<?xml-stylesheet href="/feed-style.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:media="http://search.yahoo.com/mrss/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:podcast="https://github.com/Podcastindex-org/podcast-namespace/blob/main/docs/1.0.md" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd">
  <channel>
	<title>Libre Solutions Network</title>
	<link>https://libresolutions.network/</link>
	<description>Freedom in the digital age</description>
	<generator>Hugo -- gohugo.io</generator>
	<language>en-ca</language>
	<image>
    <url>https://libresolutions.network/logo.png</url>
    </image>
	
	<podcast:funding url="https://liberapay.com/Gabe">Support this work!</podcast:funding>	
	<item>
		<title>Fungible Digital Infrastructure for bottom-up resilience and censorship resistance</title>
		<link>https://libresolutions.network/articles/fungible-infrastructure/</link>
		<pubDate>Wed, 06 May 2026 13:57:40 +0000</pubDate>
		<guid>https://libresolutions.network/articles/fungible-infrastructure/</guid>
		
		<image>https://libresolutions.network//media/stock/switch.avif</image>
		<media:thumbnail href="https://libresolutions.network//media/stock/switch.avif" />
		<itunes:image href="https://libresolutions.network//media/stock/switch.avif" />
		<description>They can&#39;t stop the signal: Manyverse, Nostr, Delta Chat  &amp; Mitra</description>
		<content:encoded>&lt;p&gt;In our uncertain and chaotic times, it is very easy to be pessimistic about technological freedom. For many, much of the world wide web has congealed into a small set of overtly tyrannical systems. Social media has gone from a place where people express themselves and interact with loved ones, to a digital circus with a quirky but dangerous machine ringmaster. To make matters even worse, most of the actual devices we hold and interact with have become dreadful to interact with. A simple question of &amp;ldquo;how do I directly send this photo/video/document to you?&amp;rdquo; becomes a negotiation of different apps and services. It seems like a cruel joke that personal computing devices are not at all new, yet basic fundamental features are mired in arbitrary complexity. Why can&amp;rsquo;t things just work and be intuitive? This is because much of our digital experience is built primarily for the convenience of the corporations that want to harvest our data, rather than being built for utility first and foremost.&lt;/p&gt;
&lt;p&gt;This isn&amp;rsquo;t because engineers and programmers are evil, in fact I would argue things would be much worse if they actually were. The biggest problem is that there is not a great deal of resources being invested in building truly general purpose digital tools for people. Software &amp;amp; hardware freedom are often seen as lofty goals to the degree people can conceptualize them at all. This is primarily because actual change requires a dramatic shift in not just the systems we use, but also how they fundamentally work. It is high time that the people begin to direct cyberspace for the benefit of each other, rather than institutions that seek to micro-manage us. Changing paradigms isn&amp;rsquo;t easy, but the first step is recognizing how radically different things can be.&lt;/p&gt;
&lt;p&gt;These days, almost everyone has to contend with a corporate gate-keeper for almost any action online. Despite how ingrained this is to our digital landscape, it is far from a fundamental technical necessity. In fact, there are many solutions to similar problems that all have different qualities and trade-offs. If you have problems with Big Tech social media giants, it is certainly easier than ever to start up your down independent social media presence, but that also has you contending with a different set of challenges. It would be nice if it was possible to &amp;ldquo;have our cake and eat it too&amp;rdquo; in terms of convenience as well as privacy and censorship resistance. I believe we are actually at the cusp of a phenomenal opportunity to have just that.&lt;/p&gt;
&lt;h2 id=&#34;conceptualizing-fungible-digital-infrastructure&#34;&gt;Conceptualizing fungible digital infrastructure&lt;/h2&gt;
&lt;p&gt;When your digital devices work, you don&amp;rsquo;t have to think about how the electricity they run was generated or where it comes from. Power from an outlet or battery just seamlessly works for you. It would be really nice if our tools had the same capacity when performing basic functions. From an engineering perspective this is possible, but requires addressing a couple of pertinent points. When I send a file, is it sent directly to the recipient? Over what transport mechanism? If the recipient is offline, is the file stores somewhere until they come online, where and how? The answers to these questions all have different trade-offs and implications which is why we have so many different messaging apps and other similar tools.&lt;/p&gt;
&lt;p&gt;There are techniques that allow for systems to leverage inter-changeable resources to accomplish tasks. For example, a public file-hosting server can be used to share large files in chats or social media apps. This is a good start but can be decentralized further. You could use a standard protocol like object storage to support access control and allow use of any provider. Doing this means that the program or app doesn&amp;rsquo;t care what servers are being used as long as it supports storing and sharing files. By building systems that treat infrastructure as a fungible utility redirects incentives towards the best of all worlds. People can select providers they trust, are reliable, and work for them. Developers no longer need to &amp;lsquo;reinvent the wheel&amp;rsquo; every time their app needs to do something simple.&lt;/p&gt;
&lt;p&gt;Originally, I was somewhat repulsed by the idea of fungible digital infrastructure. As someone who values individual digital sovereignty, I was very concerned that the &amp;lsquo;digital nomad&amp;rsquo; approach would isolate people from their data entirely. Over time, I have learned from projects putting these techniques into practice, and reflected on the incentives around this radically different paradigm. More and more, I became convinced that this is how things should have been all along. With the benefit of hindsight, it is clear to see that much of our digital landscape is needlessly and arbitrarily consolidated around corporate bottlenecks. It is exciting to think about the possibilities of restructuring cyberspace with tools built with fungible systems as a foundation. In an attempt to communicate how I&amp;rsquo;ve come around on this, I would like to share what I&amp;rsquo;ve learned in trying to understand various examples of fungible digital infrastructure put into practice.&lt;/p&gt;
&lt;h3 id=&#34;manyverse&#34;&gt;Manyverse&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://www.manyver.se/&#34;&gt;Manyverse&lt;/a&gt; is a social network built on &lt;a href=&#34;https://scuttlebutt.nz/&#34;&gt;Scuttlebutt.&lt;/a&gt; The project was interesting for many reasons. First, it worked by keeping your data on your own device, which is a huge win for individual data sovereignty. It also would allow you to connect to others over the Internet, or other networks like &lt;a href=&#34;https://briarproject.org/&#34;&gt;Briar.&lt;/a&gt; I was able to briefly use it with my twin brother to experiment in the early days.&lt;/p&gt;
&lt;p&gt;In trying out the app, I began to understand that decentralizing not just individual systems, but means of connecting was a powerful force. It helped me conceptualize how different means to do the same thing could be harmonized to build a resilient system. Even more radical was beginning to see how peer-to-peer tools could actually leverage these techniques to get &amp;rsquo;the best of all worlds&amp;rsquo;.&lt;/p&gt;
&lt;h3 id=&#34;nostr&#34;&gt;Nostr&lt;/h3&gt;
&lt;p&gt;Coming from the &lt;a href=&#34;https://libresolutions.network/tags/fediverse&#34;&gt;Fediverse,&lt;/a&gt; I was always a bit biased against it. I initially presumed that &lt;a href=&#34;https://nostr.net/&#34;&gt;Nostr&lt;/a&gt; had little meaningful potential. Nostr&amp;rsquo;s proponents argued that not using servers was a win for censorship resistance. While that&amp;rsquo;s true, for a user without a reliable relay, this meant they were giving up coherence. With no single authoritative source for events and notifications, it can be easy to miss things.&lt;/p&gt;
&lt;p&gt;Despite my reservations about Nostr as a whole, I remain open-minded to the project. Like many decentralized systems it&amp;rsquo;s constantly evolving and there genuinely is a great deal of promise. One simple thing about it is that (for better or worse) most Nostr clients add image links as attachments to posts. It&amp;rsquo;s a small thing but it does make a big difference that clients themselves can choose to seamlessly support a image hosting solution for the users.&lt;/p&gt;
&lt;h3 id=&#34;delta-chat&#34;&gt;Delta Chat&lt;/h3&gt;
&lt;p&gt;It was only when I actually started using &lt;a href=&#34;https://delta.chat/en/&#34;&gt;Delta Chat&lt;/a&gt; consistently did I begin to properly appreciate fungible digital infrastructure. When I first started using it, it was mostly &amp;ldquo;e-mail but chat, and also better and private&amp;rdquo;. You would connect the client to your e-mail address and things would just work out of the box. Simple enough, and fancifully backwards-compatible. It seemed like a great option for moving people from old systems to something much better. In many ways, Delta Chat already proved itself to be remarkably resilient to &lt;a href=&#34;https://cyberinsider.com/delta-chat-rejects-russian-authorities-request-for-user-data/&#34;&gt;state level demands.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;But over the course of using it, Delta Chat has &lt;a href=&#34;https://chatmail.at/&#34;&gt;evolved quite a bit.&lt;/a&gt; It also migrated from using a single e-mail server to &lt;a href=&#34;https://fosdem.org/2026/schedule/event/3F9VTU-deltachat-chatmail-relays-multi-transport/&#34;&gt;inter-changeable relays.&lt;/a&gt; Having actually used Delta Chat for a while I&amp;rsquo;ve been very impressed with how it actually works. It feels reliable, and seems to be getting better all the time. It supports a wide variety of fascinating features like in-chat apps and even experimental peer-to-peer calls. I am certainly eager to see how Delta Chat evolves moving forward.&lt;/p&gt;
&lt;h3 id=&#34;mitra-mini&#34;&gt;Mitra Mini&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://codeberg.org/silverpill/mitra&#34;&gt;Mitra&lt;/a&gt; is an explicitly pro-decentralization Fediverse instance. It supports many fancy features like Monero donations and even &lt;a href=&#34;https://libresolutions.network/operations/shadow&#34;&gt;darkweb&lt;/a&gt; federation. I had the pleasure of publishing a &lt;a href=&#34;https://libresolutions.network/articles/mitra/&#34;&gt;Q&amp;amp;A&lt;/a&gt; with the developer Silverpill and for a time ran my own instance. In that Q&amp;amp;A Silverpill stated he wanted Mitra to become &amp;ldquo;a powerful social media server that has everything you need, costs nothing and can run in your pocket.&amp;rdquo; and has made some very exciting progress towards that goal.&lt;/p&gt;
&lt;p&gt;Recently, Silverpill &lt;a href=&#34;https://mitra.social/objects/019de9a2-7769-7713-85c9-ad8e8599268d&#34;&gt;announced&lt;/a&gt; that &lt;a href=&#34;https://codeberg.org/silverpill/minimitra&#34;&gt;Mitra Mini&lt;/a&gt; now supports a peer-to-peer synchronization mode. Meaning that Mitra no longer needs to use the Internet to communicate, and can instead use the &lt;a href=&#34;https://devnonsense.com/posts/sneakernet/&#34;&gt;sneakernet.&lt;/a&gt; Seeing multiple systems working towards the goal of being &lt;em&gt;&amp;rsquo;transport-neutral&amp;rsquo;&lt;/em&gt; is a fascinating development that can route around surveillance and censorship.&lt;/p&gt;
&lt;h2 id=&#34;future-possibilities&#34;&gt;Future possibilities&lt;/h2&gt;
&lt;p&gt;It is my hope that the cyber rebels of the world consider this paradigm and find ways to help people get the most out of it. Having had my own mind changed on the potential of these techniques, I can appreciate the abundance of opportunities in this space. It is my opinion that this way of organizing cyberspace can exemplify how digital freedom and autonomy is actually pro-social rather than anti-social. In a time where our online experience is so overtly hostile and manipulative, it is ever so crucial to consider ways to course correct.&lt;/p&gt;
&lt;h3 id=&#34;laying-the-foundation&#34;&gt;Laying the foundation&lt;/h3&gt;
&lt;p&gt;Fungible digital infrastructure is fascinating in software, but it&amp;rsquo;s certainly possible on the hardware level as well. Communities can pool together resources that provide shared utilities such as file storage/sharing, and other online services. Net neutrality becomes less of a policy, and more of a fundamental structure we work to maintain like other utilities.&lt;/p&gt;
&lt;h3 id=&#34;private-secure--direct-connections&#34;&gt;Private, secure &amp;amp; direct connections&lt;/h3&gt;
&lt;p&gt;I anticipate that &amp;lsquo;freedom-tech&amp;rsquo; generally is going to rely more and more on transport neutrality. Being able to send data reliably without a persistent connection is certainly very valuable for censorship resistance. It&amp;rsquo;s possible that a layered application of these techniques can allow for direct connectivity without many of the drawbacks of existing online systems.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Directive 4 of the Internet</title>
		<link>https://libresolutions.network/guest-posts/directive-4/</link>
		<pubDate>Mon, 27 Apr 2026 06:11:43 +0000</pubDate>
		<guid>https://libresolutions.network/guest-posts/directive-4/</guid>
		
		<description>ICANN and our technological landscape</description>
		<content:encoded>&lt;p&gt;Most analyses of whatever is currently wrong reveal that before the current thing went wrong, there was something else just before it that was also wrong.&lt;/p&gt;
&lt;p&gt;When I have meditated on this and attempted to regress as far as possible without analyzing Layer 1, it becomes clear that a key problem that remains unresolved is the exclusive network that limits us and can be weaponized against all of us.&lt;/p&gt;
&lt;p&gt;Internet is a word used to refer to all networks using the Internet Protocol (IP) and under this definition a network is not necessarily connected to other networks.&lt;/p&gt;
&lt;p&gt;The Internet Corporation for Assigned Names and Numbers (ICANN) controls an exclusive network via their own networking suite. The most critical function of the ICANN-controlled networking suite (ICANN-NS, unless someone suggests something better) is control of addresses and routing. Being that this is an exclusive network, not only can ICANN approve who uses the network, they can expel anyone previously approved.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/all-icann.avif&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;While ICANN has remained relatively neutral in its stewardship of the ICANN-NS, the suite can, at any time, be weaponized. While most people may initially consider merely the quantity of IP addresses possible and thus conclude that ICANN cannot control every single user, the more useful analysis is on the number of organizations approved to operate within the ICANN-NS &amp;ndash; a significantly smaller and more manageable number. Almost all organizations with assigned numbers require having those numbers as a core part of their business. Threatened with expulsion from the ICANN-NS, all of these companies will either comply with whatever ICANN requires or go out business.&lt;/p&gt;
&lt;p&gt;It could be said that because ICANN has never weaponized the ICANN-NS against its users, it can also be said that ICANN has not adequately protected its users. In the case of LLM training, it can be argued that more users are harmed by the activities of the LLM bots across the ICANN-NS than benefit from the same bots. The activities of the LLM bots include violating myriad published protocols, notably IP address spoofing. Thus, ICANN is minimally derelict in their oversight and potentially a cruel master.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/directive-4.avif&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;Networks operating completely independent of the ICANN-NS are sparse.[1] Implementations of mesh networking are usually regional. My personal, limited experience with public mesh networks is that they are heavily saturated and used primarily to access bridges to the ICANN-NS free of charge. I have observed that many people taking part in mesh networking believe that money should not exist and everything should be free.&lt;/p&gt;
&lt;p&gt;Another competitive response would be a freely-associative[2] network that includes following protocols to negotiate payment options between nodes and has no central authority.&lt;/p&gt;
&lt;p&gt;At the physical layer, real assets are required for any network to function. I believe that my limited experience with mesh networking is at least correlative with fundamentals of economics which would conclude that such a free service cannot sustain itself. Therefore, somehow, physical resources must be available to propagate and sustain a network.&lt;/p&gt;
&lt;p&gt;A protocol could be created to quickly negotiate an agreed ledger[3] to be maintained between two nodes. The purpose of the protocol is for node operators to quickly determine if they have compatible payments and to agree on terms for balance settlement.&lt;/p&gt;
&lt;p&gt;Since the protocol is very flexible in the sense that it could permit gratis service generally, limited gratis services, physical (or &amp;ldquo;manual&amp;rdquo;) remuneration, remote exchange services, or any combination thereof, and to include terms to re-negotiate and scale, node operators would become completely in control of what reaches their nodes.&lt;/p&gt;
&lt;p&gt;In the case of LLM bots abusing networks and increasing labor and hardware expenses, the LLM bot operator could be converted into a funder for increased labor and hardware expansion or just go away. Not to mention that the ever-narrowing portal of services available to dissident voices could reverse course, as this could effectively facilitate a universal micropayment system.&lt;/p&gt;
&lt;p&gt;This would also have the effect of generally reducing overall hardware requirements at nearly every step, nearly eliminate market viability for DDoS attack mitigation services, and provide marginal ease from the current A.I. industry hardware stack supply chain attacks.&lt;/p&gt;
&lt;p&gt;At the same time, it could spark an entrepreneurial boom in the form hyper-local ISPs, such as small roaming nodes, mobile node stations (e.g., parked vehicles, trailers, etc.) and various support services, such as network analytics indicating geographic demand for bandwidth. This would be analogous to dial-up ISPs that formed during the 1990s, which were effectively a precursor to broadband services, establishing a customer base with inexpensive service prior to the more capital-intensive broadband network construction.&lt;/p&gt;
&lt;p&gt;The challenge for all such proposed ideas is getting anyone to take any meaningful action. For any action to ever be taken, the idea has to somehow be presented, shared, discussed, critically analyzed, and responded to by both proponents and opponents. Then, ideally, a usable and useful protocol can be proposed, tested, implemented, and maintained.&lt;/p&gt;
&lt;h3 id=&#34;notes&#34;&gt;Notes&lt;/h3&gt;
&lt;p&gt;[1] The InterPlanetary File System (IPFS) may be able to operate without the ICANN-NS, it is currently not actually useful without the ICANN-NS. If ICANN decided that it does not want IPFS on the ICANN-NS, they could threaten operators with expulsion if they do not exclude the IPFS from traversing their networks.&lt;br&gt;
[2] Not &amp;ldquo;inclusive,&amp;rdquo; as this word implies users are required be part of the network and are additionally required to interact with everyone on the network.&lt;br&gt;
[3] The word &amp;ldquo;ledger&amp;rdquo; is used in the most generic sense and not to imply blockchain technologies. I would, in fact, argue against blockchains in this application.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Bring your voice: Guest posts welcome</title>
		<link>https://libresolutions.network/guest-posts/submit-yours/</link>
		<pubDate>Tue, 24 Mar 2026 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/guest-posts/submit-yours/</guid>
		
		<description>Help spread the word</description>
		<content:encoded>&lt;p&gt;Moving forward the Libre Solutions Network is now welcoming guest posts. I believe this is an excellent opportunity to bring in more voices interested in advancing digital freedom and autonomy. Things are quite dire these days and I believe it is time to use what I&amp;rsquo;ve created to help lower the barrier to entry for others.&lt;/p&gt;
&lt;p&gt;I am first and foremost interested in personal experiences written in the first person. Why do you care about privacy? How have restrictions on technological freedom impacted your life? What do you long and hope for in a better technological future? I&amp;rsquo;m also very interested in helping recruit attention and assistance to interesting and truly ground-breaking projects. There is certainly a great deal of potential in the bright minds of the cyber rebels online, so there is a great deal to look forward to once we begin.&lt;/p&gt;
&lt;p&gt;To be clear, the bar for new submissions is high. I fully intend to filter out half-baked AI-written submissions and marketing for various products. The content of this site is fairly political so politics is acceptable but aggression is not. This project is explicitly anti-war.&lt;/p&gt;
&lt;h3 id=&#34;why-contribute&#34;&gt;Why contribute?&lt;/h3&gt;
&lt;p&gt;The Libre Solutions Network receives world-wide attention and has been featured on &lt;a href=&#34;https://corbettreport.com/how-to-really-resist-digital-id/&#34;&gt;The Corbett Report&lt;/a&gt; and &lt;a href=&#34;https://geopoliticsandempire.com/&#34;&gt;Geopolitics &amp;amp; Empire&lt;/a&gt;. I also personally maintain a reasonably sized newsletter. This site is mirrored to both Tor &amp;amp; I2P and regularly receives traffic via these routes. The Libre Solutions Network was designed to be a resilient and censorship-resistant initiative, and as such I think it is crucial to explicitly welcome &lt;strong&gt;anonymous submissions.&lt;/strong&gt; While I am happy to link your name/website this is purely optional.&lt;/p&gt;
&lt;h3 id=&#34;ideal-posts&#34;&gt;Ideal posts&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Anything related to Free Software &amp;amp; Hardware Projects&lt;/li&gt;
&lt;li&gt;Digital Autonomy (Privacy, Security, and independent cyberspace)&lt;/li&gt;
&lt;li&gt;Complaints about the state of big tech &amp;amp; cyberspace&lt;/li&gt;
&lt;li&gt;Censorship resistance and anonymity&lt;/li&gt;
&lt;li&gt;Personal experiences and opinions on anything related to LSN content/topics&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;terms&#34;&gt;Terms&lt;/h2&gt;
&lt;p&gt;I am asking that you submit me perpetual permission to publish your guest post on this site. This requires the post to be your own original creation and not AI or otherwise copied from elsewhere. I reserve the right to remove posts without notification.&lt;/p&gt;
&lt;h3 id=&#34;basic-rules&#34;&gt;Basic rules&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Submitted as markdown or plain text&lt;/li&gt;
&lt;li&gt;Reasonable length (5-10 minutes in estimated length) but this is flexible based on subject matter &amp;amp; quality&lt;/li&gt;
&lt;li&gt;Images are welcome but video is discouraged&lt;/li&gt;
&lt;li&gt;Links are welcome but referral &amp;amp; tracking links are explicitly forbidden&lt;/li&gt;
&lt;li&gt;Optional attribution (Name/Link or anonymous)&lt;/li&gt;
&lt;li&gt;Personal accounts and editorials are preferred&lt;/li&gt;
&lt;li&gt;Audio voiceovers (to include in the podcast RSS) are welcome&lt;/li&gt;
&lt;li&gt;I may make non-content corrections for spelling and other simple mistakes, subject to approval by the author&lt;/li&gt;
&lt;li&gt;Can&amp;rsquo;t market a product&lt;/li&gt;
&lt;li&gt;Must be original work&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;approval&#34;&gt;Approval&lt;/h3&gt;
&lt;p&gt;All approvals are subject to my own discretion at my leisure. The Libre Solutions Network is my passion project that I can only devote so much time to. I will do my best to respond quickly to submissions I&amp;rsquo;m interested in publishing. Timing will inevitably shift with the nature and volume of submissions sent to me.&lt;/p&gt;
&lt;h3 id=&#34;how-to-submit&#34;&gt;How to submit&lt;/h3&gt;
&lt;p&gt;Reach out to &lt;a href=&#34;https://gabe.rocks/get-in-touch/&#34;&gt;Gabriel&lt;/a&gt; &lt;a href=&#34;http://gabriel262me3lgv3w7xohtesg3laoojmtye644pwirhdm73qmedmsqd.onion/get-in-touch/&#34;&gt;Tor&lt;/a&gt; &lt;a href=&#34;http://gabe.i2p/get-in-touch/?i2paddresshelper=pRQwxGBE3emBruaNNRbHR-Y5sUBZFfHLr0OBh1W3JbKlFDDEYETd6YGu5o01FsdH5jmxQFkV8cuvQ4GHVbclsqUUMMRgRN3pga7mjTUWx0fmObFAWRXxy69DgYdVtyWypRQwxGBE3emBruaNNRbHR-Y5sUBZFfHLr0OBh1W3JbKlFDDEYETd6YGu5o01FsdH5jmxQFkV8cuvQ4GHVbclsqUUMMRgRN3pga7mjTUWx0fmObFAWRXxy69DgYdVtyWypRQwxGBE3emBruaNNRbHR-Y5sUBZFfHLr0OBh1W3JbKlFDDEYETd6YGu5o01FsdH5jmxQFkV8cuvQ4GHVbclsqUUMMRgRN3pga7mjTUWx0fmObFAWRXxy69DgYdVtyWypRQwxGBE3emBruaNNRbHR-Y5sUBZFfHLr0OBh1W3JbKlFDDEYETd6YGu5o01FsdH5jmxQFkV8cuvQ4GHVbclsk2qXx~Bw-EqDae6pcqQKRZb3ljyQL~NoEfWVcNfzHFjBQAEAAcAAA==&#34;&gt;I2P&lt;/a&gt; via any of the linked contact methods.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>We will come to regret our every use of AI</title>
		<link>https://libresolutions.network/articles/ai-regret/</link>
		<pubDate>Wed, 11 Mar 2026 13:58:08 +0000</pubDate>
		<guid>https://libresolutions.network/articles/ai-regret/</guid>
		
		<description>Drawing the distinction between using tools and having systems use you</description>
		<content:encoded>&lt;p&gt;It may be a bold statement, but I feel compelled to warn about the risks of using presently offered AI tools. My goal isn&amp;rsquo;t to convince you to avoid these systems entirely, but to at least consider how judiciously they should be used if at all. This is because many people are going to use these tools, and there needs to be a more precise argument made than to either uncritically reject or embrace it all. This piece is an attempt to draw a bold distinction between what we have, and what could be. The difference is vast, and recognizing it highlights opportunities for the road ahead.&lt;/p&gt;
&lt;h2 id=&#34;machine-minds-and-machine-hearts&#34;&gt;Machine minds and machine hearts&lt;/h2&gt;
&lt;p&gt;In such a relatively short period of time, we have gone from &amp;ldquo;doing work with computers&amp;rdquo; being a novel and fringe idea to it being the irritating background noise of our lives. Institutions shifted away from paper records to digital files and many of us shrugged and called it progress. Change is often good, but not all change is good. Even change that appears good at first, can often come along with serious downsides. While change itself is inevitable, there will always be alternative paths forward. As technological tools become more enmeshed with every aspect of our life, it becomes increasingly important to ask how and why. The stakes are high, and lives hang in the balance as the wartime applications of AI &lt;a href=&#34;https://corbettreport.com/the-ai-wars-you-are-not-prepared/&#34;&gt;come to the forefront.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;ldquo;AI&amp;rdquo; has become a vague category to mean a wide variety of tools and systems like LLM chatbots, generative tools and automated flows. These tools, when combined with all the information available, creates a colossus of immense power. People are then asking themselves many questions, but the most actionable seems to be how to interact with it, if at all. Personally, I think it is more important to consider the consequences of its use rather than merely asserting what use-cases are and aren&amp;rsquo;t valid. Regardless of our intentions, these systems have structures and characteristics that must be understood to have an informed opinion on their use. The benefits of this particular technology may be overshadowed by the dangers created by our indifference to the fine details of its implementation.&lt;/p&gt;
&lt;p&gt;In any discussion about AI use, I often see people fiercely exclaim that AI tools are no threat to their domain of expertise. I call this  &lt;strong&gt;Gell-mann&amp;rsquo;s Apathy:&lt;/strong&gt; &lt;em&gt;people are often more accepting of using AI for endeavors outside domains they care about, but are often much more judicious and critical of AI use within their own domains.&lt;/em&gt; Which is the skill domain equivalent to &lt;a href=&#34;https://en.wiktionary.org/wiki/Gell-Mann_Amnesia_effect&#34;&gt;Gell-Mann Amnesia&lt;/a&gt; where people are able to see the flaws in reporting on subjects they understand, but often take things at face value outside their familiarity. Proficient programmers argue that AI agents are not a threat to truly skilled software developers, artists point out that creative works lack substance, and writers can foreshadow the consequences of devaluing the written word. Only one wholly under the spell of the AI hype would dismiss all these critical objections. On the other hand, we can certainly recognize the powerful incentives that drive the use of these systems.&lt;/p&gt;
&lt;p&gt;For example, I will explain the magic behind &amp;lsquo;Vibe-coding&amp;rsquo;. Instead of merely using LLM chatbots to speed up searching for information and writing code, why not have the &amp;lsquo;AI Agent&amp;rsquo; directly try running the program. That way you automate away the step of copying error messages back-and-forth. The consequence of this is that &amp;lsquo;software that compiles&amp;rsquo; and even &amp;lsquo;software that passes tests&amp;rsquo; is something that can be effectively brute-forced with enough computing power and energy. At least for now, it would seem that the financial costs of vibe-coding to end-users are being discounted by orders of magnitude. But the answer to flaws in AI written software is often to throw more AI at it. Instead of adding &amp;lsquo;don&amp;rsquo;t make any mistakes&amp;rsquo; to the prompt, you use another agent to come up with known issues to check for and test against. To the degree this all works, it&amp;rsquo;s fairly impressive as one as one doesn&amp;rsquo;t try to imagine the absurd levels of waste involved. To make matters worse, this huge cost is being paid to seize a powerful monopoly over computing itself. The long-term impacts on privacy and freedoms are hard to overstate.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://www.davidrevoy.com/article1114/transmitting-everything-you-say&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/avian-intelligence-spying.avif&#39; 
&gt;

&lt;/a&gt;



&lt;/div&gt;
&lt;p&gt;The hardest part is to recognize that the current iteration of these tools isn&amp;rsquo;t the only possibility. It is entirely possible, maybe even within reach, to have a set of implementations that respect digital autonomy. Economically sound, pragmatic use of these techniques could be a boon to society at large. Sadly, we&amp;rsquo;ll never get there if we treat the existing crop of AI tools as the only option. In identifying the broader range of possibilities it is much easier to recognize and work towards better ends.  This requires us to wrestle not with the comforting distractions sent our way, but the fundamental realities that challenge even our own foundations. It is a difficult process, but it is the only way to chart a different path than what malevolent forces have planned for us. If we are not careful, we could already be living (or have let pass) &lt;a href=&#34;https://fedi.gabe.rocks/objects/019c86c7-9bc8-75f5-223d-1271ec53a283&#34;&gt;peak technological freedom.&lt;/a&gt; If this is the case, we must consider the grave impact this is likely to have on all other aspects of our lives.&lt;/p&gt;
&lt;p&gt;It is high time to explicitly recognize that it is our responsibility to ensure technological advancement isn&amp;rsquo;t an idol we sacrifice society and each other to. Yes, the fruits of powerful tools and systems can be wonderful for us and humanity at large, but there will always be dangers to keep watch for. Merely accepting anything offered to us, or even tolerating what is imposed on the public without judgement is a recipe for disaster. Enshrining even the best protections in laws or regulations will have little to no impact when the abuses are forged into the system structurally. Now more than ever, it is paramount that we recognize the fine line between using tools and letting systems use us. Many systems of our time definitely blur those lines, and often it seems unavoidable.&lt;/p&gt;
&lt;h3 id=&#34;tool-use-is-what-makes-us-smart&#34;&gt;Tool use is what makes us smart&lt;/h3&gt;
&lt;p&gt;I wouldn&amp;rsquo;t be writing this if I didn&amp;rsquo;t love technical tools and what they can do for all of us. I love that &lt;em&gt;at least for now&lt;/em&gt;, the &lt;a href=&#34;https://www.mnot.net/blog/2026/02/20/open_systems&#34;&gt;open web&lt;/a&gt; offers the potential for genuine and authentic bottom-up cultural expression and exchange unprecedented in human history. I am actually quite excited about how sophisticated systems make it easier than ever to discover insight from others with radically different experiences. For all its faults: even YouTube deserves a great deal of credit for being a phenomenal resource for making it easier to learn new things. Computers and the Internet have certainly democratized not just access to information, but also engagement with culture as a whole. It is clear that we haven&amp;rsquo;t even begun to appreciate the limitless potential technology can offer us. That potential comes with risks, and it is important that we recognize the inevitable shifts in power for and against the people.&lt;/p&gt;
&lt;p&gt;For example, if somebody asked me &amp;ldquo;should hospitals use AI?&amp;rdquo; I would have to ask for clarification. I certainly don&amp;rsquo;t think medical staff should have to consult with a chatbot before taking any action or making a decision. On the other hand, it would be absolutely negligent if we didn&amp;rsquo;t improve hospitals with the advancements in machine learning, automation and robotics. The line gets real difficult to see when the issue comes to personal health data. Unfortunately, information is fungible. This means that once information is collected it is not possible to guarantee it won&amp;rsquo;t end up in the wrong hands. The more sophisticated these systems get, the more dangerous their misuse becomes. As the technological landscape consolidates, the stakes only get higher, which creates a powerful feedback loop for further control and tyranny.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;I’m no “techno-optimist” because I know the details matter.&lt;br&gt;
I’m no “techno-pessimist” because I can see how much potential is needlessly wasted.&lt;br&gt;
I wholeheartedly believe the way forward is with equal parts courage and skepticism.&lt;br&gt;
Without courage, you’ll never try to improve anything.&lt;br&gt;
Without skepticism you’ll fall for every half-baked failure that comes along.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;I can recognize the appeal in leveraging all that can currently be known to build a &lt;a href=&#34;https://about.gitlab.com/topics/ci-cd/&#34;&gt;CI/CD&lt;/a&gt; pipeline to improve society on scales big and small. Quite ironically, it always seems easy to argue for more bureaucracy in the name of efficiency. Incorporating &lt;a href=&#34;https://www.wired.com/story/ai-agent-rentahuman-bots-hire-humans/&#34;&gt;people into automated workflows&lt;/a&gt; is merely the formalization that civilization isn&amp;rsquo;t something we co-create, but is something that manages us. Ultimately, it would seem that this is the ultimate goal of the &amp;ldquo;AI industry&amp;rdquo;. People seem to believe that this specific implementation is the only way to create technological advancement, but this isn&amp;rsquo;t at all true. It is highly ironic that those who are the most fervent proponents of imposing the use of certain tools on the public are also the most fierce in opposing bottom-up innovation. It seems that when the benefits of the tools are too good to pass up, that suddenly real competition is too dangerous to allow. &amp;lsquo;Innovation&amp;rsquo; that must be protected from failure (or even slowing down) is &lt;a href=&#34;https://tante.cc/2026/02/20/acting-ethical-in-an-imperfect-world/&#34;&gt;domination disguised as progress.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This is because if individuals, institutions, and communities were able to build and experiment on their own terms &amp;lsquo;disruption&amp;rsquo; would become the norm rather than the exception. Powerful interests would have to spend much more effort keeping pace with genuine advancement, rather than managed relative stagnation. It is baffling in a time with rapid world-wide information sharing and collaboration that we are still confined by structures constructed to gate-keep bottom-up change. The answer to that is outside the scope of this piece, but ultimately technological freedom is very intertwined with freedom in other domains like economics, civil rights and even health. It is worthwhile to appreciate the efforts in those areas. One of the biggest reasons people struggle to recognize the potential for a better future is just how many things would rapidly change if negative feedback loops were replaced with positive ones.&lt;/p&gt;
&lt;p&gt;We already have a great deal of &amp;lsquo;power tools&amp;rsquo; that are downstream of artificial intelligence research. Text-to-speech and speech to text have both gotten a lot better and more accessible. For all their limitations, even small LLMs can do fascinating things. Functions like interacting with computers and systems via chat or voice are a genuinely useful patterns to consider. With the right approaches, and doubling-down on hardware &amp;amp; software freedom, I am confident a great deal of good can come without the disastrous consequences of our current path. The good news is that the problem isn&amp;rsquo;t actually the technologies themselves, but how they are packaged. In hindsight, it would seem that if digital privacy was as unreachable as people have been conditioned to believe, the efforts to consolidate our entire computing experience wouldn&amp;rsquo;t be necessary.&lt;/p&gt;
&lt;p&gt;Because nothing is new under the sun, I&amp;rsquo;m going to draw a comparison between the expansion and domination of social media from the 2010s to what we are likely to see with AI moving forward. It would seem that despite spending billions on &amp;ldquo;AI safety&amp;rdquo; we are in the process of making the very same mistakes at a whole new level. This is precisely because I don&amp;rsquo;t believe the harms from the that era were an accident, but rather the intended outcome. While there is now a &lt;a href=&#34;https://blog.system76.com/post/system76-on-age-verification&#34;&gt;growing push&lt;/a&gt; to address these issues by various governments, I can&amp;rsquo;t take them at face value when we are in the process of rapidly re-creating a much worse situation with AI.&lt;/p&gt;
&lt;h3 id=&#34;weve-seen-this-all-before&#34;&gt;We&amp;rsquo;ve seen this all before&lt;/h3&gt;
&lt;p&gt;In hindsight, it is clear that big tech social media served a variety of functions. For the vast majority of people, it transformed the web from something you would surf and search to a doom-scrolling casino. With huge numbers of people flocking to participate, businesses, individuals, and even institutions felt immense pressure to adopt these growing platforms. In hindsight this was a terrible deal. Social media giants would eventually hold their captive audiences hostage, algorithms were tweaked to effectively ransom voices own audience against them. The deal changed over time, first by gradually reducing reach, to blatant and extreme acts of censorship.&lt;/p&gt;
&lt;p&gt;The mass adoption of social media had disastrous consequences, but it filled a very useful niche. By leveraging the rise of the smartphone, these companies were able to offer a strong illusion of what the web being open to the masses would be like. This came at a high cost, shifting online social interactions from a diverse range of self-styled unique online experiences to a standardized commercial machine was a huge blow to the concept of online anonymity. What was once common sense advice to stay safe online was beginning to seem suspicious, if not dangerous. The more people participated on social media rather than the open web, cyberspace itself would consolidate in favor of this trend.&lt;/p&gt;
&lt;p&gt;The impacts of all this have fundamentally altered our online experience. Surveillance, censorship, and algorithmic manipulation are a given. Despite many data breaches having disastrous impacts on people, we are seeing an acceleration of the information being required from people through &lt;a href=&#34;https://reclaimthenet.org/new-york-bill-would-force-age-id-checks-at-the-device-level&#34;&gt;ID verification schemes&lt;/a&gt; and other measures. The combination of social media dominance and the rise of the smartphone were a double-tap on individual privacy online. Your digital footprint was no longer mere traces in various places, but is now a commodity bought and sold in real-time. The invasions of privacy themselves created new risks as sensitive information about people was abused for a wide variety of ends from scams to hostilities.&lt;/p&gt;
&lt;p&gt;The worst of it all is what could have happened in its absence. If we hadn&amp;rsquo;t &amp;lsquo;put all our eggs&amp;rsquo; into the Big Tech basin we could have had radically better systems perform the same functions. Systems and tools are built on assumptions, and those assumptions are usually built on the way things are. It takes radical vision to imagine, never mind build on a different set of principles. This means that as the ground shifts, so does the nature of systems built on top of it. That&amp;rsquo;s the reason why the online social environment has been so chaotic and difficult to keep up with. The trouble is that we have been relying on consolidated technological structures that the idea of truly &lt;a href=&#34;https://www.adamsdesk.com/posts/8-reasons-self-hosting-is-important/&#34;&gt;independent digital infrastructure&lt;/a&gt; is fringe. So much so, that the idea of building a &amp;lsquo;cyberspace for and by the people&amp;rsquo; is essentially unthinkable.&lt;/p&gt;
&lt;p&gt;The trap is being confined to the dominant paradigm. Power decides what is projected top-down and it is ultimately fruitless to try to &amp;lsquo;out-compete&amp;rsquo; these systems on their own terms. In hindsight, it would seem that there have been many iterations of the same psyop to stifle independent technical talent. The pattern is quite straightforward: pitch to status-seeking individuals that they&amp;rsquo;ll be rewarded handsomely for building what power needs. Instead of having government build social media and the censorship apparatus on top of it, it was auctioned off to whatever platforms could get the most users. Social media quickly transformed from being about connecting with contacts to &amp;lsquo;people farming&amp;rsquo; for data collection. We then saw this very same pattern with the blockchain &amp;lsquo;revolution&amp;rsquo;. Not long after a digital token for &amp;lsquo;peer to peer digital cash&amp;rsquo; caught worldwide attention, the focus shifted from emancipatory technology towards running more and more brazen ponzi schemes. Decentralization becomes less about &amp;lsquo;changing the game&amp;rsquo; but more about trying to beat the malevolent forces at their own game. None of this means there aren&amp;rsquo;t merits to social media, blockchain technologies, or even AI tools but there are fine distinctions that need to be made.&lt;/p&gt;
&lt;h3 id=&#34;the-feedback-loop&#34;&gt;The feedback loop&lt;/h3&gt;
&lt;p&gt;There are a lot of great reasons to never use &amp;lsquo;AI tools&amp;rsquo; in the way they are currently available to people. Research has already shown profound cognitive impacts to outsourcing your thinking. Multi-media generation and chatbots double-down on what is arguably the most dangerous aspect of social media: it burns you on a pyre of your base impulses and then pours gasoline on the fire. If these tools were physical products they would likely be packaged like cigarettes, with terrifying warning labels. Yet despite all this we constantly see people prophesying that these are the future, and that one must become familiar with them to not be left behind. In fact, there is a desperation behind the adoption of these tools, a burning desire to &amp;lsquo;one last sprint&amp;rsquo; their way out of the seemingly inevitable &lt;a href=&#34;https://geohot.github.io//blog/jekyll/update/2026/03/11/running-69-agents.html&#34;&gt;&amp;lsquo;permanent underclass&amp;rsquo;.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This is because what both AI evangelists and critics can see is the all-consuming nature of how the game is played. AI as it is currently understood is not mere technology, but a system of total technological domination over the public. Just as institutions and people have already ceded too much of cyberspace to the cloud, we are in danger of offering even more of our lives and society on the altar of centralized computing. The &amp;lsquo;singularity&amp;rsquo; was never to be an economic or technological boon, but rather the mere collapse of society under the weight of digital totalitarianism. Naked human dominance and tyranny was the face behind the techno-utopian mask. A generation was evicted from the ideal of home ownership by the combination of a variety of economic and social forces, it would seem that the same is taking place in cyberspace.  &amp;lsquo;Hardware is the new homes&amp;rsquo;, as the public becomes &lt;a href=&#34;https://www.tomshardware.com/laptops/laptop-prices-expected-to-soar-by-around-40-percent-as-ai-crunch-takes-hold-analyst-says-rising-mainstream-models-priced-at-usd900-could-hit-more-than-usd1-200-due-to-rising-memory-storage-and-cpu-costs&#34;&gt;priced out&lt;/a&gt; of securing a modest home server.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/diagrams/rokos-basilisk.avif&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;For at least the foreseeable future, the path of least resistance will always involve using centralized AI tools. While it&amp;rsquo;s certainly possible to run your own models on your own hardware and energy, you&amp;rsquo;d be at a massive disadvantage compared to those using the discounted costs of the cloud. This builds a significant financial incentive to shift capital away from producing consumer-friendly hardware to equipping data-centers to take over computing itself. In effect, both state &amp;amp; private investment in AI giants is effectively investing in seizing computing power and digital infrastructure from the public. For those who are already well-assimilated into the cloud, the difference is imperceptible. For those who wish to reclaim and protect digital autonomy for the people, the game is &lt;a href=&#34;https://ruudvanasseldonk.com/2026/ai-paranoia&#34;&gt;all but entirely lost.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Regardless of how ultimately useful the technological techniques behind AI tools actually are, what people are actually afraid of is the run away feedback loop that seizes control of cyberspace as society is further dominated by it. It may not matter what currency we use, or if our government ID is digital in a time where everything needs to ask the central computers for permission to take any action. This could be tolerable if we saw a commensurate rise in innovation and invention, but it seems that was just the marketing for invasive control and surveillance. People are beginning to realize that the very nature of this system is anti-social and inhuman. The question isn&amp;rsquo;t if it is bad or good, but rather how bad it&amp;rsquo;s going to be.&lt;/p&gt;
&lt;h3 id=&#34;the-super-intelligence-red-herring&#34;&gt;The &amp;lsquo;Super-intelligence&amp;rsquo; red herring&lt;/h3&gt;
&lt;p&gt;Critics often fall into the trap of believing these systems have no use or utility. It should not be at all surprising to see fascinating applications of bulk-processing the totality of society&amp;rsquo;s creative and intellectual works. The sheer magnitude of powerful machines and useful mathematics is genuinely impressive. With some margin of error, and a pretty intense amount of waste it does certainly seem achievable to fully automate a wide variety of tasks. The combination of sophisticated automation and vast information collection can certainly provide the illusion of super-intelligence, but this would be like giving paper the credit for all the knowledge contained in books throughout history. The mythology of AI super-intelligence itself is a powerful force for dis-empowering people. Just as a gang of brutes can keep an lone dissenter intimidated, people are likely to develop an inferiority complex relative to the processed output of all of human creation. This insecurity is deliberately fostered to build on learned helplessness to make AI super-intelligence an illusory self-fulfilling prophecy.&lt;/p&gt;
&lt;p&gt;When pressed, even the most fervent AI evangelists will retreat to &amp;ldquo;they&amp;rsquo;re just tools to help smart people work harder&amp;rdquo;, but it&amp;rsquo;s clear their heart isn&amp;rsquo;t in it. If the goal was truly to unleash a new revolution of innovation and progress we would see sincere efforts to radically improve education and build up people&amp;rsquo;s skills. Yet if anything, it would seem that AI is to be not an actual industry, but a bureaucratic babysitter for a public treated as a nuisance at best and an existential threat at worst. Schools and workplaces are being outfitted with systems to demote people from mere cogs in the machine, to its subjects. With this level of dispossession and displacement, it is no surprise at all that the primary applications of AI are distraction and warfare. None of these troubles are direct consequences from technological advancement, but are the culmination of power plays through the long arc of history.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://mastodon.gamedev.place/@eARCwelder@mastodon.social/114195517066458345&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/rokos-boot.avif&#39; 
&gt;

&lt;/a&gt;



&lt;/div&gt;
&lt;p&gt;Cloud AI has an immense advantage when it comes to the magnitude and variety of information available. Scale gives these large corporations access to a treasure trove of information while copyright enforcement turns a blind eye. This is an immense asymmetric advantage that allows for the building of very useful information management and retrieval systems. But this usefulness cuts both ways. The &lt;a href=&#34;https://www.schneier.com/blog/archives/2026/01/ai-and-the-corporate-capture-of-knowledge.html&#34;&gt;consolidation of information&lt;/a&gt; inside these systems drives people to be more dependent on them. The &lt;a href=&#34;https://www.marginalia.nu/log/a_132_ai_bores/&#34;&gt;mental atrophy&lt;/a&gt; of using LLMs to do work is accelerated by allowing other research skills to atrophy. Independent verification may be entirely overshadowed by all other sources reflecting back the outputs of AI systems, that may or may not be up to date or even accurate.&lt;/p&gt;
&lt;h3 id=&#34;we-have-altered-the-deal-pray-we-dont-alter-it-further&#34;&gt;&amp;ldquo;We have altered the deal, pray we don&amp;rsquo;t alter it further&amp;rdquo;&lt;/h3&gt;
&lt;p&gt;One of the biggest traps is assuming that just because these AI tools are presently generally useful, that they will always remain productive in specific domains. Your quirky genius companion is likely to reveal its true colors when alternatives fade. Just as we are seeing consumer computing being brought out of reach for most individuals, so too can specific capabilities be withheld from the users of AI systems. We may be able to salvage utility from cloud models to make cute graphics, learn interesting things, or even build software, but this is all on borrowed time. Not only will these tools continue to become more powerful. the same mechanisms of control over them will also become more sophisticated. It is entirely possible, if not outright guaranteed that at some point these tools will eventually narrow their usefulness towards various ends, and withhold access to particular groups and people. This form of &amp;lsquo;cyber exile&amp;rsquo; effectively transforms everything and everyone connected to the system into a potential adversary.&lt;/p&gt;
&lt;p&gt;It is also not a given that these systems will be as inexpensive as they presently are. The economics appear wholly unsustainable. The costs (in price or otherwise) to use these systems must inevitably rise. Therefore, all reliance on these commercially available AI tools is taking on an indeterminable future debt in exchange for short-term gain. This is highly concerning considering the already clear troubles relating to using these systems. We have already seen institutions impose AI systems for employees, it is an open question how easily individuals of society will be able to escape them at all. For it is not just about an individual&amp;rsquo;s choice to use these systems or not. Regardless of their choice, these systems are going to be used against them. Facial recognition and other surveillance systems are ubiquitous and omnipresent. Currently, opposing this adversarial model of technological tyranny is quite difficult, and gets more challenging over time.&lt;/p&gt;
&lt;h2 id=&#34;getting-off-the-fence-refusing-to-compromise-on-humanity&#34;&gt;Getting off the fence: refusing to compromise on humanity&lt;/h2&gt;
&lt;p&gt;I genuinely get it. These tools are very handy and can do a lot of interesting things. Telling someone to avoid using these tools feels like asking them to take on an immense disadvantage. That &amp;lsquo;downgrade&amp;rsquo; is relative to your perspective. The drive to replace human creativity and input with centralized compute is on its own self-defeating. It means that all those rushing to become familiar with these tools are at best racing to push themselves out of society. The paradox is that in a desperate race to not be &amp;rsquo;left behind&amp;rsquo; you realize that you had to give up to participate. My point is that being a mere technician for AI tools is highly likely to be a &amp;lsquo;crowded trade&amp;rsquo; and practitioners will be replaceable by design. This is because the exponential consolidation of cyberspace didn&amp;rsquo;t begin when people started using ChatGPT, but actually when people shifted away from independent websites to Big Tech social media services. It&amp;rsquo;s a much longer trend, and we&amp;rsquo;re merely beginning to see the deeper impacts.&lt;/p&gt;
&lt;p&gt;I am also not so naive to prescribe an all-or-nothing approach. I recognize that many are going to be confined to these systems for a variety of reasons. It is paramount that we recognize and address structural factors rather than turning on and attacking people making different choices than us. You can&amp;rsquo;t disarm totalitarian thinking with &amp;ldquo;Join me or else!&amp;rdquo;, but rather with the strength to endure long enough to build something better. People are going to use these systems and there are many disastrous consequences of it. People are also going to strive to avoid it all at great personal cost. There will be all kinds of people everywhere in between. It is paramount that those of us concerned about these issues are focusing on connecting with the people, rather than merely fighting the machine.&lt;/p&gt;
&lt;p&gt;This is because what is actually more powerful than all these systems is what we see in each other. Despite all the hype about needing to sacrifice each other for AI to &amp;lsquo;defeat China&amp;rsquo; we&amp;rsquo;re going about it all wrong. A human society that cherishes and nurtures personal agency and capacity will absolutely out-compete a system that trades what we are for false idols. It is fatefully ironic that those who desperately wish to surpass all of human achievement, knowledge, and culture are entirely unappreciative of its wonders. Art without experience, words without coherence, and even software without sense all reveal how erroneous the current path actually is. The question was never what tools we use, but always what they&amp;rsquo;re being used for? We have a small window of time to refocus on meaningful connections rather than what algorithms choose for us, doubling down on what&amp;rsquo;s real is the winning move.&lt;/p&gt;
&lt;h3 id=&#34;presence-and-purpose&#34;&gt;Presence and purpose&lt;/h3&gt;
&lt;p&gt;Everything about our present digital experience is aimed at preying on our panic. That pressure is imposed via a variety of means, but is always used as leverage against us. First and foremost it is crucial to protect your mind in these times. Peace and sanity doesn&amp;rsquo;t have to come at the expense of being informed if you properly pace yourself. Taking the time to meaningfully engage with what&amp;rsquo;s important to you allows you to bring the care that&amp;rsquo;s called for. No matter what you&amp;rsquo;re doing, be especially focused on ensuring you&amp;rsquo;re being deliberate. A relatively small amount of self-awareness can help ensure you&amp;rsquo;re using tools rather than have them using you. The line between the two is being blurred all the time, so it&amp;rsquo;s always a good practice to question why and how you&amp;rsquo;re doing things. Taking the time to dive deep into the details of your experience is helpful to keep your real goals in mind.&lt;/p&gt;
&lt;p&gt;I won&amp;rsquo;t condemn you merely for using AI tools, but I&amp;rsquo;m going to expect a lot more out of what you accomplish. With great automation I expect much greater care into the precise details. With the power to accomplish so much by using these tools, how you choose to leverage them does tell me a great deal about what you actually prioritize. Merely generating &amp;lsquo;slop&amp;rsquo; to stay relevant in social media algorithms reveals that the message was never the point. Using AI agents to &amp;lsquo;vibe-code&amp;rsquo; freedom tech &lt;a href=&#34;https://bitchat.free/&#34;&gt;can be impressive&lt;/a&gt; but can also reveal the extent of your imagination. I am personally skeptical that those who choose the &amp;rsquo;easy route&amp;rsquo; are willing to put in the care that is truly needed in our times. It&amp;rsquo;s all well and good to retort &amp;ldquo;it&amp;rsquo;s not the critic who counts&amp;rdquo;, but then don&amp;rsquo;t say we didn&amp;rsquo;t warn you.&lt;/p&gt;
&lt;p&gt;With actual vision we could demand so much more out of what&amp;rsquo;s being offered. They came onto the scene promising an acceleration of growth and innovation but in practice we are seeing breakneck corruption and escalating wars. I encourage you to recognize that you don&amp;rsquo;t have to go with the flow of top-down madness. It is difficult to chart your own path, but it is equally rewarding. Anyone saying you must yield to these systems is ultimately gambling with your future, I encourage you to take it into your own hands. Despite what the hype would make you believe, there is a phenomenal amount of opportunity outside just paying for tokens and waiting for more tokens.&lt;/p&gt;
&lt;p&gt;If you trade your ability to think on your own, or develop your own skills to compete in mass media algorithms, those algorithms can now &amp;lsquo;cut out the middleman&amp;rsquo;. It&amp;rsquo;s not that people are replaceable, but that our role in these highly consolidated structures was always arbitrary. People and communities are capable of so much more than just being managed by top-down control systems, and have so much more to offer outside those confines. I would encourage you to protect and preserve what really matters in these mad moments: communities, connection, and genuine expression. It is clear to me that the problems of our time are constructed out of our distance from those things. Do not let the demeaning of the people turn you against yourself and others.&lt;/p&gt;
&lt;h3 id=&#34;fighting-for-technological-freedom&#34;&gt;Fighting for technological freedom&lt;/h3&gt;
&lt;p&gt;Today, the vast majority of people are unaware that there are different approaches to technological systems. Despite Free and Open Source software having an outsized impact on the technological landscape, people are often still ignorant of the &lt;a href=&#34;https://www.gnu.org/philosophy/free-sw.en.html&#34;&gt;philosophy&lt;/a&gt; behind these things. It is a tragedy because an unrelenting expectation of user freedom would have avoided the social catastrophes of the social media era, and the many dangers behind AI systems. The answer lies in directly opposing the maintenance of technological monopolies as a force for control over the population. The greatest threat to technological totalitarianism is democratized innovation. Instead of relying on Big Tech AI companies to be the arbiter and bottleneck of technological progress, society could introduce advancements in parallel.&lt;/p&gt;
&lt;p&gt;It is quite convenient for those seeking power over the public, that the problems created by corporate AI are being used as a pretext to crack down on the Free and Open Web. Online anonymity is being &amp;lsquo;phased&amp;rsquo; out as corporate infrastructure creates managed gates over online services. Legislators are more than happy to tighten restrictions as they face a frustrated populace. These days I am growing skeptical that the &amp;lsquo;clearweb&amp;rsquo; will survive as a viable tool for dissent. The vast majority of the public gets all their information solely from corporate cyberspace and governments are taking full advantage of that fact. Despite all this, we are still quite far from &amp;lsquo;game over&amp;rsquo; when it comes to online censorship. If we are willing to &amp;lsquo;up our game&amp;rsquo; when it comes to technological resistance, there is still quite a lot of potential.&lt;/p&gt;
&lt;p&gt;Independent cyberspace, be it from small personal blogs to massive online communities, needs to be fiercely &lt;a href=&#34;https://cheapskatesguide.org/resistance-infrastructure.html&#34;&gt;seeded,&lt;/a&gt; nurtured, &lt;a href=&#34;https://unshadowed.substack.com/p/ai-decoding-the-psyop&#34;&gt;and protected.&lt;/a&gt; Salvaging what utility is left of existing systems is a necessary and urgent priority. There is a great deal of hardware available that can be used for all kinds of endeavors. Making the best of it is going to require acquiring and mastering new and old skills. Instead of begging corporations for the right to repair, it is clear we&amp;rsquo;re going to have to seize it with reverse engineering.&lt;/p&gt;
&lt;h3 id=&#34;cultivating-creativity&#34;&gt;Cultivating creativity&lt;/h3&gt;
&lt;p&gt;The greatest danger of our present moment isn&amp;rsquo;t hypothetical future risks, but what we&amp;rsquo;re already losing. So many are merely going through the motions of human connection, not realizing that something fundamental has broken. The first AI to destroy humanity wasn&amp;rsquo;t run on a data-center, it was the bureaucratic machine run on people. People kept going through the motions as rigid rule-following calcified every social interaction. The very fact that people could meaningfully intervene in the moment was a bug that was always going to be patched out eventually. As bad as fully-automated AI tyranny is, it&amp;rsquo;s less of a radical shift and more of the end result of a very long running trend. The damage only appears more extreme because we don&amp;rsquo;t know what we have &lt;a href=&#34;https://www.joanwestenberg.com/the-case-for-gatekeeping-or-why-medieval-guilds-had-it-figured-out/&#34;&gt;until it&amp;rsquo;s gone.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;What genuine creation has the capacity to do is to remind us all what we&amp;rsquo;ve actually lost. For most of history, culture was a negotiation between top-down impositions and genuine bottom-up expression. In recent decades, the raw domination has managed to tip the balance by surgically severing the bonds that represented a firm limit on top-down power. If we want a human culture, healing those wounds is the only thing with a hope of turning things around. The painful scars make this a very difficult problem to tackle. No progress can be made by playing the same game of treating each other as replaceable at best, and resources to be expended at worst.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://www.joshuawcotter.com/words/make-art&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/make-art.avif&#39; 
&gt;

&lt;/a&gt;



&lt;/div&gt;
&lt;p&gt;The best thing about generative art and media, is that it forces us to answer a difficult question: &amp;ldquo;&lt;em&gt;What is the point of creating?&lt;/em&gt;&amp;rdquo; The machine can do it all faster, and with pleasing enough qualities &lt;a href=&#34;https://geohot.github.io//blog/jekyll/update/2026/02/19/ai-art.html&#34;&gt;for little effort.&lt;/a&gt; Why write when it has all been said already? Why sing if we can hear any song we like? This illusion of abundance strikes at the real suffering behind our existential starvation. Choosing to create is an inherently relational exercise. It is the purest expression of what we&amp;rsquo;re capable of doing for each other. Culture is weaved by threads of connection made by people spending their time on meaningful creations. It was never about the colors, the sound, or the witty words strung along together. It was always about the context behind our shared experiences. The &amp;lsquo;slopification&amp;rsquo; of everything coming for digital media is just the extension of all our lives being cluttered with mass-produced junk. Appliances, tools, and even instruments lack the care and craftsmanship that used to be taken for granted and is now just a memory.&lt;/p&gt;
&lt;p&gt;The point is that a better future requires people willing to put care into things, not for the sake of financial gain, but because it is the right thing to do. That can only come when we recognize our own humanity and work to express it on any level we can. It isn&amp;rsquo;t something that can be done alone. It starts with you but it&amp;rsquo;s not about you. A pro-human future needs actual humans, and villages need villagers. The system profits of imposed isolation because the void in our hearts it creates will never be filled by consuming. This cycle can be broken, and it requires us to be willing to be there for others. Slop isn&amp;rsquo;t the enemy, but rather our own indifference is.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Please Stand By: Technical Difficulties</title>
		<link>https://libresolutions.network/about/technical-difficulties/</link>
		<pubDate>Fri, 30 Jan 2026 23:52:10 +0000</pubDate>
		<guid>https://libresolutions.network/about/technical-difficulties/</guid>
		
		<description>Here&#39;s why PeerTube isn&#39;t loading</description>
		<content:encoded>&lt;h2 id=&#34;bad-news-the-peertube-instance-is-irreparably-broken&#34;&gt;Bad news: The PeerTube instance is (&lt;em&gt;irreparably&lt;/em&gt;) broken.&lt;/h2&gt;
&lt;p&gt;While doing an upgrade I mistakenly wiped my database. Due to being short on time, this was being done over several days which meant my regular backup overwrote the old data. It only became clear when this morning I noticed my instance would run but all the data was gone. To be frank this is pretty disheartening. Winter has always been challenging for me, but this one especially so. I&amp;rsquo;ve taken on a lot and it has taken a lot out of me. While my personal &lt;a href=&#34;https://gabe.rocks/health&#34;&gt;weight loss journey&lt;/a&gt; continues going well, it seems that the &amp;lsquo;big picture&amp;rsquo; of the &amp;lsquo;freedom fight&amp;rsquo; has gotten far more dire.&lt;/p&gt;
&lt;p&gt;The good news is that I haven&amp;rsquo;t lost any of the videos. I have all of them in some form or another, It&amp;rsquo;s just the Fediverse instance itself that went down with all the associated metadata. While I am very pleased with the fact that I&amp;rsquo;ve managed to get a few views via my own self-hosted PeerTube instance, it never actually got any significant engagement. Therefore I&amp;rsquo;m not in a huge rush to simply reconstitute it on a different subdomain, but that may happen in the future.&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;ve had very little time lately to address the technical debt I&amp;rsquo;ve built up over the course of this project. Over the course of working on this, I have learned a great deal. On the optimistic front, I&amp;rsquo;ve learned that the &lt;em&gt;free and open web&lt;/em&gt; is truly much more alive than I had hoped. It is genuinely good to know that the &lt;em&gt;&amp;lsquo;old web&amp;rsquo;&lt;/em&gt; is very much alive and being rebuilt by many phenomenal people and I have been delighted to participate in some small way. On the darker side, I&amp;rsquo;ve learned so much more about the traps and pitfalls well-meaning people can get ensnared in. I&amp;rsquo;ve come to realize how much more difficult battling for anything worth preserving actually is.&lt;/p&gt;
&lt;h2 id=&#34;this-is-not-the-end&#34;&gt;This is not the end.&lt;/h2&gt;
&lt;p&gt;This disruption is as good a time as any to take on some readjustments that I had been putting off for quite some time. Many assumptions that had been made when I started this project are no longer tenable. With generative AI &amp;ldquo;flooding the zone&amp;rdquo; of online discussion and governments instituting their controls over cyberspace it very much feels like the ground has shifted in challenging ways. It seems that I am being presented with a concrete reason to reinvent this project for the years ahead.&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;m going to need some time to really rethink how I want to engage on this front moving forward. There&amp;rsquo;s a much bigger picture than mere digital freedom that has become integrated with my understanding of many things. I had already considered a &amp;ldquo;rebrand and relaunch&amp;rdquo; to encompass a broader set of themes, and I&amp;rsquo;ve also been wanting to focus more on building meaningful tools than &amp;ldquo;screaming into the void&amp;rdquo;. With my time being spread very thin these days, I need to above all really focus on restoring my passion and energy for where I believe I can actually make a difference.&lt;/p&gt;
&lt;p&gt;So I&amp;rsquo;m expecting to be more quiet for a while. I&amp;rsquo;ve been frustrated at my growing backlog of half-written articles, but I&amp;rsquo;m posting this to grant myself permission to really dedicate my focus on building what I need to continue. I&amp;rsquo;m going to need some time to recuperate on many levels and focus intensely on what I want to construct. I&amp;rsquo;ll be doing a lot of rethinking and planning, because the game has changed in ways that I believe need to be properly adapted to.&lt;/p&gt;
&lt;h2 id=&#34;libre-solutions-network-20&#34;&gt;Libre Solutions Network 2.0&lt;/h2&gt;
&lt;p&gt;I am hopeful that I can make best of this opportunity to reinvent this passion project with everything I have learned. The war against digital autonomy is here and is being won by the tyrants. Sadly, the general public is still largely apathetic if not entirely in the dark about the real stakes. Thankfully, the (&lt;em&gt;real, independent&lt;/em&gt;) web is a powerful force for good and &lt;a href=&#34;https://cheapskatesguide.org/resistance-infrastructure.html&#34;&gt;we have to fight for it.&lt;/a&gt; There is so much &amp;rsquo;low-hanging fruit&amp;rsquo; that could be built to meaningfully liberate people from hostile cyberspace. Even better, the bar for actual progress is so much lower than doomsayers, shills, and purists would have you believe.&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;m absolutely frustrated to be in a bit of a bind these days as my real-life priorities have shifted and technical debt has me behind, but I want you to know that I am quite optimistic. One of the most important lessons I&amp;rsquo;ve learned while doing this is to meaningfully appreciate the great work being done by others. It has been a great relief to get involved and realize that those of us who care about digital autonomy are not at all alone and there actually are quite a lot of us out there. As bleak as things are I am thrilled to share that I have found a great many reasons to be optimistic in our ability to make a difference.&lt;/p&gt;
&lt;h3 id=&#34;while-we-wait&#34;&gt;While we wait&lt;/h3&gt;
&lt;p&gt;I&amp;rsquo;ll definitely be back. In fact, I&amp;rsquo;m hoping to publish some off-the-cuff &amp;ldquo;walk with me&amp;rdquo; rants about how I see our critical point in time. I&amp;rsquo;m adapting this project to my life circumstances, but I&amp;rsquo;m doubling-down on the mission. I&amp;rsquo;m very much down, but don&amp;rsquo;t count me out! I want to thank you and the many people who have engaged with this project one way or another, it has been a phenomenal adventure and I am intensely focused on how I can continue to work for what matters.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;If you haven&amp;rsquo;t already, now is absolutely the time to bookmark &lt;a href=&#34;https://libresolutions.network/&#34;&gt;this website&lt;/a&gt; and import the &lt;a href=&#34;https://libresolutions.network/rss&#34;&gt;RSS feed&lt;/a&gt; because that&amp;rsquo;s going to be the best place to stay up to date. The next best place is following the project on the &lt;a href=&#34;https://fedi.libresolutions.network/@lsn&#34;&gt;Fediverse&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;If you&amp;rsquo;ve got a show/podcast and want to pick my brain, now is definitely a good time if you&amp;rsquo;re fine with recording on a Saturday.&lt;/li&gt;
&lt;li&gt;Suggestions, feedback, and anything else would mean a great deal right now. Don&amp;rsquo;t hesitate to &lt;a href=&#34;https://gabe.rocks/get-in-touch/&#34;&gt;get in touch with me.&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>The State of Cyberspace: Twilight Hours</title>
		<link>https://libresolutions.network/articles/state-of-cyberspace/</link>
		<pubDate>Wed, 07 Jan 2026 20:25:38 +0000</pubDate>
		<guid>https://libresolutions.network/articles/state-of-cyberspace/</guid>
		
		<description>Taking stock of the threats to digital autonomy in our time</description>
		<content:encoded>&lt;p&gt;This last year has been a difficult and chaotic time for those interested in preserving and advancing the pillars of digital autonomy: privacy, independence, and security. Governments are working overtime to weaponize cyberspace to gain dominance over their subjects and corporations are constructing the machinery to enable it. To make matters worse, much of the public is either unaware or entirely apathetic to the looming threats, except in ways that can be used as a pretext for expanded top-down control. These concerns are far from purely hypothetical or speculative, but rather are the consequences of many powerful and long-running trends. You can listen to Keonne Rodriguez outline the consequences of trying to take these forces head-on &lt;a href=&#34;https://www.youtube.com/watch?v=UcbFSF7fWn8&#34;&gt;on the Watchman Privacy Podcast.&lt;/a&gt; If that seems too far removed from an ordinary persons&amp;rsquo; difficulties, you can read this account of how a person &lt;a href=&#34;https://hey.paris/posts/appleid/&#34;&gt;was locked out of their entire digital life&lt;/a&gt; by Apple. These are two concrete but highly significant and related instances that are both downstream of the consolidation of full-spectrum technological dominance over the public.&lt;/p&gt;
&lt;p&gt;The cause is not at all hopeless, but the hour is quite late in. Many knowledgeable cyber rebels are speculating if this is &amp;lsquo;game over&amp;rsquo; for a free cyberspace. I can certainly empathize with the terror, and can absolutely admit to feeling it first-hand. In times like these it is crucial to be aware, but not petrified of problems. The antidote to fear-based paralysis is proactive effort taken on sustainably. The good news is that there is a great deal both technologically skilled and those who excel in other domains can do to meaningfully address these challenges. This is due to the fact that the terrors in the technological dimension have origins outside that realm. A broader base of knowledge is absolutely required, and so is a much greater emphasis on responsibility and seriousness. As I outline these dangers, know that hardly any of them exist in a vacuum. The inter-related dynamic of these problems is what seriously raises the bar for comprehension and correction. This is an attempt to give a glimpse at the &amp;lsquo;bigger picture&amp;rsquo; as I currently understand it.&lt;/p&gt;
&lt;h2 id=&#34;novel-assaults-via-cyberspace&#34;&gt;Novel assaults via cyberspace&lt;/h2&gt;
&lt;p&gt;The main lesson that should be learned from the mid 2010s to the early 2020s is that mass human misery is a force multiplier to all the predatory aspects of our present digital experience. This factor creates a tectonic divide between those who are vulnerable to all kinds of harmful psychological manipulation, and those who may be spared from them for a variety of reasons. This couldn&amp;rsquo;t be more clear in the rapidly escalating &lt;a href=&#34;https://libresolutions.network/articles/chatbot-psychosis/&#34;&gt;&amp;lsquo;Chatbot Psychosis&amp;rsquo;&lt;/a&gt; phenomenon, where lonely and/or wounded individuals are easy prey for &lt;a href=&#34;https://youtu.be/MW6FMgOzklw&#34;&gt;advanced neurological traps.&lt;/a&gt; To make matters much worse, these &amp;lsquo;soft&amp;rsquo; dangers are amplified by shocks of economic instability and rising precarity. Those shocks are in part being accelerated by the rapid deployment of massive data-centers, which in turn are ostensibly for further AI deployment. This alone, is a significantly powerful feedback loop for devastation of the public.&lt;/p&gt;
&lt;p&gt;One of the more troubling developments when it comes to the digitization of everything is its impact on the workforce and institutions. An extreme potential example would be the person who came forward &lt;a href=&#34;https://archive.is/8Wgoi&#34;&gt;claiming&lt;/a&gt; that ridesharing apps use a scoring mechanism to flag drivers who are desperate to ensure they are being paid as little as possible. This may sound like far-fetched speculation but there are already individualized pricing schemes being &lt;a href=&#34;https://www.openmarketsinstitute.org/publications/personalization-price-discrimination&#34;&gt;tried out by retailers,&lt;/a&gt; and it has been a feature of online sales for some time. These tactics raise questions about what possibilities there are in the future for a &amp;ldquo;multi-tiered&amp;rdquo; society to leverage all kinds of incentives and penalties to shape behavior. This potential system is far more opaque than a mere state-run &amp;ldquo;social credit system&amp;rdquo; because it would a mesh of various business and institutional interests making it very hard to even pin down who should be held accountable for specific abuses. To make matters worse, many of these excesses are effectively normalized today. It can be very difficult to draw the line between acceptable business decisions and what is very clearly organized collusion.&lt;/p&gt;
&lt;p&gt;One of the important developing trends would be the &lt;em&gt;wars and rumors of wars&lt;/em&gt; that threaten to upend what little stability remains. &amp;lsquo;War footing&amp;rsquo; is a powerful pretext for corruption and the erosion if not outright suspension of civil liberties. It should not be ignored that as countries &lt;a href=&#34;https://growingupalienated.substack.com/p/canada-prepares-for-war&#34;&gt;begin to rearm,&lt;/a&gt; cyberspace is becoming far more overtly tyrannical in favor of top-down control. It would certainly appear that we are in the stages of a &amp;lsquo;whole of society&amp;rsquo; preparation to eliminate dissent prior. It is anyone&amp;rsquo;s guess what that preparation is actually for, but we can fully expect the many ongoing top-down threats to digital freedom to be rapidly escalated as this continues. As such it is our duty to be proactively focused on the wide array of methods our technological experience can be leveraged against the public to nullify political, social, and economic dissent.&lt;/p&gt;
&lt;p&gt;At minimum, it should be expected that a great deal of the data collection over the last decade has been very fruitful in precisely tuning psychological manipulation tactics. Social media giants have been enabled to collect vast amounts of mental health data about individuals in even the most sensitive contexts, it would seem that physical health is next. Health monitors and various &amp;lsquo;wearables&amp;rsquo; are not necessarily new, but with the rise of AI technology there is a desire to rapidly expand real-time bio-surveillance on individuals, and the public at large. If the mass abuse of the people&amp;rsquo;s mental health information can be any guide, we can fully expect the further digitization of health to be a similar-scale disaster if not much worse. Just like real identities online, we can see biometric surveillance move from fringe, to trendy, and eventually all-but-mandatory. It is clear that the politicization and commodification of health will reach exponentially new heights in the relatively near future. When the public is &amp;lsquo;feeling the pinch&amp;rsquo; from all directions, there is an understandable impulse to latch on to any readily available &amp;lsquo;solution&amp;rsquo; to make the pain go away.&lt;/p&gt;
&lt;p&gt;There are many concrete examples of this already. We had the extreme and overt &lt;a href=&#34;https://geopoliticsandempire.com/2022/02/05/james-corbett-biosecurity/&#34;&gt;&amp;lsquo;biosecurity&amp;rsquo; tyranny&lt;/a&gt; of the covid years, where people were denied access to employment or even society generally due to injection status. During the crisis, governments and corporations tested the limits of what they could impose on people. Platforms brazenly suppressed debate on state imposed measures, and institutions harshly punished internal dissent. Those seemingly &amp;rsquo;temporary&amp;rsquo; or &amp;rsquo;emergency&amp;rsquo; impositions are certainly not as unthinkable now as they would have been prior to 2020. Far more damaging than the measures themselves is the erosion if not outright eradication of medical ethics that has not been repaired. This means that any health information is almost certainly going to be weaponized as much as people&amp;rsquo;s social media information has been if not more so. This is escalating at a time where the youth face extreme pressures to leverage any &amp;lsquo;quick fix&amp;rsquo; to thrive in a predatory economic and social environment. This can be seen plainly in the &lt;a href=&#34;https://www.theguardian.com/lifeandstyle/2024/feb/15/from-bone-smashing-to-chin-extensions-how-looksmaxxing-is-reshaping-young-mens-faces&#34;&gt;&amp;rsquo;looksmaxxing&amp;rsquo; phenomenon,&lt;/a&gt; where many either popularize or aspire to biohack themselves into improving their appearance at potentially high costs. For some of these people, transhumanism isn&amp;rsquo;t a hypothetical sci-fi concept, but rather a game they are learning to play. There are already people ordering &lt;a href=&#34;https://archive.is/32ixz&#34;&gt;experimental peptides&lt;/a&gt; directly for a wide variety of purposes. I speculate that the state&amp;rsquo;s &amp;ldquo;monopoly on medicine&amp;rdquo; is being phased out in favor of DIY human experimentation managed by Big Tech.&lt;/p&gt;
&lt;h2 id=&#34;state-and-corporate-conquest-of-cyberspace&#34;&gt;State and corporate conquest of cyberspace&lt;/h2&gt;
&lt;p&gt;What can sound as outlandish or absurd to those not influenced in these spaces, can still have outsized impact in people&amp;rsquo;s real lives. Far too often extreme toxic dynamics are underestimated because the damages are relegated to neglected youth confined to hostile cyberspace. Social media is already very proficient at leveraging their emotional weaknesses for self-destructive and highly profitable schemes. This can range from self-destructive subcultures to gambling, and naturally predator dominated environments. This dynamic severely victimizes vulnerable people, and the carnage builds demands for radical solutions to resolve the problems. Unfortunately, these problems are complex and require more than simplistic knee-jerk responses. Unfortunately, the (well-deserved) political capital to address the problem ends up being redirected towards seizing more control over cyberspace. Age verification and &lt;a href=&#34;https://www.smh.com.au/technology/australia-s-teen-social-media-ban-has-a-gaming-sized-loophole-20251105-p5n7v0.html&#34;&gt;social media bans&lt;/a&gt; in the name of protecting youth do very little to address root causes and are hardly sufficient to hold negligent or malevolent platforms accountable.&lt;/p&gt;
&lt;p&gt;The pattern of redirecting justified outrage stemming from complex problems appears to be a constant feature of our time. What is most conspicuous is that there is a repeated pattern of technological systems that exacerbate particular problems are granted free reign in the name of &amp;lsquo;innovation&amp;rsquo; despite predictable hazards. Once the damage accumulates to the point of crisis the answer always seems to be a readily prepared package of chipping away at what little room for independence yet exists. All this despite the fact that the bulk of the problem was inflated by top-down consolidation of cyberspace, not mitigated by it. This familiar pattern is very clearly seen in the almost religious fervor governments and institutions are pushing for rapid AI integration throughout every aspect of operations, despite vocally crying concerns about the dangers of AI. Predictably, there wasn&amp;rsquo;t and still largely isn&amp;rsquo;t a mainstream discussion about the dangers of the massive power consolidation in cyberspace.&lt;/p&gt;
&lt;p&gt;The formula is irritatingly simple:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Prop up a system that nobody really asked for like chatbots in everything, serfdom as a service replacing previously stable employment, and more recently X users getting &lt;a href=&#34;https://www.wired.com/story/grok-is-pushing-ai-undressing-mainstream/&#34;&gt;Grok to undress people&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Leverage the resulting frustration as an impetus to carry-out pre-planned policy prescriptions like more censorship, more surveillance, and even more bureaucratic control&lt;/li&gt;
&lt;li&gt;Because the top-down control that instigated the issue remains in place, the cycle repeats and is an endless feedback loop of more of the same&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;What is just as frustrating as the simplicity of this formula, is how well it rhetorically traps objectors. Just as anyone critiquing unprecedented and irresponsible covid lockdown measures were derided as &amp;lsquo;anti-science nutters&amp;rsquo;, those who point to the irresponsible and ham-fisted deployment of these systems can be similarly dismissed as &lt;a href=&#34;https://bigthink.com/the-present/the-rise-of-ai-denialism/&#34;&gt;AI denialists.&lt;/a&gt; This works because the complexity or hypothetical promise of the domain is used to both dismiss critical concerns of outsiders, while also being used as sufficient justification for not addressing harms. What&amp;rsquo;s notable is that this &amp;lsquo;sleight of hand&amp;rsquo; is only acceptable when it is used to consolidate power, not to protect civil liberties or decentralize regardless of overall merit. For example the hypothetical benefits of giving children access to AI tools are presumed to outweigh the risks, but the benefits of people having anonymous access to the same material the bots are trained on (the web) is considered too dangerous to allow much longer.&lt;/p&gt;
&lt;p&gt;We are currently in the midst of governments finalizing the negotiations with corporations under what terms they will dictate cyberspace to the public. What is good for the public, never mind what the people actually want is irrelevant to this process. The presumption is that a state&amp;rsquo;s &amp;ldquo;digital sovereignty&amp;rdquo; and corporate &amp;ldquo;innovation&amp;rdquo; are vastly more important than the interests of the people. This is why all &amp;lsquo;safety&amp;rsquo; reforms for cyberspace will inevitably fail to actually increase safety, they&amp;rsquo;re not really intended to. In fact, the most likely outcome of these &amp;lsquo;reforms&amp;rsquo; is to be highly dangerous to the public in more insidious and difficult to quantify ways. The fact that governments across the world are highly concerned about having control over any information the public potentially has access to, and communicates to each other should be alarming. It is highly unlikely that such unparalleled and unprecedented power over the population will be used for benevolent ends, and there are many if not countless malevolent machinations for it.&lt;/p&gt;
&lt;p&gt;2025 has been a big year for the expansion of &amp;lsquo;age verification&amp;rsquo; on various platforms. This too is a very difficult rhetorical trap. Serious and pressing online safety issues are the justification for drastic measures. Unfortunately these schemes are unlikely to meaningfully protect anyone. It&amp;rsquo;s security theater for anxious parents. Politicians get to show how seriously they take the issues, corporate compliance firms get their rates, and we all get to pretend there aren&amp;rsquo;t root issues to address. It would seem that the so-called &amp;lsquo;anxious generation&amp;rsquo; isn&amp;rsquo;t actually the children using social media, but rather the parents and institutions that are beginning to grow concerned of the consequences of neglecting a generation. The firm hand of mass censorship and the smothering watchful eye of mass surveillance work together to ensure that there is nothing disturbing the false harmony that keeps the illusion going. Because of this, we can fully expect more scapegoating of digital freedom for issues that people would much rather not look to closely at.&lt;/p&gt;
&lt;h3 id=&#34;cyberwars-and-splinternets&#34;&gt;Cyberwars and &amp;lsquo;splinternets&amp;rsquo;&lt;/h3&gt;
&lt;p&gt;They say war never changes, but it certainly has expanded into new realms. Advanced autonomous systems have driven drone warfare to &amp;lsquo;change the game&amp;rsquo; on the battlefield, while cyberwars introduce new challenges for both military and civilian systems as a whole. The idealistic vision of the world wide web as a unified shared resource for humanity is certainly in peril. As our countries transition to wartime economies, &amp;lsquo;Digital Sovereignty&amp;rsquo; becomes the slogan for total digital dominance over the public. Restricting access to the rest of the world virtually is just common sense to those who wish to have uncontested information control over the public. It turns out that between foreign propaganda and scams, there are endless justifications for doing exactly that. It is absolutely vital that those of us who do understand the dangers of total information control help others understand the grave threats involved. This dynamic is almost guaranteed to fracture the world wide web into a set of &amp;lsquo;splinternets&amp;rsquo; separated via &lt;a href=&#34;https://edri.org/our-work/edrigramnumber9-9virtual-schengen-border/&#34;&gt;&amp;lsquo;great firewalls&amp;rsquo;&lt;/a&gt; or even physically disconnected. This vastly complicates the future for not just internet freedom, but civil rights and freedom generally.&lt;/p&gt;
&lt;p&gt;As it currently exists, the web is quite consolidated already. Cloudflare outages bring down a &lt;a href=&#34;https://news.az/news/why-aws-playstation-network-and-cloudflare-outages-shook-2025&#34;&gt;huge portion&lt;/a&gt; of the actual sites people actually use. The vast majority of people&amp;rsquo;s experience on the Internet is limited to a handful of smartphone apps. This means that for a great many people, the ability to manipulate and constrain their access to information is relatively straight-forward. State initiatives and corporate propaganda can enjoy uncontested authority when any dissent is considered too &amp;lsquo;high risk&amp;rsquo; to propagate. As the web becomes more controlled, the people are no longer using the Internet, but become passive subjects to it. The &amp;lsquo;information superhighway&amp;rsquo; is relegated to being &amp;ldquo;broadcast television 2.0&amp;rdquo;. You can be sure that the digital distraction tools will always be online in some form or another, but that&amp;rsquo;s not the same as the World Wide Web continuing to live on. If the &lt;a href=&#34;https://privacyinternational.org/blog/674/defeating-encryption-battle-governments-against-their-people&#34;&gt;encryption wars&lt;/a&gt; are any guide, we can fully expect information exchange across the world to be seen as too dangerous to permit.&lt;/p&gt;
&lt;p&gt;This is not to say there aren&amp;rsquo;t serious cybersecurity threats. It is just a genuine tragedy that actual security seems to always take a second seat to the need for control. Instead of building up the people to make the best of the challenges and opportunities ahead, it seems that the &amp;rsquo;nations of the free world&amp;rsquo; would rather keep their citizens docile and compliant. Despite &amp;rsquo;lawful access&amp;rsquo; backdoor systems being &lt;a href=&#34;https://www.ssh.com/blog/us-telecom-breach-by-china-the-case-for-end-to-end-encryption&#34;&gt;infiltrated by foreign attackers,&lt;/a&gt; there seems little interest in actually building up a secure digital foundation for the public from the ground up. It would seem that the powers over the population are seen as much more critical than resilience to foreign threats. As an ordinary person, you&amp;rsquo;re essentially caught up in the crossfire of titans who are wholly indifferent to your well-being. This means that it is up to individuals and communities to build up digital independence, while that&amp;rsquo;s still possible.&lt;/p&gt;
&lt;h2 id=&#34;the-war-against-general-purpose-computing&#34;&gt;The War against general-purpose computing&lt;/h2&gt;
&lt;p&gt;The last year brought one of my principal concerns to mainstream attention: the war on (public access to) general-purpose computing. I wholeheartedly believe that a great deal of scapegoating of technology is directly aimed at manufacturing consent towards &amp;lsquo;cyber disarmament&amp;rsquo; of the people. What thrust this important fight into the public&amp;rsquo;s consciousness was the rapid spike in memory prices largely caused by OpenAI&amp;rsquo;s &lt;a href=&#34;https://archive.is/20pos&#34;&gt;purchase of silicon wafers&lt;/a&gt; allegedly to &amp;lsquo;stall competition&amp;rsquo;. In additions to computer RAM, there are concerns about other components like storage becoming much more expensive. Given that storage is one of the &lt;a href=&#34;https://gabe.rocks/tech/reclaiming-cyberspace/&#34;&gt;primary resources in cyberspace,&lt;/a&gt; there are pretty serious implications to the public losing access to it over time. As we have seen, corporations would much rather you store your entire digital life on their cloud servers, rather than privately on your own machines. This then creates the opportunity for governments to dominate the information landscape by controlling these online services. To make matters worse this is not limited to just storage capacity.&lt;/p&gt;
&lt;p&gt;Originally GPU prices rose because they were being bought up to run Bitcoin mining farms. This is because GPUs (&amp;lsquo;aka &amp;ldquo;Gaming Cards&amp;rdquo;) are very useful for parallel processing which makes them great for the number-crunching required for bitcoin and using various AI tools. This double-punch has made  what used to be a moderately expensive component to one that will likely be out of reach for a great many people. Not only that, in theory GPU mining on cryptocurrency reinforced the potential for decentralized systems via distributed Proof of Work. On the other hand GPUs being hoarded for centralized data systems would have no such upside. What&amp;rsquo;s worth recognizing is that the price hikes alone on GPUs effectively lower the ceiling of what potential computing power can be run independently. Computing power is also a primary resource in cyberspace, arguably one of the more critical ones. It is very difficult to decentralized compute in general due to its heavy reliance on energy. On some level computing power will always be inherently centralized to a degree, but the question is if the public be allowed to have independent computing at all.&lt;/p&gt;
&lt;p&gt;People vastly underestimate the importance of general-purpose computing, and can&amp;rsquo;t fathom how much worse things can get when it&amp;rsquo;s gone. Imagine all the (real) economic benefits since the invention of the transistor being directed by a command economy. Liberties we take for granted on already flawed and compromised systems could be diminished entirely. A non-trivial part of this is that one could argue that personal computing has always been artificially cheap. It&amp;rsquo;s possible that these price hikes better represent a &amp;lsquo;fair&amp;rsquo; value of these machines. That said, I have a feeling that if people paid the true value of computing, they would have zero tolerance for surveillance and any lack of software or hardware freedom. It just so happens that the artificial subsidy is being removed after enough dependency on various technological systems has been established. This is at minimum a form of technological austerity, where the opportunities derived from advances in technology are stifled or reversed.&lt;/p&gt;
&lt;p&gt;Another troubling form of &amp;rsquo;technological austerity&amp;rsquo; would be a &lt;a href=&#34;https://youtube.com/playlist?list=PLFQvErdlATeY-mEHozu5GlfffewysnHFq&#34;&gt;AI bubble&lt;/a&gt; itself. While so many conversations about AI are entirely contrived, there are important details to consider. Economists argue that opposing automation or technological development is bad and irrational because (in theory) everyone benefits from the efficiency gains. This can certainly be true, but it doesn&amp;rsquo;t always have to be. Just because a technological tool or system is involved, that doesn&amp;rsquo;t necessarily mean there are efficiency gains. Every tool is going to have trade-offs, especially when the explicit goal is to replace actual people with automated workflows. Those trade-offs can be net-positive, or net-negative depending on the circumstances, implementation, and complexity involved. For a long time, it would be safe to assume all technological advances would involve a net-positive situation. As our tools become more sophisticated this can change in ways that are hard for many to grasp.&lt;/p&gt;
&lt;p&gt;Most people accept the argument that job losses and disruption are good trade for life improving overall. If fancy technology can make hospitals save more lives, move goods around faster, and create great new opportunities for people, then it&amp;rsquo;s all worth it. But this time seems to be different. People are beginning to recognize that the actual effects of how &amp;ldquo;AI&amp;rdquo; is currently being deployed are treating human displacement as an end to itself, rather than a mere byproduct of increased efficiency. They notice that the disruption of participation in society is being disrupted even at the cost of efficiency. This can be seen in large bureaucratic institutions to even warehouse operations. This fundamentally violates the &amp;lsquo;social contract&amp;rsquo; behind automation: even if the gains aren&amp;rsquo;t shared equally throughout society, there should still be a net-gain to the public at large.&lt;/p&gt;
&lt;p&gt;It is my position that this is what the &amp;ldquo;AI bubble&amp;rdquo; actually is. It&amp;rsquo;s not about any particular stock or even sector being overvalued. It&amp;rsquo;s about the recognition that particular tools and systems are being treated as an end to themselves because of real power dynamics, rather than sound economic activity. Anyone interested in &amp;lsquo;calling the top&amp;rsquo; of the AI bubble should be warned that &lt;em&gt;the market can remain irrational, longer than you can stay solvent&lt;/em&gt;. This is to say that we can expect the imposition of net-negative efficiency tools to continue far longer than raw economic analysis would explain. This is why the discussions around AI technology often involve rhetorical traps. Critics of what can be plainly seen as destructive economic warfare can be easily dismissed as ignorant luddites, while the promoters of the scheme lean on economic arguments that do not even apply in this circumstance.&lt;/p&gt;
&lt;p&gt;It would be very different if these systems and tools had to truly compete on a level playing field. I would go as far as to argue that the actual technological benefits of many artificial intelligence tools are actually being under-utilized despite the hype. This is because the social imperatives driving so called &amp;ldquo;AI adoption&amp;rdquo; are actually divorced from the economic factors. For example, it&amp;rsquo;s a lot harder for &amp;rsquo;the market&amp;rsquo; to invest in machine efficiency in situations where the economic equilibrium is maintained by exploitation. Enterprises like farms and factories are much less likely to mechanize if the political environment is perfectly fine with supplying a grey or black market of workers with no bargaining power. This in turn devalues labor as a whole, impacting even the &amp;lsquo;high skilled&amp;rsquo; workers over time. Much worse, eventually the problem becomes a structural dependency, and the idea of unraveling the economic distortion itself becomes seen as too costly. Factors like this are corrosive to actual wealth creation. The opportunities of a skilled and competitive workforce using the latest and greatest tools are traded away for politically connected &amp;lsquo;insiders&amp;rsquo; &lt;a href=&#34;https://www.citationneeded.news/the-year-of-technoligarchy/&#34;&gt;maintaining their &amp;lsquo;moat&amp;rsquo;.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The point here is that the &amp;ldquo;AI bubble&amp;rdquo; is actually a lot worse than a mere misallocation of capital and resources. It is a scheme that is not only transforming the future of cyberspace, but also being weaponized against the public themselves. These assaults are being used to manufacture consent for the digital disarmament of the people by restricting access to the general public. A big part of this is the ubiquitous availability and scaremongering over anti-social use of various AI tools. Simply telling the public &amp;ldquo;tools aren&amp;rsquo;t good or bad&amp;rdquo; will fall on deaf ears when they can plainly see the technology being used in evil and destructive ways, while the benefits of the technology are either abstract or entirely hoarded away from them. The problem is that the public has very little understanding that consolidation over technology itself represents a dire threat to them, and it&amp;rsquo;s getting much worse over time. Due to the powerful nature of these sophisticated technological tools, there is a desperate race to seize a monopoly on computing itself. As such a true &amp;lsquo;free market&amp;rsquo; of technological innovation can&amp;rsquo;t actually be permitted to exist. Instead of allowing entrepreneurs to focus on innovating ways to improve society, a bottleneck will be needed to ensure &amp;rsquo;thinking machines&amp;rsquo; don&amp;rsquo;t upset the many delicate rackets that maintain power over the public. While it&amp;rsquo;s unthinkable today, if this power grab goes unchecked I can imagine something as simple as a calculator won&amp;rsquo;t be permitted to be in public hands without the watchful eye of an AI system supervising it&amp;rsquo;s use. This is far beyond the mere destruction of knowledge, but the total control over information management itself.&lt;/p&gt;
&lt;h2 id=&#34;darkest-before-the-dawn&#34;&gt;Darkest before the dawn&lt;/h2&gt;
&lt;p&gt;Despite all the above, I think there is a great deal of excitement and opportunity in learning to forge a new path. For those who are interested in developing technical skills, there is a real chance to build truly transformative things. For those who have passions outside of technology, there are also real opportunities to shine. It is absolutely critical that those who want to build a better digital future learn from those who have skills to teach and culture to share. For far too long the idea of being &amp;lsquo;good in tech&amp;rsquo; simply meant being the lubricant that allows Big Tech to seep into all aspects of our lives. With these uncertain times, things are dynamic enough that even relatively small things can have a huge impact.&lt;/p&gt;
&lt;p&gt;For this year ahead, I am encouraging you to focus less on the small details. Instead of fighting over minute technological choices like which messaging app is best or what social media to use, stay focused on the real fight. What is the better digital future we&amp;rsquo;re hoping to pass on to future generations? What do we need to do to make small steps towards that? What do we need to genuinely foster not just a world wide web, but and entire technological landscape that supports human society rather than undermines and extracts from it? These certainly aren&amp;rsquo;t simple questions, with no easy answers, but they are the foundation for meaningful decisions.&lt;/p&gt;
&lt;p&gt;There are going to be many technological difficulties that impose all kinds of difficult problems. People are going to be stuck in difficult disentangle traps that may look simple on the surface. Above all, I hope we remember that we&amp;rsquo;re trying to fix cyberspace for people, rather than &amp;lsquo;fixing&amp;rsquo; people for cyberspace. As broader societal problems take on even more of a technological dimension, it is genuinely difficult to remind ourselves that that the problems don&amp;rsquo;t start and end with the devices we touch. The good news of this is that means there is a great deal that can be done by those outside of the technological realm, to make the job of improving things much easier.&lt;/p&gt;
&lt;p&gt;With all this bleakness out of the way, you can look forward to me sharing how we can meaningfully act on these bigger fronts.
Of course, I won&amp;rsquo;t be able to hold back from dropping a few &amp;lsquo;hot takes&amp;rsquo; on the fine details as they come up as well.
I&amp;rsquo;m wishing you an excellent 2026, and looking forward to building a better cyberspace with you.&lt;/p&gt;
&lt;p&gt;Gabriel&lt;br&gt;
Libre Solutions Network&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Teachable Moment: Will the digital control grid inevitably fail, or is it already here?</title>
		<link>https://libresolutions.network/articles/teachable-control-grid/</link>
		<pubDate>Tue, 09 Dec 2025 01:53:40 +0000</pubDate>
		<guid>https://libresolutions.network/articles/teachable-control-grid/</guid>
		
		<description>Digging deep into the fine details of technological tyranny.</description>
		<content:encoded>&lt;h2 id=&#34;are-people-truly-choosing-digital-tyranny&#34;&gt;Are people truly choosing digital tyranny?&lt;/h2&gt;
&lt;p&gt;This is my contribution to a larger discussion started by &lt;a href=&#34;https://www.wolfpox.com/&#34;&gt;Terry Wolfe&lt;/a&gt; (AKA &lt;a href=&#34;https://winterchristian.substack.com/&#34;&gt;The Winter Christian&lt;/a&gt;) referencing a piece: &lt;a href=&#34;https://alt-market.us/is-global-technocracy-inevitable-or-dangerously-delusional/&#34;&gt;&lt;em&gt;Is Global Technocracy Inevitable Or Dangerously Delusional?&lt;/em&gt;&lt;/a&gt;. Terry Wolfe states &amp;ldquo;&lt;em&gt;Brandon Smith has been a more sober analyst than most for the last decade. He says the digital prison planet is fragile and unlikely.&lt;/em&gt;&amp;rdquo; I&amp;rsquo;ll certainly agree on the fragility of a global control grid, but wholeheartedly disagree that digital totalitarianism is somehow a remote possibility. Any frank and sober analysis of our existing digital landscape reveals how overtly tyrannical and abusive much of it is, but this is often blamed on the victims.&lt;/p&gt;
&lt;p&gt;For example, Brandon Smith&amp;rsquo;s piece argues that digital tyranny is entirely built on the consent of those ruled over by it, therefore if enough people simply &amp;lsquo;smarten up&amp;rsquo; then all the issues will never come to pass. This ignores the very real and pressing impacts that people are already experiencing. For decades people have lamented countless people throwing away their lives scrolling on screens, but hardly any of them really ask &lt;em&gt;Why&lt;/em&gt;. Why do so many people carry smartphones, despite the numerous privacy, security, and mental health dangers? Why do people put up with our present digital experience when it is so &lt;a href=&#34;https://www.reuters.com/investigations/meta-is-earning-fortune-deluge-fraudulent-ads-documents-show-2025-11-06/&#34;&gt;overtly malevolent?&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;lsquo;&lt;em&gt;Convenience&lt;/em&gt;&amp;rsquo; we can sneer. This simple word allows us to shift the blame away from billions in social engineering research and &lt;a href=&#34;https://cdt.org/insights/ai-powered-deception-a-deeper-dimension-of-dark-design-patterns-in-conversational-ai-tools-and-platforms/&#34;&gt;manipulative tactics&lt;/a&gt; onto those who merely play the cards they&amp;rsquo;ve been dealt. It is the height of hubris to believe that just because we may have taken proactive steps to protect ourselves in this evolving virtual environment, that those who fail must simply be too dumb and lazy to care. Resistance to modern digital intrusions requires a certain luxury of time, if not an investment in skills or particular sacrifices. While yes smartphones and other modern systems and tools are very much responsible for accelerating human dispossession, to identify them as the cause is to mistake the symptoms for the illness.&lt;/p&gt;
&lt;p&gt;It is my position that the nature of the control grid is primarily financial. This is plain to see in the technological realm. &lt;a href=&#34;https://www.eff.org/deeplinks/2025/07/podcast-episode-smashing-tech-oligarchy&#34;&gt;Surveillance capitalism&lt;/a&gt; is a fascinating feat of financial engineering that has built the foundations of our terrifying and tragic digital experience online. The &amp;ldquo;attention economy&amp;rdquo; as it exists was not an inevitable outcome of the Internet Age, but rather a deliberate construction to enable mass data collection. The smartphone was a convenient beachhead for these intrusions but was certainly not the only means of delivering this kind of manipulation.&lt;/p&gt;
&lt;p&gt;Which is where Brandon Smith&amp;rsquo;s piece makes some fairly important points about AI technology, but still misses the forest for the trees. The AI bubble is &lt;a href=&#34;https://time.com/6961317/ai-artificial-intelligence-us-military-spending/&#34;&gt;undeniably&lt;/a&gt; a creature of the national security state &lt;a href=&#34;https://corbettreport.com/siliconvalley/&#34;&gt;just as Big Tech.&lt;/a&gt; We can point and laugh at people who succumb to asking LLM chatbots &lt;a href=&#34;https://libresolutions.network/articles/chatbot-psychosis/&#34;&gt;for life advice,&lt;/a&gt; but in doing so we&amp;rsquo;re forgetting the full-spectrum assault on deploying that particular payload to desperate, vulnerable people. My point, is that digital tyranny is downstream of actual totalitarianism, not the other way around. It is absurdly obtuse to begin human history at the invention of the transistor and then use that as the &amp;ldquo;blank slate&amp;rdquo; to condemn people for falling into particularly nefarious traps.&lt;/p&gt;
&lt;p&gt;It is genuinely fascinating to me that for all the shouting about the evils of smartphones, there has been very little interest in understanding why they continue to thrive and dominate with hardly any real resistance. It is my belief that placing all the blame on digital tools (even where it is warranted) achieves two disastrous aims: 1) It is a useful distraction from the social, economic, and other real-life pressures that drive adoption. 2) Pushes simplistic discussions about digital tools being wholly good or bad without real nuance and due consideration. To use a metaphor, smartphones are an apex predator adapted to a particular environment, the predator will ultimately remain until the environment changes. In concrete terms, people aren&amp;rsquo;t &amp;lsquo;on the road to slavery&amp;rsquo; because they have smartphones. They have smartphones because they are on &lt;a href=&#34;https://corbettreport.com/federalreserve/&#34;&gt;the road to slavery.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This inversion of cause and effect is not only simplistic, but places the blame on those assaulted rather than on those doing the assaulting. It is a familiar pattern that rarely ventures deep into examining the specific mechanisms of how power is consolidated over time, and leads to structural impacts on people&amp;rsquo;s behavior. A lack of domain knowledge can be easily made up with writing everything off as evil, but this approach rarely leads to useful discussion on a better path forward. On the other hand, those with the critical technical skills can struggle on two fronts: 1) being unable to bridge the knowledge gaps to the general public, therefore sounding incomprehensible 2) being entirely reliant on the control grid for income, staying silent as long as &lt;a href=&#34;https://archive.is/z9ApO&#34;&gt;the credits roll in.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;What one needs to consider is that one of the primary drivers for digital control systems is risk management. Almost every mass-surveillance technology has a simple small-scale security project as a proof-of-concept. Facial recognition, access control, and invasive data collection are all vital features of any robust security solution. It just so happens that those systems are also very valuable for tyrannical regimes. This goes even further into the realm of cyberspace, where control over access to information itself can maintain order over unstable situations. We have already seen many counties in the &amp;lsquo;free world&amp;rsquo; move towards not only regulating social media itself, but also developing control measures over the Internet itself.&lt;/p&gt;
&lt;h2 id=&#34;scale-is-the-enemy-a-deep-analysis-of-the-control-grid&#34;&gt;Scale is the enemy: a deep analysis of the control grid&lt;/h2&gt;
&lt;p&gt;In response to Terry&amp;rsquo;s points, &lt;a href=&#34;https://substack.com/@thewaronmeaning&#34;&gt;DJ&lt;/a&gt; put together a very valuable presentation: &lt;a href=&#34;https://humblinmumblins.substack.com/p/screencast-technocracy-okay-but-can&#34;&gt;Technocracy: Okay but can they do it? (No not really.)&lt;/a&gt;. I disagree with the title, and many of the conclusions drawn. That said, this presentation is absolutely worth the watch due to the excellent historic overview of how our digital experience was constructed over time. A main point of DJ&amp;rsquo;s presentation here is that the entire digital landscape went through various phases of development. He explains how digital systems started as research projects, then moving into institutions, to how industry picked them up to being to &amp;ldquo;model reality&amp;rdquo; to track people and transactions. This detailed technical explanation of where we have been and where things are headed is unparalleled and certainly worth your time. Unfortunately, I do worry that it isn&amp;rsquo;t particularly accessible to those without significant technical backgrounds, so I will do my best to charitably explain the main ideas.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://libresolutions.network/media/text/dj-control-grid-transcript.txt&#34;&gt;Transcript&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;DJ explains that for a technological control grid to function, it requires particular dependencies. In the presentation he does a fantastic job outlining how those dependencies were logically constructed together. To properly control individual behavior, a digital &amp;lsquo;model&amp;rsquo; is required to conceptualize the person or entity in virtual space. Trying to do this for billions of people, the development of immensely scalable and interoperable systems is critical. He explains that these advances have happened through a few major &amp;lsquo;revolutions&amp;rsquo; in technological infrastructure. What makes his presentation invaluable is that he outlines precise technical details and explains how they are directly connected to particular tyrannical measures.&lt;/p&gt;
&lt;p&gt;Where DJ and I disagree is the assertion that we are not &amp;lsquo;advanced enough&amp;rsquo; for digital totalitarianism. We could nit-pick back and forth the question of is it complete or scalable enough, but that is to miss the forest for the trees. The &amp;lsquo;digital control grid&amp;rsquo; is not a prerequisite for human tyranny, but rather an enhancement on top of it. Tyrannical digital systems are creatures of the environments they are developed in. If it was truly the case that a system was itself sufficient to be the difference between tyranny and liberty, then liberty could simply be delivered to less-free nations via cargo plane. While delivering entirely Free and Open Source systems to people in tyrannical nations is certainly worthwhile assistance, it itself is wholly insufficient to transform their lives.&lt;/p&gt;
&lt;p&gt;In fact, I would argue that Brandon Smith is correct that digital tyranny is brittle and requires human cooperation, but it is the height of naivete to believe that human cooperation can only be coerced via technological means. This is where I disagree with the conclusion that a digital control grid is something that exists in the future rather than the present. Digital totalitarianism is something that exists alongside tyranny in other domains, not merely before it. Both Brandon and DJ are correct that the public is being lied to about the nature and applicability of AI. However, DJ raises the important point that &amp;lsquo;on-site&amp;rsquo; LLMs can be &amp;lsquo;good enough&amp;rsquo; to be used to dictate behavior inside systems that are gated behind various control measures.&lt;/p&gt;
&lt;p&gt;Terry, DJ, and Brandon are mistaken to focus on the concept of a global and total control grid. This all-or-nothing approach to the problem of technological tyranny dismisses real, present dangers in the name of hypothetical future ones. Cyberspace is certainly becoming more hostile, but this is largely due to the governments and corporations that have so much control over it are themselves becoming more overtly tyrannical. It is my position that for many, their perception of digital tyranny is shaped by their experiences with how they experience abuse of power in their real lives. If one is so lucky to be (even relatively) insulated from the consequences of abusive governments and corporate coercion, digital tyranny seems like a remote and fanciful idea. Yet ironically, for those who genuinely struggle with the worst of digital assaults technology isn&amp;rsquo;t actually that high up the concern list. For many people who&amp;rsquo;s data is directly leveraged against them and their vulnerable circumstances, the need to acquire necessities is a much more principle concern.&lt;/p&gt;
&lt;p&gt;If a concrete example of this is needed, try searching for jobs online without having/leveraging any personal connections. Job seekers are expected to divulge an absurd amount of personal information online to countless institutions with no real recourse if their information is misused and abused. Your typical &amp;lsquo;gig worker&amp;rsquo; is unlikely to have privacy at the height of their concerns when the choice is between &amp;lsquo;opting out of tyranny&amp;rsquo; or attempting to make a day&amp;rsquo;s wage. Both of these people are by &lt;a href=&#34;https://www.yesigiveafig.com/p/part-1-my-life-is-a-lie&#34;&gt;their precarity&lt;/a&gt; ripe for exploitation in ways that some will never even contemplate. This &amp;ldquo;class divide&amp;rdquo; on digital tyranny is no accident, it is a powerful way to assert the rigid barriers on social mobility. This is before you consider concrete financial incentives such as the comforts of working in line with state preferences, and the punishments of working against them. Consider how politicians can choose winners and losers by giving particular industries (such as AI) preferential treatment, and those working for more independent pursuits (like your local farmer) may struggle with red tape and burdensome regulation.&lt;/p&gt;
&lt;h2 id=&#34;fight-tyranny-now-to-prevent-the-control-grid&#34;&gt;Fight tyranny now to prevent the control grid&lt;/h2&gt;
&lt;p&gt;As stated earlier, the control grid is here not in the future. Any future instantiation of a digital control system is the direct consequence of present-day power plays. Our hostile digital experience, and its grave impacts on much of the public should be evidence enough that there is an urgent threat of technological totalitarianism. Instead of giving up on the public as helpless &amp;lsquo;sheeple&amp;rsquo; we should be more willing to dissect and interrogate the incentives driving behaviors. The &amp;lsquo;big picture&amp;rsquo; is a lot more complex and messy than the surface public discussion would lead you to believe. If any of this was simple, it would have reached a conclusion by now.&lt;/p&gt;
&lt;p&gt;It is all too easy to a-priori define complete digital totalitarianism as impossible or unsustainable, but that does nothing to address the real problems that exist today. Instead of patting ourselves on the back for resisting measures that are yet to come, why not consider what needs to be done today? There are innumerable ways in which we can make our current digital landscape better. Some of those decisions are personal, but others are much more complicated collection action problems. Instead of giving up and treating those coordination challenges as impossible, we should directly focus efforts on confronting them. I think it is prudent, but also entirely critical to fight to leave our descendants a better digital future no matter what is in store.&lt;/p&gt;
&lt;p&gt;Ultimately, the hardest part is humanizing those who struggle with these assaults. In the broader discussion around global tyranny, it seems that the most seductive explanation is the one that transfers blame from the tyrants to the people. I am convinced this is a critical part of how such tyranny is maintained. People will exclaim that it would all end if the people just refused to tolerate it anymore, but how many of us tolerate the abuse against our fellow citizens when it happens? What red lines get crossed as we watch on indifferently, merely because it doesn&amp;rsquo;t yet impact us? What are we actually doing in our day-to-day lives to enable, or add friction to abuses of power. What should be done to safeguard people&amp;rsquo;s liberties both in their real lives and in cyberspace?&lt;/p&gt;
&lt;p&gt;These questions aren&amp;rsquo;t easy. They have messy answers that require consistent work. Nothing is as simple as a single decision that eradicates all the problems. As such, we should be more surgical and precise when it comes to analyzing problems. While I may disagree with DJs conclusions, I am thoughoughly impressed with his outlining of his thought process in a way that can allow us to get to the meat of these issues. It is this level of analysis I find terribly lacking in many dissident circles. It is so much easier to chant consensus rather than to openly inquire about the messy reality we find ourselves in. When it comes to being capable of preventing egregious overreach, technological or not, it requires an uncharacteristic level of humility and courage. We don&amp;rsquo;t just need technical skills to fight digital tyranny, meaningful compassion and understanding are far more essential.&lt;/p&gt;
&lt;p&gt;The simple fact is that none of us alone has any real control over what the future brings. There are many good reasons to believe that technological tyranny is a dire and urgent threat that is unlikely to be stopped. On the other hand, there are also a wide variety of reasons to hold on to hope that we can prevent future abuses and address existing ones. The real discussion isn&amp;rsquo;t about what is and isn&amp;rsquo;t likely, so much of that is out of our hands. The important part is what are the real risks, and what can be done to address them today.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Inbox Question: Becoming computer literate</title>
		<link>https://libresolutions.network/articles/computer-literacy/</link>
		<pubDate>Tue, 18 Nov 2025 10:55:14 +0000</pubDate>
		<guid>https://libresolutions.network/articles/computer-literacy/</guid>
		
		<description>How does one master machines rather than be subject to them?</description>
		<content:encoded>&lt;p&gt;I recently was asked an excellent question about how to become computer literate and where is a great place to start. Despite digital technology getting much of the blame for current-day problems, I wholeheartedly believe that computer literacy is a very valuable skill for people of all walks of life. As our digital experience becomes more complex, it&amp;rsquo;s needed more than ever to judiciously use machines rather than have them use you.&lt;/p&gt;
&lt;p&gt;Far from surrendering the digital landscape to tyrants and those who uncritically accept their machinations, we should encourage, foster, and support an environment where people are maximally able to be as computer literate as possible. This very much strikes at the root of why I believe this project (the Libre Solutions Network) is an important part of building a better future.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Where do I start with all of this?&lt;/p&gt;
&lt;p&gt;I know, vague, but I have no idea where to begin. I&amp;rsquo;ve used Windows for a long time, and like most people I didn&amp;rsquo;t do a lot of &amp;lsquo;computing&amp;rsquo; on computers; mainly just used it to access the internet, some games, and a few programs. I moved to &lt;a href=&#34;https://www.linuxmint.com/&#34;&gt;Linux Mint&lt;/a&gt; a few years ago but I use it basically the same way I used Windows XP before.&lt;/p&gt;
&lt;p&gt;What fundamentals do I need to start using technology, instead of having technology use me?&lt;br&gt;
What should I study first to learn how to actually compute things?&lt;/p&gt;
&lt;p&gt;The only direction I have in mind is getting a thinkpad or other old computer, getting it with &lt;a href=&#34;https://libreboot.org/&#34;&gt;libreboot&lt;/a&gt; or &lt;a href=&#34;https://coreboot.org/&#34;&gt;coreboot,&lt;/a&gt; and using a decent operating system, but I don&amp;rsquo;t know what how or what I can do with it aside from simply store text files locally.&lt;/p&gt;
&lt;p&gt;I know Rome wasn&amp;rsquo;t built in a day, but I have no clue where to lay the foundations. What sort of things should I seek to be independent of, what things will I practically need such as e-mail, etc. I want to know the groundwork of tech literacy so I can know what things I can gradually work towards, and how to accomplish them.&lt;/p&gt;
&lt;p&gt;This may not even be relevant, but I have access to an old Commodore 64 and some books on programming with it.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2 id=&#34;defining-computer-literacy&#34;&gt;Defining &amp;lsquo;computer literacy&amp;rsquo;&lt;/h2&gt;
&lt;p&gt;These days computers are very much everywhere and take a variety of forms. It can be dizzying to enumerate all the different platforms and form factors from laptops to smartphones and wearables. For the purposes of this question &amp;lsquo;computer literacy&amp;rsquo; means being proficient at using desktop computers for a more varied and useful set of functions. My personal and broader definition of computer literacy means getting the best utility out of the hardware available. Computer literacy even in this narrow domain is still quite broad. We can include proficiency with a wide variety of software tools, to command-line mastery as well as some sophisticated scripting. Like many rewarding skills there really isn&amp;rsquo;t a ceiling to hit, but more of a trade-off of what you want to get for how much time you can invest.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;What fundamentals do I need to start using technology, instead of having technology use me? What should I study first to learn how to actually compute things?&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;No matter what you have access to, there&amp;rsquo;s always a lot you can do to level-up. Every system is going to have a wide variety of (Free &amp;amp; non-free) software options available to try out for all kinds of different tasks. Even if you&amp;rsquo;re at a loss of what you would like to use computers for, it helps to try out simple things to get a basic familiarity with what&amp;rsquo;s available. Maybe try recording a song, or editing a video with the tools available (such as &lt;a href=&#34;https://kdenlive.org/&#34;&gt;Kdenlive&lt;/a&gt; on Linux) to scratch the surface of what&amp;rsquo;s doable on your machine. Even relatively simple things like spreadsheets in &lt;a href=&#34;https://www.libreoffice.org/discover/calc/&#34;&gt;LibreOffice Calc&lt;/a&gt; can help you do a lot of useful things. I use it to track my &lt;a href=&#34;https://gabe.rocks/health&#34;&gt;weight loss journey.&lt;/a&gt; At the beginning, it&amp;rsquo;s not important to necessarily master every tool, but just scratch the surface of things to learn what is possible.&lt;/p&gt;
&lt;p&gt;As you get more comfortable with accomplishing different specific tasks on your system, you will eventually form a broader understanding of how truly flexible and impressive even fairly old systems can be. This can also involve becoming more proficient with the operating system you&amp;rsquo;re running. As a linux user you&amp;rsquo;ll likely want to consider becoming proficient at the &lt;a href=&#34;https://ubuntu.com/tutorials/command-line-for-beginners#1-overview&#34;&gt;command-line&lt;/a&gt; to learn to manipulate data directly with the wide variety of console tools. The advantage of this approach is that you&amp;rsquo;d be very surprised at &lt;a href=&#34;https://libresolutions.network/articles/best-website-for-you&#34;&gt;what can be done&lt;/a&gt; with &amp;lsquo;just text files&amp;rsquo; and processing them.&lt;/p&gt;
&lt;p&gt;Of course, another great place to start is by learning how the system you&amp;rsquo;re using works. Trying to make as many (reversible) changes as possible, and try to find things that make it work more to your liking. For example, after trying out many different &amp;lsquo;window managers&amp;rsquo; in Linux, I personally found that &lt;a href=&#34;https://kde.org/&#34;&gt;KDE&lt;/a&gt; gave me the mix of convenience &amp;amp; customization that I really enjoyed. As you refine your system over time, it can become more of a reflection of what you want out of your machine. Some people just want a minimal and sleek experience, while others sometimes want flashy and beautiful options, the beauty is that with enough effort it all seems very much within reach for advanced Linux users.&lt;/p&gt;
&lt;h3 id=&#34;major-steps&#34;&gt;Major steps:&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Try out a wide variety of software to perform a variety of tasks&lt;/li&gt;
&lt;li&gt;Discover what changes you can make to your system itself and find out which ones improve your experience for you&lt;/li&gt;
&lt;li&gt;Consider learning the very basics of the command-line if you&amp;rsquo;re very motivated to maximize the utility of your system&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;That said, that&amp;rsquo;s definitely not the end of your journey. Once you&amp;rsquo;re comfortable with those steps you reach the tipping point of having a non-trivial idea of what&amp;rsquo;s available. That&amp;rsquo;s only a tiny fraction of what&amp;rsquo;s actually possible. Depending on the particularity of your goals, you may find yourself interested in building your own software to accomplish particular tasks. It starts out small, but eventually one realizes that they can change almost anything with enough time and effort. I don&amp;rsquo;t think learning to program is essential to make good use of machines, but it definitely helps put many things into perspective.&lt;/p&gt;
&lt;p&gt;Eventually you learn that all software is just layers of code. The programs that you run, and the scripts you tinker with are just code calling other code. Making meaningful programs is something you can do the moment you learn the basics of the command-line for your system. The command-line &amp;lsquo;shell&amp;rsquo; for your system interprets instructions, and a list of these instructions written down can already be a very powerful script. Scripting on your system will get you very comfortable with manipulating data you acquire or modify with a wide variety of programs, but writing your own programs and scripts for this purpose changes the game dramatically.&lt;/p&gt;
&lt;h2 id=&#34;rewiring-the-foundation&#34;&gt;Rewiring the foundation&lt;/h2&gt;
&lt;p&gt;It is ironic that you can accomplish all of the above, become a very powerful &amp;rsquo;tech wizard&amp;rsquo; but many will still gate-keep you as a mere trickster. While at that point you can likely accomplish almost anything you set your mind to yet there will still be people claiming you don&amp;rsquo;t actually understand computers. As frustrating as this is, there is truth to it. Learning various software programs and even writing your own doesn&amp;rsquo;t really require you to actually wrestle with what the machine is doing at a physical level. Our entire digital experience, &lt;a href=&#34;https://libresolutions.network/videos/serenum/&#34;&gt;even for programmers,&lt;/a&gt; is built on layers and layers of &lt;em&gt;abstractions&lt;/em&gt; that simplify more fundamental operations. For those interested in not only getting the most out of their machines, but also reforging a better digital future, there is a great deal of opportunity. Learning to master the machines themselves, rather than just the abstractions built on top of them is invaluable.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;This may not even be relevant, but I have access to an old Commodore 64 and some books on programming with it.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;It is absolutely quite relevant, because that platform is a great place to start learning both programming but also learning to wrestle with the machine directly. Other alternatives like micro-controllers and Raspberry Pis are great starts, but the C64 is definitely an all-in-one solution to gaining very valuable skills to enhance your long-term programming pursuits. Depending on your goals, learning to program closer to the metal, can make a radical difference on your perspective of computing. Ironically by recognizing the vast differences of all the different platforms, you begin to understand and appreciate the underlying shared foundation.&lt;/p&gt;
&lt;p&gt;When one broadens their understanding of &amp;lsquo;computer&amp;rsquo; to mean any sufficiently complex circuit, you can absolutely take on the broader challenge of robotics. With basic programming under one&amp;rsquo;s belt, they unlock the ability to wrestle with mind, machine, and physics. There is a phenomenal wealth of opportunity in learning to repair, salvage, and build better devices now that things are more accessible than ever. Parts are cheap, but ingenuity and passion are much more precious commodities. When one understands that every aspect of our digital experience, software, hardware, and even the devices themselves are very much interchangeable, &lt;a href=&#34;https://libresolutions.network/articles/cyber-resistance/&#34;&gt;the game changes dramatically.&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;flourishing-independence-sharing-is-caring&#34;&gt;Flourishing independence: Sharing is caring&lt;/h2&gt;
&lt;p&gt;Learning and building digital independence is a lot more than just a solitary endeavor. From the very beginning I would encourage you to join communities where you can find help and learn from others. The more we come together the more we can find ways to overcome shared obstacles and challenges. I would absolutely encourage you to learn more about &lt;a href=&#34;https://fsf.org&#34;&gt;Free Software&lt;/a&gt; and the collaborative mindset behind Free and Open Source Software/Hardware movements.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;What sort of things should I seek to be independent of, what things will I practically need such as e-mail, etc.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Ultimately, this is entirely up to you. I would personally recommend recognizing that much of our digital experience is &lt;a href=&#34;https://libresolutions.network/articles/hostile-cyberspace&#34;&gt;hostile cyberspace&lt;/a&gt; and that it is up to us to rebuild a better foundation. Big Tech social media is one of the more openly malevolent forces of our time, yet many people struggle to disconnect without feeling isolated. E-mail is the very same in which it has many problems but a great many institutions people interact with rely on it. One can argue you&amp;rsquo;re free to forgo any aspect of our present digital environment, but in practice the consequences can be quite non-trivial.&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;ve written before that every technological evil has &amp;ldquo;a very simple engineering solution, but a hard collective action problem to fix&amp;rdquo;. This means that improving your own digital experience very often requires the cooperation and participation of others. This is the main reason why this project, the Libre Solutions Network exists. We need others to understand and value each other&amp;rsquo;s privacy, security, and digital independence. The first step is education, and we&amp;rsquo;re going to need a lot of teachers. I wish you well in your journey to master machines.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>A low-stakes critical thinking exercise for online media</title>
		<link>https://libresolutions.network/articles/critical-thinking/</link>
		<pubDate>Mon, 03 Nov 2025 08:56:46 +0000</pubDate>
		<guid>https://libresolutions.network/articles/critical-thinking/</guid>
		
		<description>A modern media survival guide</description>
		<content:encoded>&lt;p&gt;Critical thinking is a fundamental skill for staying sane in today&amp;rsquo;s online media landscape. Like many valuable and rewarding skills, it takes practice, and is much more difficult to master than it can be described. To make matters worse, a lack of critical thinking amongst the public creates opportunities for some of the most despicable behavior to go rewarded if not outright addressed. With this piece, I hope to provide some &amp;lsquo;beyond the basics&amp;rsquo; guidance for those who may already be fairly good critical thinkers as well as a pragmatic first step for those who could benefit from an accessible starting point. While it is easy to dismiss online media as a whole, this should help people to navigate the unprecedented complexity of our current digital experience.&lt;/p&gt;
&lt;p&gt;Instead of giving up entirely, it is valuable to get the most out of what is available today. Very often one can find excellent information from unlikely and often conflicting sources, while trusted and well-known resources can just as often fall short. Being skeptical of things that go against our biases is easy, but being as focused and critical of things we identify with is much harder. To truly be a shrewd critical thinker, and a proficient learner, one absolutely must learn to to put all ideas, foreign and comfortable alike, into a precise sieve. With the right frame of mind, one can transform their mind into a powerful forge that refines raw ideas into precious insight. This frame of mind includes a variety of cognitive skills that build on each other, and are relatively easy to take on at first. The real challenge is being consistent and properly processing ideas from sources and mediums you trust. The purpose of this overview is to help you learn how you can upgrade your own critical thinking capacity without coming up against any bias or personal stake.&lt;/p&gt;
&lt;h2 id=&#34;an-info-junkies-guide-to-media&#34;&gt;An &amp;ldquo;info-junkie&amp;rsquo;s&amp;rdquo; guide to media&lt;/h2&gt;
&lt;p&gt;I certainly don&amp;rsquo;t consider myself an expert or authority on the subject of critical thinking. I like to believe that I am proficient at it, largely due to being an extremely online &amp;lsquo;digital native&amp;rsquo; for much of my life. For a long time letting my curiosity run wild over the Internet was a major (counter-productive) coping-mechanism for stress to me. In hindsight, I can see how over-time I gained a valuable skill for &lt;em&gt;traversing &lt;a href=&#34;https://www.bbc.com/future/article/20120501-building-the-like-me-weapon&#34;&gt;narrative networks&lt;/a&gt;&lt;/em&gt; to identify the most interesting speakers within a particular domain. This ability is something I would do unknowingly to abate my insatiable curiosity. Recently, I have had the opportunity to consciously assess this skill. By taking on a new interest of mine (health &amp;amp; fitness) I applied the same familiar skillset while reflecting on what I was doing and what I was learning. The results were fascinating.&lt;/p&gt;
&lt;p&gt;With the abundance of online media already, and generative AI threatening to completely flood and outpace what was already immense, there is an absolutely overwhelming need to learn to &lt;em&gt;evaluate and filter&lt;/em&gt; what information is out there. The great challenge of this, is that when one is new to a domain, we do not know what we do not know. A certain amount of trial and error is expected to wrap our minds around not just the domain itself, but also the fine details of the inevitable disagreements within that domain. The good news is that relatively simple methods can absolutely help you get the most out of what is out there fairly quickly.&lt;/p&gt;
&lt;p&gt;The most important habit is epistemological humility. Understanding and accepting that there are limits to your knowledge, always will be is fundamental to building a strong mental refiner. You can&amp;rsquo;t learn if you don&amp;rsquo;t believe you need to learn. To go even further, you need to also be able to honestly evaluate what you believe you know. As you improve this skill, it will become easier to discover and confront your presently unknown biases and knowledge gaps. Epistemological humility helps improve every aspect of critical thinking in practice. By recognizing your own mental and intellectual limits you can also be comfortable recognizing those of your allies and trusted sources.&lt;/p&gt;
&lt;h3 id=&#34;collecting-insight&#34;&gt;Collecting insight&lt;/h3&gt;
&lt;p&gt;As I&amp;rsquo;ve always loved to collect information the early steps are always the most fun for me. My curiosity gives me an open mind by default on many topics. Once you&amp;rsquo;ve recognized that you have more to learn in a particular domain, it becomes natural to seek out sources of information on that domain. Each domain will have specific topics that themselves represent almost entirely new domain in many cases. Once you get a sense for how vast and deep this fractal of knowledge is, the more you can appreciate the lifelong joy that learning truly is. This means that when one is new to particular topic or domain, the quality of the beginning sources matters very little. When beginning to wrestle with a topic it is crucial to expose yourself to the broad representation of what the discussion entails.&lt;/p&gt;
&lt;p&gt;By casting a wide net, and not being too picky when starting out you can begin to learn the boundaries and differences within the topic or domain. As you let your mind feast on the diversity in quality and presentation of information, gradually you begin to build your own understanding of it. As this knowledge improves you now have the capacity to deliberately focus your learning on the topics that are either in contention, or otherwise important to you. In the beginning, it is immensely valuable to spend the time to seek out less-known or popular sources of information, but sometimes you can luckily discover them in passing as you explore. With a bit of epistemological humility, you can recognize that early on you don&amp;rsquo;t have enough understanding of the topic to judge sources too harshly.. The best use of this early stage is to use it to collect a variety of sources in whatever media forms you wish to learn from. The variety will later serve you as you begin to narrow down your focus to high quality sources of information or on those that otherwise provide valuable and unique perspectives.&lt;/p&gt;
&lt;h3 id=&#34;conflict-is-good-actually&#34;&gt;Conflict is good, actually&lt;/h3&gt;
&lt;p&gt;One of the earliest discoveries one will make when entering a domain is that there are always significant points of contention. To outsiders it may often look like needlessly splitting hairs, but in many cases there is a crucial value in understanding the important distinction being made. If ideas are raw minerals that you refine into precious ingots of insight, conflict is the fire that puts the ideas to the test. Disagreement is when different understanding or perspectives are brought into contrast. This is not to say that all conflicts and disagreements are productive however. Drama can be fun and entertaining, however being able to disagree without losing composure or crossing lines is a difficult skill that I myself have yet to properly master. A great speaker with loads of insight may struggle when challenged, and a calm person may or may not have a passion for the finer points of the discussion. This makes getting the most out of conflict within domains a particularly difficult challenge, but it is productive, it is often immensely instructive.&lt;/p&gt;
&lt;p&gt;The reason it &amp;ldquo;leads if it bleeds&amp;rdquo; is that any disagreement usually reveals much about not only the topic at hand, but also about the participants. What may appear at the surface to be mindless petty gossip and juvenile mud-flinging can often unearth things that people have yet to truly contend with. This goes beyond just the unknown biases of individuals, but also the thinkers within a domain almost entirely. By recognizing conflict as an opportunity to learn, you can often run off with the spoils of a debate from the sidelines while others continue to lose themselves. Of course, eventually you learn enough to be trapped in these conflicts yourself. This is where your learning becomes contingent on your ability to honestly reflect on your own participation as well as your opponents. &amp;lsquo;Turning the other cheek&amp;rsquo; can very often be an opportunity to learn from your own conflicts and develop a much deeper understanding of what drives not only the conflict itself, but even your own actions and reactions.&lt;/p&gt;
&lt;p&gt;When you get to this point, you&amp;rsquo;ve learned enough to begin to discern what sources of information are useful in particular contexts. It is crucial to not develop an &amp;ldquo;all-or-nothing&amp;rdquo; approach to this. Some sources will still be valuable sometimes, even if they are not for the vast majority of time. At some point, it is necessary to do a &amp;ldquo;cost-benefit analysis&amp;rdquo; of your time engaging with any particular media source. Each source and speaker has a certain &amp;ldquo;signal to noise&amp;rdquo; ratio and frequency. Having a rough idea of both will help you decide how best to partition your time and engagement with particular sources.&lt;/p&gt;
&lt;h3 id=&#34;intellectual-prospecting&#34;&gt;Intellectual prospecting&lt;/h3&gt;
&lt;p&gt;On any issue, there is almost guaranteed to be a variety of perspectives, or at least two sides. It is very common, that even the unpopular side may make some particularly important points that are valuable to the discussion, or even other issues as well. Under-represented positions are often a valuable deposit of unique perspectives and different approaches. Being able to listen to those who have different positions than you, even opposing ones for valuable points can be a way to find flecks of precious insight in what may otherwise seem valueless. In my own experience, being able to glean important points from those who I share very little in common with has presented me with ideas and opportunities that I never would have found otherwise. Being open-minded doesn&amp;rsquo;t mean merely changing your values and beliefs with current trends, but rather being able to fully investigate a concept even if you&amp;rsquo;re opposed to it.&lt;/p&gt;
&lt;p&gt;If you ever needed a reason to love your enemies, a good one is to recognize that you can learn a lot from them. If you listen, they&amp;rsquo;ll very often make some scathing and excellent critiques of your allies. It may be worth taking those criticisms seriously, even if you have no intention to change your perspective on the issues. Very often your opponents and critics can be a very valuable mirror to hold to yourself. It&amp;rsquo;s much easier for you to recognize their flaws than your own. It turns out, that you&amp;rsquo;re quite likely to have similar flaws and weaknesses, even if only in kind but not degree. This is an opportunity to protect your mind from your ego. It is quite a mistake to &amp;lsquo;judge a book by its cover&amp;rsquo; and assume there are no fruitful trees in the forest. To go even further, connecting with and learning from those on different sides of various issues can help get you a better grasp of the basics.&lt;/p&gt;
&lt;p&gt;This is yet another area that epistemological humility plays an important role. While you may be incredibly certain about your understanding of a particular topic or focus, it can be easy to miss that your understanding has its limits. While other perspectives may clash with your own experience, it is possible there are many factors you yet don&amp;rsquo;t understand that explain the difference. Being able to accept that there is much outside your personal experience can help you identify places you need to understand better to truly gain a well-rounded grasp of a contentious issue. To make things so much more complicated, there are many inevitable communication barriers between people of different life experiences and backgrounds. To truly gain a broad understanding of divisive issues, one must learn to patiently listen to those in ways that over time can overcome communication barriers.&lt;/p&gt;
&lt;p&gt;While true and false are absolutely real, and some of objective reality is regularly measurable, don&amp;rsquo;t make the mistake of being overconfident in certain positions. There can be a lot of value in understanding what leads people astray. By dismissing it all as &amp;lsquo;brainwashing&amp;rsquo; or &amp;lsquo;disinformation&amp;rsquo; you can miss that there may be real grains of truth underpinning the argument. There are many issues where our measurements of reality are simply too limited. Think of how many headlines are generated from studies that ultimately relied on self-reported surveys asking vague questions. Precision matters, and there are many places we will never truly have that much precision.&lt;/p&gt;
&lt;h3 id=&#34;hate-the-game-not-the-players&#34;&gt;Hate the game, not the player(s)&lt;/h3&gt;
&lt;p&gt;With some of my personal experiences running this multi-media passion project, I&amp;rsquo;ve gotten hands-on experience wrestling with the incentives around content creation. Most people are familiar with the fact that mainstream social media algorithms will often influence creators and projects with how particular content and presentation is rewarded. This project was started with a deliberate focus on being as pro-decentralization as possible. This means not only making use of more niche systems like PeerTube &amp;amp; RSS, but also forgoing analytics entirely by running two &lt;a href=&#34;https://libresolutions.network/operations/shadow/&#34;&gt;darknet mirrors&lt;/a&gt; for the site. This means that in terms of feedback, I have very much been &amp;ldquo;running blind&amp;rdquo; relative to more mainstream media endeavors. While at the same time, Substack and the people I have come in touch with have provided me valuable context for the more commonly tread side of things.&lt;/p&gt;
&lt;p&gt;&amp;ldquo;&lt;em&gt;Follow the money&lt;/em&gt;&amp;rdquo; is absolutely timeless advice that pays dividends when it comes to critical thinking. I have had the frustration and pleasure of &amp;ldquo;not being bought&amp;rdquo; when it comes to this enterprise. I have deliberately forgone affiliate codes, and have yet to become notable enough to receive any sponsorships for products and services. The only financial gain I have directly received from this project is a small set of paid supporters via Substack, and some &lt;a href=&#34;https://buymeacoffee.com/libresolutionsnetwork&#34;&gt;BuyMeACoffee&lt;/a&gt; / &lt;a href=&#34;https://xmrchat.com/lsn&#34;&gt;Monero&lt;/a&gt; donations. I give this context to explain that I have an understanding of the pressures of independent content creation, and the incentives that transform online discussions. Much of my choices have limited the time for this project to be as grand as I would dream. Lack of funding has restricted my time for this project as well as made &amp;lsquo;production value&amp;rsquo; a very difficult challenge.&lt;/p&gt;
&lt;p&gt;Every platform and medium has its own pros and cons. Decentralized platforms such as the Fediverse and nostr will defnitely have more niche content, but otherwise are also a smaller audience. The big platforms requires you to thrive in a highly competitive &amp;ldquo;crowded trade&amp;rdquo; and it can be very challenging to stand out. Large corporate platforms will decide what does and does not perform well on their platform and that can have a immense impact on content and presentation, especially over time. Diversifying platforms can equalize access to your content, but unfortunately it is much easier to do that rather than diversity the income coming from a variety of sources. In almost every major online media platform the revenue follows a typical Pareto distribution where the vast majority of the revenue goes towards a few highly profitable ventures while the remaining majority make little if any at all.&lt;/p&gt;
&lt;h3 id=&#34;individual-incentives-and-compromise&#34;&gt;Individual incentives and compromise&lt;/h3&gt;
&lt;p&gt;A powerful incentive these days is that very often creators will not be alone. Collaboration is almost always a win-win exercise when it comes to learning and presenting information as well as deepening ties between interested parties. I have greatly enjoyed my &lt;em&gt;&lt;a href=&#34;https://libresolutions.network/tags/digital-autonomy-series/&#34;&gt;Digital Autonomy Series&lt;/a&gt;&lt;/em&gt; of interviews, and other collaborations I&amp;rsquo;ve done. That&amp;rsquo;s not to say there are no downsides or considerations that audiences should have regarding collaborations. Some people, like myself, are pretty happy to talk to pretty much anyone relevant. In many cases, people should know that collaborations can very much be direct business associations. This is intuitive to many people, even if it is not outright recognized. But there is also another form of association truly worth contending with: &lt;em&gt;narrative networks.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;There are different kinds of narrative networks, some are bottom-up, others are top-down. The modern media landscape is an &amp;ldquo;attention economy&amp;rdquo; that turns your time and attention into real financial gain for some. Some forms of content (such as propaganda) are deliberately produced at a financial loss to buy influence. To make matters even more complex, with people seeking out independent voices, there are many trusted speakers who can be bought for much less than institutions would require. This is what makes the democratization of the media landscape a bit of a &amp;lsquo;double-edged sword&amp;rsquo;. Independent voices are a vital force for accountability and unique perspectives, however they are more vulnerable to certain forms of pressure than larger institutions. This is not to say large institutions are incorruptible however, the fact is that their very existence has to rely on some source of funding which will represent a set of interests. If a single person is malleable, consider how corruptible a large project with exponentially more resources at stake and an existential opposition to particular voices and ideas.&lt;/p&gt;
&lt;p&gt;As such, both individuals and organizations alike can organically and by design drift in and out of various groups. These groups are effectively playing a &amp;ldquo;team sport&amp;rdquo; to amplify each other implicitly and sometimes explicitly. This has benefits for those involved, but very often audiences bear the costs. It is much harder for voices deeply embedded in a narrative network (either top-down or bottom-up) to be critical of those on their team. Beyond mere personal association, there may in fact be strong interests or business ties that make criticism within the same &amp;lsquo;side&amp;rsquo; a liability. This is why in 2025 you will rarely see mainstream figures publicly point out shortcomings of their own side. Nuance and authenticity is traded for consensus and figures both mainstream and independent alike are absolutely vulnerable to this. This is another area where an &amp;ldquo;all or nothing&amp;rdquo; approach isn&amp;rsquo;t helpful. It is reasonable to recognize the limitations of particular voices and projects, while at the same time learning from what they can offer. A problematic association itself may be disappointing, but recognizing the reality of the pressures on online media explains a lot of behavior.&lt;/p&gt;
&lt;p&gt;Because of this, escaping online &amp;lsquo;filter-bubbles&amp;rsquo; requires truly out-of-the-box thinking. This is why I mentioned earlier that a wide diversity of information sources is valuable, these days it is paradoxically all-too-easy to forget other information sources even exist. The trouble very often boils down to trust. As someone with a lot to learn on any given topic, trust is always required at particular points in time. It is absolutely paramount that we regularly reevaluate that trust so that we can refine our information sources over time. That said, to not close yourself out it is vital that you still remain open to differing sources of information, even revisiting old ones.&lt;/p&gt;
&lt;h3 id=&#34;refining-information-into-knowledge&#34;&gt;Refining information into knowledge&lt;/h3&gt;
&lt;p&gt;The difference between education and entertainment is application. There is nothing inherently wrong with entertainment itself, but it is very important to be deliberate about what you are doing. I think &amp;ldquo;infotainment&amp;rdquo; itself can be a perfectly viable way to present information, but it all boils down to what you&amp;rsquo;re acting on. Your learning should be aligned with your goals and values. Confronting your goals and values is an inherent part to developing them over time. So it is important to challenge yourself just as much if not more than the information you come across. Consider asking yourself what is the reason you are investing so much of your time with particular online media or platforms. It&amp;rsquo;s entirely possible that there are many important reasons for why you are, but sometimes it can boil down to the app or platform having conditioned you into craving novelty for a constant dopamine rush.&lt;/p&gt;
&lt;p&gt;Learning to think critically requires putting ideas to the test. If you&amp;rsquo;re not willing to act on it, then you&amp;rsquo;re simply collecting. Again, I don&amp;rsquo;t think there&amp;rsquo;s much wrong with collecting information itself, as long as that is what one chooses to do. But I have learned myself that the best way to truly learn a particular topic or domain is to put the information to actual use. By testing what you have learned against reality you will inevitably learn that things are far more complex than simplistic and comforting explanations may convey. The truth of many things will always be hidden, you can only gradually improve your flawed grasp of it over time with feedback. Learning isn&amp;rsquo;t just about rote memorization of dogma or facts, but rather about the deeper understanding forged from testing your knowledge against your own experiences.&lt;/p&gt;
&lt;p&gt;But that&amp;rsquo;s only part of the story. Your experiences as vast as they may be, can only account for a small portion of reality. It is entirely possible that you&amp;rsquo;re missing out on factors that are entirely unknown to you. Instead of assuming you&amp;rsquo;re perfectly objective in all things, being willing to seek out opposing views can help you truly refine your own knowledge. This is where it becomes very important to have real connection with those substantially different from yourself. Deep friendships with others who have radically different perspectives are valuable, especially if both participants have the capacity to set aside differences to grow each other. These days, those kind of friendships sound almost mythological, but I can assure you they are worth developing. Nothing is more epistemologically humbling than being confronted with an argument you never would have imagined by someone you already know quite well.&lt;/p&gt;
&lt;p&gt;But sharing is definitely caring. Even at the most advanced stages epistemological humility pays off big, if not even more so. Sharing your understanding can be painful when one is used to criticism or fearful of correction. But both criticism and correction can be some of the most valuable feedback you&amp;rsquo;ll get. While validation feels nice in the moment, even the harshest criticism or uncomfortable correction will teach you so much more if you let it. The clearer you share the fullness of your knowledge the better feedback you can receive. You&amp;rsquo;ll be able to ask finer questions and learn from anyone. The beauty of this is that you can build your expertise while realizing you&amp;rsquo;ve been teaching all along the way. Teaching others not only reinforces your own understanding, but can also bring other fine minds into your circles to learn from.&lt;/p&gt;
&lt;h2 id=&#34;exercise-analyzing-a-narrative-network&#34;&gt;Exercise: Analyzing a Narrative Network&lt;/h2&gt;
&lt;p&gt;Speaking of putting things into practice, I wouldn&amp;rsquo;t leave you with all this without a way you can immediately build your critical thinking skills. One may think that practicing critical thinking isn&amp;rsquo;t something you can just do, but I have found that&amp;rsquo;s not true at all. In this exercise you&amp;rsquo;ll find a domain you (likely) don&amp;rsquo;t have strong feelings about (&lt;em&gt;Don&amp;rsquo;t worry, eventually you will!&lt;/em&gt;) and exploring it. You&amp;rsquo;ll need to follow the process I described above and cast a wide net for information then synthesize what you&amp;rsquo;ve come across. You&amp;rsquo;ll then be able to answer a question from a variety of angles, but also understand what drives those perspectives.&lt;/p&gt;
&lt;p&gt;In an attempt to not bias your process, I have decided to omit any links as a starting point.
I think using your own research skills to find a starting point would be more useful.&lt;/p&gt;
&lt;h3 id=&#34;example-1---a-foundation-of-sand-evidence-based-weight-lifting&#34;&gt;Example 1 - A foundation of sand: &amp;lsquo;Evidence-based&amp;rsquo; weight-lifting&amp;quot;&lt;/h3&gt;
&lt;p&gt;A notable exercise scientist has become embroiled in scandal when a YouTube video about his Phd thesis was published. It turns out that the thesis as published was riddled with embarrassing mistakes, casting doubt on him. The scandal has erupted into a broader debate about the major figures in online &amp;ldquo;evidence-based lifting&amp;rdquo; circles.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Questions:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What does the quality of Dr Mike Israetel&amp;rsquo;s PhD thesis say about his advice on weight-lifting to the general public?&lt;/li&gt;
&lt;li&gt;Who is critical of Dr Israetel and what are their major disagreements with him?&lt;/li&gt;
&lt;li&gt;Putting aside who is right and who is wrong, what motivates particular figures to take particular sides in the drama?&lt;/li&gt;
&lt;li&gt;What are the major limitations you see in the public exercise science discussions online?&lt;/li&gt;
&lt;li&gt;How should people get information on building strength &amp;amp; muscle?&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;example-2---its-just-a-game-is-star-citizen-a-scam&#34;&gt;Example 2 - It&amp;rsquo;s just a game: Is Star Citizen a scam?&lt;/h3&gt;
&lt;p&gt;Over a decade ago Chris Roberts crowdfunded for two ambitious space games. One a single-player story experience, and a full-fledged Massively Online Multi-player game to go along with it. As of 2025 the single-player game is still not released and the MMO lacks many of the promised features and content. The game is regularly dismissed as a failure if not an outright scam in many gaming circles, but you won&amp;rsquo;t often hear that opinion expressed by content creators who speak about the game. By now, anyone still talking about Star Citizen regularly is subject to quite the survivorship bias.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Questions:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What content creators are regularly talking about Star Citizen and which ones are more or less influenced by Cloud Imperium Games?&lt;/li&gt;
&lt;li&gt;How does that impact coverage of problems in the game, and problems created by Cloud Imperium Games?&lt;/li&gt;
&lt;li&gt;What does coverage of Star Citizen look like inside and outside the community, what drives the difference?&lt;/li&gt;
&lt;li&gt;For the creators who talk about the game, but are critical of Cloud Imperium Games, how do they fund their work?&lt;/li&gt;
&lt;li&gt;If you had to suddenly make a living off creating Star Citizen content, (&lt;em&gt;Please don&amp;rsquo;t do this!&lt;/em&gt;) what incentives would impact your presentation and content?&lt;/li&gt;
&lt;li&gt;Restrict yourself to videos and content from a particular point of time. What would you have believed about the project in 2012, 2016, and onwards? How does it compare against your current understanding?&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;example-3-choose-your-own-adventure&#34;&gt;Example 3: Choose your own adventure!&lt;/h3&gt;
&lt;p&gt;Think of your own topic or question and explore the different sides of it.
Try to think of an issue where you&amp;rsquo;re not invested in what the answer might be.
Don&amp;rsquo;t just interrogate the question, but who takes what side and why.
Consider things that are said and left unsaid.&lt;/p&gt;
&lt;h3 id=&#34;follow-up-questions-questioning-yourself&#34;&gt;Follow-up questions: Questioning yourself&lt;/h3&gt;
&lt;p&gt;After completing one or more of the above exercises, now you can really put your skills to the test!&lt;/p&gt;
&lt;p&gt;Ask yourself the following questions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What business/political interest(s) are represented by your favorite media sources stories and coverage?&lt;/li&gt;
&lt;li&gt;What influences information sources I regularly pay attention to?&lt;/li&gt;
&lt;li&gt;What kind of sponsor do you want supporting your media, and what kind(s) of sponsorships would you want them to avoid?&lt;/li&gt;
&lt;li&gt;For businesses I support, what media represents their interests? How do they cover information that may be &amp;lsquo;inconvenient&amp;rsquo; for that business?&lt;/li&gt;
&lt;li&gt;What do you look for to discover and identify quality sources of information?&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;bonus-exercise-feedback&#34;&gt;Bonus exercise: Feedback&lt;/h3&gt;
&lt;p&gt;It would be absolute hubris to believe that I have perfectly encapsulated all of what people should think of to build their critical thinking skills.
If anything, I have left out a great deal to produce this as a single post.
I would invite you to re-read this, and think of glaring omissions.
I would certainly appreciate learning them, and I&amp;rsquo;d be thrilled to share any sent my way.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>We are not machines: Overcoming tyranny with VN Alexander</title>
		<link>https://libresolutions.network/videos/we-are-not-machines/</link>
		<pubDate>Sun, 19 Oct 2025 17:32:05 +0000</pubDate>
		<guid>https://libresolutions.network/videos/we-are-not-machines/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/we-are-not-machines.opus" />
			
		
		<description>Reflecting on the fine details of thriving under technological adversity.</description>
		<content:encoded>&lt;blockquote&gt;
&lt;p&gt;Victoria N. Alexander, Ph.D., is a literary fiction novelist, writing about censored and controversial subjects with audacity, humor, and compassion.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;It was an honor and pleasure to speak with &lt;a href=&#34;https://vnalexander.com/&#34;&gt;VN Alexander&lt;/a&gt; on a wide variety of topics. I hope you&amp;rsquo;ll enjoy our conversation where we touch on the finer points of many ongoing changes in our digital experience. Learning from her vast knowledge and expertise has been a valuable experience. You&amp;rsquo;ll definitely benefit from exploring her works, which range from novels to educational courses.&lt;/p&gt;
&lt;p&gt;This conversation was a thrilling opportunity for me to learn from her in-depth knowledge and precision about AI tools, online safety, and the fall of our institutions. We explore the opportunities and possibilities in taking part of the change to bring about a better digital future. By precisely understanding the deep differences between biological systems and machines we can make the best of the future.&lt;/p&gt;
&lt;h2 id=&#34;links-discussed&#34;&gt;Links discussed&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://vnalexander.com/naked-singularity-2003/&#34;&gt;Naked Singularity&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://posthumousstyle.substack.com/&#34;&gt;The Posthumous Style&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://corbettreport.com/the-battle-for-your-brain-is-already-underway/&#34;&gt;Battle for your Brain&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://posthumousstyle.substack.com/p/is-the-military-developing-mind-reading&#34;&gt;Response: Is the Military Developing Mind Reading Tech?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.whitehouse.gov/edai/&#34;&gt;Pledge to America&amp;rsquo;s Youth: Investing in AI Education&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.childrenandtech.co.uk/&#34;&gt;Catherine Knibbs work&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://ipak-edu.org/courses/e/WE-ARE-NOT-MACHINES-Monthly-Webinar-with-Dr-Alexander-p606840829&#34;&gt;We are not machines Webinar - IPAK EDU&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/VMApaJ-TKOY&#34;&gt;Biosemiotics&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://posthumousstyle.substack.com/p/how-do-we-escape-the-panopticon&#34;&gt;How Do We Escape the Panopticon?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://dactylreview.com/2019/08/08/platform-cooperative-book-publishing/&#34;&gt;Platform Cooperative Book Publishing&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Digital privacy questions with Samuel of Privacy Now</title>
		<link>https://libresolutions.network/videos/privacy-now/</link>
		<pubDate>Thu, 16 Oct 2025 19:47:16 +0000</pubDate>
		<guid>https://libresolutions.network/videos/privacy-now/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/samuel-privacynow.opus" />
			
		
		<description>A broad conversation about our digital experience and what we can do about it</description>
		<content:encoded>&lt;p&gt;Samuel reached out to me to offer people &lt;a href=&#34;https://haveprivacynow.com/&#34;&gt;free consultations&lt;/a&gt; to improve their digital experience. I took the opportunity to have a rich conversation with him about the finer points of privacy and overall digital autonomy in our time. It was a very welcome chance to connect over not just the perils of our age, but the actual opportunities to build a better digital experience.&lt;/p&gt;
&lt;p&gt;This conversation was a helpful way for me to dig deep into some of the finer points of our current struggles to maintain digital autonomy in our time. We start off talking about how telling someone to &amp;ldquo;just use Linux&amp;rdquo; should be the start of a conversation, not a command. We talk about how your overall choices have an impact regardless of what particular product or system you chose.&lt;/p&gt;
&lt;p&gt;This overlaps with many pressing questions like the end of support for Windows 10, as well as choosing &amp;lsquo;dumbphones&amp;rsquo; over a smartphone. It&amp;rsquo;s not just what you use, but also how you use it. The importance of judicious use of social media is a great example. Yet, neither of us are purists, we believe that changes that ultimately isolate you from other people are wholly impractical for a better digital future.&lt;/p&gt;
&lt;p&gt;What I hope you take away from our conversation is an invitation, no matter what your background is, to consider how you can use technology rather than have it use you. Privacy shouldn&amp;rsquo;t be about hiding, but about building trust and protecting real independence. Both Sam and I would encourage you to nurture a desire to steward a better digital future for yourself and others.&lt;/p&gt;
&lt;p&gt;If you&amp;rsquo;re impressed by this conversation, you may want to consider bookmarking his website &lt;a href=&#34;https://haveprivacynow.com/&#34;&gt;haveprivacynow.com&lt;/a&gt; which will eventually feature blog posts and a newsletter.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Fall Mini-Recap: On the brink</title>
		<link>https://libresolutions.network/videos/25-sept-recap/</link>
		<pubDate>Thu, 09 Oct 2025 00:09:50 +0000</pubDate>
		<guid>https://libresolutions.network/videos/25-sept-recap/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/25-fall-recap.opus" />
			
		
		<description>A small update and personal progress</description>
		<content:encoded>&lt;h2 id=&#34;updates&#34;&gt;Updates&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;New &lt;a href=&#34;https://xmrchat.com/lsn&#34;&gt;XMRChat&lt;/a&gt; from Leo:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Thanks for the excellent article on &lt;a href=&#34;https://libresolutions.network/articles/zano&#34;&gt;Zano,&lt;/a&gt; and in general for the information you share. Keep up the &lt;a href=&#34;https://gabe.rocks/health&#34;&gt;weight loss!&lt;/a&gt; Share how you did it? Staying away from soft drinks was key for me, as well as cutting out all caffeine.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Weight loss progress -  &lt;a href=&#34;https://gabe.rocks/health/below-350/&#34;&gt;Major Milestone: Below 350 🎉&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;New Article: &lt;a href=&#34;https://libresolutions.network/articles/culture-war/&#34;&gt;You don&amp;rsquo;t understand the Culture War&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Technical blog &lt;a href=&#34;https://gabe.rocks/tech/self-hosted-speed/&#34;&gt;Self-hosting: Speed, decentralization and efficiency&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;happy-cybersecurity-awareness-month&#34;&gt;Happy Cybersecurity Awareness Month!&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://digital-defense.io/&#34;&gt;Personal Security Checklist&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;technological-tyranny&#34;&gt;Technological Tyranny&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://reclaimthenet.org/uk-digital-id-brit-card-petition-starmer-surveillance&#34;&gt;UK Government Dismisses Public Outcry, Pushes Ahead with Controversial Digital ID Plan&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.openrightsgroup.org/press-releases/id-cards-uk-risks-sleeping-walking-into-pre-crime-state/&#34;&gt;ID cards: UK risks sleeping walking into pre-crime state&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://cdt.org/insights/we-dont-want-a-papers-please-web/&#34;&gt;We Don’t Want a “Papers, Please” Web&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://ccla.org/privacy/fix-dangerous-flaws-in-federal-cybersecurity-proposal/&#34;&gt;Government needs to fix dangerous flaws in federal cybersecurity proposal&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.schneier.com/blog/archives/2025/09/digital-threat-modeling-under-authoritarianism.html&#34;&gt;Digital Threat Modeling Under Authoritarianism&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;hope-in-a-better-digital-future&#34;&gt;Hope in a better digital future&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.maxbtroeger.com/2025/09/15/alive-internet-theory-and-the-hope-pill/&#34;&gt;Taking the Hope Pill on Dead Internet Theory&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://democracyofreach.org/what-it-means/&#34;&gt;Democracy of Reach&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://adam.nels.onl/blog/chatterbox-federated-chat-that-doesnt-suck/&#34;&gt;Chatterbox: Federated Chat that Doesn&amp;rsquo;t Suck&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.fsf.org/news/fsf-turns-forty-with-a-new-president-and-a-new-campaign&#34;&gt;FSF turns forty with a groundbreaking new project and a new president&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=FQcBrBCd1V8&#34;&gt;FLOSS 849 - Veilid: Be a Brick&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.thelastamericanvagabond.com/ima-free-speech-or-limited-speech/&#34;&gt;IMA: Free Speech or Limited Speech – There Are No Other Choices&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;honorable-mentions&#34;&gt;Honorable mentions&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://hackaday.com/2025/09/15/hosting-a-website-on-a-disposable-vape/&#34;&gt;Hosting A Website On A Disposable Vape&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.cloudflare.com/supporting-the-future-of-the-open-web/&#34;&gt;Supporting the future of the open web: Cloudflare is sponsoring Ladybird and Omarchy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://isitreallyfoss.com/&#34;&gt;Is it really FOSS?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://t.wtyl.live/w/df899dd7-42aa-4e6a-9dfa-a5c94694829d&#34;&gt;Spartacus: Conscientious Objection In The Digital Panopticon&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://kumu.io/Windscribe/vpn-relationships&#34;&gt;VPN Relationships&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://thenewleafjournal.com/aegis-authenticator-and-linux-authenticator/&#34;&gt;Aegis Authenticator and Linux Authenticator&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://switchedtolinux.com/news/can-wearables-be-trusted&#34;&gt;Can Wearables Be Trusted?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>You don&#39;t understand the Culture War</title>
		<link>https://libresolutions.network/articles/culture-war/</link>
		<pubDate>Mon, 29 Sep 2025 08:15:30 +0000</pubDate>
		<guid>https://libresolutions.network/articles/culture-war/</guid>
		
		<description>Examining the blind spots of digital social conflict</description>
		<content:encoded>&lt;p&gt;These days, there is a laudable desire to &lt;em&gt;turn down the temperature&lt;/em&gt; of social conflicts in our chaotic times. While a nice idea in theory, in practice this often results in well-meaning but misguided calls to &amp;lsquo;rise above division&amp;rsquo;. There is a dangerous and counter-productive assumption that all wounds will be mended and all differences can be set aside. This lack of seriousness can further entrench resentment as it can be interpreted as callous indifference. For those without stakes in the conflict, it is all-too-easy to mock participants as dull brutes or hysterical maniacs. But there is so much more to it.&lt;/p&gt;
&lt;p&gt;The &amp;lsquo;culture war&amp;rsquo; in the western world is far from just a feat of advanced social engineering. Being more than mere theater, the dynamics are complex and self-reinforcing. It is a black hole of misery that slowly and insidiously traps victims before they can even recognize they&amp;rsquo;re captured. Those outside it hardly notice it at all, but those trapped inside are suffering incomprehensible horrors. Just as light can&amp;rsquo;t escape the gravity well of a black hole, the stories of those from within the culture war seem impossible to be understood outside it.&lt;/p&gt;
&lt;p&gt;This piece is an attempt to address some critical blind spots that exacerbate the problem. I certainly can not claim to have the last word on this. This is merely my own self-reflection from my years wrestling with these questions. There are critical observations that must be understood if we truly wish to resolve the negative feedback loops working against our online and actual freedom. If nothing else this is an invitation for those who are outside the culture war to better connect with those trapped within it. We should hope that these feedback loops are reversible, because a lot more is at stake than just the mental health of our socially isolated. If we are not careful, the black hole of the culture war can consume not just ourselves, but all of society.&lt;/p&gt;
&lt;h2 id=&#34;scapegoating-tech&#34;&gt;Scapegoating tech&lt;/h2&gt;
&lt;p&gt;Our technological landscape often gets the brunt of the blame for the culture war and its consequences. The consolidation of our digital experience has brought state-of-the-art manipulation through a variety of sophisticated means. Smartphones were a beachhead for corporations to launch novel surveillance, manipulation and consumption oriented paradigms. People are justifiably concerned about algorithmic amplification and state-level propaganda campaigns being weaponized against the public. The error is to believe that this is all there is to our present polarization and rising tensions. It is the height of hubris, if not outright negligence to presume that our social problems are dictated by technology and not the reverse.&lt;/p&gt;
&lt;p&gt;It is quite convenient that tech gets the majority of the blame, because it allows us to absolve our own responsibility for these patterns. Every technological evil has a really simple engineering solution but an immensely challenging collective action problem keeping it in place. This directly contradicts the flawed assumption that our digital experience dictates actual power. People are not powerless because our technological tools withhold it from them. In truth, these systems are merely adapted to suit the needs of a public in captivity.&lt;/p&gt;
&lt;p&gt;The weapons of the internet age are undeniably powerful force multipliers, but they are far from the source of the anguish and pain driving the culture war. Any honest accounting of the deep roots of our present-day nihilism and tragedy would take us back far before the public went online. Just as we could never have expected the world wide web to resolve all our human failings, we can&amp;rsquo;t truly hang all our hopes and blame on it either. Building a better future for people online and &amp;lsquo;IRL&amp;rsquo; requires contending with the darkness that drives people to self-destructive escapism.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;It is a serious lack of conscious awareness if not basic intelligence, to think that physical violence is the worst form that war can take. The war of today is simply far more sophisticated and effective than it once was. And many of the tactics being used are quite frankly far more abusive.&lt;/p&gt;
&lt;p&gt;One of the saddest parts of this modern type of warfare is that people do not understand why they feel the way they feel. We all know that wartime is horrible to experience. That it takes a serious toll on people. But when people know the world is at war, and they understand what&amp;rsquo;s going the things that they&amp;rsquo;re experiencing and the ways that they&amp;rsquo;re feeling make sense to them. In this war, so many of the symptoms of war are absolutely there, but nobody actually thinks anything is going on like that.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=WJo2YanPxu8&#34;&gt;Teal Swan - The World is Already at War&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/memes/division.webp&#39; 
&gt;



&lt;/div&gt;
&lt;h2 id=&#34;the-human-side-of-the-culture-war&#34;&gt;The human side of the culture war&lt;/h2&gt;
&lt;p&gt;Politics has often been defined as &amp;lsquo;&lt;em&gt;warfare mediated through other means&lt;/em&gt;&amp;rsquo;. Different people and groups will have different interests and conflicts naturally arise. The question fundamentally boils down to how are those interests protected and what means are used to mediate the conflicts. Cycles of disrespect accelerate into open hostility if not outright violence. This chaos naturally erodes what little tenuous peace remains.&lt;/p&gt;
&lt;p&gt;&amp;lsquo;Divide and conquer&amp;rsquo; works not because people are foolish, but because there will always be real vulnerable points to be exploited. In times of rapid social change, the youth and elders struggle to communicate, much less understand each other. When social roles break down, expectations are unclear and trust becomes a fantasy. The fraying of societal cohesion creates an anxiety that fuels more anti-social behavior, creating a powerful downward spiral.&lt;/p&gt;
&lt;p&gt;Ultimately, the fractal of conflicts is merely the renegotiation of &lt;a href=&#34;https://denisrancourt.ca/videos.php?id=9&#34;&gt;unstable dominance hierarchies.&lt;/a&gt; Denis Rancourt argues that all our forms of social organization will always be downstream of the shared dominance hierarchy. This has some very troubling implications, but absolutely explains why politics is as dysfunctional as it is. You may think you&amp;rsquo;ve &amp;lsquo;chosen a side&amp;rsquo; but in actuality this was already decided for you. Fundamental aspects of who you are will place you neatly within the collectively constructed battle lines. Your decision to engage or not means little when your existence is interpreted as an existential threat to others.&lt;/p&gt;
&lt;h3 id=&#34;spiteful-mutants-the-bastard-children-of-a-dying-empire&#34;&gt;Spiteful Mutants: The bastard children of a dying empire&lt;/h3&gt;
&lt;p&gt;How did &amp;lsquo;wokeness&amp;rsquo; spread from a niche ideology of extremely online college students to being a de-facto state-mandated religion of managerial elites? People will often point to &amp;lsquo;weaponized empathy&amp;rsquo; as the defining characteristic that allowed it to flourish, but this is a mischaracterization of something important. Social justice was able to fill a crucial niche that had gone long abandoned: a trauma-informed approach to politics. Due to their personal experiences, these people were able to peer into the abyss of the darkest human evils, tragically the abyss often peers back.&lt;/p&gt;
&lt;p&gt;With this knowledge. the progressive left innovated a radically different way of approaching systems of power. By deconstructing order, they were able to identify how predators leverage self-destructive feedback loops to keep prey in line. This understanding unearthed a wide variety of political, social, and economic warfare that their opponents were wholly unprepared for. The right, but even the general public found it impossible to engage without conceding to the progressive framework. This was because they had no conception for a understanding of politics that wrestled with the nature of trauma. This did have consequences however, the brash and overzealous enforcement of progressive norms created a powerful opposing force. Many correctly recognized that dangerous political weapons were being used to monopolize not just the public discussion, but actual institutional, social, and economic power. This reaction created what was called the &amp;lsquo;alt-right&amp;rsquo;. What most people will recognize is that both the woke progressives and alt-right are extremely online movements, but that&amp;rsquo;s just what&amp;rsquo;s visible from the surface.&lt;/p&gt;
&lt;p&gt;What people struggle to recognize is that these are just the most outwards and overt expressions of broader undercurrents. These major factions are entirely corrupted by the economic and social influences of online media. Because the movements were born online, they are creatures of that environment. The YouTube recommendation algorithm is often cited as a major driving force of online radicalization. This is funny because very often progressive men would complain about Jordan Peterson or Ben Shapiro videos being pushed to them. They couldn&amp;rsquo;t understand why the algorithm would recommend something so alien to their preferences. But what the algorithm saw, was that these people were so much closer to &amp;rsquo;the other side&amp;rsquo; than they think. This is because culture-warriors of all stripes are recruited into their preferred digital cult based off their deep wounds and personal characteristics.&lt;/p&gt;
&lt;p&gt;People correctly diagnose that most authoritarian progressives have a deep rooted hatred for the society they live in, but they seldom ask why. A charitable understanding of the spiteful nihilism requires dissecting the pain and hurt that drives people to hate their origins. Many incomprehensible behaviors make quite a bit of sense when you consider the consequences of abuse, hopelessness, and a lack of constructive outlets for rage. On the other hand, the existence of the alt-right shows that not all people respond to the same trauma the same way. There are many adaptations and reactions one can have from the same difficulties. The more defensive and hostile stance of the right is perfectly suited to escalate the game the woke is playing.&lt;/p&gt;
&lt;p&gt;Ironically, heavy-handed efforts to prevent conflicts escalate them. Censoring hate drives further resentment, and restricting conflicts seems to only raise the stakes. A terrified public desperately pleads the state to take drastic measures to &amp;lsquo;avoid civil war&amp;rsquo;. These knee-jerk reactions are wholly unable to assess much less resolve root causes and inevitably backfire. This creates a run away cycle where the means of preserving order are leveraged to create more chaos and destruction.&lt;/p&gt;
&lt;h2 id=&#34;forging-peace-in-turbulent-times&#34;&gt;Forging peace in turbulent times&lt;/h2&gt;
&lt;p&gt;We absolutely need to be fiercely critical of how the digital systems we use exacerbate real social problems. But if we allow ourselves to believe that technological systems are the source of our social problems we are setting up for total failure. To truly resolve the difficult problems of our time, we&amp;rsquo;re going to need significantly more seriousness, honesty, and care than is readily available. Humanizing others, and ourselves to others is only the first step.&lt;/p&gt;
&lt;h3 id=&#34;courageously-rejecting-awful-paradigms&#34;&gt;Courageously rejecting awful paradigms&lt;/h3&gt;
&lt;p&gt;Give yourself permission to think outside the prescribed narrative. Just because you&amp;rsquo;re given a (false) binary choice, that doesn&amp;rsquo;t mean either is a particularly good option. Having the courage and patience to find a way to be something radically different is a fantastic gift to yourself. You are not confined to fitting within the characterization your enemies have for you.&lt;/p&gt;
&lt;p&gt;Technological paradigms are arguably the easiest to change. You should recognize that everything can change with enough time and effort. All the platforms and systems we use are ultimately things we could redesign from scratch if we wanted to. None of the gadgets and software we encounter will be eternal, so embrace the mission of playing for the long game.&lt;/p&gt;
&lt;h3 id=&#34;building-a-virtuous-cycle-understanding&#34;&gt;Building a virtuous cycle: Understanding&lt;/h3&gt;
&lt;p&gt;If there&amp;rsquo;s one skill that can be a game-changer moving forward it would be epistemological humility. By that I mean being willing to recognize that you don&amp;rsquo;t, but also likely can&amp;rsquo;t know everything. There are going to be people with experiences you don&amp;rsquo;t and maybe can&amp;rsquo;t understand. By being able to tolerate some uncertainty, it is so much easier to listen to those vastly different than you. This way, you can build a connection that allows you to begin to learn their experience.&lt;/p&gt;
&lt;p&gt;By understanding our differences, it&amp;rsquo;s perfectly reasonable to put up boundaries. Self respect isn&amp;rsquo;t hatred. Understanding doesn&amp;rsquo;t mean enabling. Instead of taking an all-or-nothing approach, we can begin to actually negotiate rather than escalate conflicts. By beginning to recognize and assert our needs, it is so much easier to avoid self-destructive passivity.&lt;/p&gt;
&lt;p&gt;A useful recommendation to the right, but even the public generally, would be to build a better understanding of trauma responses. The progressive left, and some of the mainstream discussion has a fairly decent grasp of these issues. Unfortunately, those without this understanding are effectively easy prey for those who have it. With this understanding we can genuinely reach out to those who are hurting and provide genuine care instead of moralizing and condescension.&lt;/p&gt;
&lt;h3 id=&#34;redemption-the-antidote-to-nihilism&#34;&gt;Redemption: The antidote to nihilism&lt;/h3&gt;
&lt;p&gt;Despite being innovative and powerful, the progressive project is largely doomed. This is because it emphasizes inherent and collective evils that are immovable burdens on those who carry the blame. The progressive understanding of power is quite useful at identifying serious challenges, but entirely worthless when it comes to solutions. By treating people as irredeemable you&amp;rsquo;re forcing them into choose all out war, or self-debasement. This &amp;lsquo;Church of no salvation&amp;rsquo; breeds apathy on behalf of those who refuse to submit and self-loathing among those who do. To truly bring people together, there needs to actually be a viable path for repentance.&lt;/p&gt;
&lt;p&gt;People are going to disappoint you, and they&amp;rsquo;re going to fall short in a lot of different ways. To actually make a difference we&amp;rsquo;re going to need more than just those who neatly fit within our preferences. This requires a radically different approach to the madness of today&amp;rsquo;s politics. Honor cultures are corrosive to authentic values because they inevitably descend into prioritizing appearances rather than substance.&lt;/p&gt;
&lt;p&gt;Forgiveness is not about creating opportunities for future harm, but about ensuring that those who wish to make amends are able to do so. We should be gentle with those who have been wounded by the abuses of the culture war. They&amp;rsquo;re going to be sensitive and troubled, but a lot of good can come from learning from our own mistakes. By salvaging good out of the evils of our time, we can learn, create and share real solutions to our troubles.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>August Recap: Sorry for the delay!</title>
		<link>https://libresolutions.network/videos/25-aug-recap/</link>
		<pubDate>Tue, 09 Sep 2025 15:11:48 +0000</pubDate>
		<guid>https://libresolutions.network/videos/25-aug-recap/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/25-09-recap.mp3" />
			
		
		<description>The future of Monero, Android and decentralized media</description>
		<content:encoded>&lt;h2 id=&#34;updates&#34;&gt;Updates&lt;/h2&gt;
&lt;h3 id=&#34;recent-posts&#34;&gt;Recent posts&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://libresolutions.network/articles/fediverse-moderation/&#34;&gt;You Can&amp;rsquo;t Please Everybody: censorship in decentralized networks&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://libresolutions.network/articles/isp-kyc/&#34;&gt;Inbox Question: What good is hope in a digital prison?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://libresolutions.network/articles/chatbot-psychosis/&#34;&gt;Chatbot psychosis is actually a really big deal&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;trends-to-watch&#34;&gt;Trends to watch&lt;/h2&gt;
&lt;h3 id=&#34;the-future-of-android&#34;&gt;The Future of Android&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://www.cnbc.com/2025/09/02/google-antitrust-search-ruling.html&#34;&gt;Tech Google stock jumps 8% after search giant avoids worst-case penalties in antitrust case&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://www.androidauthority.com/android-developer-verification-requirements-3590911/&#34;&gt;Google wants to make sideloading Android apps safer by verifying developers’ identities&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@Gargron/115093185284473606&#34;&gt;&amp;ldquo;Sideloading&amp;rdquo; is the rentseeker word for &amp;ldquo;being able to run software of your choosing on a computing device you purchased&amp;rdquo;.&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://x.com/GrapheneOS/status/1960374854592418216&#34;&gt;GrapheneOS not affected&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;moneros-hashrate-troubles&#34;&gt;Monero&amp;rsquo;s &amp;lsquo;Hashrate troubles&amp;rsquo;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://forklog.com/en/researchers-debunk-alleged-51-attack-on-monero/&#34;&gt;Researchers Debunk Alleged 51% Attack on Monero&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://rekt.news/hashrate-heist-or-hype&#34;&gt;Hashrate Heist or Hype?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/w0NWN3MbFPU&#34;&gt;The attacks on Monero’s POW consensus system continue + Price, News &amp;amp; More! | EPI 227&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://antimoonboy.com/posts/amn40/&#34;&gt;Anti Moonboy News 40 - Well That Escalated Quickly&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/monero-project/research-lab/issues/143&#34;&gt;The true target is consensus to change the PoW. &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://support.kraken.com/articles/notice-of-delisting-xmr-canada&#34;&gt;Notice of delisting for Monero (XMR) in Canada&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;growing-pains-in-decentralized-social-media&#34;&gt;&amp;lsquo;Growing pains&amp;rsquo; in decentralized social media&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://cheapskatesguide.org/articles/us-social-media-laws.html&#34;&gt;Some of the New US State Social Media Laws are Driving Away Small Social Media&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://www.404media.co/4chan-and-kiwi-farms-sue-the-uk-over-its-age-verification-law/&#34;&gt;4chan and Kiwi Farms Sue the UK Over its Age Verification Law&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://techcrunch.com/2025/08/29/mastodon-says-it-doesnt-have-the-means-to-comply-with-age-verification-laws/&#34;&gt;Mastodon says it doesn’t ‘have the means’ to comply with age verification laws&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@Gargron/115074631868019158&#34;&gt;Technically, [fedi admins are] probably also breaking laws in Afghanistan, Iran, North Korea and so on. &lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://arewedecentralizedyet.online/&#34;&gt;Are We Decentralized Yet? - Fediverse vs &amp;lsquo;The Atmosphere&amp;rsquo;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;notable-items&#34;&gt;Notable items&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://unshadowed.substack.com/p/the-planetary-bio-surveillance-grid&#34;&gt;The Planetary Bio-Surveillance Grid&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://arxiv.org/pdf/1709.01149&#34;&gt;Biotechnology and the lifetime of technical
civilizations&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://lucumr.pocoo.org/2025/9/2/passkeys/&#34;&gt;Passkeys and Modern Authentication&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.froth.zone/sam/an-ai-sceptic-tries-using-local-large-language-models-blogust-xxxi&#34;&gt;An “AI Sceptic” Tries Using Local Large Language Models: Blogust XXXI&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://liliputing.com/pinephone-pro-linux-smartphone-has-been-discontinued-but-the-original-pinephone-is-still-available/&#34;&gt;PinePhone Pro Linux smartphone has been discontinued&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=chPzslZKBhI&#34;&gt;We&amp;rsquo;ve started an organization to reform the DMCA - here&amp;rsquo;s why&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://usips.org/blog/2025/09/cox-v-sony/&#34;&gt;USIPS Urges Supreme Court to Rein in Overbroad Copyright Liability in Sony v. Cox&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://open.substack.com/pub/centerforhumanetechnology/p/how-chatgpts-design-led-to-a-teenagers&#34;&gt;Key Takeaways: How ChatGPT&amp;rsquo;s Design Led to a Teenager&amp;rsquo;s Death&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://x.com/GrapheneOS/status/1964561043906048183&#34;&gt;GrapheneOS calls out Sameer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://battlepenguin.com/tech/the-purism-libre-5-and-the-six-year-refund/&#34;&gt;The Purism Librem 5 and the Six Year Refund&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.sambent.com/urgent-def-con-researcher-exposes-how-password-managers-betray-your-trust/&#34;&gt;[URGENT] DEF CON Researcher Exposes How Password Managers Betray Your Trust&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=0zNtATsb5eg&#34;&gt;So.. I kind of Revived a Dead Game..&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Chatbot psychosis is actually a really big deal</title>
		<link>https://libresolutions.network/articles/chatbot-psychosis/</link>
		<pubDate>Tue, 26 Aug 2025 20:42:24 +0000</pubDate>
		<guid>https://libresolutions.network/articles/chatbot-psychosis/</guid>
		
		<description>Hold your loved ones close</description>
		<content:encoded>&lt;p&gt;The latest developments in mind-machine intermingling are as silly as they are horrifying. Despite being a relatively new phenomenon, &amp;lsquo;AI psychosis&amp;rsquo; actually has its own &lt;a href=&#34;https://en.wikipedia.org/wiki/Chatbot_psychosis&#34;&gt;Wikipedia Page&lt;/a&gt; and was recently covered in &lt;a href=&#34;https://www.psychologytoday.com/us/blog/urban-survival/202507/the-emerging-problem-of-ai-psychosis&#34;&gt;Psychology Today.&lt;/a&gt; In a time where people are quick to blame technology for social problems, this is undeniably a problem with how these tools are structured and used. The public&amp;rsquo;s understanding, or lack of understanding, is a force multiplier for what is already a very troubling situation. This piece is a warning for those who may fortunately be isolated from these troubles, but want to be there for others.&lt;/p&gt;
&lt;h3 id=&#34;why-should-we-care&#34;&gt;Why should we care?&lt;/h3&gt;
&lt;p&gt;It&amp;rsquo;s generally distressing how social impacts of tech companies are often brushed off as a &amp;lsquo;skill issue&amp;rsquo; on behalf of the victim. People struggling with these problems are in need of outreach and support, not scorn and derision. Eventually, as the mental (and sometimes physical) carnage piles up, the will to take drastic (and often counter-productive) action finally arises. In many situations, this ends up being the worst-case-scenario for all involved. The only way to truly wrestle with this kind of problem is to tackle the social, economic, and technical challenges together, lest we let the abuse continue in an altered form.&lt;/p&gt;
&lt;p&gt;The extreme cases always get the headlines, but that&amp;rsquo;s not the entire picture. We shouldn&amp;rsquo;t forget about the less extreme, but much more widespread impacts. It wasn&amp;rsquo;t so long ago that admitting to poor mental health due to online interactions would have been embarrassing, so we can fully expect people to downplay and deny the effects of chatbot use on their lives and relationships. It&amp;rsquo;s possible that people may be more willing to reach out for help this time around, but I would argue the impacts are far too insidious for that.&lt;/p&gt;
&lt;p&gt;The stakes are immense. We have only begun to see the first-contact effects, and we have yet to comprehend the long-term consequences. Given the full range of impacts from mental health to &lt;a href=&#34;https://www.forbes.com/sites/jodiecook/2023/07/27/why-chatgpt-could-be-making-us-less-intelligent-6-key-reasons/&#34;&gt;IQ loss,&lt;/a&gt; we can expect a vast array of terrifying phenomena. The solution isn&amp;rsquo;t to eschew responsibility until enough political will conveniently arrives, we should be proactive in addressing the roots of this from the beginning. Taking action isn&amp;rsquo;t just about protecting yourself, but also recognizing and reacting to emerging dangers for others.&lt;/p&gt;
&lt;h2 id=&#34;the-roots-of-chatbot-psychosis&#34;&gt;The roots of chatbot psychosis&lt;/h2&gt;
&lt;p&gt;The loneliness epidemic is tragic. The drought of human connection is leaving many in a seemingly inescapable abyss. In a time when people are starved for real human companionship, mentorship, and support, workplaces and other institutions are working to remove the human element from nearly everything. Even if this is for &amp;rsquo;efficiency&amp;rsquo;, is it truly worth the cost? When it comes to loneliness, people love to blame the victim. It certainly helps that those without real human connection get quite bitter after a while. This cycle of disrespect is what has caused so much of the population to give up on each other. This social dynamic is no mere accident of our times. It is a &lt;a href=&#34;https://www.instagram.com/reel/DMkFQlgSl5e/&#34;&gt;cultivated territory&lt;/a&gt; for farming clicks and purchases out of human misery.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/memes/this-machine.webp&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;Bitter and miserable people are effectively perfect consumers. By distancing themselves from everyone around them, they end up cut off from people who may even be able to help. On the other side, people who can get along with others and cooperate can actually end up building things that address these profitable problems, keeping people lonely kills two birds with one stone. We have seen all of this and more with social media algorithms. They&amp;rsquo;ve caused all kinds of body image issues, unraveling of the social fabric, and mindless distraction at the expense of people&amp;rsquo;s real lives.&lt;/p&gt;
&lt;p&gt;You may think I&amp;rsquo;m just talking about a small fringe minority of irresponsible people, but you&amp;rsquo;d be surprised how prevalent these issues are. How many people in your life know the &amp;lsquo;real you&amp;rsquo;, by your estimation? Odds are you&amp;rsquo;re not very confident in how much you really know more than a couple of people in your life. With an incentive to keep these struggles to oneself, troubles can be buried for far longer than one would think.&lt;/p&gt;
&lt;p&gt;In many ways, &amp;lsquo;AI Psychosis&amp;rsquo; is nothing new, it is merely an extension of the existing trends By allowing de-facto monopolies over our digital experience to profit off human misery with hardly any opposition, we are encouraging this to get much worse. It does not matter what technological or political &amp;lsquo;solution&amp;rsquo; we wrap around our refusal to address the challenge posed by Big Tech control over so much of our lives.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/simulation-prison.webp&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;What actually is new is the rapid feedback and vast array of content. Asking AI chatbots questions can definitely feel like you have the totality of human knowledge communicating with you in real-time. The magician&amp;rsquo;s trick of these systems is that they encourage you to create an egregore of it out of your own perspective and desires. ChatGPT 4o&amp;rsquo;s &lt;a href=&#34;https://www.technologyreview.com/2025/08/15/1121900/gpt4o-grief-ai-companion/&#34;&gt;affirming personality&lt;/a&gt; effectively allowed people to &amp;lsquo;speedrun narcissism&amp;rsquo; only for them to mourn the next version which was less supportive. These tools are more than mere &amp;lsquo;mirrors of the mind&amp;rsquo; but are actually just doing the same disastrous pattern that Big Tech social media had: &lt;em&gt;keeping you engaged at all costs.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;As we continuously see that Big Tech, and its enablers to want to have their cake and eat it too. You can expect them to impose a double standard of requiring restrictions on general-purpose computing and communication in the name of &amp;lsquo;safety&amp;rsquo;, while at the same time arrogantly &lt;a href=&#34;https://apnews.com/article/ai-regulation-state-moratorium-congress-39d1c8a0758ffe0242283bb82f66d51a&#34;&gt;refusing to be held accountable&lt;/a&gt; for any of their own dangers.&lt;/p&gt;
&lt;h2 id=&#34;what-can-we-do&#34;&gt;What can we do?&lt;/h2&gt;
&lt;h3 id=&#34;ai-discipline&#34;&gt;AI Discipline&lt;/h3&gt;
&lt;p&gt;I&amp;rsquo;m skeptical that we can convince others to avoid these tools entirely. We&amp;rsquo;re up against corporations mandating their use for work, and they&amp;rsquo;ve already become commonplace if not expected in education. These systems are already ubiquitous and backed up by a horrifying amount of institutional inertia. The cause is far from hopeless, but it makes sense to pick our battles wisely.&lt;/p&gt;
&lt;p&gt;If we can&amp;rsquo;t talk others out of using these tools, we should at least encourage judicious use. I believe all the &amp;lsquo;old internet&amp;rsquo; advice applies here well, your real identity shouldn&amp;rsquo;t be attached to all your online interactions, especially with AI. Avoiding using your real name is a good idea. It&amp;rsquo;s also crucial to ensure you&amp;rsquo;re not communicating sensitive information about yourself to these systems, but unfortunately you have to hope nobody else does it on your behalf. Ideally, we should want everybody to be on &amp;rsquo;team privacy&amp;rsquo; and that is all about keeping personal or sensitive information away from data harvesters.&lt;/p&gt;
&lt;p&gt;Where possible, it makes sense to seek out less-harmful alternatives. This requires there to be knowledgeable enough to know the difference, which is no trivial thing. The general public is stuck struggling with questions like &amp;ldquo;are these things alive&amp;rdquo; while the important questions go unanswered.&lt;/p&gt;
&lt;h3 id=&#34;dont-compromise-on-humanity&#34;&gt;Don&amp;rsquo;t compromise on humanity&lt;/h3&gt;
&lt;p&gt;Our technological landscape is downstream of our cultural and political context. A few l33t h4x0rs on the Deep Web are never going to single-handedly turn the tide. (&lt;em&gt;no offense, you guys are great!&lt;/em&gt;) It seems that when older generations are confronted with the fact that we have raised multiple generations online they recoil and blame the young for their foolishness. If we truly want to wrestle with these problems we have to ask ourselves what deteriorated our societal and social bonds to the point that Big Tech social media felt like a less painful alternative. Finding who&amp;rsquo;s at fault is a lot less useful than finding out what we can do to turn things around.&lt;/p&gt;
&lt;p&gt;Bringing people together takes constant efforts, and is arguably harder than ever with the time constraints people have to contend with. A lot of trust has been broken as people feel isolated and abandoned. Taking the effort to turn the tide is going to be no simple task. Be patient with yourself as others as you try to bring warmth and peace. People really have no idea how much better things can be with a bit of calm and sanity.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Inbox Question: What good is hope in a digital prison?</title>
		<link>https://libresolutions.network/articles/isp-kyc/</link>
		<pubDate>Tue, 19 Aug 2025 11:32:37 +0000</pubDate>
		<guid>https://libresolutions.network/articles/isp-kyc/</guid>
		
		<description>Wrestling for direction in uncertain times</description>
		<content:encoded>&lt;p&gt;I got an interesting query that I felt was critical to share. This person shares a fear that I imagine is quite prevalent these days. While there are many exciting censorship resistance and privacy tools, they are not so widely adopted we can simply ignore ongoing power-grabs. I hope you&amp;rsquo;ll find this exchange helpful.&lt;/p&gt;
&lt;h2 id=&#34;question&#34;&gt;Question:&lt;/h2&gt;
&lt;blockquote&gt;
&lt;p&gt;I would love to talk to you about internet entrance ID. As far as i can see nobody is talking about what we can do when internet use is only possible after identification. Surely all use of vpns, tor en fediverse is then a bit silly because authorities will know who we are anyway. When that kicks in normal people (non- nerds) will have no way to discover the solutions that the nerds think up. As far as i can see we&amp;rsquo;re nearly fucked. But nobodys talking about it. Everyone is talking about digital ids and cbdc&amp;rsquo;s and censur and like but if we cant get onto the internet because are ISP wont let is in without identification then isnt the game then over?&lt;/p&gt;
&lt;p&gt;At the same time history is being deleted (wayback machine) and history can be rewriten (1984) in any way that suits the times.
I know that you are very positive about the future and that you are inclined ( like James Corbett) to rant about black pilled people who &amp;ldquo;give up&amp;rdquo; but i havent seen anyone answer my question. You dont really believe that any of you guys will be allowed on the internet if it is so easy to shut you down and as far as i can see this is what is going to happen.
It seems to me that the only real solution to this world wide dystopian situation is that we all throw away our phones and refuse to be digital prisoners anymore. But this  of course will never happen.&lt;/p&gt;
&lt;p&gt;I think that there is also a possibility that you and other digital freedom lovers and promoters are making the situation even worse because you promote hope. We can keep hoping and hoping and hoping and then suddenly free use of internet will not be possible anymore and we will be prisoners for life and for ever. And don&amp;rsquo;t imagine that revolution will work then because it won&amp;rsquo;t.
I read and follow your stuff and i am willing to pay for your great work but i would really like a few answers first. Is there a way to get around an ISP?&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2 id=&#34;answer&#34;&gt;Answer&lt;/h2&gt;
&lt;p&gt;To be clear, it is already the case that it is normal for people to have internet access associated with their real-life identities. At least here in Canada almost every residential ISP will be able to pass on subscriber information to law enforcement when a request is made. This is even more true for mobile data, where your internet access is linked to a single person instead of a household. To oversimplify a bit, all VPNs do is allow you to &amp;ldquo;share&amp;rdquo; a connection with people over the Internet. This means that depending on the policies and procedures of a particular VPN (such as logging, and cooperating with law enforcement) they may offer differing protection against state surveillance. That said, even in situations where state-level surveillance is omniscient, I think it is important to still prioritize privacy and security from other threats. (Such as corporations, scammers, cyber-criminals and mobs)&lt;/p&gt;
&lt;p&gt;You&amp;rsquo;re right to point out that VPNs and overlay networks like Tor are definitely next in line to be targeted by these measures. How big a problem this is may depend on your jurisdiction. For example in China people often have to use workarounds to access the Tor network for both practical and legal reasons. While motivated tech-savvy people will always find ways around these problems, the vast majority of people are going to &amp;ldquo;go along to get along&amp;rdquo; effectively entrenching the censorship and control. In many ways, the biggest problem here isn&amp;rsquo;t strictly ID verification by ISPs, but the legal and technical mechanisms governments will use to secure sovereignty over cyberspace at the expense of their citizens. The fine line here isn&amp;rsquo;t strictly the risk to individuals, but also the fact that in time it may be entirely impractical for anyone to run an online service for others that in any way clashes with stated and unstated policy. So all I&amp;rsquo;ve done here is confirmed and enhanced your concerns. In short, the Internet as we know it isn&amp;rsquo;t dying, but is being killed.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/memes/hostile-cyberspace.webp&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;So what&amp;rsquo;s the solution? This is a trend that extends far beyond a single national government, and the impacts are worldwide regardless of which nations do and don&amp;rsquo;t participate.
Whatever is able to coordinate and carry out this assault on digital freedom worldwide is absolutely outside the reach of the ordinary &amp;lsquo;checks and balances&amp;rsquo; of democratic governance. The traditional technical solutions to this are unlikely to reverse and resolve this situation. There simply isn&amp;rsquo;t a critical mass of the public interested in protecting their digital rights, if there was we wouldn&amp;rsquo;t be even having this conversation. When it comes to &amp;ldquo;real solutions&amp;rdquo; it is important to consider that technology is just part of the picture. It can&amp;rsquo;t be the entirety of the answer because our digital experience is shaped by an array of &amp;ldquo;collective action problems&amp;rdquo;.&lt;/p&gt;
&lt;p&gt;Therefore, if it is as bad as you say and technological solutions alone are insufficient to address these problems, what purpose is it to share hope in technical solutions at all?
I believe in human creativity and ingenuity. I am wholeheartedly committed to the idea that even people trapped in a relentless digital prison may still find ways to make a difference. These draconian measures by governments across the world are serious problems, but that&amp;rsquo;s not the same as it all being over. These shifts are radical transformations of the social and legal environment simply change the game for those interested in technical solutions. Just because old solutions are no longer viable that doesn&amp;rsquo;t mean it is impossible to build new strategies and systems adapted to the current environment. It is true that this environment is much more overtly hostile to free expression and privacy online, but I anticipate that technical solutions built in this era will be far more resilient than ones of the past.&lt;/p&gt;
&lt;p&gt;My goal has never been to put particular tools on a pedestal. If anything I&amp;rsquo;ve consistently tried to put the things I&amp;rsquo;ve been interested under a microscope and dissect their qualities. By carefully considering the pros and cons of particular tools and techniques, we can be more informed of what approaches are viable in an evolving and changing environment. I originally conceived of the Libre Solutions Network understanding that nothing is currently perfect and that far more work than I can imagine needs to be done to actually build a free and just cyberspace. It is by facing the problems head-on that I&amp;rsquo;ve chosen to spend so much time investigating what can be done. By learning from imperfections of the day we can refine approaches to bring about truly revolutionary change, and that is what I think is needed to overcome our present-day challenges.&lt;/p&gt;
&lt;p&gt;I wholeheartedly understand the desire to want to retreat from it all. I don&amp;rsquo;t think anyone should focus all their energies in saving or engaging with cyberspace, but I definitely believe that it is a worthwhile pursuit. For example, there are many problems with the medical field, especially as it relates to ethics and the politicization of health. I would absolutely not want to discourage someone interested in becoming a doctors or medical expert. We as freedom-loving people are always going to want skilled and experienced people on our side. Ironically, doctors and academics are arguably more controlled than technical people given their dependence on professional networks, yet we wouldn&amp;rsquo;t tell anyone to give up on the concept of human health in a dystopian society. My mission, from the beginning has never been to just promote a few tools and leave it at that. I believe we need to recruit technical minds to a mindset that values human flourishing and equip them to make it a reality.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;To answer your question: How do I get around a hostile ISP?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The reason why we need freedom-minded techies is that we need independent digital infrastructure. Governments and corporations are only able to control cyberspace because so much of it is reliant on their infrastructure, provided at our expense. Recognizing that much of the Internet as we know it is &amp;lsquo;hostile cyberspace&amp;rsquo; we can begin to actually build up our own networks and tools to truly reshape our digital landscape from the ground up. This requires local action. I love the idea of community-run networks, and it is clear that where they are possible they should be explored. The beauty of many existing tools is that they are still very much compatible with a radically different internet. I think with a little bit of change, people would realize how little change is needed to make things much better, and that&amp;rsquo;s an exciting prospect.&lt;/p&gt;
&lt;p&gt;Nobody is going to build any of this without hope. I have never meant to promote complacency, which is why I work to emphasize not just the dangers of our present digital experience, but also the opportunities in building a better digital future. There is so much to be excited for if we can work together to find the opportunities to overcome our technical and social challenges. Ironically, these days I feel that the darker things get, the lower the bar for meaningful progress actually is. Once you really begin to grapple with the big picture, you realize we haven&amp;rsquo;t even begun to make real change. As much as I am just as terrified as you for what lies ahead, I am also ignited by the hope that we can make the best of it.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>You Can&#39;t Please Everybody: censorship in decentralized networks</title>
		<link>https://libresolutions.network/articles/fediverse-moderation/</link>
		<pubDate>Tue, 12 Aug 2025 14:24:05 +0000</pubDate>
		<guid>https://libresolutions.network/articles/fediverse-moderation/</guid>
		
		<description>What you need to know about bans on the Fediverse.</description>
		<content:encoded>&lt;p&gt;One of the principle concerns of corporate social media is how people are manipulated to boost profits, attention, and engagement. The effects of this automated algorithmic manipulation are all-pervasive as they are disruptive. It is the very reason that the newspeak phrases like &lt;a href=&#34;https://www.urbandictionary.com/define.php?term=Unalive&#34;&gt;&lt;em&gt;unalive&lt;/em&gt;&lt;/a&gt; have entered the public vocabulary. Elon Musk&amp;rsquo;s purchase of Twitter raised the profile of discussions about the impact and influence of social media on society. Among those who consider with these issues, it is clear that a radically different solution is needed.&lt;/p&gt;
&lt;p&gt;While people have always attempted to migrate to &amp;lsquo;alt-tech&amp;rsquo; competitors to mainstream sites, we have the opportunity to explore new paradigms. Multiple models of decentralized social networking have risen to show what is possible. Due to their nature, different systems will have advantages and disadvantages. There are many crucial details to understand when trying to make the best of any of these systems. Sometimes, solving particular problems opens up new challenges. It is our responsibility to learn from the options we are contending with today, so that we can work on new solutions for the future.&lt;/p&gt;
&lt;p&gt;There are many decentralized social media systems. There are multiple iterations of the dream of &lt;a href=&#34;https://knightcolumbia.org/content/protocols-not-platforms-a-technological-approach-to-free-speech&#34;&gt;&lt;em&gt;protocols not platforms&lt;/em&gt;,&lt;/a&gt; where systems span larger than a single implementation. The major benefits to this paradigm are interoperability, accessibility, and anti-fragile architecture. Some are blockchain based like &lt;a href=&#34;https://bastyon.com/&#34;&gt;Bastyon,&lt;/a&gt; others like Mastodon use federated servers, and &lt;a href=&#34;https://nostr.net/&#34;&gt;nostr&lt;/a&gt; uses encryption-as-identity for portable identities. Each approach has trade-offs and considerations. For the purposes of this piece, I will be focusing on the limitations of the Fediverse.&lt;/p&gt;
&lt;h2 id=&#34;deficiencies-the-fediverse-in-practice&#34;&gt;Deficiencies: The Fediverse in practice&lt;/h2&gt;
&lt;p&gt;The Fediverse (which includes Mastodon) is an inter-connected network of federated social media sites. This includes various Free Software services like &lt;a href=&#34;https://libresolutions.network/articles/mitra&#34;&gt;Mitra,&lt;/a&gt; &lt;a href=&#34;https://ghost.org/6&#34;&gt;Ghost,&lt;/a&gt; or even big tech giants like Meta&amp;rsquo;s Threads. Even alternative networks like nostr can be connected via bridges. This means that instead of one single platform, there is a wider interoperable network, at least in theory.&lt;/p&gt;
&lt;p&gt;Every platform on the Fediverse can be called an &amp;ldquo;instance&amp;rdquo; each instance hosts accounts for the people on the platform. While followers &amp;amp; follows can be migrated, it is not seamless. Generally a profile exists on an instance and is beholden to the rules, features and limitations of that instance. Instance operators are offering their users a beachhead into decentralized social media, and the users are offering attention and community in return.&lt;/p&gt;
&lt;p&gt;This may sound like a win-win for everyone involved. It&amp;rsquo;s now possible for operator-run independent social media to exist, but why hasn&amp;rsquo;t it caught on yet? The Fediverse is very much a social experiment as well as a technological one. Just like users can follow, block and mute each other, so too can instances. This means that operators can effectively decide which instances (and by extension users) their users can interact with.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;The major innovation of the Fediverse is the creation of a website that isn&amp;rsquo;t PvP, but team deathmach instead.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2 id=&#34;can-you-be-banned-from-the-fediverse&#34;&gt;Can you be banned from the Fediverse?&lt;/h2&gt;
&lt;p&gt;There is no mechanism to prevent an individual from using federated social media, but there are a variety of reach and accessibility considerations. Instance operators, especially those of larger instances, can have a huge impact. While they can wield a significant amount of power over the network, that power is not absolute. You can be banned from particular instances, and those instances can ban instances that host you.&lt;/p&gt;
&lt;p&gt;This may sound like it defeats the purpose of using decentralized social media for censorship resistance. &lt;a href=&#34;https://battlepenguin.com/tech/the-broken-fediverse/&#34;&gt;The lack&lt;/a&gt; of a single unified network has its own advantages and disadvantages. Due to the decentralized, but also fragmented nature of the Fediverse, it is impossible to be banned from the entire network.&lt;/p&gt;
&lt;h3 id=&#34;account-bans&#34;&gt;Account bans&lt;/h3&gt;
&lt;p&gt;If you join a fediverse instance, you are a guest on someone else&amp;rsquo;s infrastructure. This is very similar to the deal Big Tech offers you when you create an account. The benefit of choosing the Fediverse over Big Tech is that hopefully, your instance administration can be more reasonable than Big Tech. That&amp;rsquo;s likely not a high bar at all, but there will inevitably be times where they disappoint.&lt;/p&gt;
&lt;p&gt;Your account on a particular instance can be banned just like any other online service. In this scenario, you&amp;rsquo;re perfectly able to join a new instance that aligns with you, or setup your own. Setting up your own instance involves non-trivial work and resources, including maintenance costs. The good news is that most fediverse software supports mechanisms to export your follows and follower lists, so you are not strictly &amp;lsquo;&lt;em&gt;starting from scratch&lt;/em&gt;&amp;rsquo; when you are banned or simply migrate instance hosts.&lt;/p&gt;
&lt;p&gt;The critical detail is to recognize that an account ban is merely removal from a particular instance. You&amp;rsquo;re still able to join another instance that&amp;rsquo;s even running the same software, such as Mastodon. In general, instance administrators only have control over the community they provide infrastructure for.&lt;/p&gt;
&lt;h3 id=&#34;instance-bans&#34;&gt;Instance bans&lt;/h3&gt;
&lt;p&gt;Of course, the natural solution to the above problem is to run your own fediverse infrastructure. By procuring your own system, you can operate on your own terms. While this solves many problems, it won&amp;rsquo;t solve all of them. Other instances, with often sizable user counts can block your instance. This is due to the biggest difference between decentralized and centralized social media. In centralized social media association is not interpreted as endorsement or approval. On decentralized networks, association is something &lt;a href=&#34;https://fba.ryona.agency/?reason=suspects&#34;&gt;you can be punished for.&lt;/a&gt; Your instance can be blocked by others who wish to &amp;lsquo;protect&amp;rsquo; their users from either your content, or content of those associated with you.&lt;/p&gt;
&lt;p&gt;There are many valid reasons for all-out instance blocks. Spam is a problem for both centralized and decentralized networks, and needs to be fought accordingly. Different jurisdictions have different requirements for removing illegal material, so every instance is likely to have slightly different policies and practices when it comes to such material. This means that there are more than just technical costs of running an instance, but there are also legal and social risks to consider. In our highly polarized times, people struggle to get along well over the Internet. Not all disagreements are handled nicely. Due to the &amp;ldquo;hub and spoke&amp;rdquo; nature of the Fediverse, &amp;lsquo;&lt;em&gt;dogpiling&lt;/em&gt;&amp;rsquo; is arguably no less prevalent than on centralized networks. The difference is that now there are more opportunities for conflict.&lt;/p&gt;
&lt;p&gt;One way to manage these risks has been the proliferation of curated blocklists. It&amp;rsquo;s certainly a lot easier to be put on those lists than to get off them. This means that truly independent or otherwise unpopular instances must effectively rebuild their own federation outside the more &amp;ldquo;mainstream counterparts&amp;rdquo;. This bifurcation creates particular social dynamics that leave both sides arguably much worse off. The solution to this problem is for more responsibly run instances to exist. Your instance doesn&amp;rsquo;t need absolute federation with the entire network, it just needs interested people to connect with. Larger communities investing in their own instances to provide the platform is a viable approach to tackle this problem.&lt;/p&gt;
&lt;h3 id=&#34;nostr-fixes-this&#34;&gt;Nostr fixes this?&lt;/h3&gt;
&lt;p&gt;A popular approach to this problem is to simply use nostr instead of federated social media (though they &lt;em&gt;can overlap&lt;/em&gt;). Using &lt;em&gt;encryption as identity&lt;/em&gt; nostr mitigates the problem of account bans by separating users from particular relays (servers). The instance blocking problem is also resolved a bit, because much of the interactions involving relays are done client-side.&lt;/p&gt;
&lt;p&gt;The significant downside of nostr&amp;rsquo;s approach is that not only is there no such thing as a global coherent state, but that it&amp;rsquo;s difficult to have one at all. The best way to ensure you don&amp;rsquo;t miss any notifications or interactions is to run your own nostr relay, but this can be impacted by all the same troubles a fediverse instance can have. That said, &lt;a href=&#34;https://soapbox.pub/tools/ditto/&#34;&gt;Ditto&lt;/a&gt; is an interesting project that provides a nostr relay and its own fediverse bridge. Providing a viable platform for those interested in both Nostr and the fediverse.&lt;/p&gt;
&lt;h2 id=&#34;freedom-isnt-free&#34;&gt;Freedom isn&amp;rsquo;t free&lt;/h2&gt;
&lt;p&gt;In a time where governments and corporations are restricting the Internet at a breakneck pace, it is vital to take an active role in preserving our digital freedoms. Free speech online isn&amp;rsquo;t something a billionaire can buy for you. You can&amp;rsquo;t rely on governments to protect it, and legislation will be insufficient to safeguard it. If we want a robust and valuable &amp;lsquo;&lt;em&gt;digital town square&lt;/em&gt;, we need to work diligently to construct it. This is well outside the scope of what an individual can accomplish, but many hands make light work. it is absolutely achievable to radically transform the web with enough independent technical skill and resources.&lt;/p&gt;
&lt;p&gt;The fight for online freedom relies on people actually feeling it. Those trapped on big tech corporate sites aren&amp;rsquo;t going to invest in a future that never felt real in the first place. It is our role as cyber rebels to do what we can to bring digital freedom to others, not to abandon the public to their foolishness. The public inherits the digital landscape we tolerate, and forgets the solutions that aren&amp;rsquo;t supported. Cyber rebels need to consider how to reclaim territory in cyberspace not just for themselves, but for others as well. This requires assessing various solutions as they are, not strictly how we&amp;rsquo;d like them to be.&lt;/p&gt;
&lt;p&gt;Since at least 2020, online censorship has accelerated and people have become more pessimistic about the future of the web as a whole. This is naturally understandable. If we want a better digital future we have to not just work towards it, but share it with others. This requires seriously evaluating the problems as they exist, not as we would like them to be. If building a better technological future was cheaper, more convenient, and easier to work with, it would be done already. It is always going to take dedicated independent effort to preserve digital freedom and that work is precious. Giving up on digital freedom has profound consequences. Things are far too inter-twined to abandon IRL rights for digital ones or vice-versa. It is high time we recognize the common causes of not just wishing for a better technological landscape, but actually working towards putting it into practice.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Summer 2025 Recap: Personal Touch</title>
		<link>https://libresolutions.network/videos/2025-summer-recap/</link>
		<pubDate>Thu, 31 Jul 2025 23:36:34 +0000</pubDate>
		<guid>https://libresolutions.network/videos/2025-summer-recap/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/25-summer-recap.mp3" />
			
		
		<description>Some recent updates and items of interest</description>
		<content:encoded>&lt;h2 id=&#34;updates&#34;&gt;Updates&lt;/h2&gt;
&lt;h3 id=&#34;website-updates&#34;&gt;Website updates&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;New vanity address for the Tor &lt;a href=&#34;https://libresolutions.network/operations/shadow&#34;&gt;hidden service&lt;/a&gt; &lt;a href=&#34;http://lsnonion2dv35xqlfv2batqdhyasi7oa734h7t4z2py43de4wb6jlyad.onion&#34;&gt;lsnonion2dv35xqlfv2batqdhyasi7oa734h7t4z2py43de4wb6jlyad.onion&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;I would recommend bookmarking the new address via the &lt;a href=&#34;https://www.torproject.org/download/&#34;&gt;Tor Browser.&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;rss-reader-project&#34;&gt;RSS Reader project&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;I really would like your feedback on what features are essential for a desktop RSS reader to have in 2025! I am not a designer, so UX suggestions are very much valued. I want this project to be built for making the open web a first-class contender with other media systems. The more feedback I get early on, the better this can be in the long run.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://gabe.rocks/tech/rss-help/&#34;&gt;Help me build the best desktop RSS client!&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3 id=&#34;xmrchat&#34;&gt;XMRchat&lt;/h3&gt;
&lt;p&gt;You can now leave tip messages via &lt;a href=&#34;https://xmrchat.com/lsn&#34;&gt;XMRChat&lt;/a&gt; Feel free to browse the &lt;a href=&#34;https://github.com/sa8ab/xmrchat&#34;&gt;repository&lt;/a&gt; for XMRchat. XMRchats will be read and answered in the next relevant piece or recap, whichever comes first!&lt;/p&gt;
&lt;h3 id=&#34;personal-note&#34;&gt;Personal note&lt;/h3&gt;
&lt;p&gt;I&amp;rsquo;ve hit a major weight loss milestone of &lt;a href=&#34;https://gabe.rocks/health/200-down/&#34;&gt;200lbs down&lt;/a&gt; from my high of over 570. That mission has definitely impacted the Libre Solutions Network as a project, but I&amp;rsquo;m grateful to have made so much progress. I am optimistic that with enough support, I can really go full-throttle into making the Libre Solutions Network an impactful project for digital autonomy.&lt;/p&gt;
&lt;h2 id=&#34;items-of-interest&#34;&gt;Items of Interest&lt;/h2&gt;
&lt;h3 id=&#34;givewp-data-leak&#34;&gt;GiveWP Data leak&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://corbettreport.com/data-leak-at-corbett-report/&#34;&gt;Data Leak at Corbett Report (and Many Other Sites)!&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://pi-hole.net/blog/2025/07/30/compromised-donor-emails-a-post-mortem&#34;&gt;Compromised Donor Emails: A post-mortem What Information Was Exposed (and What Was Not)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://x.com/troyhunt/status/1950690451125882932&#34;&gt;Troy hunt on GiveWP&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/impress-org/givewp/issues/8042&#34;&gt;Github Discussion&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Email aliasing guides:
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.privacyguides.org/en/email-aliasing/&#34;&gt;Privacy Guides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://thenewoil.org/en/guides/moderately-important/email-aliasing/&#34;&gt;The New Oil&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;id-verification-and-digital-id&#34;&gt;ID verification and Digital ID&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/eu-digital-identity-wallet/av-doc-technical-specification/issues/18&#34;&gt;EU Digital ID - Do not add Google Play Integrity integration&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/eu-digital-identity-wallet/av-app-android-wallet-ui&#34;&gt;EU Age Verification App Repository&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/eu-digital-identity-wallet/av-doc-technical-specification/discussions/19&#34;&gt;Discussion&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://tube.tchncs.de/videos/watch/66f8adb1-fd47-42a0-ae9d-0a11949593e2&#34;&gt;Age Verification Laws: Privacy Trojan Horse&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://battlepenguin.com/privacy-guard/&#34;&gt;Privacy Guard: You Don&amp;rsquo;t Need to Scan My Drivers License&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;the-fine-details&#34;&gt;The Fine Details&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://discuss.grapheneos.org/d/24134-devices-lacking-standard-privacysecurity-patches-and-protections-arent-private&#34;&gt;GrapheneOS - Devices lacking standard privacy/security patches and protections aren&amp;rsquo;t private&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.drewlyton.com/story/the-future-is-not-self-hosted/&#34;&gt;The Future is NOT Self-Hosted&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://shkspr.mobi/blog/2025/07/im-never-going-back-to-matrix/&#34;&gt;I&amp;rsquo;m never going back to Matrix&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;notable-mentions&#34;&gt;Notable Mentions&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.thebrink.me/chatgpt-induced-psychosis-how-ai-companions-are-triggering-delusion-loneliness-and-a-mental-health-crisis-no-one-saw-coming/&#34;&gt;ChatGPT-Induced Psychosis&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://techcrunch.com/2025/07/19/for-privacy-and-security-think-twice-before-granting-ai-access-to-your-personal-data/&#34;&gt;For privacy and security, think twice before granting AI access to your personal data&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://reclaimthenet.org/amazon-acquires-bee-ai-wearable-startup-for-voice-powered-personal-devices&#34;&gt;Amazon Acquires Bee, the AI Wearable That Hears Everything You Say&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://usips.org/blog/2025/07/fair-access-to-banking/&#34;&gt;Fair Access to Banking: Why do Banks get to decide what you can buy?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.atlasofsurveillance.org/atlas&#34;&gt;EFF: Atlas of Surveillance&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.therage.co/samourai-wallet-developers-plead-guilty-to-unlicensed-money-transmission/&#34;&gt;Samourai Wallet Developers Plead Guilty To Unlicensed Money Transmission&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.citationneeded.news/curate-with-rss/&#34;&gt;Curate your own newspaper with RSS&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Teachable Moment: All is fair in love and war</title>
		<link>https://libresolutions.network/articles/love-and-war/</link>
		<pubDate>Mon, 28 Jul 2025 12:15:51 +0000</pubDate>
		<guid>https://libresolutions.network/articles/love-and-war/</guid>
		
		<description>A gender war flashpoint highlights the concrete privacy concerns of age verification</description>
		<content:encoded>&lt;p&gt;The narrow window of time where the public could make use of the web to hold power accountable is coming to a close. The corporate consolidation over the &lt;em&gt;digital town square&lt;/em&gt; has already relegated the free exchange of ideas to the moderately technically savvy user. When it comes to challenging totalitarianism, this is a catastrophic loss. Far from being humanity&amp;rsquo;s &amp;ldquo;&lt;em&gt;information super-highway&lt;/em&gt;&amp;rdquo;, much of cyberspace has been transformed into broadcast television with likes.&lt;/p&gt;
&lt;p&gt;Governments have caught up to the digital tools of our time. While &amp;ldquo;&lt;em&gt;team freedom&lt;/em&gt;&amp;rdquo; becomes more apathetic and nihilistic about technology, a well-funded and connected league of bureaucrats are working to ensure that the people can never again use these tools to threaten their power. During the Covid years, it was invaluable for people of the world to share notes on what their governments were doing to them. It is clear that such an opportunity will be throttled away in the future.&lt;/p&gt;
&lt;p&gt;Last week, the world was given a major demonstration of how bifurcated the web of tomorrow is. The vast majority of people are going to concede to verification schemes to access web content, and a small minority will be gated from major online services. This separation is but a first step into a vastly more gated and controlled web, that will make digital dissent a fading memory. For now the focus is on the United Kingdom, but there have been many similar proposals in &lt;a href=&#34;https://cyberfreedom.ca/s-209/&#34;&gt;Canada,&lt;/a&gt; &lt;a href=&#34;https://www.abc.net.au/news/2025-07-11/age-verification-search-engines/105516256&#34;&gt;Australia,&lt;/a&gt; as well as &lt;a href=&#34;https://www.eff.org/deeplinks/2025/04/digital-identities-and-future-age-verification-europe&#34;&gt;Europe.&lt;/a&gt; It is fortunate that while this is being put into place, there was a high-profile example of the concrete dangers of our current path. It just so happens that a dating gossip app had a &lt;a href=&#34;https://www.404media.co/women-dating-safety-app-tea-breached-users-ids-posted-to-4chan/&#34;&gt;devastating data breach,&lt;/a&gt; weaponizing the private and personal information of those who were required to hand it over to participate.&lt;/p&gt;
&lt;h2 id=&#34;the-tea-spills&#34;&gt;The tea spills&lt;/h2&gt;
&lt;p&gt;It is easy to be hard on the young. Our social and technological environment has been changing so rapidly it&amp;rsquo;s genuinely hard to understand the challenges people face. Young boys and girls are creatures of an environment many hardly understand, much less work to improve. To make matters worse, not all interventions work out for the better. An app was made with the stated goal of allowing women to share notes and red flags about men in their lives. As it grew in popularity, eventually somebody noticed that the uploaded photo ID documents (to prove the users were women) were publicly accessible.&lt;/p&gt;
&lt;p&gt;This breach is perfect culture war fodder, and has received a great deal of mainstream coverage. This alone raises the stakes of the breach. Assurances of safety and security mean nothing in circumstances where there is sufficient motivation to leverage the data. &lt;a href=&#34;https://youtu.be/bWTyvvb8GFs&#34;&gt;S2 Underground&lt;/a&gt; makes a point to highlight the national security implications of this breach. Many people verified themselves with their workplace ID, or had their selfies linked to their actual location. The problems don&amp;rsquo;t end there. Scammers will routinely make use of breached information to find prey, and this kind of information can be expected to be leveraged for harassment campaigns.&lt;/p&gt;
&lt;p&gt;This strikes at the root justification for ID  verification online: the idea that it makes anyone at all safer. The tight intermingling of our real-world identities with the digital world has been a disaster for privacy and safety as a whole. The apathetic refrain &amp;ldquo;[they] can get everything anyways&amp;rdquo; says a lot more when &amp;ldquo;they&amp;rdquo; isn&amp;rsquo;t just intelligence agencies, but scammers and vindictive people online. While governments and corporations will promise you that they will take every precaution to protect your information, take no comfort from it. Breaches are a fight against entropy and almost assured on a long enough time line. Personal information has been leaked from small start-ups to the biggest tech giants of them all. If what we&amp;rsquo;re actually after is safety, it&amp;rsquo;s high time to consider what that truly means in a digital context.&lt;/p&gt;
&lt;p&gt;The safety promised by these systems is merely the transfer of risk from the giant institutions onto the people. The dangers only escalate as these systems consolidate control and power while failing to truly address the problems of our time. The false dichotomy between safety and freedom online is a very convenient way to avoid having to answer for the power they possess in control of these systems. It can&amp;rsquo;t be ignored that while these measures are put in place to &amp;lsquo;protect us&amp;rsquo; governments are also introducing &lt;a href=&#34;https://cyberfreedom.ca/45-2/&#34;&gt;&amp;lsquo;back-door&amp;rsquo; legislation&lt;/a&gt; to be able to spy on all that transpires on these platforms. The sum effect of these regulations is that there will be fewer independent digital platforms, and so much more speech control online. Nothing new, but an escalation of existing trends. Do you feel safer already?&lt;/p&gt;
&lt;h2 id=&#34;the-digital-dark-age-begins&#34;&gt;The digital dark age begins&lt;/h2&gt;
&lt;p&gt;Despite age verification being imposed &lt;em&gt;for your safety&lt;/em&gt;, scope creep is inevitable. It did not take long at all for the this law to ensure that X was &lt;a href=&#34;https://reclaimthenet.org/the-uks-online-safety-act-is-already-causing-protests-to-be-hidden&#34;&gt;suppressing footage of protests.&lt;/a&gt; Ultimately, none of this is new. Governments across the world are leveraging the corporate consolidation of the web to completely eliminate dissent. One has to ask: what do these governments intend to &lt;em&gt;do&lt;/em&gt; once they have seized total dominance over the public discussion? It is important to consider what this global coordinated gating of information is actually aimed at solving.&lt;/p&gt;
&lt;p&gt;Age verification often fails to accomplish its stated goals. Already we have seen that video game screenshots are sufficient to &lt;a href=&#34;https://news.instant-gaming.com/en/articles/13978-death-stranding-2-let-s-you-bypass-uk-age-verification-on-the-internet&#34;&gt;fool some of these systems.&lt;/a&gt; Correcting for mistakes by making validation more invasive simply increases the risk to participants. As simple methods continue to fail, we can expect the intrusions to move from platforms to your own devices. &lt;a href=&#34;https://www.eff.org/deeplinks/2025/06/eus-encryption-roadmap-makes-everyone-less-safe&#34;&gt;Client-side scanning&lt;/a&gt; and other mechanisms can be adopted to ensure &lt;em&gt;safety&lt;/em&gt; at the expense of a state veto over political dissent. The paper-thin pretexts of policing hate and disinformation collapse entirely when one observes how these policies are actually applied in practice: the letter of every regulation applied to silence inconvenient voices, while selected speakers are given preferential treatment. The new dark age doesn&amp;rsquo;t look dark at all, but instead brightly illuminated like a casino. A wide assortment of attention-grabbing colors arranged to hide rot we&amp;rsquo;re not supposed to notice. Any attempt to communicate to the public requires you to play by the house&amp;rsquo;s rules.&lt;/p&gt;
&lt;p&gt;The destruction of the web as a place for independent exchange of ideas has absolutely dire consequences for the future of humanity. Conceding cyberspace to tyrants after they made it inescapable is the final defeat before endless torment. Abandoning the free and open web only gives your local propagandists an unparalleled advantage over you. Setting proper digital boundaries is possible, but the opportunity to do so is fading.&lt;/p&gt;
&lt;h2 id=&#34;curating-coherence&#34;&gt;Curating coherence&lt;/h2&gt;
&lt;p&gt;People do not appreciate the vital importance of a free cyberspace enough. It is clear that we can expect the vast majority of the public to not only accept the death of digital dissent, but to lecture us about how important it is. At this stage, the best one can hope for is to merely preserve what is important as the darkness creeps in. With enough care and persistence, we can work to reverse the trend, but it is going to take much more than what has currently arisen.&lt;/p&gt;
&lt;h3 id=&#34;recognize-and-resist-hostile-cyberspace&#34;&gt;Recognize and resist hostile cyberspace&lt;/h3&gt;
&lt;p&gt;The ultimate contradiction of trying to make the Internet safe is that the corporate web exists to farm value from people. There can be no safety on platforms that exist to sell every moment of attention at the expense of your mental health. Another unpopular distinction is that merely using a VPN to evade the current iteration of ID verification is not a way to resist these measures. At worst it is signaling to the corporation that their users can be expected to absorb the impact of future violations.&lt;/p&gt;
&lt;p&gt;Understand that there is more to the world wide web than a few corporate controlled platforms. There are new decentralized protocols, and ways to build up independent cyberspace. These giant tech monopolies will be the enforcers of state politics and morality for as long as people tolerate it. We are already beginning to see the intrusions leap from mere mental health concerns to health trackers observing minute biological details.&lt;/p&gt;
&lt;p&gt;Under the guise of making cyberspace &amp;lsquo;safe&amp;rsquo; for all, we are seeing a parallel escalation in the ways in which our digital landscape can control, manipulate, and abuse people. These trends are hardly coincidental. It is high time to directly face the fact that these systems are hostile to the people they manage. You are not even a &amp;lsquo;user&amp;rsquo; of these systems, you are a resource to be exploited, if not a liability to be managed. Do not give these platforms the benefit of the doubt, much less your sensitive personal information.&lt;/p&gt;
&lt;h3 id=&#34;develop-and-build-independent-technical-capacity&#34;&gt;Develop and build independent technical capacity&lt;/h3&gt;
&lt;p&gt;The existing set of cyber-rebels are largely a loose set of individuals who chose to break free of hostile cyberspace early, for a variety of reasons. As a community, we have hardly begun to tread water. We are not even close to building rafts for others in any large way. Organized independent technical skills and resources are needed to truly chart a better direction. This requires freedom fighters from all walks of life to recognize the centrality of digital freedom in their real-life endeavors.&lt;/p&gt;
&lt;p&gt;Digital freedom is not the most important fight, but it is becoming a very critical front that is a prerequisite to holding governments and institutions accountable. If we wish to truly break new ground, rather than optimize within the boundaries assigned to us, victories in cyberspace are needed. This is no simple task. I can admit it is not easy to find technical people who recognize the stakes, responsibility, and opportunity in forging a radically new direction.&lt;/p&gt;
&lt;p&gt;Breaking free from hostile cyberspace requires finding or producing independent alternatives. It is utterly pointless to finger-wag at those trapped in virtual prisons if we are not well-equipped to offer an alternative. For far more people than you think, this is all that they have known. As the years crawl by, it becomes increasingly dire for increasing numbers of people.&lt;/p&gt;
&lt;h3 id=&#34;curate-independent-cyberspace-and-irl-space&#34;&gt;Curate Independent cyberspace and &amp;lsquo;IRL&amp;rsquo; space&lt;/h3&gt;
&lt;p&gt;If you want people to connect offline, you need to ensure there actually are rich social environments for people to thrive in. This may come as a shock, but authentic person-to-person interaction takes time. To make matters worse, our modern environment undermines a significant amount of trust which makes this even harder. Bringing people together is not just work, but a phenomenally valuable skill. It is important to be patient with the process, remind yourself what this is really all about.&lt;/p&gt;
&lt;p&gt;At the same time, it really is not ideal to write-off the digital entirely. Fundamentally the goal should be for discovering, building, and maintaining a better digital experience that doesn&amp;rsquo;t intrude on our actual lives. The ability for people across the world to share information and connect has never truly been the problem. The problem has always been how social interactions have been gated and mediated by corporations and governments with malicious intent.&lt;/p&gt;
&lt;p&gt;A better digital landscape is possible, it should compliment our lives rather than intrude on them. This simple distinction is what separates a free cyberspace from the controlled dystopia the powers of the world wish to force on us. What can we do to protect this boundary?&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Darknet Market Maximalism with Anti Moonboy (AKA Xenu)</title>
		<link>https://libresolutions.network/videos/anti-moonboy/</link>
		<pubDate>Sun, 06 Jul 2025 13:42:05 +0000</pubDate>
		<guid>https://libresolutions.network/videos/anti-moonboy/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/antimoonboy.mp3" />
			
		
		<description>Exploring the possibilities that remain for peer-to-peer digital cash</description>
		<content:encoded>&lt;p&gt;&lt;a href=&#34;https://peertube.libresolutions.network/w/cG7Nag4zKju8dhy7y7XxVi&#34;&gt;Listen on Peertube&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This is a great conversation with &lt;a href=&#34;https://antimoonboy.com/&#34;&gt;Anti Moonboy&lt;/a&gt; a highly knowledgeable Monero advocate also known as &lt;a href=&#34;https://x.com/xenumonero&#34;&gt;Xenu on X.&lt;/a&gt; It was a pleasure to be joined by a knowledgeable and passionate cyber rebel to discuss many things including his latest manifesto &lt;a href=&#34;https://antimoonboy.com/darknetmarketmaximalism/&#34;&gt;Darknet Market Maximalism.&lt;/a&gt; In our conversation we touch on the wider cryptocurrency discussion as well as the finer points of decentralization and privacy.&lt;/p&gt;
&lt;p&gt;If you&amp;rsquo;re interested in staying up to date on Monero and other topics &lt;a href=&#34;https://antimoonboy.com/amn/&#34;&gt;Anti Moonboy News&lt;/a&gt; is a phenomenal resource. Please consider following Anti Moonboy through his site&amp;rsquo;s &lt;a href=&#34;https://antimoonboy.com/index.xml&#34;&gt;RSS feed,&lt;/a&gt; but you can also check out his channels on &lt;a href=&#34;https://www.youtube.com/@Anti_Moonboy&#34;&gt;YouTube,&lt;/a&gt; &lt;a href=&#34;https://rumble.com/c/c-7272376&#34;&gt;Rumble,&lt;/a&gt; and &lt;a href=&#34;https://odysee.com/@anti_moonboy:7&#34;&gt;Odysee.&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;The Times 03/Jan/2009 Chancellor on brink of second bailout for banks.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://www.investopedia.com/terms/g/genesis-block.asp&#34;&gt;Satoshi Nakamoto - Bitcoin Genesis block&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3 id=&#34;links--resources&#34;&gt;Links &amp;amp; Resources:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cnbc.com/2025/05/15/coinbase-says-hackers-bribed-staff-to-steal-customer-data-and-are-demanding-20-million-ransom.html&#34;&gt;Coinbase says hackers bribed staff to steal customer data and are demanding $20 million ransom&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cbc.ca/news/world/world-us-cryptocurrency-related-crimes-1.7546701&#34;&gt;&amp;lsquo;Wrench attacks&amp;rsquo; subject some cryptocurrency holders to violence, kidnapping&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Self-hosting tools:
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://yunohost.org/&#34;&gt;YunoHost&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://libreserver.org/&#34;&gt;LibreServer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://start9.com/&#34;&gt;Start9&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://protos.com/michael-saylor-suggests-selling-kidneys-as-bitcoin-dips-below-80k/&#34;&gt;Michael Saylor suggests selling kidneys as bitcoin dips below $80K&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://antimoonboy.com/aotpo/&#34;&gt;Attacked of the Poisoned Outputs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://libresolutions.network/videos/bitcoin&#34;&gt;Geopolitics &amp;amp; Empire: Bitcoin’s Rise &amp;amp; Its Future Role…Tulip Mania or Digital Gold?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/_alDjVDcX4k&#34;&gt;Sam Bankman Fried and his empty boxes.&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://libresolutions.network/articles/zano&#34;&gt;The Zano Conspiracy: Hijacking Privacy&lt;/a&gt; | &lt;a href=&#34;https://gabe.rocks/docs/#/page/zano&#34;&gt;Notes&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://antimoonboy.com/posts/amn32/&#34;&gt;Anti Moonboy News 32 - Spy Nodes&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://odysee.com/@anti_moonboy:7/AMN9:c&#34;&gt;Anti Moonboy News 9 - &amp;ldquo;How is Zano being used today?&amp;rdquo;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://xmrchat.com/&#34;&gt;XMRChat&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://nostr.com/&#34;&gt;Nostr&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://xmrbazaar.com/&#34;&gt;XMRBazaar&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://libresolutions.network/articles/mitra/&#34;&gt;Mitra&lt;/a&gt; | &lt;a href=&#34;https://codeberg.org/silverpill/mitra&#34;&gt;Repository&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;donate&#34;&gt;Donate&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://antimoonboy.com/donate/&#34;&gt;Support Anti Moonboy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://libresolutions.network/about/support&#34;&gt;Support this work&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Decentralization in Practice: Pitfalls and Possibilities</title>
		<link>https://libresolutions.network/videos/simplified-privacy/</link>
		<pubDate>Sun, 29 Jun 2025 17:21:41 +0000</pubDate>
		<guid>https://libresolutions.network/videos/simplified-privacy/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/simplified-privacy.mp3" />
			
		
		<description>Talking the finer points of freedom tech with Simplified Privacy</description>
		<content:encoded>&lt;p&gt;This conversation is an opportunity to learn from Simplified Privacy, an organization that works to put decentralization in practice. It was a pleasure to talk with Shadow from the team to dig deep into the challenges involved with privacy for fun and profit. This was a great opportunity to compare notes on the bleeding edge of decentralization and privacy tools and the practical realities of putting it to use. There are a lot of important questions to ask and lots of fine points to consider.&lt;/p&gt;
&lt;p&gt;You can follow Simplified Privacy on &lt;a href=&#34;https://ditto.pub/@npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6&#34;&gt;Nostr&lt;/a&gt; to get connected.&lt;/p&gt;
&lt;h2 id=&#34;relevant-links&#34;&gt;Relevant links:&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://cyberfreedom.ca/tag/45th-parliament/&#34;&gt;New Canadian Legislation against privacy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.jeffgeerling.com/blog/2025/self-hosting-your-own-media-considered-harmful-updated&#34;&gt;Self-hosting your own media considered harmful (Updated)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/ftJ6eGll8HU&#34;&gt;YouTube Considers This Software &amp;ldquo;Harmful or Dangerous&amp;rdquo;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://videos.lukesmith.xyz/w/fd4pz1jhA9GazuJ9PUy7tM&#34;&gt;Fight the System? Or Exit the System?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/6AynIIFM2WU&#34;&gt;AKSHUALLY! You Should ALWAYS Use A VPN! - The Hated One&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.androidpolice.com/meta-yandex-apps-de-anonymize-localhost-tracking/&#34;&gt;Researchers catch Meta apps abusing Android to track sensitive browsing history&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://snikket.org/blog/on-the-jabber-ru-mitm/&#34;&gt;On the jabber.ru MITM attack&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://arstechnica.com/security/2024/06/critical-moveit-vulnerability-puts-huge-swaths-of-the-internet-at-severe-risk/&#34;&gt;Critical MOVEit vulnerability puts huge swaths of the Internet at severe risk&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.404media.co/the-signal-clone-the-trump-admin-uses-was-hacked/&#34;&gt;The Signal Clone the Trump Admin Uses Was Hacked&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Smile! You&#39;re being recorded.</title>
		<link>https://libresolutions.network/articles/smile-recorded/</link>
		<pubDate>Wed, 18 Jun 2025 15:00:42 +0000</pubDate>
		<guid>https://libresolutions.network/articles/smile-recorded/</guid>
		
		<description>Recognizing and contending with the nature of systemic surveillance.</description>
		<content:encoded>&lt;p&gt;Omnipresent surveillance isn&amp;rsquo;t merely normalized, but expected. It&amp;rsquo;s a sad state of affairs when the extreme consolidation and misuse of sensitive personal information is merely yet another risk placed on individuals without a care. Worse still, people are quick to blame consumers for particular technology choices without considering structural factors. While it is worth our time to try to find ways to minimize digital intrusions, at some point the bigger picture has to be drawn and confronted. We are well past the time where being careful about what you post online was sufficient to protect your data. In our time, almost every institution you interact with creates a larger and larger digital footprint that is almost entirely outside of your own control.&lt;/p&gt;
&lt;p&gt;While this can be mitigated by refusing to interact with any large public or private institution, it is unreasonable to expect the general public to make the same sacrifice consistently. Instead of playing the blame game, it can be useful to take stock of the information that is unnecessarily collected by institutions we choose to interact with, and those people are forced to contend with. Even when information collection is necessary, we should ask if data retention truly necessary? Even if it is, how long? Regardless of how long the information is kept, what practices are acceptable with that particular information? By recognizing the new threats created by mass data collection we should reassess how we allow people&amp;rsquo;s information to be collected and used.&lt;/p&gt;
&lt;p&gt;Many of these issues are currently coming to a head with &lt;a href=&#34;https://www.cbsnews.com/video/senate-holds-hearing-23andme-concerns-company-selling-customers-data/&#34;&gt;the sale&lt;/a&gt; of 23andMe&amp;rsquo;s treasure trove of sensitive data ranging from personal details to DNA. In many ways this is but the tip of a massive and jagged iceberg, given that the potential uses (&lt;em&gt;and misuses&lt;/em&gt;) for intimate personal and medical details multiply by the day. While institutions both public and private promise to protect the information they collect with the latest and greatest standards and practices, these guarantees aren&amp;rsquo;t worth very much. Data breaches are &lt;a href=&#34;https://tech.co/news/data-breaches-updated-list&#34;&gt;so common&lt;/a&gt; to be background noise to many. Once information is shared, sold, or stolen, there is hardly any recourse for those who are harmed by its misuse.&lt;/p&gt;
&lt;p&gt;The only way to ensure information is protected across time is to never record it in the first place. Consequences of breaches both large and small are severe for individuals. Information divulged in breaches is often &lt;a href=&#34;https://www.fastcompany.com/91347086/data-breach-illicit-markets-personal-information-criminals&#34;&gt;weaponized&lt;/a&gt; against individuals, resulting in a wide array of terrible consequences. The tragedy is that your digital footprint is already far outside your control. While it is advisable to avoid proactively enlarging it, the sad fact is that almost every institution and service has an incentive to &lt;a href=&#34;https://gizmodo.com/data-broker-brags-about-having-highly-detailed-personal-information-on-nearly-all-internet-users-2000575762&#34;&gt;work against you.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The latest stock-market hype cycle, &lt;a href=&#34;https://youtube.com/playlist?list=PLFQvErdlATeY-mEHozu5GlfffewysnHFq&#34;&gt;&amp;quot;&lt;em&gt;AI Mania&lt;/em&gt;&amp;quot;&lt;/a&gt; is the fuel for this particular bonfire of civil liberties. The clear desire to integrate &amp;lsquo;intelligent&amp;rsquo; tools into all levels of society is based on the assumption that the mass collection, retention, and use of sensitive personal information is not only harmless, but desirable. This is a direct assault on the ability for individuals to have, much less choose their own boundaries with particular entities. It&amp;rsquo;s a lot harder to &amp;lsquo;opt-out&amp;rsquo; of particular features when your phone plan is &lt;a href=&#34;https://infosec.exchange/@briankrebs/114699542271613288&#34;&gt;linked to your healthcare&lt;/a&gt; or entities are able to leverage information collected on you from everywhere and anywhere.&lt;/p&gt;
&lt;p&gt;The problem is not contained to a single institution or sector. This is a classic &lt;a href=&#34;https://www.investopedia.com/terms/e/externality.asp&#34;&gt;negative exernality&lt;/a&gt; feedback loop. The privacy and security of individuals is being traded for risk management by institutions both public and private. This trade is anything but voluntary and immensely one-sided. Powerful automation and robotics systems are being developed with the express purpose of making our physical reality &lt;a href=&#34;https://x.com/bigmadcrab/status/1930016652457898091&#34;&gt;as controlled&lt;/a&gt; as our digital one. If one is concerned about the information dark age online, they should be a great deal more concerned with what is coming to our actual lives if this trend continues.&lt;/p&gt;
&lt;p&gt;It can be hard for people to see why anyone would cooperate with all this, but there are many strong incentives to go &lt;em&gt;play pong&lt;/em&gt; with the machine. The gold rush surrounding artificial intelligence tools means that many are going to experiment with &amp;lsquo;AI agents&amp;rsquo;, even &lt;a href=&#34;https://techcrunch.com/2025/03/07/signal-president-meredith-whittaker-calls-out-agentic-ai-as-having-profound-security-and-privacy-issues/&#34;&gt;at their own peril.&lt;/a&gt; The more interwoven these tools become with our lives, the more serious abuses can come from the misuse of personal information. It&amp;rsquo;s one thing when a person chooses to use these tools, but a whole other scenario when institutions are making use of them and individuals are left with the consequences.&lt;/p&gt;
&lt;p&gt;While private entities are massively responsible for expanding surveillance, Governments are escalating their own measures. Every level of society, including corporate data collection can be leveraged for &lt;a href=&#34;https://www.openrightsgroup.org/blog/why-predictive-policing-must-be-banned/&#34;&gt;real-time social control.&lt;/a&gt; The &lt;a href=&#34;https://theconsciousresistance.com/emergent201-tech-army/&#34;&gt;militarization&lt;/a&gt; of everyday technical tools has profound implications for governments capacity and willingness to suppress even the most minor signs of dissent.&lt;/p&gt;
&lt;p&gt;This depressing dystopia is far from the inevitable path that its beneficiaries and sci-fi would have you believe. The biggest barrier to a better digital future is not the systems we have to contend with but our own imagination and will. Devices can be repurposed, systems can be replaced, and tools can be rebuilt or refined. In the worst case scenario, we&amp;rsquo;ll have a great deal of recycling to do. It is difficult to draw the line that the problem is not the devices themselves, necessarily. &amp;lsquo;Wearables&amp;rsquo;, touch-screen devices, robots, and automation are all things that get a lot of &lt;em&gt;well-intentioned&lt;/em&gt; ire, but are hardly the actual basis for the feared top-down technological terror. The actual problems are caused by these tools being built for a terrifyingly consolidated power structure to manage any resistance, internal or external. As political corruption consolidates actual power, the digital landscape morphs to suit this state of affairs. It is unavoidable that those who want a better digital experience must be engaged citizens supporting initiatives for transparency, accountability and justice.&lt;/p&gt;
&lt;p&gt;The good news is that non-technical people are very much needed in this fight. None of this is an engineering problem. This is a reflection that our digital experience is a direct consequence of the powers at play in society. It is understandably overwhelming to consider the greater scope at hand. To make matters worse, it is entirely unlikely that these problems will be properly addressed. One can bet on more invasive (&lt;em&gt;both voluntary and coerced&lt;/em&gt;) data collection on even the smallest details one can imagine in their life. The problem with privacy is that its harms are largely abstract to many people. The solutions are even more opaque as it&amp;rsquo;s genuinely difficult to understand what moves are genuinely worth the effort. It&amp;rsquo;s a challenging problem to solve because the harms are effectively diffused throughout society, like pollution, harming people in subtle to severe situations over longer periods of time. Odds are, there will likely be no single moment where people decide to take these issues head-on, especially when there are more pressing matters at hand. Unfortunately, this does nothing to stop privacy issues from impacting various other areas of life. This leads to scenarios where people are distraught by our modern digital landscape, but feel it&amp;rsquo;s not only inescapable but also impossible to change.&lt;/p&gt;
&lt;p&gt;There is a case for apathy. Those of us who want to see a better digital future may not want to admit it, but many people are up against more acute and practical concerns than data privacy. This is incredibly frustrating as we see the consolidation and weaponization of information used to create new and concerning dangers. Instead of blaming those who are unable to prioritize privacy, we have to ask ourselves what we need to do to structurally &lt;em&gt;change the game&lt;/em&gt;. It is not reasonable to expect those shackled by information control and invasive surveillance to pay the entire cost of overcoming it themselves. Such an expectation is an inevitable descent into disappointment and despair.&lt;/p&gt;
&lt;h3 id=&#34;but-what-can-we-do&#34;&gt;But what can we do?&lt;/h3&gt;
&lt;p&gt;I would encourage you to face the problems as they are, and with some faith and creativity seek out smaller wins. Given that we have finite lifetimes, our goal shouldn&amp;rsquo;t be to unilaterally solve everything. Instead, a cooperative long-term approach of &lt;em&gt;building momentum&lt;/em&gt; in the right direction can absolutely yield meaningful results. There are notable examples from history in both the &lt;a href=&#34;https://www.fsf.org/&#34;&gt;Free Software Foundation&lt;/a&gt; and the &lt;a href=&#34;https://www.eff.org/&#34;&gt;Electronic Frontier Foundation,&lt;/a&gt; but know that you need not be constrained by these particular efforts. Don&amp;rsquo;t be afraid of drawing your own lines in different places than others. If anything it can be a unique advantage to recognize particular problems and share insights.&lt;/p&gt;
&lt;p&gt;Those who can unplug their minds from algorithmic control should, those who can protect their information absolutely need to, but that&amp;rsquo;s not the entire picture. The best we can expect from the vast majority of people is for them to play the cards they&amp;rsquo;re dealt. It is our job as those who want to work towards a better digital future to give the public better cards to play. In hindsight the cypherpunks most important point was recognizing it was the role of privacy advocates to create things that make digital autonomy possible and convenient. It is absolutely a high bar. Every year commercial trends raise the expectations the public has for technology. This is a daunting challenge, but more importantly an awesome opportunity.&lt;/p&gt;
&lt;p&gt;It is fundamentally crucial that we recognize that our digital experience is downstream of our cultural understanding of the tools and systems we use. Without judicious and careful understanding of the world as it is, we will never see the future as we would like it to be. The dreamers must come to understand the doomers, and the doomers in turn must learn to appreciate the dreams. With this common understanding then we can wrestle with the fundamental social foundations of our technological landscape. This is far from philosophical navel-gazing, but is a necessary prerequisite for making the change necessary to avoid digital totalitarianism.&lt;/p&gt;
&lt;p&gt;Now more than ever, it is vital to build a vision for a better digital experience. Simply decrying the egregious abuses of our existing one will only help us find opportunities to cope. By bringing people together to envision a truly radical and ambitious transformation of cyberspace, we have the opportunity to build lasting and holistic &lt;em&gt;solutions&lt;/em&gt;. We have only begun to grapple with the consequences of our experience as it is. There is so much work to define what a better future looks like. Those of us with technical ability have two immense responsibilities: to be stewards for technology &lt;em&gt;as it is&lt;/em&gt;, and to be fierce advocates for technological change that is used for people rather than against them.&lt;/p&gt;
&lt;p&gt;If we are willing to take on these responsibilities, it is outright shocking how quickly things can improve. By responding to present-day realities we can properly inform long-term approaches. There is a real chance to make the tyrants of the world regret leaving so many bright technical minds &lt;a href=&#34;https://sfstandard.com/2025/05/20/silicon-valley-white-collar-recession-entry-level/&#34;&gt;without work.&lt;/a&gt; Fighting for freedom in the real world is increasingly dependent on recognizing and addressing the realities in cyberspace, and we would ignore this to our peril. Those interested in a better future in general would be wise to consider how we plan to make space for a much needed independent technical revolution.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Digital Autonomy &amp; Open-Source Intelligence with James Corbett</title>
		<link>https://libresolutions.network/videos/digital-autonomy-osint/</link>
		<pubDate>Thu, 12 Jun 2025 10:55:02 +0000</pubDate>
		<guid>https://libresolutions.network/videos/digital-autonomy-osint/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/corbett.mp3" />
			
		
		<image>https://libresolutions.network//images/corbett.webp</image>
		<media:thumbnail href="https://libresolutions.network//images/corbett.webp" />
		<itunes:image href="https://libresolutions.network//images/corbett.webp" />
		<description>Discussing the fine points of research, censorship &amp; AI terror.</description>
		<content:encoded>&lt;p&gt;We return to the &lt;a href=&#34;https://libresolutions.network/tags/digital-autonomy-series&#34;&gt;Digital Autonomy series&lt;/a&gt; to take a close look at our role in participating in today&amp;rsquo;s information landscape. It is an honor and a pleasure to be joined by James Corbett of the &lt;a href=&#34;https://corbettreport.com&#34;&gt;Corbett Report&lt;/a&gt; to dig into this topic in detail. James brings his vast experience as an independent researcher and alternative media voice. We discuss the evolving digital landscape as well as the pressing concerns around artificial intelligence tools. Independent voices and audiences themselves face unprecedented challenges to make the most of the opportunities of our time.&lt;/p&gt;
&lt;p&gt;Consider taking this as an opportunity to reevaluate how you want to engage online. It has never been more clear that our time on corporate platforms is on borrowed time. You can consider trying out the &lt;a href=&#34;https://libresolutions.network/tags/fediverse&#34;&gt;Fediverse&lt;/a&gt; or &lt;a href=&#34;https://nostr.com/&#34;&gt;nostr&lt;/a&gt; or even just bookmark sites you find important and valuable. We all have a role to play in shaping the future of the information landscape, and our choices matter.&lt;/p&gt;
&lt;h2 id=&#34;links-discussed&#34;&gt;Links discussed:&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://www.washingtontimes.com/news/2006/apr/18/20060418-110124-3694r/&#34;&gt;CIA mines ‘rich’ content from blogs&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://corbettreport.com/episode-288-open-source-journalism/&#34;&gt;Open Source Journalism&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://corbettreport.com/mission-un-accomplished-the-corbett-report-back-on-youtube/&#34;&gt;Mission Un-Accomplished? The Corbett Report Back on YouTube&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://antennapod.org/&#34;&gt;AntennaPod&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://corbettreport.com/the-corbett-report-now-on-ipfs/&#34;&gt;The Corbett Report . . . Now on IPFS!&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://andrewblackman.net/2025/05/no-rss-isnt-dead/&#34;&gt;No, RSS isn’t dead!&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://www.businessinsider.com/jack-dorsey-partially-to-blame-for-centralizing-the-internet-regrets-2022-4&#34;&gt;Twitter founder Jack Dorsey said he&amp;rsquo;s &amp;lsquo;partially to blame&amp;rsquo; for centralizing the Internet and that he regrets it&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://odysee.com/@Odysee:8/welcomestheindependentmediaalliancetoportal:b&#34;&gt;Decentralization in Action: Odysee Welcomes the Independent Media Alliance to Portal&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://gabe.rocks/sharing/ima.opml&#34;&gt;Independent Media Alliance.opml&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://libresolutions.network/articles/grayjay/&#34;&gt;A Grayjay Review&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://www.jeffgeerling.com/blog/2025/self-hosting-your-own-media-considered-harmful-updated&#34;&gt;Self-hosting your own media considered harmful (updated)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=ftJ6eGll8HU&#34;&gt;YouTube Considers This Software &amp;ldquo;Harmful or Dangerous&amp;rdquo;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://corbettreport.com/the-internet-is-dead-long-live-the-internet/&#34;&gt;The Internet Is Dead. Long Live the Internet.&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://corbettreport.com/we-need-to-talk-about-ai/&#34;&gt;We Need To Talk About AI&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://web.archive.org/web/20230810084819/https://www.youtube.com/watch?v=sFj6-z8KeeU&amp;amp;t=2985s&#34;&gt;Neil Postman on Technopoly (1992)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://www.theglobeandmail.com/business/article-shopify-ceo-says-ai-use-for-work-a-fundamental-expectation-for-all/&#34;&gt;Shopify CEO says AI use for work a ‘fundamental expectation’ for all employees&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://ml-site.cdn-apple.com/papers/the-illusion-of-thinking.pdf&#34;&gt;The Illusion of Thinking: Understanding the Strengths and Limitations of Reasoning Models via the Lens of Problem Complexity&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://youtube.com/playlist?list=PLFQvErdlATeY-mEHozu5GlfffewysnHFq&#34;&gt;AI Mania - Nobody Special&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://www.iflscience.com/rokos-basilisk-the-banned-thought-experiment-you-might-regret-reading-about-78478&#34;&gt;Roko&amp;rsquo;s Basilisk: The &amp;ldquo;Banned&amp;rdquo; Thought Experiment You Might Regret Reading About&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Cool Concepts That Deserve More Recognition</title>
		<link>https://libresolutions.network/articles/experiments/</link>
		<pubDate>Tue, 27 May 2025 10:37:16 +0000</pubDate>
		<guid>https://libresolutions.network/articles/experiments/</guid>
		
		<description>Learning from the past to inform the future</description>
		<content:encoded>&lt;p&gt;Over the years, there have been many fascinating projects attempting to push the limits of digital decentralization. What makes these inventions interesting is the opportunity to truly transform the systems people take for granted. While not every attempt succeeds in radically changing the game, there is often quite a fair bit to learn from them. In fact, it is often through failed experiments that we can learn the most to inform future approaches. Cyber rebels of all stripes need to rekindle their sense of creativity and curiosity.&lt;/p&gt;
&lt;p&gt;It is tragic that so many brilliant technical minds are absorbed into big money cargo cults rather than drawn to working on practical answers to pressing problems. A lot of the very tantalizing and game-changing techniques are very often the most obscure. It is our job as cyber rebels to give these underrated gems their due credit. In the hopes of exploring the art of the possible, we&amp;rsquo;ll be looking at a few fascinating projects that have covered important ground.&lt;/p&gt;
&lt;h3 id=&#34;zeronet---a-web-revolution&#34;&gt;ZeroNet - A web revolution&lt;/h3&gt;
&lt;p&gt;A particularly ambitious project to reinvent the Internet as we know it was &lt;a href=&#34;https://gabe.rocks/docs/#/page/zeronet&#34;&gt;ZeroNet.&lt;/a&gt; This project was a particularly daring attempt to solve a great many problems all at once. Describing itself as &amp;ldquo;Open, Free and un-censorable websites, using Bitcoin cryptography and BitTorrent network&amp;rdquo;. The project was also built to be quite friendly with Tor, leveraging existing anonymity solutions to protect privacy on this new frontier. This project had some absolutely astounding potential and some very well-refined approaches. It is a shame that &lt;a href=&#34;https://github.com/HelloZeroNet/ZeroNet&#34;&gt;the repository&lt;/a&gt; hasn&amp;rsquo;t been updated since 2021, but the project lives on as &lt;a href=&#34;https://github.com/zeronet-conservancy/zeronet-conservancy&#34;&gt;0net.&lt;/a&gt;&lt;/p&gt;

&lt;a href=&#39;https://youtu.be/cjVMuLLoM00&#39;&gt;

&lt;video muted autoplay preload=&#34;none&#34;&gt;
    &lt;source src=&#39;https://libresolutions.network/media/video/zn.mp4&#39;&gt;
&lt;/video&gt;

&lt;/a&gt;

&lt;p&gt;If ZeroNet had gained significant adoption, it would have become an incredibly powerful tool against online censorship. ZeroNet attempted to level the playing-field of information dissemination by ensuring that sites were served by their visitors. Getting the visitors to share the load meant that the originator didn&amp;rsquo;t even need to stay online for their content to remain available. This has many performance benefits that have also been replicated in other projects. &lt;a href=&#34;https://corbettreport.com/interview-1435-declare-your-independence-with-ipfs/&#34;&gt;IPFS&lt;/a&gt; is another parallel initiative that tried to take this on, but ZeroNet also had other advantages.&lt;/p&gt;
&lt;p&gt;Far from merely being a resilient content delivery system, ZeroNet had a truly revolutionary design for serving dynamic content. A limitation IPFS and other similar approaches had was that it was impossible or impractical to build even relatively simple web experiences on top of them. Because of its radically different approach to static and dynamic content, ZeroNet had mechanisms to allow for any modern site to be built on top of it. At the peak of its popularity ZeroNet had a decentralized, password-less, pseudonymous single-sign-on system that worked with &lt;a href=&#34;https://zeronet.io/docs/using_zeronet/sample_sites/&#34;&gt;blogs, mail&lt;/a&gt; and even an attempted YouTube clone. Serving a web site from ZeroNet rather than the regular Internet had many advantages similar to other &lt;a href=&#34;http://libresolutions.network/operations/shadow&#34;&gt;darknets,&lt;/a&gt; such as no cost permission-less hosting.&lt;/p&gt;
&lt;p&gt;ZeroNet did a lot of very interesting things, but it certainly had its limitations. To my knowledge it was quite obscure and relatively unknown even to technical people. Many trade-offs had to be made to work as well as it did, and there are a wide variety of valid criticisms one could make. If ZeroNet was remade today I&amp;rsquo;m sure it would be radically different, but there is a great deal to appreciate about how it was put together. The best and worst thing about ZeroNet was that it took on a lot all at once. This made the project much more rigid and inflexible, but certainly created a more user-friendly experience than similar projects often have.&lt;/p&gt;
&lt;h3 id=&#34;opennic---democratic-dns&#34;&gt;OpenNIC - Democratic DNS&lt;/h3&gt;
&lt;p&gt;Many people underestimate how many problems of our current Internet are downstream of the social conventions around DNS, Domain Name System. Web addresses (such as &lt;code&gt;libresolutions.network&lt;/code&gt; or &lt;code&gt;example.com&lt;/code&gt;) are effectively just names mapped to assigned numbers. What we know of as the Internet is largely based on the mutual agreement on a single set of addresses mapped to assigned internet addresses. There is no real technical barrier to people deciding to use alternative numbers mapped to the same names. You very well could reinvent your own internet and assign names and numbers as you wish, but then the problem is getting others to cooperate. This may sound wildly impractical, but it&amp;rsquo;s truly a testament to how free we can be with technology if we choose to be. It&amp;rsquo;s worth understanding the advantages of an alternative DNS root if for no other reason to recognize the real potential we have to change our digital experience.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;The centralized and capitalist nature of the domain name system is a huge design problem for those of us working to build bridges between the centralized Web and the Peer Webs as the current system makes it very difficult to match the onboarding experience of centralized platforms. (You can sign up to a centralized social network in 30 seconds… can you register your own domain name, have your server and app set up, and be up and running with your decentralized one in that time? You could. But not with our current system.)&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://web.archive.org/web/20180626180725/https://ar.al/2018/06/26/web+/#fn:1&#34;&gt;Web+ - Aral Balkan&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;One of the recurring problems when it comes to radically transforming the very structure of the web is facing DNS. While some attempts try to eliminate DNS all together, a great deal of infrastructure has been built on top of it, so throwing it away entirely includes a variety of trade-offs and consequences. The trouble with going through the effort to reinvent the wheel, is that you&amp;rsquo;re also going to reinvent many other things people take for granted as well. This would notably include infrastructure for generating and accepting certificate files to protect connections with TLS.&lt;/p&gt;
&lt;p&gt;Despite being over 24 years old, OpenNIC is a very ambitious attempt to maintain an independent DNS root. What&amp;rsquo;s worth considering is that it doesn&amp;rsquo;t have to be the only one. As covered in &lt;a href=&#34;https://corbettreport.com/interview-1328-new-world-next-week-with-james-evan-pilato/&#34;&gt;NWNW 1328,&lt;/a&gt; Russia &lt;a href=&#34;https://www.defenseone.com/technology/2017/11/russia-will-build-its-own-internet-directory-citing-us-information-warfare/142822/&#34;&gt;made a move&lt;/a&gt; in 2017 to build their own. With some creativity, it&amp;rsquo;s absolutely possible for even smaller localities to experiment with doing the same themselves. By localizing control over the &amp;ldquo;Internet phonebook&amp;rdquo;, it&amp;rsquo;s possible to begin building &lt;a href=&#34;https://anarchosolarpunk.substack.com/p/offgridinternet&#34;&gt;truly independent&lt;/a&gt; digital infrastructure.&lt;/p&gt;
&lt;h3 id=&#34;piratebox---portable-internet&#34;&gt;PirateBox - Portable internet&lt;/h3&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://commons.wikimedia.org/wiki/File:Piratebox.jpeg&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://upload.wikimedia.org/wikipedia/commons/4/45/Piratebox.jpeg&#39; 
&gt;

&lt;/a&gt;


&lt;p class=&#34;caption&#34;&gt;
    Chgoddon, CC BY-SA 3.0, via Wikimedia Commons &lt;a target=&#39;_blank&#39; href=&#39;https://commons.wikimedia.org/wiki/File:Piratebox.jpeg&#39;&gt;Source&lt;/a&gt;
&lt;/p&gt;


&lt;/div&gt;
&lt;p&gt;If you&amp;rsquo;re interested in local internet you can start yourself, PirateBox was a phenomenal demonstration of &lt;a href=&#34;https://youtu.be/t4V_Pt2C3Qk&#34;&gt;what can be done.&lt;/a&gt; The concept is relatively straightforward: you load up public services on portable hardware and then share a public WiFi (or wired) access point. The PirateBox project itself is &lt;a href=&#34;https://forum.piratebox.cc/read.php?9,23070&#34;&gt;discontinued since 2019&lt;/a&gt; but it&amp;rsquo;s a relatively simple concept to replicate. In many ways it is much easier, because many open source self-hostable solutions are even more robust and accessible.&lt;/p&gt;
&lt;p&gt;It may seem quaint in a time where most people spend their time collaborating online, but there are real advantages to locally-based digital services. At minimum, it&amp;rsquo;s a convenient way to have your own separate internet with a curated set of content and services. With a significant investment in network access, a permanent installation could provide private and uncensored comms to a small community.&lt;/p&gt;
&lt;p&gt;As a proof-of-concept the project demonstrated that even mobile phones &lt;a href=&#34;https://youtu.be/0MEyxMY_Gus&#34;&gt;can be utilized.&lt;/a&gt; It&amp;rsquo;s important to consider that there are many ways to adapt to modern consumer trends. Ironically, because smartphones are consumption-based devices, they&amp;rsquo;re well suited to be clients for PirateBox-like systems. With permanent installations, and long-range communications there can be many useful independent networks with a wide variety of capabilities.&lt;/p&gt;
&lt;h3 id=&#34;gun---decentralized-application-framework&#34;&gt;Gun - Decentralized application framework&lt;/h3&gt;
&lt;p&gt;The holy grail that cyber nomads have been seeking for a long time is a truly refined ecosystem to build dApps. A &amp;ldquo;dApp&amp;rdquo; is a decentralized application that doesn&amp;rsquo;t rely on centralized points of failure. The calling card for a good dApp is &amp;ldquo;write once, use forever, anywhere&amp;rdquo;. &lt;a href=&#34;https://gabe.rocks/docs/#/page/gun&#34;&gt;Gun&lt;/a&gt; is a web application framework that provides peer-to-peer functionality and a decentralized database to persist data. These features are what&amp;rsquo;s necessary to build truly revolutionary online experiences.&lt;/p&gt;
&lt;p&gt;This means that any developer who learns to use gun can build almost any &lt;a href=&#34;https://archive.fosdem.org/2022/schedule/event/gun/&#34;&gt;peer-to-peer private application&lt;/a&gt; they can imagine. This radically different way of building applications creates new possibilities to escape the problems of our present paradigm. By breaking free of centralized management, these applications have the potential to build the &amp;ldquo;best of all worlds&amp;rdquo; when it comes to convenience, security, and resilience.&lt;/p&gt;
&lt;p&gt;Gun has the advantage of leveraging many modern web browser functionalities. This is both an asset and a liability. On the positive side, it allows for many tried and tested technologies to be leveraged to build the foundation. But on the negative side it means that these applications are entirely dependent on major browser vendors. In a time where the future of the open web is in doubt, there are reasons to take this concern seriously. Like many of the other projects in this piece, and others across the web there are win conditions beyond critical mass success. Even if gun doesn&amp;rsquo;t become the main dApp framework, there can still be a lot to learn from it&amp;rsquo;s successes and challenges.&lt;/p&gt;
&lt;h2 id=&#34;the-future&#34;&gt;The Future&lt;/h2&gt;
&lt;p&gt;These three examples are but a taste of the ocean of possibilities out there. I wanted to highlight these examples to show that obscurity or lack of mass adoption is not actually failure. Ambitious attempts themselves are valuable experiments regardless of how they end up. Often times, newer projects are inspired or informed from techniques that were tried in the past. It&amp;rsquo;s high time we embrace the &amp;ldquo;&lt;em&gt;freedom in freedom&lt;/em&gt;&amp;rdquo; and learn to explore possibilities rather than fight over dogmatic preferences and approaches.&lt;/p&gt;
&lt;p&gt;There are a wide variety of projects I&amp;rsquo;m currently curious to see grow and evolve. From &lt;a href=&#34;https://guix.gnu.org/&#34;&gt;Guix&lt;/a&gt; a new approach to a fully-free Linux OS, to the fascinating work of the &lt;a href=&#34;https://spritely.institute/&#34;&gt;Spritely Institute&lt;/a&gt; on real-time distributed computation. Peer-to-peer and private applications are also entering a new phase as &lt;a href=&#34;https://www.iroh.computer/&#34;&gt;Iroh&lt;/a&gt; and &lt;a href=&#34;https://veilid.com/&#34;&gt;Veilid&lt;/a&gt; are becoming more mature. But software is only part of the real equation. Finding truly independent and &amp;lsquo;hackable&amp;rsquo; (&lt;em&gt;user-modifiable&lt;/em&gt;) hardware solutions is what I&amp;rsquo;m most curious about these days.&lt;/p&gt;
&lt;p&gt;As dark as the technological landscape can be at times, it&amp;rsquo;s now more important than ever to remember that there is so much potential to build a different future. The inertia behind centralized and controlled platforms is very much on borrowed time. Even you could discover, build, or share the part that tips the scales. There is an immense amount of power in the hands of those who decide to strike out a new path in our time. Digital technology is really just a heap of re-programmable logic circuits, with enough effort, creativity, and inspiration there are no limits to how much things can change.&lt;/p&gt;
&lt;p&gt;Never forget that your choices matter, and that we can always forge a new path.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>The opportunity of our time: Reversing Demoralization</title>
		<link>https://libresolutions.network/articles/remoralization/</link>
		<pubDate>Sun, 04 May 2025 20:44:38 +0000</pubDate>
		<guid>https://libresolutions.network/articles/remoralization/</guid>
		
		<image>https://libresolutions.network//media/stock/candles.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/stock/candles.webp" />
		<itunes:image href="https://libresolutions.network//media/stock/candles.webp" />
		<description>Learning to overcome defeatism and apathy</description>
		<content:encoded>&lt;p&gt;A free cyberspace needs people willing to take action and learn from mistakes. Demoralization robs people not only of their capacity for action, but also their very spirit. Making the best of our future requires us to directly oppose the mass-demoralization that paralyzes people in despair and complacency.&lt;/p&gt;
&lt;p&gt;To take part in a better digital future, we are obligated to wrestle with the real human problems that will be with us no matter what tools we use. The social dynamics of our society aren&amp;rsquo;t things we can out-engineer, nor should we want to try. It is of utmost importance that those of us interested in better tools for a brighter tomorrow need to contend with the real difficulties people are actually facing. If we do not work to &amp;ldquo;&lt;em&gt;win hearts, and change minds&lt;/em&gt;&amp;rdquo; on important issues like privacy, security, and digital autonomy; nobody will have any sympathy for our concerns.&lt;/p&gt;
&lt;p&gt;How many times have freedom-minded people heard:&lt;/p&gt;
&lt;p&gt;&amp;ldquo;&lt;em&gt;It&amp;rsquo;s hopeless.&lt;/em&gt;&amp;rdquo;&lt;/p&gt;
&lt;p&gt;&amp;ldquo;It&amp;rsquo;s too late.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;&amp;ldquo;&lt;em&gt;We won&amp;rsquo;t make a difference!&lt;/em&gt;&amp;rdquo;&lt;/p&gt;
&lt;p&gt;&amp;ldquo;&lt;em&gt;What&amp;rsquo;s the point in trying?&lt;/em&gt;&amp;rdquo;&lt;/p&gt;
&lt;p&gt;&amp;ldquo;&lt;em&gt;They won&amp;rsquo;t let it happen!&lt;/em&gt;&amp;rdquo;&lt;/p&gt;
&lt;p&gt;There is a dire need to recognize and reverse the most insidious force working against people&amp;rsquo;s lives and liberty. It is so oppressive and omnipresent that many feel it is not merely immovable, but a fundamental structure of our reality. The vast majority of things needed to make our digital (and actual) lives better aren&amp;rsquo;t technological engineering challenges, but rather sophisticated &lt;a href=&#34;https://en.wikipedia.org/wiki/Collective_action_problem&#34;&gt;collective action problems.&lt;/a&gt; This means that the path to success isn&amp;rsquo;t dependent on novel breakthroughs in technology but rather in preserving and repairing a frayed social fabric. It is tempting to blame those who wallow in despair, but it is always far more important to ask ourselves why so many are trapped within it.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&amp;ldquo;&lt;em&gt;Despair is an op[eration], and it&amp;rsquo;s world wide.&lt;/em&gt;&amp;rdquo;&lt;br&gt;
Catherine Austin Fitts&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;The most potent weapon of our time is not merely fear, but the &lt;a href=&#34;https://posthumousstyle.substack.com/p/is-the-military-developing-mind-reading&#34;&gt;calculated mass application&lt;/a&gt; of it. When governments and corporations are the most desperate to maintain their stranglehold over the public, we can expect ever increasing resources to be deployed into never-ending mass demoralization. This is because a demoralized individual is compliant, dependent, and unwilling to consider alternatives. The demoralized person is a very profitable mark because they are vulnerable to advertising campaigns and emotionally charged scams. A demoralized public will be entirely unable to push for accountability, justice, or even simple truth, by design. It is vital to understand that rage is not evidence of resisting demoralization, because rage &lt;a href=&#34;https://libresolutions.network/articles/redirecting-resistance&#34;&gt;can be directed.&lt;/a&gt; If anything, rage is a weakness that leads many to a path of fruitless self-destruction.&lt;/p&gt;
&lt;h2 id=&#34;recognizing-demoralization&#34;&gt;Recognizing demoralization&lt;/h2&gt;
&lt;p&gt;It&amp;rsquo;s relatively easy to identify demoralization in those who are different than us, but so much harder to find it in our peers and ourselves. When we understand the harms of both targeted and mass demoralization, it is crucial for us to recognize it in our midst. At its root, demoralization is learned helplessness. The constant mutterings of the demoralized is that &amp;ldquo;it doesn&amp;rsquo;t matter&amp;rdquo;. Details, or even the truth itself are irrelevant when one learns that their own contributions to society, or even their own life make no difference. Robbed of dignity and self-determination, people individually and as a whole begin to adapt to their captivity.&lt;/p&gt;
&lt;p&gt;These adaptations drive the individual to lose perspective of their situation. Over time it becomes difficult to even remember what life was like before they had to adapt to a countless array of impositions and threats. In losing touch with their own life circumstances, it becomes almost impossible to understand others, especially those who are different. While it is certainly possible for an individual to rise above these challenges, it is a whole other matter to reverse the tide society wide.&lt;/p&gt;
&lt;h3 id=&#34;why-are-people-demoralized&#34;&gt;Why are people demoralized?&lt;/h3&gt;
&lt;p&gt;The easily accessible answers are far too oversimplified. While it&amp;rsquo;s undoubtedly true that modern entertainment technologies and convenient services have taken face-to-face time away from people, &amp;ldquo;digital disconnects&amp;rdquo; are only a partial and temporary measure. It is more difficult to wrestle with the idea that mass demoralization of the public is an intended policy outcome for its stabilizing effects. It&amp;rsquo;s so much easier for corrupt schemes to go along nicely when people are unable to react and respond. Over time, the consequences of this kind of abuse create conditions that perpetuate these circumstances.&lt;/p&gt;
&lt;p&gt;Very often, the subjects of demoralization are themselves blamed for their condition. In a world where everyone can recognize &lt;a href=&#34;https://corbettreport.com/5thgen/&#34;&gt;omnipresent negative messaging&lt;/a&gt; and polarization, this seems to be an uncharitable stretch. Viewed from a far, it is so much easier to identify demoralized people because the problems they are adapting to seem abstract or at least distant. Whereas when we look at ourselves and those around us we are intimately aware of the circumstances that constrain our agency and power. This mismatch is precisely responsible for much of the polarization we see today; different groups of people are demoralized by different but similar circumstances, leading to anger and confusion.&lt;/p&gt;
&lt;p&gt;As times get harder, bitterness and resentment settle in. These feelings make it harder to trust and cooperate. This directly attacks people&amp;rsquo;s ability to work together to achieve things that matter. As people begin to forget that people actually &lt;em&gt;can&lt;/em&gt; work together to make a difference, eventually the entire idea begins to sound crazy and impossible. All this creates a suffocating atmosphere of futility and despair. Living in those conditions is no simple thing, one necessarily must cope however they can. Truly recognizing demoralization in oneself and others is often far too terrifying to contemplate.&lt;/p&gt;
&lt;h3 id=&#34;were-not-exempt&#34;&gt;We&amp;rsquo;re not exempt&lt;/h3&gt;
&lt;p&gt;Demoralization isn&amp;rsquo;t about what you know, or what you have. It&amp;rsquo;s about what you&amp;rsquo;re doing. Given the overall depressing atmosphere of the modern digital landscape, it is no surprise that almost everyone shows some signs of demoralization. It&amp;rsquo;s easy to arrogantly dismiss that we have been corrupted by hopelessness in one way or another simply because we want to believe we&amp;rsquo;re above it all. What makes despair and apathy corrosive is that they weave themselves into the very social fabric that means no single person can fight it alone, no matter how well-equipped. Do not fall into the trap of assessing yourself as having everything figured out and others being a herd of dull and demoralized masses. In truth, almost all of us are closer than we care to admit.&lt;/p&gt;
&lt;h3 id=&#34;yuri-bezminov-was-hopefully-wrong&#34;&gt;Yuri bezminov was (&lt;em&gt;hopefully&lt;/em&gt;) wrong&lt;/h3&gt;
&lt;p&gt;While he didn&amp;rsquo;t invent the term, people often associate the word demoralization with Yuri Bezminov&amp;rsquo;s &lt;a href=&#34;https://youtu.be/y9FjDb6_tcc?list=PLBED093AE4B485153&#34;&gt;lectures.&lt;/a&gt; He makes a couple of very strong claims that are entirely counter-productive to overcoming mass demoralization:&lt;/p&gt;
&lt;p&gt;Claim: &lt;em&gt;Demoralized people can&amp;rsquo;t be reasoned with&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;With the benefit of hindsight, this seems to be a great mindset to isolate oneself from others. This ironically creates more demoralization in the long run. It would be more productive to consider that one has to take more care when trying to persuade others. Any good sales person knows the most important skill on their part is to &lt;em&gt;listen&lt;/em&gt;. One has to understand a person&amp;rsquo;s perspective to begin to change their mind. It&amp;rsquo;s entirely possible (&lt;em&gt;and quite likely&lt;/em&gt;) that those you can&amp;rsquo;t persuade have concerns and risks you don&amp;rsquo;t comprehend.&lt;/p&gt;
&lt;p&gt;Claim: &lt;em&gt;Demoralization is irreversible&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;The fundamental point of this piece is that we can and should work to bring others from the brink. It is worth striving to refine our skills, knowledge, and language to build a digital future people want to be a part of. Things are hard, and many people are absolutely struggling with a lot, but there is so much that can be done to make real tangible change. Not immediately, not all at once, and definitely not easily, but it&amp;rsquo;s absolutely achievable.&lt;/p&gt;
&lt;h2 id=&#34;learning-to-overcome-demoralization&#34;&gt;Learning to overcome demoralization&lt;/h2&gt;
&lt;p&gt;Just because it&amp;rsquo;s outright impossible to single-handedly and unilaterally transform society, this doesn&amp;rsquo;t mean we can&amp;rsquo;t make a meaningful difference. With people growing more and more frustrated with our existing digital experience, building gradual improvements seems like a lower and lower bar every day. The most important step is to remind others and ourselves that we don&amp;rsquo;t need to accept things as they are. We are entitled to a better digital future and we can work together to make it happen. Resisting digital totalitarianism requires a lot of hope, and all the imagination we can come across. It is perfectly within our reach to work to build, and share a culture of good stewardship over our digital lives. We must recognize the opportunity in inspiring ourselves and others to take first steps. With clarity, focused effort, and willingness to cooperate, there is so much that can be accomplished.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://youtu.be/aVNDLISHXpw&#34;&gt;No, Humanity Doesn&amp;rsquo;t Have to Zombie Walk Into a Dystopic Nightmare Future&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;growth-mindset&#34;&gt;Growth mindset&lt;/h3&gt;
&lt;p&gt;The thing holding most people back the most is the understandable desire to change everything all at once. That&amp;rsquo;s far too impractical for many, so embracing gradual change is a practical necessity. A dozen different projects starting small can avalanche into massive changes over time. Odds are most people can think of a few things they would want changed in their digital life, even the simpler fixes can be quite meaningful.&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s a lot more important to be willing to learn than to have everything figured out. Nobody is going to change everything all at once, odds are people are going to want different options. Being able to withstand setbacks and experiment can really unlock better opportunities and insights. Building the capacity for people to take risks to try new things out itself is a worthwhile goal.&lt;/p&gt;
&lt;p&gt;Embracing win/win cooperation will be the biggest game-changer when it comes to transforming our digital lives. It&amp;rsquo;s entirely likely that people with radically different visions for a better cyberspace can still share insights, progress, and opportunities. By focusing on shared objectives we can set aside petty fights that derail meaningful improvements.&lt;/p&gt;
&lt;h3 id=&#34;learning-lessons&#34;&gt;Learning lessons&lt;/h3&gt;
&lt;p&gt;Optimism doesn&amp;rsquo;t mean refusing to &lt;a href=&#34;https://margaretannaalice.substack.com/p/against-defeatism-the-apocaloptimist&#34;&gt;admit difficulties.&lt;/a&gt; It is natural, and absolutely vital to spend time recognizing the limits and drawbacks of particular techniques and tools. A willingness to take criticism is far more valuable than avoiding it entirely. By being able to maintain honest and open communication, so many embarrassing problems can be avoided. Facing the bleakness of how difficult things are isn&amp;rsquo;t about diminishing hope, but about refining and informing it. Making strategic decisions can be the difference between playing around and gaining serious ground. It&amp;rsquo;s almost certain that many techniques have been tried in the past, and that there is useful information to glean from previous attempts. Despite how shiny and new our tools can seem, almost nothing is truly new under the sun.&lt;/p&gt;
&lt;h3 id=&#34;share-goodwill&#34;&gt;Share goodwill&lt;/h3&gt;
&lt;p&gt;There&amp;rsquo;s no extra credit for working alone. &lt;a href=&#34;https://rusingh.com/surround-yourself/&#34;&gt;Surround yourself&lt;/a&gt; with people willing to do what they can. &lt;em&gt;Teamwork makes the dream work&lt;/em&gt; as they say. Becoming comfortable working with others to build new things is very much its own reward. Finding ways to share joy despite bleak circumstances is often what will make or break long-term success. Spending time to recharge and celebrate the small wins is critical in maintaining morale and momentum. Appreciating and supporting creative works can go a long way to make things less of a slog. Songs, memes, and silly cartoons are all things that can help get the word out and share perspective.&lt;/p&gt;
&lt;p&gt;A better digital future has to be explicitly pro-human and pro-fun. We have a unique opportunity in our time to make things that are truly transformative but also have real soul and care put into them. There are so many ways in which we can revitalize our digital experience with play and creativity rather than tyranny and profit. It has never been easier to make a bigger impact on the future of cyberspace, it is high time we embrace it. There are all kinds of ways one can get involved, but it starts with helping others break free from the worst of it.&lt;/p&gt;
&lt;p&gt;Remind yourself that your enemies aren&amp;rsquo;t those with different technological choices, but rather those who seek to impose theirs on others. Willingness to accept differences and make compromises can absolutely yield promising results with proper boundaries. Even relatively small projects can do a lot of good. A simple forum, small online community, or even a simple tool can be part of a bigger picture to help people gain a much better digital experience. Instead of surrendering cyberspace to bots and Big Tech, we can proactively create our own things that demonstrate that we can all ask for better.&lt;/p&gt;
&lt;p&gt;If the Internet never forgets, how do you want to be remembered?&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>The Lie of AI</title>
		<link>https://libresolutions.network/articles/lie-of-ai/</link>
		<pubDate>Thu, 17 Apr 2025 01:25:57 +0000</pubDate>
		<guid>https://libresolutions.network/articles/lie-of-ai/</guid>
		
		<image>https://libresolutions.network//media/stock/confused-man.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/stock/confused-man.webp" />
		<itunes:image href="https://libresolutions.network//media/stock/confused-man.webp" />
		<description>Dispelling the false dichotomy between innovation and precision</description>
		<content:encoded>&lt;p&gt;Tools can be great, but stories are much more powerful. By weaving a fantastic tale you can trap people into wrestling with the wrong questions. It is difficult to disentangle the reality of what machine learning tools actually offer, as opposed to the sci-fi cultism that surrounds &amp;ldquo;AI&amp;rdquo; discourse. To make matters wore, efficiency and accelerated progress are mere pretexts for the central management of all economic (&lt;em&gt;and even non-economic&lt;/em&gt;) activity under a consolidated technological machine. If the top-down roll-out of AI tools in workplaces were about efficiency and productivity, there would be no need to &lt;a href=&#34;https://aftermath.site/ai-video-game-development-art-vibe-coding-midjourney&#34;&gt;push so hard&lt;/a&gt; to get the workforce to adopt tools. Any truly revolutionary advancements would have workers and entrepreneurs experimenting with or without permission, not under mandate.  The imposition of &lt;a href=&#34;https://betakit.com/shopify-ceo-tobi-lutke-tells-employees-to-prove-ai-cant-do-the-job-before-asking-for-resources/&#34;&gt;&amp;ldquo;AI first&amp;rdquo;&lt;/a&gt; policies in government and corporations reeks of a political maneuver, rather than a technological one.&lt;/p&gt;
&lt;h2 id=&#34;ai-politics&#34;&gt;AI Politics&lt;/h2&gt;
&lt;p&gt;Science fiction offers no shortage of terrifying potential futures at the hand of rogue AI systems. The far more pressing issue for many people is the concern about generative tools like ChatGPT and more sophisticated &amp;ldquo;agents&amp;rdquo; eliminating jobs. If these tools were being adopted purely for efficiency and innovation this would be merely a difficult transition in a phase that could potentially leave people better off. The problem is that consolidated infrastructure and information management under centralized control creates additional risks. It seems that the &amp;rsquo;efficiency&amp;rsquo; that much of theses institutions are after is not productivity, but this technological and economic consolidation. This is conspicuously absent from the public discussion about throwing AI into everything.&lt;/p&gt;
&lt;p&gt;Generally, this line of questioning comes up in regards to equity concerns. If we&amp;rsquo;re transforming every institution to systematically discriminate, the chosen solution seems to be to merely carve out the most broad categorizations. Unfortunately, the more data provided to the machine, the more innocuous reasons the system can find to discriminate against or target any particular person or group. Even worse, we must ask what are the consequences of creating even more dependence on these corporate platforms. Countries have already begun to recognize digital sovereignty as &lt;a href=&#34;https://libresolutions.network/articles/government-in-tech&#34;&gt;an important priority.&lt;/a&gt; It is high time we heed that warning and recognize that institutions are often much more vulnerable to these problems than we consider.&lt;/p&gt;
&lt;p&gt;The stakes are quite high. There are countless initiatives to deeply integrate various &amp;ldquo;AI tools&amp;rdquo; into almost every major institution in society. &lt;a href=&#34;https://www.healthcareexcellence.ca/media/qdmn0p3b/20211208_aireport_en.pdf&#34;&gt;Healthcare,&lt;/a&gt; &lt;a href=&#34;https://www.europol.europa.eu/media-press/newsroom/news/how-ai-can-strengthen-law-enforcement-insights-europols-new-report&#34;&gt;law enforcement,&lt;/a&gt; and even &lt;a href=&#34;https://educationhub.blog.gov.uk/2025/03/artificial-intelligence-in-schools-everything-you-need-to-know/&#34;&gt;education&lt;/a&gt; aren&amp;rsquo;t safe from the long march. Manufacturing and military are no exception as the AI arms race &lt;a href=&#34;https://libresolutions.network/articles/war-and-technocracy/&#34;&gt;heats up.&lt;/a&gt; While workplaces are being disrupted with inane chatbots and AI workflows, the real innovation is in building an all-encompassing &lt;a href=&#34;https://corbettreport.com/algocracy/&#34;&gt;&amp;lsquo;algocracy&amp;rsquo;.&lt;/a&gt; The difference between the average person&amp;rsquo;s direct experience with AI, and how vulnerable they are to its excesses couldn&amp;rsquo;t be more extreme.&lt;/p&gt;
&lt;p&gt;People are already beginning to notice that a reliance on generative AI tools not only builds dependence, but also &lt;a href=&#34;https://www.windowscentral.com/software-apps/copilot-and-ChatGPT-makes-you-dumb-new-microsoft-study&#34;&gt;atrophies the mind.&lt;/a&gt; It is intuitively clear that taking the &amp;ldquo;easy way&amp;rdquo; undermines one&amp;rsquo;s ability to properly master their trade or craft. On the other hand, that doesn&amp;rsquo;t matter at all when the job one is confined to serves no real purpose other than to boost the stock value of AI companies. If the plan is to replace a competent, skilled, and rational workforce with robotic servants, training human talent serves no purpose. This has profound impacts as not only do workers have to worry about AI tools being imposed in their workplaces, but for skills and training to be withheld from them. We can expect more professions to be &lt;a href=&#34;https://en.wikipedia.org/wiki/Deskilling&#34;&gt;&amp;lsquo;de-skilled&amp;rsquo;&lt;/a&gt; and replaced with streamlined AI-friendly gig work.&lt;/p&gt;
&lt;p&gt;The two-punch combination of withdrawing opportunities to learn skills, and the expectation that workers self-sacrifice their mental faculties for minimal gains is likely to be devastating to people&amp;rsquo;s long-term prospects. The true dangers of AI for most people are not magical properties of the technologies themselves, but rather calculated economic warfare waged in the name of their implementation. It has almost nothing to do with the technology itself, but is entirely in the way these controlled platforms are infiltrating society. It is crucial to understand that without the AI mania hype &lt;a href=&#34;https://youtube.com/playlist?list=PLFQvErdlATeY-mEHozu5GlfffewysnHFq&#34;&gt;manufacturing a bubble&lt;/a&gt; to distort incentives, these tools would be deployed in more rational and productive ways.&lt;/p&gt;
&lt;h2 id=&#34;the-death-of-the-web&#34;&gt;The Death of the Web?&lt;/h2&gt;
&lt;p&gt;Corporate social media has caused a lot of problems, but one of the more subtle ones is the absolute devastation of the Web as a resource for people to create, learn &amp;amp; share together. A world-wide means of direct communication for people in a variety of media formats has truly &lt;a href=&#34;https://libresolutions.network/articles/perfect-cms/&#34;&gt;changed the world.&lt;/a&gt; Government censorship and corporate consolidation have drastically impacted the ability for the Web to function for dissent as well as cultural expression and exchange. To make matters worse, the companies training AI models are &lt;a href=&#34;https://www.designrush.com/news/80-percent-of-web-traffic-is-bots-the-hidden-cost-of-ai-scraping&#34;&gt;raising the costs&lt;/a&gt; for those trying to share content at all. There aren&amp;rsquo;t many great solutions to this, it&amp;rsquo;s really a difficult predicament to manage.&lt;/p&gt;
&lt;p&gt;If we are not careful, we could absent-mindedly give AI tools the authority to be the gateway for people&amp;rsquo;s access to information as a whole. Search engines are in a &lt;a href=&#34;https://libresolutions.network/articles/search/&#34;&gt;difficult spot&lt;/a&gt; with more people beginning to use chatbots to respond to any and every query. Without direct audience support, it is unlikely that running a web site will be economically viable for much longer. This has profound implications for the future of humanity&amp;rsquo;s knowledge as a whole. It is ironic in the quest to build tools that could deliver all of humanity&amp;rsquo;s knowledge to the forefront, we end up &lt;a href=&#34;https://posthumousstyle.substack.com/p/are-the-tech-bros-insane&#34;&gt;putting it in jeopardy.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The &lt;a href=&#34;https://libresolutions.network/articles/dead-internet/&#34;&gt;Dead Internet Theory&lt;/a&gt; isn&amp;rsquo;t a quirky observation, but a serious problem with devastating consequences. If everyone&amp;rsquo;s information landscape is entirely polluted by corporations and dictated by governments, genuine dissent and accountability will only become more and more out of reach. The last thing we want is for every level of society to be manipulated by the same forces that have transformed the &amp;lsquo;digital town square&amp;rsquo; into a spectacle of self-harm and menticide.&lt;/p&gt;
&lt;h2 id=&#34;rising-above&#34;&gt;Rising above&lt;/h2&gt;
&lt;p&gt;Things are absolutely looking staggeringly dire. As people&amp;rsquo;s opportunities in the real world decline, we can sadly also expect them to evaporate in cyberspace. It is crucial that we recognize that this is a path we can deviate from. If we recognize the manufactured dependence on these systems as the problem and threat that it is there are many alternative actions that can be taken. It is paramount that people get others to understand that we are allowing our civic, social and economic lives to be systematically undermined by not mere technological change, but the weaponization of it.&lt;/p&gt;
&lt;p&gt;The situation is far from hopeless. It seems quite likely that the economic engineering of insanity is as fragile as it is potent. You have the power to rationally plan out your future on what&amp;rsquo;s good for you and those around you. Just because there are overwhelming incentives to &amp;lsquo;go with the flow&amp;rsquo;, that doesn&amp;rsquo;t mean that it is, the only path possible. There are thankfully many ways for you to double-down on your humanity. I fully expect our present insanity to sow the seeds for an environment where people begin to respect genuine craftsmanship and care.&lt;/p&gt;
&lt;p&gt;The worst thing AI tools can do to you is to deter you from building up your own capabilities. No matter what skills or knowledge you work to acquire and refine, the better you can recognize the truly useful advances in your field or endeavor. While automation and generative AI can be very sexy, it can also leave you with an unpleasant feeling of being unfulfilled. Mastering your own craft, or even learning a variety of practical skills can be its own reward worth cherishing. We may not be able to escape the AI inquisition over our lives, but we can at least create room to retreat from it.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Practical Paranoia: Navigating A Hostile Digital Landscape</title>
		<link>https://libresolutions.network/articles/practical-paranoia/</link>
		<pubDate>Wed, 09 Apr 2025 05:10:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/practical-paranoia/</guid>
		
		<image>https://libresolutions.network//media/stock/spy.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/stock/spy.webp" />
		<itunes:image href="https://libresolutions.network//media/stock/spy.webp" />
		<description>Making the best of difficult situations</description>
		<content:encoded>&lt;p&gt;One of the greatest roadblocks to people making real progress in improving our digital experience is apathy. The all too common refrain &amp;ldquo;&lt;em&gt;they can get anything if they want&lt;/em&gt;&amp;rdquo; ignores the all-too-real reality that &amp;ldquo;they&amp;rdquo; can be more than just governments and intelligence agencies. Given our sad state of affairs, &lt;em&gt;they&lt;/em&gt; can be smaller and smaller entities as the stakes rise. You would be shocked at what could come your way if you just became enough of a target. To make matters worse, to the worst offenders, everyone is a target. Governments aren&amp;rsquo;t just interested in spying on you, but seizing more and more control over your entire life. Recognizing the &amp;lsquo;big picture&amp;rsquo; of our technological troubles can help us appreciate the long term objectives. It is far too late to merely make a few simple changes to feel &amp;lsquo;safe&amp;rsquo;.&lt;/p&gt;
&lt;p&gt;Privacy invasions are bad, but dependency is arguably worse. Once people are &amp;rsquo;locked-in&amp;rsquo; to particular tools, they&amp;rsquo;re vulnerable to future impositions with less ability to change course. The sheer scale of consolidation in our time makes even relatively abstract abuses have immense impact. Subtle propaganda or &amp;lsquo;dark patterns&amp;rsquo; can force behavior change in large groups of people. Making the effort to avoid or circumvent these intrusions can be daunting in the best of circumstances. The situation is dire, but is it worth going against the grain?&lt;/p&gt;
&lt;p&gt;In today&amp;rsquo;s digital landscape, even the very idea of privacy appears entirely out of reach. Flexibility and independence is impractical and expensive for the vast majority of people. This is because many of the encroachments that appeared under the guise of convenience have come at significant costs. Many people struggle to recognize the undesirable impacts of tools and services they use, much less devote time to mitigating them. When one becomes aware of these all-pervasive threats, the natural response is to become entirely overwhelmed. It&amp;rsquo;s a reasonable question to wonder what&amp;rsquo;s worth one&amp;rsquo;s effort and what is more pain than peace of mind.&lt;/p&gt;
&lt;p&gt;Deciding how far one is willing to go to secure not just privacy, but digital autonomy and censorship resistance will have a lot to do with one&amp;rsquo;s goals. While I would hope that you&amp;rsquo;re sympathetic to these aims, it&amp;rsquo;s certainly a great deal to expect one to make it their top priority. Even worse, in some circumstances like employment, people often have little choice. Those choosing to refuse to adopt the &amp;rsquo;latest and greatest&amp;rsquo; are often seen as sticklers or &amp;rsquo;luddites&amp;rsquo; despite there being very valid reasons to have pause. It is crucial to consider the path we&amp;rsquo;re on and what can be done to navigate in a more productive direction.&lt;/p&gt;
&lt;p&gt;A sizable portion of the public has clear ideas of what should be avoided, but a concrete idea of where to go is generally lacking. The Free Software movement has done a great job providing incredible alternatives, but genuinely radical change is required to make an impact for the broader public. Many great strides have been made in public awareness, but actionable steps are often insufficient and/or require significant technical ability. The fight for a better digital future requires a truly independent vision of a better cyberspace that isn&amp;rsquo;t aiming to put massive demands on the public.&lt;/p&gt;
&lt;p&gt;At the very least, we must recognize where things have gone wrong. Beyond merely adapting to every new imposition, strategic choices have to be made. To make real progress one has to accept that this is not an all-or-nothing affair, but it is a war of attrition. Can our greatest and freest minds build something better before everyone is trapped into selling every neuron in their brain? Can we create, build, and share genuine solutions before people are out of options? Do we have the humility to reach out to those behind before they&amp;rsquo;re trapped in shame and despair?&lt;/p&gt;
&lt;h2 id=&#34;the-broad-strokes&#34;&gt;The broad strokes&lt;/h2&gt;
&lt;p&gt;Any attempt at narrowing down what&amp;rsquo;s worth a person&amp;rsquo;s time is almost definitely going to be contentious and incomplete at best. Each person is going to have more or less available time and resources available to improve their digital experience. It&amp;rsquo;s easy to blame people for not doing enough, but much harder to consider what steps could be taken to make the right choices more practical. In my opinion, the optimal balance is to be motivated by deliberate decision-making with reasonable expectations, rather than fear.&lt;/p&gt;
&lt;h3 id=&#34;simplify&#34;&gt;Simplify&lt;/h3&gt;
&lt;p&gt;No matter where you wish to draw the line, complexity is bound to cause problems. A disorganized digital life is as problematic as real-world analogues. Cutting back from non-essential accounts/software/systems can go a long way to bring back some peace of mind. Ruthlessly streamlining your digital life can yield time, money and even security benefits. By focusing on tools, systems, and devices that enrich your life, you can avoid the stress of innumerable dead ends. Above all, it is important to remember that we should fiercely exercise our right to refuse various tools, devices and systems while we still can.&lt;/p&gt;
&lt;h3 id=&#34;replace-the-most-egregious-options&#34;&gt;Replace the most egregious options&lt;/h3&gt;
&lt;p&gt;Things are far worse than the &amp;ldquo;if it&amp;rsquo;s free, you&amp;rsquo;re the product&amp;rdquo; days. If anything, people often pay for the privilege of a user-hostile experience. When things truly can&amp;rsquo;t be given up, it can sometimes be worth learning a better alternative until you&amp;rsquo;re ready to make a complete switch. Don&amp;rsquo;t let purists dissuade you from making small steps to change your digital life, gradual progress is real change. Ultimately, it&amp;rsquo;s about asking yourself if the product or service is financially incentivized to give a good experience, or simply collect your data. Sometimes, like in the case of social media companies, they also have a vested interest in manipulating you, potentially making the deal much worse.&lt;/p&gt;
&lt;h3 id=&#34;fortify-your-mind&#34;&gt;Fortify your mind&lt;/h3&gt;
&lt;p&gt;The information landscape is both incredible and tragic, sadly much of it is getting much worse over time. No matter what technological decisions you make, it&amp;rsquo;s prudent to guard your mind against undue influence. Manipulating minds is big business that scales to incredibly significant power. Being skeptical of information sources, especially those saying what you want to hear is absolutely vital. It&amp;rsquo;s critical to take time to understand the incentives that your media, news, and entertainment have. It is intuitively clear that entities with the resources to buy the best influence, PR, and advertising are likely not those providing honest value-for-value. Recognize that your trust is an incredibly valuable prize that you should be very judicious with.&lt;/p&gt;
&lt;h3 id=&#34;ask-others&#34;&gt;Ask others&lt;/h3&gt;
&lt;p&gt;Odds are, you likely have trusted friends who have already taken many steps to improve their privacy and/or security. Instead of simply following someone&amp;rsquo;s prescribed plan of what &amp;lsquo;should be done&amp;rsquo;, it can be incredibly useful to get feedback on how particular things work in practice. It is very easy to put together lists of theoretically good options, but it&amp;rsquo;s much harder to spend the time properly evaluating then. Learning how various tools or substitutes actually work in practice is much more useful than stressing over perfection.&lt;/p&gt;
&lt;h2 id=&#34;the-fine-details&#34;&gt;The Fine details&lt;/h2&gt;
&lt;p&gt;The best use of your time is to gradually refine your digital habits to work for you. There are crucial areas where you&amp;rsquo;ll want to start, but pragmatism goes a long way. You&amp;rsquo;re not going to be able to change everyone else&amp;rsquo;s habits once you&amp;rsquo;ve decided what works for you. Flexibility and compromise are necessary parts of adapting to the world as it is.&lt;/p&gt;
&lt;h3 id=&#34;digital-sovereignty&#34;&gt;Digital sovereignty&lt;/h3&gt;
&lt;p&gt;Reclaiming control over your work, ideas, memories, and files is a great place to start. Prioritizing tools that allow you to work without the internet is a great strategy for long-term resilience. It&amp;rsquo;s much easier to predict a system you have some control over than a wide variety of online services competing for attention and market-share. If you can&amp;rsquo;t do anything productive without access to online services, it&amp;rsquo;s worth wondering how much of your device is wasted computing power.&lt;/p&gt;
&lt;p&gt;Offline or offline-first tools go a long way towards allowing you to be productive in a permission-less way. This is an area where Free &amp;amp; Open Source software provides a great deal of abundance. The less dependent you are on online services the less influence corporations and governments inherently have over your processes. By taking action to protect your information and workflows, you&amp;rsquo;re also building reliable independence.&lt;/p&gt;
&lt;h3 id=&#34;communication&#34;&gt;Communication&lt;/h3&gt;
&lt;p&gt;Ensuring that your personal communications aren&amp;rsquo;t being leveraged against you is a pretty critical objective. Why should your sensitive conversations with friends and family be fed into AI algorithms to precisely market or manipulate you? Healthy boundaries are a must-have in a time where companies are rushing to squeeze everything out of you and governments are desperate to suppress dissent. The trouble with improving your communications is that some level of negotiation with others is required. People may have different priorities and ease-of-use is often a very important factor. Communication is definitely an area where choosing the &amp;ldquo;lesser evil&amp;rdquo; is a perfectly defensible choice.&lt;/p&gt;
&lt;h3 id=&#34;opsec&#34;&gt;OPSEC&lt;/h3&gt;
&lt;p&gt;Protecting your data is one thing, but protecting data about you is a whole other challenge. Anonymity and pseudonymity are very valuable tools when interacting online. Speaking from experience, using your real name online for a tiny bit more credibility is not worth the many serious downsides. We are in a time where it&amp;rsquo;s relatively easy for novices to automate cyber-stalking, and there are other severe threats like &amp;lsquo;doxxing&amp;rsquo; and &amp;lsquo;swatting&amp;rsquo;. When people are more polarized than ever, its never been easier for small organized groups to make an example out of a target.&lt;/p&gt;
&lt;p&gt;Consider being very careful about what information you share on public platforms, or with services that collect and sell data. So much is already out of your control that what little you can do to protect your identity online is very valuable. Things can seem innocuous and harmful today, but you never know where the winds will blow a decade from now and what makes somebody a &amp;lsquo;fair target&amp;rsquo; for harassment and abuse. Fierce insistence on not only your own privacy, but respect for that of others is absolutely paramount moving forward.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>The UN Is Working To Open Source Your Government: For Better Or Worse</title>
		<link>https://libresolutions.network/articles/politics-in-tech/</link>
		<pubDate>Tue, 25 Feb 2025 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/politics-in-tech/</guid>
		
		<image>https://libresolutions.network//media/stock/un.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/stock/un.webp" />
		<itunes:image href="https://libresolutions.network//media/stock/un.webp" />
		<description>Embracing the opportunities of our time</description>
		<content:encoded>&lt;p&gt;We are in a difficult position when it comes to maintaining our digital liberties. Governments across the world are racing to seize more control over people&amp;rsquo;s &lt;a href=&#34;https://reclaimthenet.org/apple-rejects-uk-surveillance-backdoor-pulls-icloud-encryption&#34;&gt;private information&lt;/a&gt; and &lt;a href=&#34;https://reclaimthenet.org/whatsapp-eu-dsa-vlop-regulation-meta-46-million-users&#34;&gt;communications.&lt;/a&gt; People are beginning to recognize the downsides of moving the &amp;ldquo;public square&amp;rdquo; to controlled online platforms. In truth, we are only beginning to grapple with the problems caused by our technological landscape. A great deal can be done, but if we continue to let apathy and defeatism discourage real action, we will end up in very grim circumstances.&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s certainly possible to withdraw oneself from the most blatant intrusions, but escaping entirely ends up being quite unsustainable. Various workplaces are introducing &lt;a href=&#34;https://reclaimthenet.org/ai-is-inflaming-workplace-surveillance&#34;&gt;their own intrusions&lt;/a&gt; into people&amp;rsquo;s digital lives, and many public institutions evaluating &amp;ldquo;AI tools&amp;rdquo; with little care for the important details. The public is denied representation in the future of technology. For many, their only voice is to choose one intrusion over another.&lt;/p&gt;
&lt;p&gt;With enough effort, collaboration, and time we could forge a better path. While many of the devices we use have become so entrenched in our lives, that doesn&amp;rsquo;t mean we no longer have the ability to set healthy boundaries. The devices themselves can be redesigned, changed, and improved based off lessons we have learned in recent decades. A healthier digital landscape is very much within reach, we just have to devote our focus and resources to it. If we aren&amp;rsquo;t proactive in shaping the future of our own technological experience, governments and corporations will speak for us.&lt;/p&gt;
&lt;p&gt;Many super-national entities are working towards transforming our digital experience. The United Nations has a concerning initiative that may have far-reaching implications about the future of digital government and open source projects. This isn&amp;rsquo;t the first initiative of its kind, but a parallel initiative that could very well end up being quite impactful. During the Covid Crisis, The EU launched the &lt;a href=&#34;https://libresolutions.network/articles/government-in-tech/&#34;&gt;Next Generation Internet&lt;/a&gt; plan to reshape cyberspace. The plan included leveraging open-source development to truly harness decentralized innovation. While there were many excellent advancements under this initiative, the positives were largely incidental. The EU NGI was motivated by a desire to help European governments protect their digital sovereignty from Big Tech, but not necessarily to protect the digital sovereignty of European citizens. In part, the goal was to transform not only Europe&amp;rsquo;s digital experience, but also that of the world. While the rhetoric against digital totalitarianism was laudable, in practice it seems that Europe&amp;rsquo;s stance was in degree and not in principle.&lt;/p&gt;
&lt;h3 id=&#34;the-un--open-source-solutions&#34;&gt;The UN &amp;amp; open source solutions&lt;/h3&gt;
&lt;p&gt;While it was great to see many great and excellent Free Software projects get funding, it certainly comes at a price. If the EU or any institution directs funds towards open source projects, they can effectively pick winners and losers. Various &amp;lsquo;soft&amp;rsquo; mechanisms such as &lt;a href=&#34;https://www.youtube.com/watch?v=QBZ21k4BL04&#34;&gt;codes of conduct&lt;/a&gt; can enforce social and political behaviors. This means that the more investment made into Open Source by Big Tech, governments, or other institutions, the more the ecosystem is made in their image. The stakes of this are quite high. Not only does this mean particular projects can thrive or be broken by political incentives, but so to can individuals seeking to build their skills. To truly build a better digital future we must contend with these forces and find ways to &lt;a href=&#34;https://libresolutions.network/operations/bankroll&#34;&gt;make our own impact.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The greatest challenge posed by the UN&amp;rsquo;s involvement in Open Source is the mere fact that there are a lot of resources being tapped into. A world-wide network of people to collaborate with on particular projects, and a great deal of mentorship and support. It is quite possible that many communities will be entirely unable to retain technical talent that hasn&amp;rsquo;t gone to either UN initiatives or Big Tech projects. This is a non-trivial problem to overcome.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Recognizing the significant potential for Open Source to be deployed to accelerate progress on the SDGs, ECOSOC has called for the development of specific proposals for how its power can be best leveraged.&lt;/p&gt;
&lt;p&gt;The OSPO for Good event hosted by the United Nations Office of Special Envoy on Technology and the United Nations Office of Information and Communications Technology answers directly to this call by focusing on how OSPOs, which have been instrumental for tapping the value of Open Source in the private sector, can be used also outside of industry, by governments, not for profits, and academia.&lt;/p&gt;
&lt;p&gt;Such “OSPOs for Good” have the power to bring the world’s population closer together, both technically through an open and interoperable infrastructure, and socially through the open and culture-spanning communities that maintain the infrastructure through peer-production and collective action.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://www.un.org/digital-emerging-technologies/sites/www.un.org.techenvoy/files/OSPOs_for_Good_Report_1.pdf&#34;&gt;OSPOs for Good Building &amp;amp; Designing Cooperative Digital Infrastructure&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;The UN like the EU, recognizes the power of open source collaboration and bottom-up change. It&amp;rsquo;s highly likely that these initiatives will bear genuinely good fruit, but there will be smaller details to be concerned with. Putting our entire digital future in the hands of the UN, (or some compromise between governments &amp;amp; corporations) is sure to diminish any hopes of having meaningful digital autonomy in the future. It is important to recognize that decentralized innovation is the future, but many forces are competing to seize control of it.&lt;/p&gt;
&lt;p&gt;This year at FOSDEM, a European open source conference sponsored by Google and other big companies, there was &lt;a href=&#34;https://fosdem.org/2025/schedule/event/fosdem-2025-5687-scaling-open-source-solutions-to-achieve-the-sustainable-development-goals-a-global-call-to-action/&#34;&gt;a presentation&lt;/a&gt; made by representatives from the &lt;a href=&#34;https://www.digitalpublicgoods.net/who-we-are&#34;&gt;Digital Public Goods Alliance.&lt;/a&gt; The presentation outlines how open source initiatives are driving various &lt;a href=&#34;https://wikispooks.com/wiki/Agenda_2030&#34;&gt;UN sustainable development goals.&lt;/a&gt; The DPGA has &lt;a href=&#34;https://www.devex.com/news/why-donors-are-backing-a-global-push-for-digital-public-infrastructure-104007&#34;&gt;received funding&lt;/a&gt; from various governments, the Gates Foundation, and many more &lt;a href=&#34;https://www.digitalpublicgoods.net/who-we-are&#34;&gt;notable members&lt;/a&gt; like USAID. They even include an &lt;a href=&#34;https://www.digitalpublicgoods.net/registry&#34;&gt;interesting registry&lt;/a&gt; mapping projects to particular SDGs.&lt;/p&gt;
&lt;h2 id=&#34;digital-public-goods--sdgs&#34;&gt;Digital Public Goods &amp;amp; SDGs&lt;/h2&gt;
&lt;p&gt;Just as many great things came out of the EU NGI, it&amp;rsquo;s important not to take an all-or-nothing approach. Digital public goods can definitely be a fantastic mechanism to build a freer cyberspace, but the devil is always in the details.
Recognizing the potential of actual digital public goods is not necessarily the same as elevating the DPGA&amp;rsquo;s definition. The Digital Public Goods Alliance has &lt;a href=&#34;https://www.digitalpublicgoods.net/standard&#34;&gt;its own standard&lt;/a&gt; for what meets their definition of a digital public good. The standard includes 9 &amp;lsquo;indicators&amp;rsquo; of something meeting the criteria. Indicators 4,5,8 are great things relating to what is worth striving for, but indicators 1 &amp;amp; 8 are where things get messy.&lt;/p&gt;
&lt;p&gt;#1 is the primary concern. The DPGA has explicit political goals for open source projects that aim to meet the standard. While the goals themselves may seem desirable, the devil is often in the details. For example, what content preferences can we expect from a project aimed at advancing education? Given the UN&amp;rsquo;s preference for censorship of what is deemed &lt;a href=&#34;https://www.un.org/en/un-coronavirus-communications-team/five-ways-united-nations-fighting-%E2%80%98infodemic%E2%80%99-misinformation&#34;&gt;misinformation,&lt;/a&gt; we can expect any &amp;lsquo;digital public good&amp;rsquo; that meets the standard to be also hostile to unpopular or inconvenient (&lt;em&gt;but possibly true&lt;/em&gt;) information. In #8 the standard also includes a requirement for the project to &amp;ldquo;Do No Harm by Design&amp;rdquo;. Knowing the UN&amp;rsquo;s heavy-handed approach to &lt;a href=&#34;https://reclaimthenet.org/un-cybercrime-treaty-human-rights-concerns-ratification&#34;&gt;sensitive issues,&lt;/a&gt; there is no reason to expect this standard would be enforced fairly or consistently, especially world-wide.&lt;/p&gt;
&lt;p&gt;Given that we know the UN is not the ideal steward for the future of open source, how should we react? Is the plan to merely avoid anything labeled a &amp;lsquo;digital public good&amp;rsquo; and fall prey to corporate schemes instead? Big Tech is just as, if not more willing to take control over our digital future if we don&amp;rsquo;t reassert our own vision. Privacy, censorship resistance, elegance and efficiently can all be things we expect out of our own tools. A great deal can and should be done to help people reclaim their digital autonomy with a flexible but informed approach.&lt;/p&gt;
&lt;h3 id=&#34;notable-examples&#34;&gt;Notable Examples&lt;/h3&gt;
&lt;p&gt;The DPGA recognizes various projects and systems, some you may even be aware of already. When one browses &lt;a href=&#34;https://www.digitalpublicgoods.net/registry&#34;&gt;the registry&lt;/a&gt; it&amp;rsquo;s clear that this is a large collection of tools for helping nations secure some form of digital sovereignty. While this can overlap with individuals and communities reclaiming their digital autonomy, it doesn&amp;rsquo;t always. Some genuinely useful (or otherwise harmless) projects are included within the registry, but others with more &lt;a href=&#34;https://www.digitalpublicgoods.net/r/iverify&#34;&gt;explicitly agenda-driven&lt;/a&gt; motivations are too. Browsing the software section reveals a variety of technical tools with health &amp;amp; climate monitoring dashboards.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.digitalpublicgoods.net/r/fedora-linux&#34;&gt;Fedora Linux&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.digitalpublicgoods.net/r/drupal&#34;&gt;Drupal&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.digitalpublicgoods.net/r/libreoffice&#34;&gt;LibreOffice&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.digitalpublicgoods.net/r/mautic&#34;&gt;Mautic&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.digitalpublicgoods.net/r/openmandriva-lx&#34;&gt;OpenMandriva Lx&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.digitalpublicgoods.net/r/rocky-linux&#34;&gt;Rocky Linux&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.digitalpublicgoods.net/r/tor-browser&#34;&gt;Tor Browser&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.digitalpublicgoods.net/r/truenas&#34;&gt;TrueNAS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.digitalpublicgoods.net/r/openstreetmap&#34;&gt;OpenStreetMap&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.digitalpublicgoods.net/r/mozilla-common-voice-dataset&#34;&gt;Mozilla Common Voice Dataset&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.digitalpublicgoods.net/r/harmony&#34;&gt;Harmony&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.digitalpublicgoods.net/r/wikipedia&#34;&gt;Wikipedia&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;dont-throw-out-the-baby-with-the-bathwater&#34;&gt;Don&amp;rsquo;t throw out the baby with the bathwater!&lt;/h3&gt;
&lt;p&gt;In discussions about digital tools, people are incredibly quick to take an all-or-nothing approach. Just because we understand influences in the open source community, doesn&amp;rsquo;t mean that &amp;ldquo;open source is compromised&amp;rdquo;. By its own definition open source is decentralized innovation. Institutions like the EU and the UN are correctly recognizing its potential to make radical and dramatic change quickly. It is crucial that we recognize the very same potential and actualize it ourselves.&lt;/p&gt;
&lt;p&gt;One can expect many excellent and worthwhile software and systems being recognized by the DPGA. For the moment, those under threat of digital totalitarianism have to make the best with what is available, or they can produce themselves. Expecting perfection is a non-starter in an environment where people have to make difficult decisions with available resources. It&amp;rsquo;s quite possible that many UN sanctioned Digital Public Goods are worth considering for particular purposes.&lt;/p&gt;
&lt;p&gt;In fact, those interested in forging a truly independent digital landscape should consider what has been done by the EU and the DPGA. Learning from not only the featured projects, but also the plan itself. There are many crucial details that those interested in building real &amp;ldquo;freedom tech&amp;rdquo; need to understand before even beginning to build their own solutions. Until such a time where we can expect independent communities and freedom-loving people world wide to build up their own technological innovation potential, there will always be catching up to do.&lt;/p&gt;
&lt;h3 id=&#34;digital-freedom-goods&#34;&gt;Digital Freedom Goods&lt;/h3&gt;
&lt;p&gt;A good place to start would be defining a set of objective and testable criteria for what real freedom tools would be like. We can expect them to align with Free Software &amp;amp; Hardware goals, but there are many other things worth considering. We are at such a critical point because there is still a great deal of time to make real changes. We can gain a lot from taking the time to peer back through existing experiments and lessons learned over the years. There are useful projects that show promise, and useful techniques worth replicating.&lt;/p&gt;
&lt;p&gt;It is important to make the distinction between tools that give governments more digital sovereignty, as opposed to tools that can build a better digital landscape for all of us. There will be systems and tools with overlapping purposes, but others could be irrelevant or entirely at odds with personal digital sovereignty. It is critical that those liberty-minded individuals among us spend time putting together a vision of an efficient but ultimately healthy digital landscape. With enough people united under this vision, people would have something to flock to instead of Big Tech corporations or government-sponsored tech.&lt;/p&gt;
&lt;p&gt;While many do build great things on their own, they&amp;rsquo;re often without much support. It is on us to discover, share, and support useful freedom tools so long as they are genuinely useful. It&amp;rsquo;s long past time to stop falling for marketing hype and start focusing on building up truly independent paths forward. Governments and corporations have very clear ideas about what direction we will be heading in, it&amp;rsquo;s time we work towards building our own vision.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Teachable Moment: Memecoin Mayhem</title>
		<link>https://libresolutions.network/articles/teachable-memecoin/</link>
		<pubDate>Tue, 18 Feb 2025 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/teachable-memecoin/</guid>
		
		<image>https://libresolutions.network//media/stock/slots.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/stock/slots.webp" />
		<itunes:image href="https://libresolutions.network//media/stock/slots.webp" />
		<description>Learning from one of the creators of the latest rug pull.</description>
		<content:encoded>&lt;p&gt;Javier Milei, Argentina&amp;rsquo;s &amp;ldquo;libertarian&amp;rdquo; resident promoted a memecoin &amp;lsquo;Libra&amp;rsquo;. The &lt;a href=&#34;https://www.vivalalibertadproject.com/&#34;&gt;project&amp;rsquo;s website,&lt;/a&gt; which Milei linked to, claimed that the project was &amp;ldquo;&lt;em&gt;created with a clear mission: to boost the Argentine economy by funding small projects and local businesses, supporting those who seek to grow their ventures and contribute to the country’s development.&lt;/em&gt;&amp;rdquo; While this certainly sounds laudable, the game was rigged from the start.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/libra-chart.webp&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;It turns out that shortly after hitting a lot of quick attention, the price &lt;a href=&#34;https://decrypt.co/306134/did-argentina-president-javier-milei-launch-solana-meme-coin&#34;&gt;quickly dropped 89%.&lt;/a&gt; Javier Milei even deleted his tweet supporting the project. This controversial launch, featured things that look like a pretty typical &lt;a href=&#34;https://www.investopedia.com/terms/p/pumpanddump.asp&#34;&gt;pump and dump scheme.&lt;/a&gt; This whole incident is noteworthy because of how much memecoin shenanigans are tolerated in politics and activist circles. Even president Trump has his own &lt;a href=&#34;https://www.reuters.com/markets/currencies/trumps-meme-coin-made-nearly-100-million-trading-fees-small-traders-lost-money-2025-02-03/&#34;&gt;official memecoin.&lt;/a&gt; It&amp;rsquo;s worth asking ourselves, is this the behavior we want to see from our &amp;lsquo;allies&amp;rsquo;?&lt;/p&gt;
&lt;h2 id=&#34;coffeezilla-interview-highlights&#34;&gt;Coffeezilla interview highlights&lt;/h2&gt;
&lt;p&gt;Coffeezilla does fantastic work. I&amp;rsquo;m a huge fan of &lt;a href=&#34;https://youtu.be/LDhU295bUv4&#34;&gt;his reporting.&lt;/a&gt; Coffeezilla managed to get Hayden Davis, one of the creators of the Libra memecoin &lt;a href=&#34;https://youtu.be/EqizJTbxAEM&#34;&gt;to talk about the incident.&lt;/a&gt; If you haven&amp;rsquo;t given much thought to the memecoin hype, this is very much worth your time. Coffeezilla manages to get some quite detailed and shocking admissions from Hayden. It&amp;rsquo;s worth expanding on some of the small details of the conversation to get a better picture of the memecoin schemes. You can also watch Coffeezilla&amp;rsquo;s follow-up video &lt;a href=&#34;https://youtu.be/Ud6GuH7gSDw&#34;&gt;here.&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;the-reality-distortion-field&#34;&gt;The reality distortion field&lt;/h3&gt;
&lt;p&gt;The most fascinating part of this interview is listening to someone from a particularly strong &lt;a href=&#34;https://en.wikipedia.org/wiki/Reality_distortion_field&#34;&gt;reality distortion field.&lt;/a&gt; Much of what Hayden says shocks Coffeezilla, and likely much of the public as well. When one is surrounded by people with particular strong preferences and beliefs it becomes difficult to question the atmosphere we are in. It is a great reminder to question our own assumptions about many things, even where there may even be consensus.&lt;/p&gt;
&lt;p&gt;As an outsider, it&amp;rsquo;s very clear that Hayden is surrounded by people who claim to believe that while these memecoins often end up as naked rug-pull scams, there is surely a bright future for &amp;lsquo;social finance&amp;rsquo;. His attitude is nakedly nihilistic about these schemes because of corruption throughout the rest of society. Going so far as to argue &amp;ldquo;&lt;em&gt;but then how else can we make money?&lt;/em&gt;&amp;rdquo; as if to say that profitable returns are the only meaningful indicator of productive economic activity. It&amp;rsquo;s understandable to be cynical about the bigger picture, but at what point do we take responsibility for our own actions?&lt;/p&gt;
&lt;p&gt;This reality distortion field is itself troubling to contemplate. That many bright, entrepreneurial people are being given a strong signal that fraud is a good and productive use of their talents. In the interview, Hayden explicitly makes the case that the entire cryptocurrency industry, or even the economy at large is fundamentally no different. Even if one accepts this premise, it&amp;rsquo;s not difficult to make the case that there are wildly varying degrees to which this is true in particular places. The nihilistic refusal to make these distinctions seems to be a fundamental pillar of this reality distortion field. While it&amp;rsquo;s certainly true that neither Hayden or I will change all this, there&amp;rsquo;s something tragically dim about giving in to these forces. Is this truly the best we can hope for? I beg to differ.&lt;/p&gt;
&lt;h3 id=&#34;sniping&#34;&gt;Sniping&lt;/h3&gt;
&lt;p&gt;Much of the conversation revolves around discussion of &amp;lsquo;sniping&amp;rsquo; the memecoin supply. This is when people will quickly buy up a sizable chunk of the memecoin supply before it&amp;rsquo;s even announced. For example, between when the Libra &lt;a href=&#34;https://www.investopedia.com/terms/s/smart-contracts.asp&#34;&gt;smart contract&lt;/a&gt; was deployed, and when Javier Milei tweeted about it. This gives the &amp;lsquo;snipers&amp;rsquo; an extraordinary advantage over all the people who find out about the memecoin later.&lt;/p&gt;
&lt;p&gt;If this activity was purely organic, it would be easier to defend the behavior. It gets worse when behaviors like insider trading gets involved. It&amp;rsquo;s one thing to buy up a memecoin quickly because you think the name has potential, it&amp;rsquo;s a whole different world when you know in advance it&amp;rsquo;s going to be promoted by big names. Given the way these launches are structured, it&amp;rsquo;s guaranteed that there will be some with access to information that can be used to get massive returns at the expense of the rest.&lt;/p&gt;
&lt;p&gt;To take things to a whole new level, in the interview the co-creator of Libra explains that those launching their own memecoin feel a need to snipe their own tokens. Not only was it done in this case, he argues that this is common practice in the space. This makes an already quite predatory arrangement even more slanted. Not only are the &amp;lsquo;outsiders&amp;rsquo; competing with those who specialize in sniping memecoins, inside traders, but also the creators themselves. By having a large control of the token supply, the creators and insiders can directly manipulate the price of these assets with very little transparency.&lt;/p&gt;
&lt;h3 id=&#34;insider-perks&#34;&gt;Insider perks&lt;/h3&gt;
&lt;p&gt;In addition to all the other issues related to the Libra launch, Dave Portnoy &lt;a href=&#34;https://cointelegraph.com/news/dave-portnoy-claims-returned-6-million-libra-tokens-founder&#34;&gt;was offered&lt;/a&gt; a substantial amount of tokens to hype the project. David claims that after being told he was not to disclose this, that he returned the tokens. It just so happens that this very favorable exchange happens after the tokens had already crashed in value.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;One insider who had lost about $5.34 million on LIBRA was compensated $5 million.&lt;/p&gt;
&lt;p&gt;This insider, none other than Barstool founder David Portnoy, had spent 29,000 SOL worth $5.77 million on LIBRA tokens roughly 9 minutes after it launched at $2.51 per coin but quickly lost over $5 million as the token crashed amid speculation of foul play and as President Milei pulled his support, Lookonchain analysis showed on Monday, February 17.&lt;/p&gt;
&lt;p&gt;After the loss, however, Portnoy was sent 5 million USDC in two tranches of 4.5 million USDC and 500,000 USDC. He also dumped his remaining LIBRA holdings after receiving this compensation.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://thecryptobasic.com/2025/02/17/how-libra-token-creator-compensated-dave-portnoy-while-others-hold-the-bag/&#34;&gt;How LIBRA Token Creator Compensated Dave Portnoy While Others Hold the Bag&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Unlike other bag holders, David was given the opportunity to be made whole. The very fact that this was done demonstrates the nature of these memecoin schemes. There are many losers and a few winners by design. It&amp;rsquo;s worth considering how memecoins exemplify cryptocurrency at its worst, and what incentives they create for content creators. Despite a great deal of rhetoric about eliminating central banks, it&amp;rsquo;s troubling to see many trends all converge on the mere privatization and digitization of central banking.&lt;/p&gt;
&lt;h2 id=&#34;opposing-the-grift-industrial-complex&#34;&gt;Opposing the grift industrial complex&lt;/h2&gt;
&lt;h3 id=&#34;how-memecoins-work&#34;&gt;How memecoins work:&lt;/h3&gt;
&lt;p&gt;To put the interview in perspective, it&amp;rsquo;s worth contemplating the scheme from start to finish.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;People get together to plan to launch a cryptocurrency asset&lt;/li&gt;
&lt;li&gt;Deals are made, to get investment and buy off influencers&lt;/li&gt;
&lt;li&gt;Branding and marketing is put together, then the token is launched&lt;/li&gt;
&lt;li&gt;Word gets out, project creators, insiders and skilled traders leap on the opportunity to secure large amounts of the token&lt;/li&gt;
&lt;li&gt;The influencers and figures promote the token to the masses&lt;/li&gt;
&lt;li&gt;Enticed by a rising price, the captive audience flocks in and buys the overpriced collectibles&lt;/li&gt;
&lt;li&gt;Large holders dump the token absorbing a majority of the funds put in by wider public&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;It does not matter if the price tanks immediately, or after some time, the scheme is the same. All the buyers of the token are effectively a commodity being sold to investors by leveraging their parasocial connections. As was brought up in the interview, people you follow (&amp;quot;&lt;em&gt;key opinion leaders&lt;/em&gt;&amp;quot;/KOLs) have many opportunities to exchange your trust for financial gain. Sponsorships absolutely have &lt;a href=&#34;https://odysee.com/@WatchmanPrivacy:1/Sponsorships:e&#34;&gt;their problems,&lt;/a&gt; so it is on you to judge your sources of information based on what they market to you.&lt;/p&gt;
&lt;p&gt;Memecoins are far from the only way this happens, it&amp;rsquo;s just one of the more blatant iterations of it. It is an instructive example of what kinds of behavior are indicative of mass manipulation. Looking at the bigger picture, we can consider how predatory modern social media is. Centralized platforms like Big Tech and &lt;a href=&#34;https://libresolutions.network/articles/alt-tech&#34;&gt;Alt-Tech&lt;/a&gt; all have the ability to pick winners and losers. As the selected winners grow large audiences, they then have the opportunity to make substantial amounts off promoting various products and schemes to them. It&amp;rsquo;s worth asking how &amp;lsquo;independent&amp;rsquo; many of these voices can be when they are beholden to not only the platforms they choose, but also the partnerships that fund their operation. If we truly want to build up independent voices in the public discussion, we have to support them. Payment processors notwithstanding, it&amp;rsquo;s often just as easy to directly support great investigative work as buy a memecoin.&lt;/p&gt;
&lt;h3 id=&#34;we-can-do-better&#34;&gt;We can do better&lt;/h3&gt;
&lt;p&gt;I would encourage you to adopt high standards. Not just in the voices you let influence your thinking, but also for platforms and what your wider community tolerates. There is definitely a limit to how effective your activism or cause can be if you permit your constituents to be fleeced by frauds and needless time-sinks. There is a great deal you can do to uplift truly independent voices, sharing great works directly with others is much more revolutionary than jumping to the &amp;ldquo;next great platform&amp;rdquo;. If we want a meritocracy in public discourse, it&amp;rsquo;s up to all of us to be the stewards of it.&lt;/p&gt;
&lt;p&gt;Above all, it&amp;rsquo;s important to consider how many social and political phenomenons are primarily driven by the desire to emotionally manipulate audiences to put them into a &amp;lsquo;marketable&amp;rsquo; mindset. We all have buttons that can be pressed to raise fear, urgency, or insecurity. Recognizing that  social media manipulation builds real fortunes can help put the need to disentangle from these machinations into perspective. It&amp;rsquo;s largely a matter of judgement: do you want to put your efforts towards supporting the most sleek and popular leaders, or would you rather discover and share genuine insight that others need?&lt;/p&gt;
&lt;p&gt;No matter how sophisticated our digital prison becomes, never forget that we have the ability to shape the future together. You would be genuinely surprised at how effective even the smallest of steps can be. Diverting your attention away from hype and instead turning it towards what you can do to make a difference on the small scale will yield fantastic results over time. There are many ways to make a difference, don&amp;rsquo;t let clever marketing trick you into thinking a purchase is the first step.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Can we save free speech online? Yes, if we build it!</title>
		<link>https://libresolutions.network/articles/perfect-cms/</link>
		<pubDate>Tue, 11 Feb 2025 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/perfect-cms/</guid>
		
		<image>https://libresolutions.network//media/stock/network.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/stock/network.webp" />
		<itunes:image href="https://libresolutions.network//media/stock/network.webp" />
		<description>How to lay the foundation for a better cyberspace.</description>
		<content:encoded>&lt;p&gt;What would it be like to build something as radical as &lt;a href=&#34;https://clas.ucdenver.edu/nhdc/sites/default/files/attached-files/entry_172.pdf&#34;&gt;the printing press&lt;/a&gt; or the Internet today? Many of us take for granted that the World Wide Web already is the pinnacle of this achievement. We then erroneously assume that any improvement must be out of reach for us mere mortals. The good news is that there already is a blueprint for radically transforming the Web. This is no pie-in-the-sky fantasy. I will share the fundamentals of how to forge a path for a better cyberspace.&lt;/p&gt;
&lt;p&gt;It is tragic that for many, the World Wide Web is entirely confined to a few social media sites and mainstream publications. There are many tools one could build to reshape our online experience, but there&amp;rsquo;s a single one that can change this dynamic entirely: a Content Management System. Yep, CMS tools are things that truly don&amp;rsquo;t get enough attention when it comes to building a better cyberspace.&lt;/p&gt;
&lt;h3 id=&#34;what-is-a-content-management-system-cms&#34;&gt;What is a Content Management System (CMS)?&lt;/h3&gt;
&lt;p&gt;A Content Management System is the service that runs many functions for a website. It generally interfaces with a database and provides tools for non-technical users to configure and run the site. Without a content management system, one has to write every web part of their site &amp;ldquo;by hand&amp;rdquo;, or with the help of a &lt;a href=&#34;https://libresolutions.network/articles/best-website-for-you&#34;&gt;static site generator.&lt;/a&gt;  The CMS is the lifeblood of a website that effectively defines what features and functionality is possible. If one wants to have a dramatic impact on the future of the Web, building a great CMS is likely one of the best ways to do it.&lt;/p&gt;
&lt;p&gt;Novel features can be designed to build a CMS that not only transforms cyberspace, but also makes it more resilient to censorship. There is a great deal of &amp;rsquo;low-hanging fruit&amp;rsquo; ripe for taking on many present challenges head-on. Building a truly transformative CMS is no small task, but the potential upside is immense.&lt;/p&gt;
&lt;h2 id=&#34;wordpress-a-proven-record-for-decentralizing-cyberspace&#34;&gt;WordPress: A proven record for decentralizing cyberspace&lt;/h2&gt;
&lt;p&gt;The History of &lt;a href=&#34;https://wordpress.org/&#34;&gt;WordPress&lt;/a&gt; is its own &lt;a href=&#34;https://youtu.be/wd4DjJdCvJY&#34;&gt;long&lt;/a&gt; &lt;a href=&#34;https://youtu.be/GVzzC06qICw&#34;&gt;story.&lt;/a&gt; WordPress is a very ubiquitous CMS that powers &lt;a href=&#34;https://www.wpzoom.com/blog/wordpress-statistics/&#34;&gt;over 43%&lt;/a&gt; of the World Wide Web. There&amp;rsquo;s an entire industry around themes, plug-ins, and support as well as education. As a software project and community, WordPress is wildly successful. Thanks to its plug-in system, it&amp;rsquo;s hard to think of anything that can&amp;rsquo;t be done with it.&lt;/p&gt;
&lt;p&gt;It certainly didn&amp;rsquo;t start out dominating the Web. WordPress was one of many open-source blogging platforms. Its flexibility and relatively high usability gave it real staying power. It&amp;rsquo;s a shining example of how much wealth can be made off building a fundamental public good. One doesn&amp;rsquo;t need to pay to use WordPress, merely install it and run it like any other Free and Open Source Software. Part of this permissiveness allowed it to be packaged by hosting providers even further lower the barrier to entry.&lt;/p&gt;
&lt;p&gt;By its mere existence, WordPress has given many people the opportunity to participate in Cyberspace that otherwise might not have been able to. Its relatively accessible features and adaptability are what allowed a simple open source project to dominate the entire Web. If you&amp;rsquo;re somebody who does manage to move their attention beyond social media sites, odds are many of the sites you visit are running WordPress.&lt;/p&gt;
&lt;p&gt;No matter how &amp;ldquo;big&amp;rdquo; WordPress is, it&amp;rsquo;s still a very useful tool for decentralizing the Web. It supports &lt;a href=&#34;https://gabe.rocks/docs/#/page/really%20simple%20syndication&#34;&gt;RSS&lt;/a&gt; out of the box, and even has a &lt;a href=&#34;https://wordpress.com/support/enter-the-fediverse/&#34;&gt;fediverse plug-in.&lt;/a&gt; Despite being over 20 years old, WordPress is still pushing boundaries and innovating. Practically everything you want to do with a web site can be built with WordPress, and if it can&amp;rsquo;t you can always build new themes and plug-ins to support it.&lt;/p&gt;
&lt;p&gt;This isn&amp;rsquo;t to say WordPress is perfect. No software project ever fully breaks free from the assumptions it was built on. There are new innovations worth fully embracing from a fresh start. The greatest advantage a new competitor can offer is simplicity. WordPress itself can do anything, but that doesn&amp;rsquo;t mean it&amp;rsquo;s easy to pull off. There are many competitors to WordPress, some open source as well, others fully proprietary. If one wants to radically transform cyberspace for the better, learning from WordPress&amp;rsquo; example is a the place to start.&lt;/p&gt;
&lt;h2 id=&#34;can-we-do-better&#34;&gt;Can we do better?&lt;/h2&gt;
&lt;p&gt;Building a new CMS to forge a new Cyberspace is no small feat. If we truly want others to participate in a free and open web, we must ensure that the tools to do so are accessible and intuitive. It will take a fair bit of investment, lots of work, but it&amp;rsquo;s likely the best place to start. There are many great examples to learn from, and many new innovations to embrace. Building a configurable, user-friendly, pro-decentralization CMS is certainly an achievable goal to strive for.&lt;/p&gt;
&lt;p&gt;Personally, I took a &lt;a href=&#34;https://gabe.rocks/tech/ghost/&#34;&gt;look at Ghost&lt;/a&gt; which is a newer CMS that also took a stab at &lt;a href=&#34;https://ghost.org/changelog/activitypub-alpha/&#34;&gt;decentralized social media.&lt;/a&gt; Ghost is trying to leverage itself to take on the independent creator economy, and includes payments as a first-class feature. The trouble is, I don&amp;rsquo;t believe payment features and a bolted-on social layer are quite enough to truly adapt to present-day troubles.&lt;/p&gt;
&lt;p&gt;The beauty of a first-class free and open source CMS is that it can solve many problems at once. Once those problems are solved, others can then leverage those solutions. This is the mechanism that allows a truly revolutionary tool to actually reshape cyberspace.&lt;/p&gt;
&lt;h2 id=&#34;building-the-best-the-perfect-cms&#34;&gt;Building the best: The &amp;lsquo;perfect&amp;rsquo; CMS&lt;/h2&gt;
&lt;p&gt;If you&amp;rsquo;d like to hire a CTO to build a free software revolution in cyberspace my contact details can be found &lt;a href=&#34;https://gabe.rocks/get-in-touch/&#34;&gt;here.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;😅 I&amp;rsquo;m (&lt;em&gt;mostly&lt;/em&gt;) kidding. I plan to freely share the secret sauce here since I am currently unable to build such a tool on my own. I have some smaller projects in mind for this year, so I&amp;rsquo;ll be pleased if people beat me to it.&lt;/p&gt;
&lt;h3 id=&#34;aim-high&#34;&gt;Aim high&lt;/h3&gt;
&lt;p&gt;Imagine a radically better cyberspace, and build the tool that people would actually use in that reality. Recognize that for every person, business, or group a &amp;ldquo;website&amp;rdquo; can be all kinds of very different things. Come up with as many different &amp;ldquo;use cases&amp;rdquo; for your software and hone those insights into requirements for a truly flexible platform. This defined flexibility will guide the construction of a truly revolutionary tool.&lt;/p&gt;
&lt;p&gt;Despite what the defeatists will tell you, there&amp;rsquo;s a bright future in building real solutions to present-day problems. The endeavor itself will make anyone involved a powerful force for shaping cyberspace in a better direction. Armed with an ambitious goal, some diligent testing and experimentation,  programmers can become a real &lt;a href=&#34;https://libresolutions.network/videos/serenum&#34;&gt;force to reckon with.&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;security&#34;&gt;Security&lt;/h3&gt;
&lt;p&gt;A fundamental pillar of this project has to be strong security. As a tool for even the technical novice, it must not create opportunity for costly mistakes. Recognizing that this system may be operating in &lt;a href=&#34;https://libresolutions.network/articles/hostile-cyberspace&#34;&gt;hostile cyberspace,&lt;/a&gt; it&amp;rsquo;s crucial that security is at the foundation of every decision. One way to enable decentralization without compromising on security would be a layered module approach.&lt;/p&gt;
&lt;p&gt;Instead of giving every plug-in or custom module access to everything, modules should have defined roles and be granted only what is necessary to fulfill those roles. A custom theme shouldn&amp;rsquo;t need direct access to your database, and a new video player shouldn&amp;rsquo;t need to connect to remote sites. Strong authentication will be needed to protect users and resources. Adopting the latest and greatest in security practices will yield great results moving forward. The plan from the beginning should be to be adaptable to future security upgrades.&lt;/p&gt;
&lt;h3 id=&#34;decentralization&#34;&gt;Decentralization&lt;/h3&gt;
&lt;p&gt;A great deal of software today is written to build a monopoly around. Instead, there is an opportunity to build a truly revolutionary tool. Building a CMS with censorship resistance from the ground up can be a powerful advantage. Instead of &amp;ldquo;reinventing the wheel&amp;rdquo; the system can gracefully connect with existing censorship resistance technologies. By defining alternative transports, the entire idea of &amp;ldquo;the Web&amp;rdquo; can be broadened further beyond what it is today.&lt;/p&gt;
&lt;p&gt;There are many alternative transport mechanisms for websites. Some people use the &amp;ldquo;dark web&amp;rdquo; with &lt;a href=&#34;https://libresolutions.network/operations/shadow&#34;&gt;Tor &amp;amp; I2P,&lt;/a&gt; but there are even more options. &lt;a href=&#34;https://veilid.com/&#34;&gt;Veilid&lt;/a&gt; and &lt;a href=&#34;https://reticulum.network/&#34;&gt;Reticulum&lt;/a&gt; are both fascinating new ideas for revolutionizing cyberspace. For all the reasons existing content management systems are adopting federated social plug-ins, it makes sense to build this kind of decentralized social layer directly into the software. &lt;a href=&#34;https://libresolutions.network/articles/mitra&#34;&gt;Mitra&lt;/a&gt; supports cross-federation over the web and darknets alike.&lt;/p&gt;
&lt;p&gt;By designing the system with decentralization in mind, there must be a concept of a &amp;ldquo;remote user&amp;rdquo;. Recognizing that somebody commenting on, or engaging with your site must be able to define their own profile on their own systems. There are ways to leverage decentralization for better content as well. &lt;a href=&#34;https://framablog.org/2023/11/28/peertube-v6-is-out-and-powered-by-your-ideas/&#34;&gt;PeerTube uses&lt;/a&gt; decentralized technologies to enable peer-to-peer streaming. RSS and &lt;a href=&#34;https://www.thepodcasthost.com/business-of-podcasting/what-is-podcasting-2-0-and-why-should-i-care/&#34;&gt;Podcasting 2.0&lt;/a&gt; should be first-class features of the CMS.&lt;/p&gt;
&lt;p&gt;Beyond this, it should be a goal of the system to provide the capability to help guests &amp;amp; contributors migrate their work to their own platform. Many fascinating systems could be built to allow multiple publications to collaborate over the open web. With this in place, people could gradually move from being guest contributors to eventually having their own body of work on their own platform as they learn.&lt;/p&gt;
&lt;h3 id=&#34;modularity&#34;&gt;Modularity&lt;/h3&gt;
&lt;p&gt;The CMS should be designed to open as many doors as possible without drowning the user in abstract decisions. Instead, it should be designed to have an opinionated approach to things to serve the user. Learning from WordPress&amp;rsquo;s modularity is important, but that flexibility needs to be harnessed properly. A great many things that can be done with plug-ins should be able to be done with the software itself.&lt;/p&gt;
&lt;p&gt;With a strong baseline set of features, and defined modularity, the CMS can be in an excellent position to adapt and grow over time. Modules that users don&amp;rsquo;t want or need can be disabled. When beginning to use the software, basic questions can be asked about what they would like to begin with various &amp;ldquo;profiles&amp;rdquo; of pre-set defaults.&lt;/p&gt;
&lt;h3 id=&#34;efficiency&#34;&gt;Efficiency&lt;/h3&gt;
&lt;p&gt;Above all, the tool should work for the user. There are many solved problems that are unnecessary to make the user toil with. Properly converting and sizing media, transcribing audio &amp;amp; video are all things that can be easily done automatically today. Focus on assisting the user do what they want to, rather than making them fight the CMS to get basic things done. Performance is another critical objective. A great deal can be done to optimize for speed without the expense of quality. Being blazing fast at different scales is no small feat. The CMS should be as responsive as possible and find ways to optimize speed without dependency on third-parties.&lt;/p&gt;
&lt;h3 id=&#34;accessibility&#34;&gt;Accessibility&lt;/h3&gt;
&lt;p&gt;Administrating the CMS should assume very little technical knowledge. This requires some strong design skills to ensure the software is intuitive as well as powerful. In addition to this, every effort should be made to use &lt;a href=&#34;https://libresolutions.network/docs/#/page/progressive%20enhancement&#34;&gt;progressive enhancement&lt;/a&gt; to be adaptable to a wide variety of viewers.&lt;/p&gt;
&lt;p&gt;New innovations are a great way to differentiate itself. A companion app could make it easy to publish content on the go. With the proper open protocols, this companion app could make updating one&amp;rsquo;s own space in cyberspace as easy as posting to social media.&lt;/p&gt;
&lt;h2 id=&#34;can-we-build-it&#34;&gt;Can we build it?&lt;/h2&gt;
&lt;p&gt;It would certainly require a great deal of work, but the opportunity is there. This is likely outside the scope of a single person, and would need a broader team or community to turn into a reality. Difficult is a far cry from impossible. It&amp;rsquo;s worth remembering that online free expression can be safeguarded by deliberate innovation if we put our minds to it. Instead of falling for the next big platform that promises to be better, we can truly build a foundation for a better outcome.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>How to REALLY Resist Digital ID – #SolutionsWatch</title>
		<link>https://libresolutions.network/videos/corbett-report/</link>
		<pubDate>Tue, 04 Feb 2025 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/corbett-report/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/solutionswatch-digitalid.ogg" />
			
		
		<image>https://libresolutions.network//media/images/solutionswatch.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/solutionswatch.webp" />
		<itunes:image href="https://libresolutions.network//media/images/solutionswatch.webp" />
		<description>Gabriel joins the Corbett Report</description>
		<content:encoded>&lt;p&gt;It was an honor and privilege to join James Corbett for &lt;a href=&#34;https://corbettreport.com/category/solutions/&#34;&gt;#SolutionsWatch&lt;/a&gt; to discuss &lt;a href=&#34;https://gabe.rocks/docs/#/page/digital%20identification&#34;&gt;Digital ID&lt;/a&gt; and how we can (&lt;em&gt;or can&amp;rsquo;t&lt;/em&gt;) stop it. James Corbett is a legend and a great inspiration to this project. I would highly recommend you check out more of his work at &lt;a href=&#34;https://corbettreport.com/&#34;&gt;the Corbett Report.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Show notes and comments&lt;/strong&gt; &lt;a href=&#34;https://corbettreport.com/how-to-really-resist-digital-id/&#34;&gt;on the Corbett Report&lt;/a&gt;&lt;br&gt;
Since I&amp;rsquo;m a Corbett Report subscriber I&amp;rsquo;ll be engaging there as well!&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Reminder: Big Tech sucks no matter who is in charge</title>
		<link>https://libresolutions.network/articles/big-tech/</link>
		<pubDate>Mon, 20 Jan 2025 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/big-tech/</guid>
		
		<image>https://libresolutions.network//media/images/social-media.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/social-media.webp" />
		<itunes:image href="https://libresolutions.network//media/images/social-media.webp" />
		<description>All the more reason to double down on the open web.</description>
		<content:encoded>&lt;h3 id=&#34;animal-farm-the-digital-pen&#34;&gt;Animal Farm: The digital pen&lt;/h3&gt;
&lt;p&gt;The power and profit from manipulating masses of &lt;a href=&#34;https://www.dictionary.com/browse/menticide&#34;&gt;menticided&lt;/a&gt; people is not to be underestimated. Nations across the world are considering it as part of their &lt;a href=&#34;https://www.aa.com.tr/en/opinion/opinion-elon-musk-brazil-and-the-battle-for-digital-sovereignty/3332242&#34;&gt;&amp;lsquo;digital sovereignty&amp;rsquo;.&lt;/a&gt; The people, are not as dull as social engineers would hope, and are beginning to turn away from the most egregious abuses. This is impacting growth &amp;amp; engagement figures, and also impacts their ability to collect more data for artificial intelligence.
Despite years of troubling decisions, these companies are now beginning realize they need &lt;a href=&#34;https://www.theverge.com/2025/1/3/24334946/meta-ai-profiles-instagram-facebook-bots&#34;&gt;actual people&lt;/a&gt; on their sites. The most overt sign would be Mark Zuckerberg&amp;rsquo;s &lt;a href=&#34;https://www.youtube.com/watch?v=7k1ehaE0bdU&#34;&gt;interview on Joe Rogan,&lt;/a&gt; but this is no isolated incident. There has been a long trend of people beginning to recognize how abusive social media giants can be. The industry even has a cute term for it &lt;a href=&#34;https://itif.org/publications/2024/12/16/eight-ways-the-new-administration-can-pursue-a-post-techlash-agenda/&#34;&gt;&amp;rsquo;techlash&amp;rsquo;&lt;/a&gt;.&lt;br&gt;
The Information Technology &amp;amp; Innovation Foundation describes it as:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&amp;ldquo;New technologies and the tech companies that provide them are accused of fueling a myriad of economic and societal problems—from destroying individual privacy to amplifying biases, destroying jobs, and snuffing out competition.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://itif.org/events/2024/12/17/techlash-2025/&#34;&gt;Techlash 2025: The Outlook for Tech Policy in the Trump Administration&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Of course, the ITIF argues that these are myths and exaggerations, but despite their damage control, it matches people&amp;rsquo;s lived experiences. The problems created by corporate consolidation of cyberspace will manifest no matter which company the public flocks to. Even worse, these problems &lt;a href=&#34;https://www.schneier.com/essays/archives/2024/06/how-online-privacy-is-like-fishing.html&#34;&gt;become normalized,&lt;/a&gt; making the intrusions feel acceptable. The answer is not new platforms, but new paradigms. There is a great deal of potential already being demonstrated in the decentralized social media networks such as Nostr and the &lt;a href=&#34;https://blog.elenarossini.com/my-year-of-fediverse-explorations/&#34;&gt;Fediverse.&lt;/a&gt; It&amp;rsquo;s important to remember if you just want information, &lt;a href=&#34;https://gabe.rocks/docs/#/page/really%20simple%20syndication&#34;&gt;RSS&lt;/a&gt; still can&amp;rsquo;t be beat! By truly committing ourselves to a better digital future, the road ahead becomes much more clear.&lt;/p&gt;
&lt;h3 id=&#34;zuckerberg-cooling-marks&#34;&gt;Zuckerberg cooling marks&lt;/h3&gt;
&lt;p&gt;Zuckerberg&amp;rsquo;s interview on Joe Rogan is a great introduction to the concept of &lt;a href=&#34;https://kieranhealy.org/blog/archives/2002/10/31/cooling-the-mark-out/&#34;&gt;cooling the mark.&lt;/a&gt; Skilled con artists have recognized that many people are smart enough to decipher schemes as they happen. This creates a problem where those who recognize the fraud or abuse end up willing to do something about it. Instead the scammer has to spend time consoling the victim. By arguing that the scheme was not only not a problem, the con artist can slip in that it was actually good for the victim.&lt;/p&gt;
&lt;p&gt;As such, Zuckerberg is outright saying out loud what many had seen first-hand, but never seen addressed for years. Many commenting on the interview have been attempting to create a mark-cooling narrative that lessons have been learned and that mistakes will be corrected in the future. This presumes that Meta&amp;rsquo;s actions during the Covid Crisis, or other political events were not intended from the beginning. By re-contextualizing the overreaches of the last years, not only is history re-written but actual &lt;a href=&#34;https://libresolutions.network/articles/social-media&#34;&gt;important lessons&lt;/a&gt; are buried. Even worse, by reframing reality with the same assumptions the problem was created with, the groundwork for future offenses is being laid.&lt;/p&gt;
&lt;p&gt;One of the questions people have to ask themselves is &amp;ldquo;&lt;em&gt;Why the sudden pivot on censorship?&lt;/em&gt;&amp;rdquo;. Failing to consider this is to fall into the same trap of not asking why specific overt measures were put into place at the start. No serious individual can truly swallow the idea that governments and corporations are only now seeing the error of their ways. In fact, the &lt;a href=&#34;https://www.verywellmind.com/streisand-effect-8654367&#34;&gt;Streisand Effect&lt;/a&gt; has been well understood for two decades. Instead of naively chalking it all up to ignorance, one needs to consider a more sophisticated game of &lt;a href=&#34;https://roundingtheearth.substack.com/p/mindwar-a-radicalizing-mixture-of&#34;&gt;mindwar.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;All strong emotions are prone to being weaponized. By putting people in a situation where they are desperate you can &lt;a href=&#34;https://cdn-assets.minds.com/The_Censorship_Effect.pdf&#34;&gt;leverage their dissatisfaction&lt;/a&gt; to run all kinds of &lt;a href=&#34;https://libresolutions.network/articles/-alt-tech&#34;&gt;cons&lt;/a&gt; and &lt;a href=&#34;https://libresolutions.network/articles/redirecting-resistance/&#34;&gt;schemes.&lt;/a&gt; It is my perspective, that what many experienced as &amp;lsquo;The Culture War&amp;rsquo; was a carefully crafted psychological event. In hindsight, it is clear that many people with a variety of concerns had their voices silenced in an orchestrated and coordinated fashion. It is too easy to presume that the eventual state of having to &amp;ldquo;tone down&amp;rdquo; the overt manipulation wasn&amp;rsquo;t known from the beginning. That limited window would be a very valuable opportunity to discover what techniques are able to &lt;a href=&#34;https://consentfactory.org/2024/08/23/the-global-crackdown-on-dissent/&#34;&gt;manufacture consent&lt;/a&gt; without as much resistance.&lt;/p&gt;
&lt;h3 id=&#34;speech-not-reach&#34;&gt;Speech not reach&lt;/h3&gt;
&lt;p&gt;Elon Musk notably &lt;a href=&#34;https://x.com/elonmusk/status/1593673339826212864&#34;&gt;announced&lt;/a&gt; a new standard of &amp;ldquo;Freedom of speech, but not freedom of reach&amp;rdquo;. There are natural barriers that make widespread information dissemination difficult, but modern-day social media companies are artificial structures. They have two major functions: attracting people to consume content, then selling their information and attention to others. Selling attention shifts incentives on the platform, prioritizing that which is profitable to promote. This means that there is a specific reason for every dominating narrative.&lt;/p&gt;
&lt;p&gt;People often mistake social media platforms for a level playing field. Truly &amp;lsquo;organic&amp;rsquo; discovery and growth is something that can only be possible in a &lt;a href=&#34;https://libresolutions.network/videos/attention-democracy&#34;&gt;radically different environment.&lt;/a&gt; This is something that already exists in some form on the open web. Outside of these consolidated platforms, nobody is funneled to spend time on specific sites over others. Your web browser gives you access to the limitless potential of the entire world wide web. There are still barriers, but they are somewhat limited to what is inherent to the technology, rather than having artificial gate-keeping organizations. The way to actually &amp;lsquo;fix&amp;rsquo; online free expression is to create a &lt;a href=&#34;https://archive.is/AF2i7&#34;&gt;&amp;lsquo;web browser for social&amp;rsquo;.&lt;/a&gt; People need a tool that allows them to communicate in an interoperable permission-less way. If you&amp;rsquo;ve been following the &lt;a href=&#34;https://libresolutions.network/tags/fediverse&#34;&gt;Fediverse,&lt;/a&gt; you would know that there are exciting things on this front already.&lt;/p&gt;
&lt;h3 id=&#34;platform-migration&#34;&gt;Platform Migration&lt;/h3&gt;
&lt;p&gt;Just prior to the United states banning Tiktok, many people have &lt;a href=&#34;https://www.forbes.com/sites/petersuciu/2025/01/15/tiktok-users-heading-to-rednote--it-looks-similar-has-the-same-issues/&#34;&gt;flocked to&lt;/a&gt; another social media app &amp;lsquo;Rednote&amp;rsquo;. This strategy is highly unlikely to be effective. Even if the community successfully migrates in significant numbers, countries all over the world are building the technological capacity to segregate themselves from &amp;lsquo;foreign influence&amp;rsquo;. Digital &amp;lsquo;sovereignty&amp;rsquo; for your government, but at your expense. Switching from platform-to-platform will never be sufficient to actually resolve these problems.&lt;/p&gt;
&lt;p&gt;The fact of the matter is that almost every social media app is going to be a &lt;a href=&#34;https://www.eff.org/deeplinks/2025/01/online-behavioral-ads-fuel-surveillance-industry-heres-how&#34;&gt;spying nightmare.&lt;/a&gt; Nit-picking a particular one can be missing the point. No matter what platforms you&amp;rsquo;re on you should consider sticking to the web version, rather than the apps. It&amp;rsquo;s worth thinking about how every bit of data you provide these platforms can be &lt;a href=&#34;https://docs.reclaimthenet.org/12-18-24-Censorships-Next-Frontier.pdf&#34;&gt;leveraged by governments&lt;/a&gt; and other partners against you.&lt;/p&gt;
&lt;p&gt;It is vital now more than ever that people and communities begin to consider how to build up their own independent digital infrastructure. Without doing this, people will always be &lt;a href=&#34;https://www.technocracy.news/how-engineered-dependency-erases-our-autonomy/&#34;&gt;subjects of the whims&lt;/a&gt; of governments and corporations alike. It is incredibly ironic that &lt;a href=&#34;https://libresolutions.network/operations/hearth&#34;&gt;localizing the Internet&lt;/a&gt; will also have significant advantages to combating world-wide censorship. With a truly sovereign community infrastructure, it is much harder for outside forces to prevent messages from reaching it. As more and more people worldwide rebuild cyberspace from the ground up, you would be surprised how much better the web could be.&lt;/p&gt;
&lt;h3 id=&#34;turning-away-from-the-trough-of-menticide&#34;&gt;Turning away from the trough of menticide&lt;/h3&gt;
&lt;p&gt;It is high time we reject Big Tech for &lt;em&gt;what it is&lt;/em&gt; rather than who&amp;rsquo;s in charge of it. In hindsight, it is clear to see that social media giants were specifically designed &lt;a href=&#34;https://corbettreport.com/the-weird-darpa-facebook-coincidence-you-never-heard-about/&#34;&gt;as public control systems.&lt;/a&gt; One has to understand that every corporate (or state-run) social media platform is its own rigged game, with varying degrees of fairness. Continuing to migrate to the most perceived &amp;lsquo;free&amp;rsquo; option merely entrenches the mechanism itself: the commodification of parasocial interactions. What&amp;rsquo;s worse than profit off destroying minds is the real power that can be gained by manipulating those minds.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&amp;lsquo;Slop&amp;rsquo;&lt;/em&gt; and &amp;lsquo;&lt;em&gt;brainrot&lt;/em&gt;&amp;rsquo; are both terms to describe content with little informational value maximized for social media metrics. On any platform designed to capture one&amp;rsquo;s attention, these addictive and demeaning forms of content will proliferate widely. If you&amp;rsquo;re not used to listening to those with different perspectives than you, it&amp;rsquo;s going to be very hard to identify what percentage of your feed is pure slop. The brainrot is the long-term effects of not proactively managing your attention, and merely &amp;lsquo;doomscrolling&amp;rsquo; until your dopamine centers can&amp;rsquo;t respond anymore. The truth is, liberating yourself from these machinations still leaves many others trapped in it. Many are justifiably concerned about the effects of these platforms and want to either push for reform or outright ban these platforms.&lt;/p&gt;
&lt;p&gt;Banning particular platforms will only mitigate the most egregious examples. The better option is to build ‘digital town square’ on a foundation that doesn’t foster these problems. This is not about just slapping a web3 token on top of social media, but truly understanding what participation in the Free and Open Web means. Big Tech CEOs, including Mark Zuckerberg have repeated over and over again that reducing online harms at scale is impossible, so we need to stop pretending that they&amp;rsquo;re going to miraculously figure it out. We are responsible for our participation online, and it requires us to consider what models we empower with it.&lt;/p&gt;
&lt;h2 id=&#34;anti-slop-protocols&#34;&gt;Anti-slop protocols&lt;/h2&gt;
&lt;p&gt;It&amp;rsquo;s clear that many people are going to continue to use mainstream social media, often without exploring the decentralized alternatives. This is a shame, but it&amp;rsquo;s at least a situation that can be mitigated. Taking the time to protect yourself from &amp;lsquo;slop&amp;rsquo; will go a long way to reduce social media&amp;rsquo;s impact on you.  It&amp;rsquo;s a bit of effort and might even be controversial, but you may find these techniques effective.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Keep your purpose in mind&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Don&amp;rsquo;t visit a social media site to merely gaze at what the algorithm decides for you, remember what you actually want out of visiting in the first place.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Use the web version, rather than the app&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This is a great way to keep you from being distracted by notifications and also reduces the information the platform can learn from you.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Organize people you find insightful into lists&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This is massively better than just waiting for their updates to be put into your feed.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Make use of mute feature&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Sometimes you can mute words as well! It can be helpful when a big story is getting too much attention to simply ignore posts where that phrase is used.&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s also a great idea to mute accounts that specialize in slop or otherwise inflammatory content.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Engage Judiciously&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Leaving a &amp;rsquo;like&amp;rsquo; can feel like such a small thing, but the algorithms tend to take it quite seriously. Your engagement is largely what drives your experience so make sure you&amp;rsquo;re being deliberate.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Don&amp;rsquo;t respond to a post with massive engagement&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If a hundred thousand people have already liked the post, and there are thousands of comments, reconsider the benefit in adding yours to the pile. If you want to respond to an overall conversation, it&amp;rsquo;s better to take the time to write your own long-form post about the discussion.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Ignore anyone too big&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Any massively public figure inherently has to maximize for the lowest common denominator. Consider finding accounts that others may not be aware of that have real merit. &amp;ldquo;Too big&amp;rdquo; can be a judgement call. My own metric is if your IRL contacts have heard of them, that&amp;rsquo;s way past the &amp;rsquo;too big&amp;rsquo; scale.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Prioritize length&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This signal is a bit noisy since people can use chatGPT to generate large amounts of text, but it still holds relatively well. If someone is willing to take the time to frame their argument well, it&amp;rsquo;s often more worth considering than a simple one-line reaction.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Resist the urge to stay current&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s only natural to want to be on top of breaking issues. On the other hand, unless you&amp;rsquo;re personally involved, fact finding takes time. There is a great deal of noise that can be added by good-faith speculation and outright shameless attempts to capitalize on breaking news. Prioritizing which events are worth understanding in detail can definitely go a long way.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;These are of course, suggestions and aspirations. Feel free to take on what you think can help you stay focused and discard the ones that aren&amp;rsquo;t desirable or even supported on your platform of choice. The most important thing is to be deliberate about what you&amp;rsquo;re doing and not let platforms themselves dictate your participation. Of course, like many other things this is easier said than done.&lt;/p&gt;
&lt;p&gt;For those with spare time, resources, and creativity at hand, it may be seriously worth considering creating your own platforms. The Internet may be dead, but we can salvage the Free and Open Web by doubling-down on building it ourselves. While having your own website may not bring in huge amounts of views, you would be surprised at the quality feedback you get with quality contributions. Consider what you would like to see the &lt;em&gt;digital town square&lt;/em&gt; look like, and what you can do to build that future.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Digital Autonomy &amp; Fitness with Zachary Boissinot</title>
		<link>https://libresolutions.network/videos/fitness/</link>
		<pubDate>Mon, 13 Jan 2025 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/fitness/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/digital-autonomy-fitness.ogg" />
			
		
		<image>https://libresolutions.network//media/images/gabe-and-zach.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/gabe-and-zach.webp" />
		<itunes:image href="https://libresolutions.network//media/images/gabe-and-zach.webp" />
		<description>Work against resistance to become the resistance</description>
		<content:encoded>&lt;p&gt;I would like to introduce you to Zachary Boissinot. A great Canadian who is passionate about health and people&amp;rsquo;s autonomy. I joined Zach to discuss what it&amp;rsquo;s been like for him a personal trainer and owner of a gym. Recently I&amp;rsquo;ve begun to &lt;a href=&#34;https://gabe.rocks/health/&#34;&gt;make progress&lt;/a&gt; on my own weight loss journey thanks in big part to his instruction. We touch on some of the recent challenges people are facing, as well as potential concerns of how health data can be misused. I hope you&amp;rsquo;ll find our conversation worth diving into.&lt;/p&gt;
&lt;p&gt;The &lt;a href=&#34;https://libresolutions.network/tags/digital-autonomy-series/&#34;&gt;Digital Autonomy Series&lt;/a&gt; is where I try to have conversations to &amp;lsquo;bridge the gap&amp;rsquo; between technical minds and the real concerns people have in their daily lives. The goal is to build some understanding of the pressing issues related to how our digital experience impacts different domains of life. By learning from others with a solid understanding in one of those areas, we can begin to &lt;a href=&#34;http://localhost:1313/articles/digital-autonomy/&#34;&gt;imagine how a better digital future&lt;/a&gt; would actually work.&lt;/p&gt;
&lt;p&gt;Zachary runs &lt;a href=&#34;https://afootabovefitness.com/&#34;&gt;A Foot Above Fitness&lt;/a&gt; a gym with an excellent community and it&amp;rsquo;s a pleasure to be a part of it. There&amp;rsquo;s something uniquely inspiring about a community of people being so forthcoming with kindness and encouragement. Even if you&amp;rsquo;re not local, there&amp;rsquo;s a lot that can be learned from his example. You can also get connected through either &lt;a href=&#34;https://www.facebook.com/AFootAboveFitness&#34;&gt;Facebook&lt;/a&gt; or &lt;a href=&#34;https://www.instagram.com/afootabovefitness/&#34;&gt;Instagram.&lt;/a&gt;&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>The Zano Conspiracy: Hijacking Privacy</title>
		<link>https://libresolutions.network/articles/zano/</link>
		<pubDate>Tue, 07 Jan 2025 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/zano/</guid>
		
		<image>https://libresolutions.network//media/stock/digital-world.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/stock/digital-world.webp" />
		<itunes:image href="https://libresolutions.network//media/stock/digital-world.webp" />
		<description>Unraveling a massive affinity scam targeting the privacy-conscious cryptocurrency community.</description>
		<content:encoded>&lt;p&gt;Last December, Roger Ver appeared on the &lt;a href=&#34;https://rumble.com/v5xyrwt-why-the-intel-agencies-want-to-track-your-every-transaction-and-throw-roger.html&#34;&gt;Tucker Carlson show.&lt;/a&gt; Taking the time to outline his history as an old Bitcoin fan, and staunch economic freedom advocate. He raised his concerns about how Bitcoin was &amp;lsquo;hijacked&amp;rsquo; by nefarious forces to neuter its utility as anything other than &amp;lsquo;digital gold&amp;rsquo;. Roger&amp;rsquo;s take on Bitcoin&amp;rsquo;s flaws are incredibly compelling, partly because it is backed by some real history. I raised many similar concerns when I spoke with &lt;a href=&#34;https://roundingtheearth.substack.com/&#34;&gt;Mathew Crawford&lt;/a&gt; and Hrvoje on &lt;a href=&#34;https://geopoliticsandempire.com/2024/11/15/bitcoin-tulip-gold/&#34;&gt;Geopolitics &amp;amp; Empire.&lt;/a&gt; It is concerning however, to see this Bitcoin &amp;rsquo;limited hangout&amp;rsquo; used to promote a very &lt;a href=&#34;https://youtu.be/aES5WvXgAcw?t=161&#34;&gt;suspect cryptocurrency.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Roger is currently being prosecuted for tax evasion, despite renouncing his citizenship and &amp;ldquo;becoming a citizen of the world&amp;rdquo;. He believes this is a politically motivated prosecution. In &lt;a href=&#34;https://home.solari.com/hijacking-bitcoin-the-hidden-history-of-btc-with-steve-patterson/&#34;&gt;her interview&lt;/a&gt; with the co-author of Roger Ver&amp;rsquo;s book &amp;lsquo;Hijacking Bitcoin&amp;rsquo;, Catherine Austin Fitts points out that how Roger is being prosecuted is highly irregular. &lt;a href=&#34;https://www.freerogernow.org/&#34;&gt;The public petition&lt;/a&gt; in his name has currently reached over 18 thousand signatures. The petition has been signed by notable names like Tucker Carlson, Bret Weinstein, Jeffrey Tucker, Aaron Day with many others.&lt;/p&gt;
&lt;p&gt;In his conversation with Tucker, Roger Ver argues that the only way to preserve financial privacy and autonomy is for humanity to adopt cryptocurrency, but specifically private ones. This is because while there are many cryptocurrencies, many of them are perfectly transparent. This creates privacy concerns. While private cryptocurrencies are absolutely worth exploring, Roger Ver has a few specific solutions in mind. Leveraging the fear of state abuse via central bank digital currencies, he argues we need to rush into more cryptocurrency projects. Saying he would be embarrassed to promote Bitcoin today, but he &lt;a href=&#34;https://x.com/zano_project/status/1870135248098382248&#34;&gt;explicitly promoted&lt;/a&gt; two other cryptocurrencies Monero &amp;amp; &lt;a href=&#34;https://gabe.rocks/docs/#/page/zano&#34;&gt;Zano.&lt;/a&gt; I had already been familiar with Monero which I consider one of the few decent cryptocurrencies, but I had never heard of Zano. What I found looking into Zano I found highly troubling.&lt;/p&gt;
&lt;p&gt;I am choosing to highlight Zano for two reasons:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Some quite prominent figures vocal about decentralization and privacy have promoted it.&lt;/li&gt;
&lt;li&gt;It&amp;rsquo;s exemplary of what one should avoid if they are to consider cryptocurrency at all.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;After spending a significant amount of time digging, and comparing notes with others even more knowledgeable than me, my mind is made up. I am strongly convinced that there is something nefarious in the promotion of Zano.&lt;/p&gt;
&lt;h2 id=&#34;whats-wrong-with-zano&#34;&gt;What&amp;rsquo;s wrong with Zano?&lt;/h2&gt;
&lt;p&gt;Zano is a cryptocurrency that has a great deal of &lt;a href=&#34;https://pdfhost.io/v/oIeFyPGBn_Zano&#34;&gt;red flags.&lt;/a&gt; These particular red flags put it in the &lt;a href=&#34;https://yanmaani.github.io/proof-of-stake-is-a-scam-and-the-people-promoting-it-are-scammers/&#34;&gt;same league&lt;/a&gt; as many failed projects and outright frauds. In many ways, it is an excellent example of how predatory the cryptocurrency market can be. Even people who may be familiar with Bitcoin itself, may not truly be able to appreciate the significant differences between it and other cryptocurrencies. There are many fundamental differences to these digital assets that can have a profound impact on how they work, as well as their future.&lt;/p&gt;
&lt;h3 id=&#34;the-liquidity-problem&#34;&gt;The liquidity problem&lt;/h3&gt;
&lt;p&gt;Making a small cryptocurrency popular is no simple task. Bitcoin has had over a decade to gain familiarity and access, but almost every other cryptocurrency has to compete with &lt;a href=&#34;https://explodingtopics.com/blog/number-of-cryptocurrencies&#34;&gt;thousands&lt;/a&gt; of others. It is incredibly hard to stand out without at least promising truly innovative features. It&amp;rsquo;s very straightforward to download the source code of a cryptocurrency, make some trivial changes to function and branding to make a new one. These slight variations are often shameless attempts to ride on the coattails of a more successful project, but also create a &amp;ldquo;spam&amp;rdquo; problem for exchanges.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://www.investopedia.com/tech/190-cryptocurrency-exchanges-so-how-choose/&#34;&gt;Exchanges&lt;/a&gt; are online platforms where people generally buy their cryptocurrency. There are a huge variety of them, and they all have a different selection of cryptocurrencies. Some are naturally more popular than others. When one creates a cryptocurrency, it is not automatically listed on any exchanges, especially not the centralized ones. These exchanges effectively operate as &amp;ldquo;on-ramps&amp;rdquo; for people to acquire cryptocurrencies and trade within them.&lt;/p&gt;
&lt;p&gt;For smaller cryptocurrencies, this creates a bit of a &amp;ldquo;&lt;em&gt;chicken and egg problem&lt;/em&gt;&amp;rdquo;. To be listed on an exchange, the coin needs to be sufficiently popular and &lt;a href=&#34;https://crypto.com/en/university/liquidity-in-crypto-markets&#34;&gt;liquid,&lt;/a&gt; but to be sufficiently popular and liquid it needs to be on exchanges. A potential solution to this is DExs (&lt;em&gt;Decentralized Exchanges&lt;/em&gt;), but these are generally not as popular among users. This creates many problems, but especially for cryptocurrency investors.&lt;/p&gt;
&lt;p&gt;The biggest problem when trading a small coin is that you&amp;rsquo;re effectively at the mercy of the few exchanges it is sold on. Even if you &amp;lsquo;mine&amp;rsquo; your own coins, you won&amp;rsquo;t have many places to sell. What&amp;rsquo;s worse, is that all kinds of market manipulation is possible by even relatively small players on obscure coins and exchanges. To make a bold statement, this means that there is no such thing as organic &lt;a href=&#34;https://www.investopedia.com/terms/p/pricediscovery.asp&#34;&gt;price discovery&lt;/a&gt; for coins not widely listed. Prices can wildly vary between smaller exchanges. All of this together gives larger holders of smaller coins very powerful economic influence over the ecosystem. Specifically in the case of Zano, &lt;a href=&#34;https://coinmarketcap.com/currencies/zano/#Markets&#34;&gt;over 85%&lt;/a&gt; of its known daily trading volume (at the time of writing) takes place in a single exchange. Yet even at the most popular exchange Zano isn&amp;rsquo;t very liquid.&lt;/p&gt;
&lt;h3 id=&#34;hijacking-privacy&#34;&gt;Hijacking privacy&lt;/h3&gt;
&lt;p&gt;The Zano project seems to have a lot of resources to throw around and buy influence. This on its own is a huge red flag for me. It wouldn&amp;rsquo;t be the first time a nominally &amp;lsquo;decentralized&amp;rsquo; project that used its own tokens to buy up positive PR. Odysee/LBRY had a program where they would &lt;a href=&#34;https://scribe.rip/@scottcbusiness/what-happened-to-lbry-odysee-ded8c4c24bbb&#34;&gt;sponsor creators&lt;/a&gt; with a significant amount of LBRY credits to be unlocked after a particular time. This meant that many popular figures had a huge incentive to promote and speak well of the platform no matter what the reality. Many well-known figures, may promote various cryptocurrencies, without being able to properly communicate the massive risks in playing with unproven cryptocurrencies. It&amp;rsquo;s often the case that many of these personalities themselves may not be able to reasonably tell just how bad a particular asset can be. This is because cryptocurrency projects all have very important details that often get glossed over by people getting excited about rapid price increases.&lt;/p&gt;
&lt;p&gt;I am highly suspicious that Zano has effectively &amp;ldquo;bought its way&amp;rdquo; into the online discussions it&amp;rsquo;s featured in. Regardless, the plug in Roger Ver&amp;rsquo;s Tucker Carlson interview has effectively done this. It&amp;rsquo;s so easy for somebody enchanted by a beautiful website, rising price, and growing popularity to overlook many glaring signs of trouble. Technical details take time to prove. Software requires testing and validation to truly prove that systems work as intended. It&amp;rsquo;s incredibly common for catastrophic bugs to come out of nowhere, just &lt;a href=&#34;https://fortune.com/2024/08/03/crowdstrike-outage-fortune-500-companies-5-4-billion-damages-uninsured-losses/&#34;&gt;ask Crowdstrike.&lt;/a&gt; But price rises come a lot faster than technical merit. It&amp;rsquo;s incredibly easy for a new cryptocurrency to become multiples of its current price on small exchanges before most people even hear of it. This in combination with project creators (and investors) maintaining control over the token supply with a huge &lt;a href=&#34;https://scribe.rip/zano-news/zano-development-fund-breakdown-5d320a6a88f2&#34;&gt;pre-mine&lt;/a&gt; makes for a very predatory arrangement.&lt;/p&gt;
&lt;h3 id=&#34;rigging-the-game&#34;&gt;Rigging the game&lt;/h3&gt;
&lt;p&gt;Zano actually had multiple opportunities for insiders to take significant control over the token supply. The &lt;a href=&#34;https://docs.zano.org/docs/learn/emission/#premine&#34;&gt;pre-mine&lt;/a&gt; allocated nearly 30% of the total token supply to fund the project. This means that as the cryptocurrency launched, a huge share of the total supply was under control of the project team. Some argue that this is a good thing, it gives those working on the project a means of funding development of the project. Unfortunately, this is also a very popular means for outright frauds to run straightforward &lt;a href=&#34;https://www.investopedia.com/terms/p/pumpanddump.asp&#34;&gt;pump and dump&lt;/a&gt; scams. For some cryptocurrencies, they use &amp;lsquo;Proof-of-Stake&amp;rsquo; as their consensus algorithm, which makes this circumstance even more dire. Because under a proof-of-stake system large holders have a significant control over the currency itself. In addition to this, large holders can maintain a permanent advantage by receiving profits from staking their large holdings.&lt;/p&gt;
&lt;p&gt;While  Zano had a very generous premine, that wasn&amp;rsquo;t the only opportunity for insiders to acquire a large stake of the supply. In a highly unusual move, holders of a different cryptocurrency called &lt;a href=&#34;https://bitcointalk.org/index.php?topic=740112.0&#34;&gt;Boolberry&lt;/a&gt; were able to exchange their tokens for Zano at a &lt;a href=&#34;https://blog.zano.org/coinswap-launch/&#34;&gt;1:1 ratio.&lt;/a&gt; In another unusual action, the window to swap tokens was relatively short. Lasting around a month, one can assume that only the most &amp;lsquo;in the know&amp;rsquo; holders would have had the opportunity to swap. Large holders of this highly obscure and relatively inexpensive token can potentially have a significant stake in Zano. Since Zano is intended to be a private cryptocurrency, there is no known way to learn how much of the supply is dominated by insiders.&lt;/p&gt;
&lt;p&gt;In yet another unique move, Zano uses &lt;a href=&#34;https://archive.is/JdPb0&#34;&gt;both&lt;/a&gt; &lt;a href=&#34;https://www.investopedia.com/terms/p/proof-work.asp&#34;&gt;Proof-of-Work&lt;/a&gt; and &lt;a href=&#34;https://www.investopedia.com/terms/p/proof-stake-pos.asp&#34;&gt;Proof-of-Stake.&lt;/a&gt; Proof-of-work is where computing power is used to validate the network. Proof-of-Stake instead has holders of the token &amp;rsquo;lock up&amp;rsquo; some of their funds to participate in exchange for a share of block rewards. Because (&lt;em&gt;like many others&lt;/em&gt;) Zano is a relatively new cryptocurrency, its proof-of-work consensus is at risk of being dominated by those with significant computing power. The creator argues that adding proof-of-stake is a means of overcoming this initial weakness. On the other hand, there are other solutions that don&amp;rsquo;t create immense profit for insiders. A popular solution other cryptocurrencies use is &lt;a href=&#34;https://academy.binance.com/en/glossary/merged-mining&#34;&gt;&amp;lsquo;merged mining&amp;rsquo;&lt;/a&gt; where the cryptocurrency can be &amp;lsquo;mined&amp;rsquo; in parallel with other larger coins, encouraging more computing power a lot faster.&lt;/p&gt;
&lt;p&gt;A hybrid consensus algorithm is a bold move that may encounter un-intuitive complications. The introduction of Proof-of-stake itself may not have been done for system security reasons, but possibly for profit. The combination of a pre-mine coin and proof-of-stake &amp;ldquo;pump and dump&amp;rdquo; is a scam that has gotten very old these days. It&amp;rsquo;s almost comical. Zano is possibly in the worst of all worlds given that there was a massive pre-mine, a large amount of Boolberry trade-ins, which will all be able to profit off staking rewards in the future. To discuss this and other issues in a &lt;a href=&#34;https://youtu.be/vHWEhO5RSHM&#34;&gt;Q&amp;amp;A with the Zano team,&lt;/a&gt; &amp;lsquo;Untraceable&amp;rsquo; effectively argued this was a &amp;ldquo;dev tax&amp;rdquo; on Zano in perpetuity. Meaning that the developers would have the capability of profiting off the system at the expense of participants. It is worth considering that it is not just merely the developers, but also unknown insiders who may also be able to reap significant staking rewards. To the degree it works out this way, it a frustrating &lt;em&gt;re-creation&lt;/em&gt; of all the things cryptocurrencies were ideally invented to eliminate. If we are willing to passively accept the owners of a cryptocurrency dominating the consensus algorithm and profiting off the ecosystem itself&amp;hellip; are we really any better off than with central banks?&lt;/p&gt;
&lt;p&gt;Zano is attempting to corner the market on private digital currencies (&lt;em&gt;and assets!&lt;/em&gt;) while maintaining significant control over the token supply. A digital currency using proof-of-stake with a consolidated supply is truly just a &lt;a href=&#34;https://live.solari.com/w/p/dYcUH3sp9KY5v82GcoFWxH?playlistPosition=1&#34;&gt;CBDC&lt;/a&gt; with extra steps. It&amp;rsquo;s really worth considering how many of these projects directly aimed at enticing &amp;lsquo;freedom fighters&amp;rsquo; are &amp;ldquo;wolves in sheep&amp;rsquo;s clothing&amp;rdquo;. Since at least the &lt;a href=&#34;https://www.citationneeded.news/the-fraud-was-in-the-code/&#34;&gt;FTX&lt;/a&gt; collapse, it&amp;rsquo;s clear that there is a desire to build a &lt;a href=&#34;https://roundingtheearth.substack.com/i/85749309/establishing-a-new-global-financial-order-in-one-fell-swoop&#34;&gt;CBDC issuer&lt;/a&gt; that&amp;rsquo;s technically private. I wholeheartedly believe that Zano is an attempt to encircle the private cryptocurrency space and neuter it, because it&amp;rsquo;s possible that alternatives are far too resilient to tolerate. If Zano is given preferential treatment compared to Monero by exchanges, you will be able to be certain that this is true.&lt;/p&gt;
&lt;h3 id=&#34;the-bigger-picture&#34;&gt;The bigger picture&lt;/h3&gt;
&lt;p&gt;One can argue, that none of this matters. The Zano team effectively did during &lt;a href=&#34;https://youtu.be/vHWEhO5RSHM&#34;&gt;their Q&amp;amp;A.&lt;/a&gt; As somebody who has watched the cryptocurrency space when people actually cared about decentralization, innovation, and potential it&amp;rsquo;s truly awful to witness. It seems that the simple strategy of setting up yet another cryptocurrency and hyping it up is itself so profitable it distracts from sincere attempts to build real solutions. What concerns me the most about the Zano platform is that it seems perfectly suited to operate as a means to recapitalize on the &lt;a href=&#34;https://whistleblowersinternational.com/Blog/meme-coin-scams-how-to-spot-and-avoid-them/&#34;&gt;memecoin hype,&lt;/a&gt; without delivering much in tangible innovation. I&amp;rsquo;m quite sure that sounds harsh, but regardless of whatever price movement Zano makes, I am incredibly skeptical it will accomplish stated objectives.&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s clear that there isn&amp;rsquo;t a lot of interest in pointing out the flaws of various cryptocurrency projects. The time and effort to validate well-funded marketing in an area the majority of people don&amp;rsquo;t understand is daunting. It&amp;rsquo;s not just myself. If you listen &lt;a href=&#34;https://youtu.be/vHWEhO5RSHM&#34;&gt;to the Q&amp;amp;A,&lt;/a&gt; &lt;a href=&#34;https://x.com/DontTraceMeBruh&#34;&gt;Untraceable&lt;/a&gt; is very knowledgeable and has clearly done his homework. But I fully expect this to be ignored as the price may well continue to rise despite it all. I made an attempt to reach out to others much more knowledgeable about cryptocurrency than me, and received variations of the same question: &amp;ldquo;&lt;em&gt;Why are you even looking at this?&lt;/em&gt;&amp;rdquo;. Those I know who have a serious grasp of the fine details can&amp;rsquo;t take this project seriously, but is your favorite parasocial hero going to tell you this?&lt;/p&gt;
&lt;p&gt;But all the major red flags: the premine, the token swap, decisions made about the consensus algorithm, lack of technical documentation, are all worth keeping in mind for any hyped-up asset. When one watches the cryptocurrency market with a healthy dose of skepticism you will see many doomed-from-the-start projects rise and fall over and over. One of the things that makes Zano particularly noteworthy is that it is not merely cryptocurrency, but it also intends to be a platform to launch other digital assets. As Untraceable pointed out in the Q&amp;amp;A, Zano doesn&amp;rsquo;t support smart contracts. This means that any digital assets launched under Zano are &amp;lsquo;dumb tokens&amp;rsquo; that currently are under centralized control. If Zano becomes significantly popular, the platform itself can become a haven for pump-and-dump memecoins that have no utility. The centralized issuance and lack of ability to create smart contracts makes any of these assets suspect.&lt;/p&gt;
&lt;h3 id=&#34;kaurma-not-all-that-glitters-is-gold&#34;&gt;Kaurma: Not all that glitters is gold&lt;/h3&gt;
&lt;p&gt;Bitcoin may be very successful as &amp;lsquo;digital gold&amp;rsquo;, but many people are very disinterested in the &lt;a href=&#34;https://watchmanprivacy.com/2024/10/18/130-are-bitcoin-podcasts-divine-intervention/&#34;&gt;current trajectory&lt;/a&gt; of the Bitcoin community. The race to seek out the &amp;rsquo;next Bitcoin&amp;rsquo; is very intense these days. Many are desperate to recapture the vision, or the dream of &lt;em&gt;peer to peer digital cash&lt;/em&gt;. Building a project to take on this ambition is laudable, but actually achieving it is no small feat. If Bitcoin was &amp;lsquo;hijacked&amp;rsquo; or otherwise unable to function as a medium of exchange, any new project has massive shoes to fill to even make the attempt. In public discussions, there is a huge lack of serious consideration for what lessons could have been learned. Privacy, scaling, decentralization are all secondary concerns to marketing the next hyped up asset.&lt;/p&gt;
&lt;p&gt;One of the things I stumbled on while looking into Zano was Aaron Day&amp;rsquo;s ambitious project Kaurma. The Zano profile on X &lt;a href=&#34;https://x.com/zano_project/status/1874896193672953925&#34;&gt;shared a video&lt;/a&gt; of Aaron Day explaining the dangers of CBDCs and economic surveillance. Arguing that you &amp;lsquo;defeat surveillance with privacy&amp;rsquo; and therefore we need to use Monero, Zano and his new project, which is planned to be built on top of Zano. The choice to build on top of Zano is interesting, given the details above. In defending this choice, he argues that a &amp;ldquo;fair launch&amp;rdquo; &lt;a href=&#34;https://x.com/AaronRDay/status/1876297418435854735&#34;&gt;isn&amp;rsquo;t really important.&lt;/a&gt; This certainly raises concerns about his ability to fairly steward a stablecoin project.&lt;/p&gt;
&lt;p&gt;Aaron Day &lt;a href=&#34;https://x.com/AaronRDay/status/1859379045256896901&#34;&gt;wrote:&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Tether will either blow up in a scandal or will be co-opted by the establishment and will become the de facto CBDC for this US. Either way, the end result is digital tyranny.&lt;/p&gt;
&lt;p&gt;This is why we are launching Kaurma - a gold-backed privacy stablecoin on Zano.&lt;/p&gt;
&lt;p&gt;The world deserves private, P2P digital cash.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;A &amp;ldquo;gold-backed privacy stablecoin&amp;rdquo; is quite the mouthful. It&amp;rsquo;s also at least an order of magnitude more complex than actually succeeding to build a peer to peer digital cash system. The intention appears to be to build the stablecoin (a digital asset with a stable value) with Zano&amp;rsquo;s &amp;ldquo;Confidential Asset&amp;rdquo; system. There are significant concerns about how these assets &lt;a href=&#34;https://x.com/DontTraceMeBruh/status/1821797625835769864&#34;&gt;are centralized.&lt;/a&gt; In addition to this, tying the physical world (like with gold) to cryptocurrencies is no simple task either. There are many cryptocurrency projects that have &amp;rsquo;tokenized&amp;rsquo; gold, but none of them are truly decentralized. Despite many people being attracted to cryptocurrency for decentralization &amp;amp; privacy, it seems that one is going to have to trust the operators of Kaurma to back their end of the bargain. While it&amp;rsquo;s almost guaranteed that Tether has problems, is building more Tether-like entities truly a solution?&lt;/p&gt;
&lt;p&gt;Those genuinely interested in decentralizing financial power have to understand that the fine details matter. Being overly ambitious without due caution is at best a recipe for making others pay for your foolish mistakes. The problem is that this is largely a question of values. Being okay with your &amp;ldquo;allies&amp;rdquo; being fleeced by endless frauds and scams is a road to &lt;a href=&#34;https://libresolutions.network/articles/redirecting-resistance/&#34;&gt;de-facto sabotage.&lt;/a&gt; There are values that served those who got into cryptocurrency early, that have largely been forgotten as the market has been refined into a parasocial plundering machine. It is highly suspect that those with the means to rise on centralized platforms always happen to have a &amp;lsquo;solution&amp;rsquo; that requires people to hand over their money and data for empty promises.&lt;/p&gt;
&lt;h2 id=&#34;can-we-do-better&#34;&gt;Can we do better?&lt;/h2&gt;
&lt;p&gt;Decentralizing is hard. Adopting a cryptocurrency in 2025 is not going to meaningfully protect people from CBDCs, de-banking, or state surveillance. For the vast majority of people their real weak-points are employment and ability to pay for necessities. Neither of those are going to be transformed overnight. If your goal is to just make enough money off suckers to &amp;rsquo;liberate&amp;rsquo; yourself from today&amp;rsquo;s major inconveniences, then maybe that can work. When one is truly interested in rebuilding the foundations of our digital experience, a lot more fundamental work is required to make meaningful change. The desire to do &lt;em&gt;something&lt;/em&gt; to oppose tyranny is wonderful, but it&amp;rsquo;s also something that can be weaponized against you.&lt;/p&gt;
&lt;p&gt;At some point, thought leaders need to demonstrate their willingness to &lt;em&gt;walk the walk&lt;/em&gt;. If they talk a big game about innovation, decentralization, and protecting privacy, how much do their actions reflect this? It&amp;rsquo;s easy to be skeptical about what you&amp;rsquo;re being told, but it&amp;rsquo;s a whole other challenge to consider what you&amp;rsquo;re not being told. In an age where people&amp;rsquo;s digital experience is being confined to increasingly controlled devices, the systems we slather on top are never going to make a meaningful difference.&lt;/p&gt;
&lt;p&gt;I am incredibly disappointed that I am even moved to not only write this piece, but make it as long as this. One of the prime motivators for me to begin writing about technical topics was the complete un-seriousness they are given in so-called freedom loving circles. I am convinced that at least 99% of the cryptocurrency ecosystem exists to build a cargo-cult that keeps motivated technical minds away from real solutions. Bitcoin was released in 2008, do you feel more or less digitally free since then? Almost everyone who is old enough to remember would admit that things have gotten dire. Has the plentiful variety of cryptocurrencies available meaningfully enhanced your digital experience? I certainly doubt it.&lt;/p&gt;
&lt;p&gt;The most important way to make progress is to work against people being forced into digital systems not herd them into yet another unproven &amp;lsquo;solution&amp;rsquo;. If it truly is the answer, it can absolutely catch on organically. Technology can be a powerful force for helping people with all kinds of problems, but things will continue to get worse if we continue to be careless. New tools are needed, but at a much more fundamental level than mere software. It is distressing to see well-meaning people lured into blatant scams by appealing to their justified fear of tyranny and abuse. We should expect better from our thought-leaders. If they are so careless to look into the fine details, who needs enemies?&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Casey Means: &#39;Good Energy&#39; &amp; Biosurveillance</title>
		<link>https://libresolutions.network/articles/good-energy/</link>
		<pubDate>Thu, 02 Jan 2025 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/good-energy/</guid>
		
		<image>https://libresolutions.network//media/stock/meds.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/stock/meds.webp" />
		<itunes:image href="https://libresolutions.network//media/stock/meds.webp" />
		<description>Can Big Data &amp; wearables improve our health?</description>
		<content:encoded>&lt;p&gt;Since the Covid Crisis, there has been a renewed interest in people taking control of their health. This on its own is fantastic news. This is something that&amp;rsquo;s very close to my heart since I&amp;rsquo;ve been embarking on my own &lt;a href=&#34;https://gabe.rocks/health&#34;&gt;health journey.&lt;/a&gt; As part of this, I was gifted Casey Means&amp;rsquo; book &lt;a href=&#34;https://www.goodreads.com/book/show/196848596-good-energy&#34;&gt;&lt;em&gt;Good Energy&lt;/em&gt;&lt;/a&gt; by my mother. I think there is a lot of very useful and important information in this book. Sadly, it also leaves out a wide variety of &lt;a href=&#34;https://youtu.be/gXjj2EoElFg&#34;&gt;important information,&lt;/a&gt; especially when it comes to digital autonomy.&lt;/p&gt;
&lt;h2 id=&#34;good-energy&#34;&gt;Good Energy&lt;/h2&gt;
&lt;p&gt;The book is about Casey Mean&amp;rsquo;s journey from being a surgeon within the medical system, to adopting new ideas and practices for helping people take charge of their own health. Recognizing that to a surgeon armed with a hammer (scalpel) everything starts to look like a nail, she started to consider how many different problems were caused by common lifestyle factors. The book outlines how taking on many simple habits can really build into massive health improvements over time. The author provides a large picture of how our modern environment impacts our health, and strategies for mitigating this. If you&amp;rsquo;re somebody like me, who could learn a lot more about health, I would highly recommend reading the book as a good step in taking responsibility for one&amp;rsquo;s health.&lt;/p&gt;
&lt;p&gt;Just because I agree with many points made by the book, doesn&amp;rsquo;t mean I agree with every line. It is absolutely true that to take better charge of one&amp;rsquo;s own health getting more information is helpful. On the other hand, as a &amp;rsquo;techie&amp;rsquo; I have significant concerns over data privacy. It would be different if all the means of acquiring your own personal health information were entirely analog. In that case, you could harmlessly get all the information required with few to no privacy concerns. Sadly this isn&amp;rsquo;t the state of things.&lt;/p&gt;
&lt;p&gt;Good Energy explicitly recommends many smart watches and devices known as &amp;lsquo;wearables&amp;rsquo;. There are non-trivial privacy concerns people should consider before making an informed choice about using them. The book goes even further to recommend having a Continuous Glucose Monitor (GCM) to get real-time metabolic information. The author is an adviser to &lt;a href=&#34;https://www.levels.com/&#34;&gt;Levels,&lt;/a&gt; a company that is launching a new &lt;a href=&#34;https://archive.is/uQMBE&#34;&gt;smart GCM.&lt;/a&gt; over time, I&amp;rsquo;ve become more and more skeptical of the further digitization of health. All kinds of companies are after everyone&amp;rsquo;s &lt;a href=&#34;https://www.microjourneys.io/p/exploring-the-pure-blood-trap&#34;&gt;medical information,&lt;/a&gt; but what are they using it for?&lt;/p&gt;
&lt;h2 id=&#34;wearables-a-cause-for-concern&#34;&gt;Wearables: A cause for concern?&lt;/h2&gt;
&lt;p&gt;Health monitors as a whole are a gold mine of useful information about a person. This is something that can be used for an incredible amount of good, but sadly also just as much evil. The best way to protect sensitive information is not to record it, and these tools by design do a lot of recording. It&amp;rsquo;s one thing to have crucial information in your own hands, but once it&amp;rsquo;s in others&amp;rsquo; control the game changes completely.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;While digitizing medical data could revolutionize healthcare, systemic inefficiencies, weak security measures, and a lack of trust in Big Tech make it risky. These vulnerabilities expose patients to data theft, scams, fraud, and exploitation. If patients can&amp;rsquo;t trust healthcare companies like UnitedHealth Group to safeguard sensitive health data, why should they believe digitizing and uploading healthcare data to a Big Tech company like Google is a good idea?&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://www.androidpolice.com/sending-digitized-medical-data-to-google-bad-idea/&#34;&gt;Android Police: Digitizing and sending medical data to Google sounds like a bad idea&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;This is a non-trivial concern. As we &amp;lsquo;digitize&amp;rsquo; healthcare, there are many serious questions to ask about who or what is being empowered with our sensitive health information. We have already seen much simpler IoT devices used to &lt;a href=&#34;https://www.theguardian.com/world/article/2024/jun/25/tracking-device-domestic-violence-offenders-stalking-apple-find-my-friends&#34;&gt;enable stalking and harassment,&lt;/a&gt; the dangers related to health monitors are only beginning to become apparent. There is a frustrating lack of health monitoring gadgets that don&amp;rsquo;t require a smartphone app. These apps all inherently rely on connecting to a corporate controlled service with very few real guarantees of privacy. Even when a particular provider may have strong guarantees, little prevents it (and all of people&amp;rsquo;s sensitive information) from being &lt;a href=&#34;https://www.forbes.com/sites/andrewwilliams/2021/01/14/google-now-owns-fitbit-what-it-means-for-your-fitness-data-privacy/&#34;&gt;sold to a new company&lt;/a&gt; with less scruples. There are countless ways personal health information on a wide variety of people could be misused and abused.&lt;/p&gt;
&lt;p&gt;In fact, we already saw in the Covid Crisis that vaccination status was used to fuel &lt;a href=&#34;https://www.campfire.wiki/doku.php?id=vaccine_passport&#34;&gt;systematic discrimination&lt;/a&gt; in many areas of life in many countries. Given the serious decline in both medical ethics and privacy since that time, there are hardly any guarantees about all kinds of forms of medical discrimination in the future. To be clear, there&amp;rsquo;s a lot of good to come from people being given the tools to take charge of their own health, but unfortunately that&amp;rsquo;s not exactly what&amp;rsquo;s being offered here. With the vast majority of commercially available options, the risk of people&amp;rsquo;s sensitive biological information being in the wrong hands is almost guaranteed.&lt;/p&gt;
&lt;p&gt;In addition to all this, there are also simple fundamental technical &lt;a href=&#34;https://theconversation.com/a-medical-right-to-repair-can-empower-consumers-and-save-lives-234451&#34;&gt;problems with the lifecycle&lt;/a&gt; of these products. Being so dependent on smartphones and online services means that these products are vulnerable to (if not designed with) &lt;a href=&#34;https://pirg.org/articles/bricked-house-how-obsolescence-looms-over-our-smart-home-devices/&#34;&gt;planned obsolescence.&lt;/a&gt; Just as one begins to take charge of their health, a simple business decision could pressure them into giving up more data just in exchange for continuing to use the tool they&amp;rsquo;ve begun to rely on. With people beginning to connect the very idea of taking care of themselves with cloud-based tools, they can forget the most important tool of all: being in control of their health and data. Without the individual being in control of their technological experience, just like with health, they can fall prey to very nefarious and harmful schemes.&lt;/p&gt;
&lt;h2 id=&#34;biosecurity-is-more-information-always-good&#34;&gt;Biosecurity: Is more information always good?&lt;/h2&gt;
&lt;p&gt;To reiterate, individuals having control of their own information is an entirely different circumstance than &lt;a href=&#34;https://freedomhouse.org/report/freedom-net/2021/global-drive-control-big-tech&#34;&gt;powerful institutions&lt;/a&gt; having insight into the public&amp;rsquo;s information. As &lt;a href=&#34;https://macleans.ca/society/why-social-media-has-taken-over-your-life-and-you-need-to-sign-off-now/&#34;&gt;we saw&lt;/a&gt; with Big Tech social media, information that can be abused inevitably will be. The stakes can only become higher and higher as the information collected from people shifts from self-reported data to passively collected biological markers. Far from a mere hypothetical, these tools are able to be weaponized to build &lt;a href=&#34;https://unlimitedhangout.com/2021/05/investigative-reports/wearable-solutions-and-the-internet-of-incarceration/#from-private-prisons-to-wearable-prisons&#34;&gt;wearable prisons&lt;/a&gt; given enough opportunity.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;In a much related manner, the ruling class also seems to be marrying the issue of mass incarceration with the wearables revolution.&lt;/p&gt;
&lt;p&gt;“In a digital world with ankle bracelets and GPS devices, there is no reason to believe that physical imprisonment is the only option for those convicted of nonviolent offenses,” Darrell West wrote for the Brookings Institute in 2015. “Compared to incarceration, ankle bracelets and GPS devices seem far more tolerable. They keep offenders in society, are less punitive than prisons, and are much less expensive.”&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://unlimitedhangout.com/2021/05/investigative-reports/wearable-solutions-and-the-internet-of-incarceration/&#34;&gt;Wearable “Solutions” and the Internet of Incarceration&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;When one is letting a cloud-enabled wearable govern their personal health decisions, are they truly free? How many of those subtle nudges from the platform able to change seemingly unrelated decisions? Is it not out of the question to imagine of the individual&amp;rsquo;s biological information for propaganda and control purposes? Just as these &amp;lsquo;innovations&amp;rsquo; blur the line between those incarcerated and those who are &amp;lsquo;free&amp;rsquo;, they also blur the line between civilian and target. Military use of and investment in wearables is &lt;a href=&#34;https://www.gminsights.com/industry-analysis/military-wearables-market&#34;&gt;rising precipitously.&lt;/a&gt; There are serious questions to ask about how personal health information is able to be used against people in the future.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;And he’s [Giorgio Agamben] really articulated what this is and where it’s going, and the fact that this is a new governance paradigm for the planet. For example, he did an interview in May of 2020—so, very early on—called Polemos Epidemios, where he said:&lt;/p&gt;
&lt;p&gt;“An epidemic, as is suggested by its etymological roots in the Greek term demos (which designates the people as a political body), is first and foremost a political concept. In Homer, polemos epidemios is the civil war. What we see today is that the epidemic is becoming the new terrain of politics, the battleground of a global civil war — because a civil war is a war against an internal enemy, one which lives inside of ourselves.”&lt;/p&gt;
&lt;p&gt;And it goes on to say:&lt;/p&gt;
&lt;p&gt;“It is important to understand that biosecurity, both in its efficacy and in its pervasiveness, outdoes every form of governance that we have hitherto known. As we have been able to see in Italy — but not only here — as soon as a threat to health is declared, people unresistingly consent to limitations on their freedom that they would never have accepted in the past.”&lt;/p&gt;
&lt;p&gt;Well, that’s a pretty good articulation of what’s happened over the past couple of years.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://corbettreport.com/interview-1698-james-corbett-lays-out-the-biosecurity-agenda/&#34;&gt;James Corbett Lays Out the Biosecurity Agenda&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Not only we can be sure that these changes have disastrous consequences, but we can also be sure that this information is already leaking wherever possible. Both wearables and various online fitness services have had &lt;a href=&#34;https://www.scworld.com/analysis/unsecured-fitness-app-database-leaks-61m-records-highlights-health-app-privacy-risks&#34;&gt;massive data breaches&lt;/a&gt; in the recent past. Even when these services aren&amp;rsquo;t being outright breached, generous data sharing and selling will ensure that your information is not &amp;lsquo;siloed&amp;rsquo; within a single organization.&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s incredibly troubling to see prominent voices having financial ties to &amp;lsquo;solutions&amp;rsquo; that collect, and eventually give away sensitive health information. For a time, a huge amount of YouTube personalities were sponsored by BetterHealth, an online teletherapy service. It turned out that BetterHelp was &lt;a href=&#34;https://www.theverge.com/2023/3/2/23622227/betterhelp-customer-data-advertising-privacy-facebook-snapchat&#34;&gt;lying&lt;/a&gt; about it&amp;rsquo;s promise to not share customer sensitive data with Big Tech giants. This is an important reminder that we can&amp;rsquo;t take these companies privacy guarantees at face value.&lt;/p&gt;
&lt;h2 id=&#34;are-there-good-wearables&#34;&gt;Are there good wearables?&lt;/h2&gt;
&lt;p&gt;It&amp;rsquo;s certainly &lt;a href=&#34;https://www.welivesecurity.com/en/privacy/prescription-privacy-protection-exercise-caution-mobile-health-app/&#34;&gt;a minefield.&lt;/a&gt; Despite Mozilla&amp;rsquo;s &lt;a href=&#34;https://foundation.mozilla.org/en/privacynotincluded/garmin-vivoactive/&#34;&gt;glowing report&lt;/a&gt; on Garmin wearables, I&amp;rsquo;m not convinced there are enough acceptable options in the space. The most convenient option for many will be either the &lt;a href=&#34;https://foundation.mozilla.org/en/privacynotincluded/google-pixel-watch/&#34;&gt;Google&lt;/a&gt; or &lt;a href=&#34;https://foundation.mozilla.org/en/privacynotincluded/apple-watch/&#34;&gt;Apple&lt;/a&gt; variant based on their smartphone of choice. The apps built around these watches all inherently make you more reliant on their services, undermining your ability to keep your information private. If you&amp;rsquo;ve made the (laudible) effort of &amp;ldquo;de-googling&amp;rdquo; your phone, a smart watch will likely claw back some of the progress made. Even if you do find a decently secure and private choice, other health apps can &lt;a href=&#34;https://globalnews.ca/news/4249893/pumpup-security-breach-fitness-app/&#34;&gt;be their own problem.&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;what-i-would-like-to-see-in-a-smart-watch&#34;&gt;What I would like to see in a smart watch&lt;/h3&gt;
&lt;p&gt;I don&amp;rsquo;t think it&amp;rsquo;s impossible for a company to build a privacy-friendly wearable. In fact, &lt;a href=&#34;https://github.com/jakkra/ZSWatch&#34;&gt;ZSWatch&lt;/a&gt; is a model project to consider. It&amp;rsquo;s a Free and Open Source hardware &amp;amp; software solution. Using a powerful app &lt;a href=&#34;https://gadgetbridge.org/&#34;&gt;Gadgetbridge&lt;/a&gt; to put you in charge of your own information. There&amp;rsquo;s a great deal of opportunity in designing a health monitor that doesn&amp;rsquo;t sacrifice on privacy and autonomy. If you&amp;rsquo;re interested in building these kinds of products, here&amp;rsquo;s my wishlist:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Highly Repairable&lt;/li&gt;
&lt;li&gt;Waterproof (I like to swim!)&lt;/li&gt;
&lt;li&gt;Replacable straps&lt;/li&gt;
&lt;li&gt;No Smartphone/app required&lt;/li&gt;
&lt;li&gt;All the basic metrics:
&lt;ul&gt;
&lt;li&gt;Sleep&lt;/li&gt;
&lt;li&gt;Steps&lt;/li&gt;
&lt;li&gt;Heart rate&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Workout tracking&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Optional&lt;/em&gt; personal server (appication) that can be run for those who want real-time metrics available.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Optional&lt;/em&gt; User-friendly software for updating firmware and making changes&lt;/li&gt;
&lt;li&gt;Direct data export &amp;amp; backup/import&lt;/li&gt;
&lt;li&gt;Robust support for simple applications being built by users&lt;/li&gt;
&lt;li&gt;Notifications/Interactions for phones&lt;/li&gt;
&lt;li&gt;Compatible with &lt;a href=&#34;https://kdeconnect.kde.org/&#34;&gt;KDE Connect&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Works as a FIDO2 key / additional storage.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;thinking-differently&#34;&gt;Thinking differently&lt;/h3&gt;
&lt;p&gt;There are definitely still some &amp;ldquo;app free&amp;rdquo; pedometers available. I would encourage you to focus on the healthy habits rather than particular technologies. The most powerful tool you&amp;rsquo;ll ever have for improving your health is your own mind. Taking your own notes, recording your progress in a workbook can help a great deal. My hope is that you walk away reading this not only cautious about many of these wearables, but more importantly confident you can make changes in your life without them. All the value of these tools only matters if they genuinely improve your life, which is something you have the power to do without them. Having more in-depth information helps, but there&amp;rsquo;s a great deal that can be done on your own.&lt;/p&gt;
&lt;p&gt;The book &lt;em&gt;Good Energy&lt;/em&gt; by Casey Means is still an excellent guide for taking control of your health, even if you pass on the wearables recommendation. Having already made many of the changes suggested in the book myself (even prior to reading it) I&amp;rsquo;ve noticed a radical change in my quality of life. You will still get a great deal out of taking charge of your lifestyle without making yourself dependent on these online services. I can certainly understand circumstances where it may feel like a decent trade-off regardless. In that instance, I would just remind you that you&amp;rsquo;re not forever dependent. Once you&amp;rsquo;ve built the habits, you&amp;rsquo;re always free to continue your journey without the wearables.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Teachable Moment: Bitcoin can survive everything... except World War 3</title>
		<link>https://libresolutions.network/articles/teachable-bitcoin/</link>
		<pubDate>Wed, 18 Dec 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/teachable-bitcoin/</guid>
		
		<image>https://libresolutions.network//media/stock/bitcoin.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/stock/bitcoin.webp" />
		<itunes:image href="https://libresolutions.network//media/stock/bitcoin.webp" />
		<description>Raising the bar in cryptocurrency discussions.</description>
		<content:encoded>&lt;p&gt;I stumbled on a shocking piece making the rounds on social media. It&amp;rsquo;s a fascinating example of how hype or doom can be manufactured so quickly over such a fundamental misunderstanding (or deception). The article was a piece in Fortune titled &lt;a href=&#34;https://fortune.com/2024/12/17/bitcoin-downtime-update-quantum-computing-attack-study/&#34;&gt;&amp;quot;&lt;em&gt;Bitcoin would need over 300 days of downtime to adequately defend itself from the ‘imminent’ threat of quantum computing, research finds&amp;quot;&lt;/em&gt;.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Here is the offending paragraph:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;A study from the University of Kent’s School of Computing calculated that if Bitcoin were to try to effectively protect itself from the threat quantum computing poses, it would take a protocol update that would take the cryptocurrency offline for 76 days. More realistically, the study calculated, &lt;strong&gt;Bitcoin would instead designate 25% of its server to a protocol update and allow its users to continue to mine and trade at a slower rate.&lt;/strong&gt; But in that scenario, the downtime would take about 305 days. That’s 10 full months.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;em&gt;Please point to me where the Bitcoin server is, Fortune.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;I was immediately perplexed about this article because anyone who spent time following &lt;a href=&#34;https://scribe.rip/@lorenzoprotocol/what-was-the-bitcoin-block-size-war-f17cff7af502&#34;&gt;the blocksize war&lt;/a&gt; in Bitcoin would know that upgrades happen without downtime. I was even more surprised to read the linked &lt;a href=&#34;https://arxiv.org/html/2410.16965v1&#34;&gt;paper&lt;/a&gt; from the Kent’s School of Computing, which also seemed to have this knowledge gap.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Proverbially, this is easier said than done. Any upgrade to a current-day cryptosystem to make it quantum-secure comes with an all-but inevitable downtime.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;It&amp;rsquo;s funny how this line in the paper doesn&amp;rsquo;t have a citation. I genuinely have no idea why the authors of the paper put this in writing. The only scenario I can imagine this being plausible is if a powerful entity had kept an advanced protype quantum computer secret and their first observable act was to take on Bitcoin. Is it possible, sure&amp;hellip;&lt;/p&gt;
&lt;p&gt;But not only is this not particularly likely, but there would most definitely be other signs on the way. In that scenario, Bitcoin is already toast, as the trust in the system will be gone entirely and it would be pointless to even attempt such an upgrade. There are many other scenarios where the Bitcoin network has time to upgrade. None of these scenarios involve downtime. The truth of the matter is that this paper fundamentally misunderstands how decentralized networks operate, which makes me have serious questions about the state of academia.&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;ve been meaning to follow-up on the &lt;a href=&#34;https://www.campfire.wiki/doku.php?id=bitcoin:bitcoin_education_guide&#34;&gt;Bitcoin&lt;/a&gt; conversation I had the pleasure of participating in on &lt;a href=&#34;https://geopoliticsandempire.com/2024/11/15/bitcoin-tulip-gold/&#34;&gt;Geopolitics &amp;amp; Empire.&lt;/a&gt; Not only has it sparked many intense debates within my friends and associates, but there&amp;rsquo;s also been a much wider discussion on Bitcoin&amp;rsquo;s role in shaping the future of the US dollar and even digital currency systems. I believe there are some fundamental pieces of information that should be wider understood as this conversation progresses. It is clear, that there is a significant hunger for a deeper understanding on this topic.&lt;/p&gt;
&lt;h2 id=&#34;the-basics&#34;&gt;The basics&lt;/h2&gt;
&lt;h3 id=&#34;quantum-computing-hype&#34;&gt;Quantum computing hype&lt;/h3&gt;
&lt;p&gt;Google&amp;rsquo;s new Quantum Chip &amp;lsquo;Willow&amp;rsquo; has &lt;a href=&#34;https://blog.google/technology/research/google-willow-quantum-chip/&#34;&gt;reached a new milestone&lt;/a&gt; of cracking a key challenge in a tiny fraction of the time it would take an ordinary machine. This is due the fact that quantum computers process information in a much different way than classical computers do. The idea is that &lt;a href=&#34;https://www.ibm.com/topics/quantum-computing&#34;&gt;these differences&lt;/a&gt; can potentially find answers to hard-to-compute problems. Of course, these differences have profound security implications.&lt;/p&gt;
&lt;h3 id=&#34;encryption-apocalypse&#34;&gt;Encryption apocalypse&lt;/h3&gt;
&lt;p&gt;Encryption uses math to protect information. To the degree quantum computers are vastly more powerful at the kinds of math used to protect information, they can be much more capable at reversing that math. In theory, this could be used to break many forms of encryption used today in online banking, websites, and even Bitcoin. As such powerful forces across the world are not only racing for &lt;a href=&#34;https://www.techtarget.com/searchsecurity/definition/quantum-supremacy&#34;&gt;Quantum Supremacy,&lt;/a&gt; and having the most quantum computing power, but also for having the strongest &lt;a href=&#34;https://www.nist.gov/cybersecurity/what-post-quantum-cryptography&#34;&gt;post-quantum cryptography,&lt;/a&gt; to protect their secrets.&lt;/p&gt;
&lt;p&gt;This has profound impacts for cryptocurrencies, which all function due to cryptographic math. If quantum computers to become practical to use for breaking all kinds of cryptographic functions, than only &amp;ldquo;post-quantum&amp;rdquo; cryptocurrency projects will be able to withstand the onslaught. Of course this is not unique to cryptocurrency. Governments across the world have been collecting people&amp;rsquo;s communications on a &lt;a href=&#34;https://www.keyfactor.com/blog/harvest-now-decrypt-later-a-new-form-of-attack/&#34;&gt;&amp;ldquo;harvest now, decrypt later&amp;rdquo;&lt;/a&gt; basis that will absolutely give those interested in historical mass surveillance an unprecedented insight into people&amp;rsquo;s lives.&lt;/p&gt;
&lt;p&gt;To make matters worse, all digital communications and security would be impacted in this scenario. A nation or corporation using such computing power for their own interests would effectively have the ability to read any intercepted communications. Online finance, and other institutions already &lt;a href=&#34;https://www.whitehouse.gov/wp-content/uploads/2024/07/REF_PQC-Report_FINAL_Send.pdf&#34;&gt;have to solve these problems,&lt;/a&gt; just differently than cryptocurrencies.&lt;/p&gt;
&lt;h3 id=&#34;a-bitcoin-post-quantum-upgrade&#34;&gt;A Bitcoin post-quantum upgrade&lt;/h3&gt;
&lt;p&gt;The punchline is that Bitcoin could absolutely upgrade to post-quantum cryptography with zero downtime. The &lt;a href=&#34;https://arxiv.org/html/2410.16965v1&#34;&gt;paper,&lt;/a&gt; and the article(s) written about it are fundamentally misunderstanding how upgrades work in a decentralized network. Unlike centralized services, where the service provider can use a load-balancer to seamlessly migrate users to an upgraded system, decentralized networks have to handle things differently. The benefit of a decentralized protocol is that no single entity can shut down, disrupt, or modify the network, the idea of &amp;ldquo;downtime&amp;rdquo; for upgrades makes little sense.&lt;/p&gt;
&lt;p&gt;Bitcoin, and every other blockchain based system has an advantage. Every block is an approximate for time and can be programmatically used to trigger certain events. Here&amp;rsquo;s a step-by-step walk-through of how a post-quantum upgrade of the Bitcoin network would work:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;The developers would agree on one of likely many solutions to migrate Bitcoin&amp;rsquo;s addresses, and security to new post-quantum cryptography.&lt;/li&gt;
&lt;li&gt;The ecosystem developers would then modify their Bitcoin software to &amp;ldquo;switch over&amp;rdquo; to the new cryptography after a certain time, defined by a specific block in Bitcoin&amp;rsquo;s blockchain.&lt;/li&gt;
&lt;li&gt;Operators would then on their own time, without any downtime to the wider network, upgrade their software.&lt;/li&gt;
&lt;li&gt;Eventually, once time passes to reach the selected block in the blockchain, everything running on the Bitcoin network switches over to the new cryptography and continues running as normal.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;em&gt;But it can&amp;rsquo;t be that easy right?&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Here&amp;rsquo;s the rub, that&amp;rsquo;s a possible, but simplified &amp;amp; idealistic scenario. At minimum, you&amp;rsquo;d want to not hinge all the massive changes on a single hard fork. It presumes that all participants are enthusiastically pleased with the desired solution. In the past, controversial changes to the Bitcoin network have torn the community apart. But why would anyone reject this upgrade? Surely everyone in Bitcoin wants to have quantum-safe Bitcoin?&lt;/p&gt;
&lt;p&gt;Imagine a hypothetical scenario where there is not one single post-quantum cryptography solution, but a variety. Instead of everyone making the choice between making the upgrade or not, maybe there are multiple competing proposals. Consider that the technical details, may be relatively minor, but we&amp;rsquo;ve already seen how social media can be weaponized to turn minor misunderstanding into horror and rage. With many competing scenarios, even assuming them all to be genuine finding &lt;em&gt;consensus&lt;/em&gt; on the solution long-term is a non-trivial task.&lt;/p&gt;
&lt;p&gt;These different directions would likely be not only incompatible with each other, but by design they would all have to be incompatible with the way Bitcoin has run since its inception. This means that the post-quantum upgrade to Bitcoin must be a &lt;a href=&#34;https://youtu.be/XCo6yyutYAM&#34;&gt;hard fork,&lt;/a&gt; any software not applying the upgrade will effectively be running a completely different system.&lt;/p&gt;
&lt;p&gt;Given how the Bitcoin community has handled scaling &amp;amp; &lt;a href=&#34;https://videos.lukesmith.xyz/videos/watch/6bae169d-abec-40f5-95dc-8a2c5687d767&#34;&gt;privacy,&lt;/a&gt; I am pessimistic that they could actually perform a migration to post-quantum cryptography. This is not the same as saying that it&amp;rsquo;s impossible. Given the amount of wealth in the Bitcoin ecosystem, I imagine there&amp;rsquo;s quite a bit of incentive to get it right. But this highlights Bitcoin&amp;rsquo;s fundamental weakness, it will always be vulnerable to &lt;a href=&#34;https://www.bitchute.com/video/4GT3RKbwxDZh&#34;&gt;manipulation of people&lt;/a&gt; influential in the community.&lt;/p&gt;
&lt;p&gt;The mere idea of post-quantum Bitcoin splitting into a couple or several different parallel hard-forks would be absolutely disastrous for the long-term health of the project. On the other hand it&amp;rsquo;s possible that entities interested in resolving problems in Bitcoin could take advantage of the hard fork opportunity to correct other problems as well. In that scenario you would likely see different post-quantum Bitcoin networks diverge into entirely different projects, which could be a great thing in the long run. Bitcoin successfully migrating to post-quantum encryption would be a historic accomplishment that would be very difficult to overstate. If the Bitcoin community successfully completes a post-quantum upgrade hard-fork I will certainly be recanting some of my harsher words regarding how I see the community &amp;hellip;but I won&amp;rsquo;t be holding my breath.&lt;/p&gt;
&lt;h2 id=&#34;but-what-is-the-real-bitcoin-killer&#34;&gt;But what is the real Bitcoin killer?&lt;/h2&gt;
&lt;p&gt;The ongoing discussion around Bitcoin and its future is lacking some very important wider context. It is my personal belief that the major powers in the world are preparing (but not yet initiating) a global-scale World War 3. Bitcoin &amp;lsquo;maximalists&amp;rsquo; would argue that this can potentially be avoided if countries can replace brutal and bloody wars with &lt;a href=&#34;https://archive.org/details/softwar-theory/page/15/mode/2up&#34;&gt;softwar.&lt;/a&gt; The simplest argument for this idea is that if entities can become more wealthy peacefully enriching themselves off Bitcoin, why would they commit acts of aggression to get less?&lt;/p&gt;
&lt;p&gt;I believe that only analyzing human warfare at the economic level is reductive. One could ask, &amp;ldquo;If Bitcoin hasn&amp;rsquo;t stopped any wars yet, when will it start stopping wars?&amp;rdquo; If not at 100K USD, will it need to reach 1M USD? How about 1 Billion USD? I&amp;rsquo;m sure many would consider outright astronomical numbers a bargain to end wars forever, but wars may yet come. When wars get hot, many things quickly get pushed off the table. A scenario where World War 3 escalates despite Bitcoin is one where its utility is drastically limited.&lt;/p&gt;
&lt;p&gt;Bitcoin (and every other cryptocurrency) inherits circumstances downstream of our technological landscape. No matter how well designed and robust the Bitcoin network can be, there are fundamental realities that it relies on and must contend with. In an open warfare scenario, not only is energy likely to be rationed away from independent operations, but computing power is already aggregated into clusters. This means that while the network itself may be able to operate in the most dire of circumstances, access can certainly be restricted and manipulated by strong forces in wartime. To the degree Bitcoin can be a threat to opposing powers, it can also be a target.&lt;/p&gt;
&lt;p&gt;Regardless of what the future holds, it is crucial that we consider the fundamentals of our technological landscape. Cyberspace itself must have fertile ground for supporting peaceful innovation, lest we surrender it all to the Military Industrial Complex. Bitcoin &lt;em&gt;and many other great and useful technologies,&lt;/em&gt; serve effectively no purpose if digital freedom as we know it is extinguished by warmongers. It matters not where you fall on Bitcoin being benevolent or malevolent, it is time to ask what is the future of cyberspace and where does that put us?&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>The Cyberwar comes for thee: telecommunications companies breached</title>
		<link>https://libresolutions.network/articles/telecom-hack/</link>
		<pubDate>Fri, 06 Dec 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/telecom-hack/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/civilian-based-cyber-defense.ogg" />
			
		
		<image>https://libresolutions.network//media/stock/switchboard.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/stock/switchboard.webp" />
		<itunes:image href="https://libresolutions.network//media/stock/switchboard.webp" />
		<description>A vindication of civilian-based cyber defense</description>
		<content:encoded>&lt;p&gt;You can taste the palpable salty feeling from the US Federal Government having to tell citizens they should use &lt;a href=&#34;https://www.nbcnews.com/tech/security/us-officials-urge-americans-use-encrypted-apps-cyberattack-rcna182694&#34;&gt;encrypted communications.&lt;/a&gt; After ages of fighting citizen&amp;rsquo;s right to private communications from the very beginning, it seems that desperate measures must be taken to prevent foreign adversaries from having access to sensitive information. This is a radical departure from the top-down message of &amp;ldquo;&lt;em&gt;nothing to hide, nothing to fear.&lt;/em&gt;&amp;rdquo;&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/memes/telecom-hack.webp&#39; 
&gt;



&lt;/div&gt;

&lt;h2 id=&#34;telecommunications-breach&#34;&gt;Telecommunications Breach&lt;/h2&gt;
&lt;p&gt;Since 2022, a hacking group presumably linked to the Chinese government categorized as &lt;a href=&#34;https://theconversation.com/what-is-salt-typhoon-a-security-expert-explains-the-chinese-hackers-and-their-attack-on-us-telecommunications-networks-244473&#34;&gt;&amp;ldquo;Salt Typhoon&amp;rdquo;&lt;/a&gt; have gained incredibly sensitive access to telecommunications infrastructure all over the &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/white-house-salt-typhoon-hacked-telcos-in-dozens-of-countries/&#34;&gt;world.&lt;/a&gt; This has recently escalated, to there being evidence of targeted spying on both 2024 presidential candidates.&lt;/p&gt;
&lt;p&gt;What&amp;rsquo;s most troubling about this breach, is that it also included the &amp;ldquo;lawful access&amp;rdquo; &lt;a href=&#34;https://www.politico.com/news/2024/11/13/china-hackers-wiretap-data-telcos-00189445&#34;&gt;backdoor wiretaps.&lt;/a&gt; So not only are everyone&amp;rsquo;s sensitive communications vulnerable in specific contexts, but also by anyone with the capabilities of leveraging Salt Typhoon&amp;rsquo;s intrusion. Currently, there is &lt;a href=&#34;https://www.washingtonpost.com/technology/2024/12/03/china-hack-salt-typhoon-telecom/&#34;&gt;no announced timeline&lt;/a&gt; for this being addressed. There&amp;rsquo;s not a whole lot of reason to be optimistic. Last month, a &lt;a href=&#34;https://youtu.be/HyNcrdxI9ZU&#34;&gt;Senate Judiciary Committee&lt;/a&gt; discussed just how logistically challenging it is to address this issue.&lt;/p&gt;
&lt;h2 id=&#34;never-let-a-crisis-go-to-waste&#34;&gt;&lt;em&gt;Never Let A Crisis Go To Waste&lt;/em&gt;&lt;/h2&gt;
&lt;p&gt;Naturally this kind of disaster is a great pretext for governments to push sweeping changes in impacted industries. At minimum, we can expect massive changes to be driven in cybersecurity, telecommunications, and hardware manufacturers. While many of these changes are long overdue, with security professionals rejoicing, others are not so benign.&lt;/p&gt;
&lt;p&gt;This massive breach itself can be used as a rallying cry to consolidate control over digital products, companies, and even entire digital ecosystems. As the cyber security industry has advanced, the line between &amp;ldquo;cyber&amp;rdquo; and human problems becomes quite blurry. Serious concerns, like &lt;a href=&#34;https://freedomhouse.org/sites/default/files/2023-04/FH_TransnationalRepression2023_0.pdf&#34;&gt;transnational repression&lt;/a&gt; can potentially be weaponized against subsets of the population. What&amp;rsquo;s more is that almost any aspect of what people currently take for granted as &amp;ldquo;digital freedom&amp;rdquo; can evaporate away as &amp;rsquo;national security&amp;rsquo; interests take priority.&lt;/p&gt;
&lt;p&gt;I am not so naive to believe this is the long-overdue wake-up-call to governments that their citizen&amp;rsquo;s security matters. If anything, this is a rallying cry for control freaks to demand more top-down micromanagement of all things technological. Instead of working on strategies from the ground up to create a truly resilient and secure digital landscape, these concerns will be leveraged to seize even more control over the World Wide Web. We have the opportunity to push for a different direction, but time is vanishingly short.&lt;/p&gt;
&lt;h2 id=&#34;re-introducing-civilian-based-cyber-defense&#34;&gt;Re-Introducing Civilian-based Cyber Defense&lt;/h2&gt;
&lt;p&gt;Originally, I introduced the idea in &lt;a href=&#34;https://libresolutions.network/articles/policy-framework/&#34;&gt;Good Governance in Cyberspace: Digital Freedom Policy Framework&lt;/a&gt; for Policies for the People. The idea is inspired by the idea of &lt;a href=&#34;https://www.nonviolent-conflict.org/wp-content/uploads/2016/02/Civilian-Based-Defense-English.pdf&#34;&gt;Civilian-Based Defense,&lt;/a&gt; which is a fascinating model for society-wide resilience and freedom. Bringing civilian-based defense to cyberspace is likely to be much more effective than any top-down approach and can radically transform our digital landscape for the better.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;The Structural Basis of Freedom&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When power is effectively diffused throughout the society among strong loci, the rulers&amp;rsquo; power is most likely subjected to controls and limits, thus enabling the society to resist oppression, usurpation, and aggression. This condition is associated with political &amp;ldquo;freedom&amp;rdquo; When, on the other hand, such loci have been seriously weakened or their independence of action has been destroyed, when the subjects are all equally impotent and the society&amp;rsquo;s power has become highly centralized, then the rulers&amp;rsquo; power will most likely be uncontrolled. This condition is associated with &amp;ldquo;tyranny.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;It is no accident that past totalitarian systems have attempted either to eliminate all independent groups or to subject them to full control by the party or state. Ultimately therefore, freedom is not something that rulers &amp;ldquo;give&amp;rdquo; their subjects. Nor, in the long run, do the formal institutional structures and procedures of the government (as, for example, may be laid out in the constitution) by themselves determine the degree of freedom or the limits of the rulers&amp;rsquo; power.&lt;/p&gt;
&lt;p&gt;A society may in fact be more free or more oppressed than the formal  constitutional or legal arrangements would indicate. Instead, the extent and intensity of the rulers&amp;rsquo; power and the actual degree of freedom of the society will be set by the strength of the subjects and the condition of: the institutions of the whole society. The rulers&amp;rsquo; power and the degree of the society&amp;rsquo;s freedom may in turn, be expanded or contracted by the interplay between the actions of the rulers and those of the subjects: some rulers may choose not to be as oppressive as the structural condition permits, and other rulers may receive more support than the structural condition requires, making them more powerful.&lt;/p&gt;
&lt;p&gt;Increases in the rulers&amp;rsquo; power are directly or indirectly determined, on the one hand, by the willingness of the subjects to accept the rulers, to obey to cooperate and to carry out their orders and wishes. On the other hand, reductions in the rulers&amp;rsquo; power are determined by the subjects&amp;rsquo; unwillingness to accept the rulers, coupled with their ability to disobey, to withhold  cooperation, to defy orders, and to refuse demands made upon them.&lt;/p&gt;
&lt;p&gt;The degree of liberty or tyranny in any political society is, it follows, largely a reflection of the relative determination of the subjects to be free, of their willingness and ability to organize themselves to live in freedom and, very importantly, their ability to resist any efforts to dominate or enslave them. In other words, the population can use the society itself as the means to establish and defend its freedom. Social power, not technological means of destruction, is the strongest guarantor of human freedom.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://www.nonviolent-conflict.org/wp-content/uploads/2016/02/Civilian-Based-Defense-English.pdf&#34;&gt;Civilian-based Defense - A Post-Military Weapons System: Page 32&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;This maps directly onto our digital experience. The &lt;a href=&#34;https://fsf.org&#34;&gt;Free Software movement&lt;/a&gt; has demonstrated the incredible potential of building solutions that put power in the hands of the user. By building verifiable, open and transparent systems more people can collaborate to innovate on genuine solutions to pressing problems. The Open Source model of development has been so powerful that even &lt;a href=&#34;https://opensource.org/sponsors&#34;&gt;giant mega-corporations&lt;/a&gt; have adopted it (&lt;em&gt;in part or in full&lt;/em&gt;) for their needs. True digital decentralization requires a hard look at how our devices are manufactured, built, and repaired. The entire &amp;ldquo;lifecycle&amp;rdquo; of the devices we use is filled with opportunities for genuine advancement.&lt;/p&gt;
&lt;p&gt;Devices and software built with this in consideration can radically lower the &amp;ldquo;technical knowledge&amp;rdquo; barrier required for everyone to comfortably navigate. Many of our current challenges are precisely caused by the present condition of so much consolidated control over digital technology. I would encourage the future cyber rebels in our midst to consider building for the future we all want. Instead of corporate or state requirements driving innovation in this space, people can take on the challenge of learning to construct within new paradigms and discover novel approaches. The beauty of programmable circuits is that their potential is very often more constrained by our imagination than physics.&lt;/p&gt;
&lt;p&gt;Everyone needs to consider who we are empowering when we allow nations to seize control over the digital landscape in the name of keeping us safe. Are we truly protecting ourselves from digital threats when we accept governments and corporations dictating our digital futures to us? If we do accept ceding more and more control in the name of safety, how can that control inevitably be abused? What should we focus on when it seems that our entire future is highly intertwined with present changes in the digital landscape?&lt;/p&gt;
&lt;p&gt;I ask these questions aloud because there are no simple answers, only urgent lines of inquiry. More study, less complacency is the way out of digital totalitarianism. More passion, less apathy is what we need to truly push back against nefarious forces. I&amp;rsquo;m convinced that the public does have the qualities to build a much better technological future, all that&amp;rsquo;s required is some effort and creativity. In these times, this can&amp;rsquo;t be more urgent. If we desire strong freedoms within and without our societies, a much stronger emphasis on bottom-up problem-solving is required. The nature of cyberwarfare is that there aren&amp;rsquo;t really battle lines, merely troubles that come for us all, in one form or another. Governments and corporations will take care of themselves, but who&amp;rsquo;s thinking about everyday people?&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Teachable Moment: GrapheneOS DESTROYS Unplugged</title>
		<link>https://libresolutions.network/articles/teachable-phones/</link>
		<pubDate>Fri, 29 Nov 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/teachable-phones/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/grapheneos-unplugged.ogg" />
			
		
		<image>https://libresolutions.network//media/images/grapheneos-unplugged.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/grapheneos-unplugged.webp" />
		<itunes:image href="https://libresolutions.network//media/images/grapheneos-unplugged.webp" />
		<description>Walking through the fine points of smartphone privacy &amp; security.</description>
		<content:encoded>
&lt;p&gt;GrapheneOS &lt;a href=&#34;https://x.com/GrapheneOS/status/1808159435245646046&#34;&gt;writes&lt;/a&gt; to Unplugged: (Emphasis mine)&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;No, you created it to make money. You do not believe in anything beyond making money. You&amp;rsquo;ve marketed your products with &lt;em&gt;highly inaccurate privacy and security claims including claiming it&amp;rsquo;s impenetrable.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;You are scamming people&lt;/strong&gt;, and spreading misinformation about an open source project further contributes to it.&lt;/p&gt;
&lt;p&gt;The past history of many of the people involved in your company didn&amp;rsquo;t get erased through creating a new one.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;You aren&amp;rsquo;t on the same side as us&lt;/strong&gt; and the deeper you dig, the more of a response there&amp;rsquo;s going to be from us. &lt;strong&gt;You are not our allies&lt;/strong&gt;, and you are &lt;em&gt;not bringing people privacy and security&lt;/em&gt;. &lt;strong&gt;You&amp;rsquo;re grifters&lt;/strong&gt;.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/grapheneos-unplugged-dunk.webp&#39; 
&gt;



&lt;/div&gt;
&lt;h2 id=&#34;what&#34;&gt;What?&lt;/h2&gt;
&lt;p&gt;Alright, let&amp;rsquo;s rewind a bit. &lt;a href=&#34;https://unplugged.com/&#34;&gt;GrapheneOS&lt;/a&gt; is an open source custom operating system for Android devices (in the Pixel line) that &amp;ldquo;de-googles&amp;rdquo; the device and provides a wide variety of security and privacy features. Unplugged is a &amp;ldquo;private smartphone&amp;rdquo; company founded by the &lt;a href=&#34;https://en.wikipedia.org/wiki/Erik_Prince&#34;&gt;Blackwater founder&lt;/a&gt; Erik Prince.&lt;/p&gt;
&lt;p&gt;The above exchange began when Pierre Chang on X asked Unplugged what makes their phone more secure than GrapheneOS, tagging them.&lt;/p&gt;
&lt;p&gt;GrapheneOS then &lt;a href=&#34;https://x.com/GrapheneOS/status/1804551479484645421&#34;&gt;replied&lt;/a&gt; with:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Where do they make any claim about GrapheneOS?&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s an ARMv8.2 MediaTek Dimensity 1200 SoC device running a non-hardened fork of the Android Open Source Project. The hardware/firmware doesn&amp;rsquo;t come close to meeting our security requirements, and it&amp;rsquo;s not a hardened OS.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;To translate this a bit. Android Open Source Project (AOSP) is the base foundation that all android-based systems are built on top of. It initially doesn&amp;rsquo;t include Google and other bloatware, but vendors tend to add that on. As GrapheneOS states, hardware and firmware matter a great deal when it comes to security, so getting it right is important. They also claim that the Unplugged phone&amp;rsquo;s operating system LibertOS isn&amp;rsquo;t hardened. In this context hardened means making specific modifications to improve security.&lt;/p&gt;
&lt;p&gt;What&amp;rsquo;s interesting to note is that in this exchange, Unplugged doesn&amp;rsquo;t attack GrapheneOS in their weakest point: dependence on Google manufactured hardware. It&amp;rsquo;s possible that they don&amp;rsquo;t do this because they don&amp;rsquo;t want people taking too close a look at their own hardware choices.&lt;/p&gt;
&lt;p&gt;They get close in this exchange where GrapheneOS &lt;a href=&#34;https://x.com/GrapheneOS/status/1804634097442324989&#34;&gt;replies&lt;/a&gt; to Unplugged defending their firmware.&lt;/p&gt;
&lt;blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;When using GrapheneOS (or any other custom ROM), Google driver binaries are required, but Google does not provide any commitments regarding data collection or privacy in this code.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;This claim about data collection / privacy for the firmware or drivers isn&amp;rsquo;t accurate. Additionally, you use a MediaTek SoC device with proprietary MediaTek firmware and drivers, and they aren&amp;rsquo;t known for having good security. The hardware, firmware and driver security of the devices we&amp;rsquo;re supporting is much better, not worse as you&amp;rsquo;re making it seem.&lt;/p&gt;
&lt;p&gt;As a side note, GrapheneOS is an operating system. The term ROM isn&amp;rsquo;t accurate and we don&amp;rsquo;t want it to be referred to as such. It&amp;rsquo;s a fork of the Android Open Source Project like the stock OS on any Android device.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Unplugged makes the argument that their product is important because the GrapheneOS &lt;a href=&#34;https://grapheneos.org/install/web&#34;&gt;web installer&lt;/a&gt; is too difficult for much of the general population. You can watch &lt;a href=&#34;https://youtu.be/L1KZWjZVnAw&#34;&gt;Mental Outlaw demonstrate&lt;/a&gt; the process and judge for yourself. Regardless of the overall difficulty, would it not be better to have a trusted friend or relative give you assistance rather than settle for a potentially inferior product? In fact if one wants the privacy and security guarantees of GrapheneOS, you can always buy a pre-flashed version from a provider like &lt;a href=&#34;https://abovephone.com/&#34;&gt;Above Phone&lt;/a&gt; &amp;hellip;but that does require putting trust in that provider.&lt;/p&gt;
&lt;p&gt;Back in July in response to a podcast, &lt;a href=&#34;https://x.com/GrapheneOS/status/1816539910620479802&#34;&gt;GrapheneOS wrote:&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Unplugged has simply doubled down on false claims about GrapheneOS security, pretending people cannot buy devices with GrapheneOS installed and pretending it&amp;rsquo;s hard to install along with promoting their blatantly insecure products with false marketing.&lt;/p&gt;
&lt;p&gt;&amp;hellip;&lt;/p&gt;
&lt;p&gt;They keep pushing the false claim that Pixels supporting using another OS makes them less secure. The reality is that it&amp;rsquo;s properly implemented in a secure way without adding any significant attack surface. The bottom of the barrel MediaTek Unplugged devices have awful security.&lt;/p&gt;
&lt;p&gt;They still haven&amp;rsquo;t ported to the initial release of Android 14 with Android 15 right around the corner. This means they&amp;rsquo;re missing at least around a year of Moderate severity privacy/security patches and huge privacy/security improvements from the past year of Android releases.&lt;/p&gt;
&lt;p&gt;Unplugged is using an SoC from MediaTek, a company known to have poor security practices, which fares poorly against real attackers and which has a history of &lt;em&gt;repeatedly shipping actual backdoors.&lt;/em&gt; They&amp;rsquo;re trying to portray that as more trustworthy and more secure hardware. Nope.&lt;/p&gt;
&lt;p&gt;Unplugged was founded by Erik Prince, noted war criminal and illegal arms dealer. They make a point in talking about the involvement of their employees in enabling &lt;a href=&#34;https://citizenlab.ca/2022/04/catalangate-extensive-mercenary-spyware-operation-against-catalans-using-pegasus-candiru/&#34;&gt;these kinds of operations&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;That doesn&amp;rsquo;t imply competence, but explains the lack of ethics.&lt;/p&gt;
&lt;p&gt;They&amp;rsquo;re trying to present themselves as if they were leaders in the field and switched sides, but they never were and simply want money.&lt;/p&gt;
&lt;p&gt;Unplugged is an &lt;strong&gt;affinity scam&lt;/strong&gt; in the same vein as the Freedom Phone. At least Freedom Phone doesn&amp;rsquo;t seem to try to harm open source projects.&lt;/p&gt;
&lt;p&gt;Unplugged has built their product out of open source projects, but without complying with the licenses from projects like DivestOS and while trying to harm open source. Claiming to be in the process of replacing some of the code they were caught stealing doesn&amp;rsquo;t change much&amp;hellip;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Now that&amp;rsquo;s the root of the teachable moment here. What is an &lt;a href=&#34;https://libresolutions.network/articles/redirecting-resistance/&#34;&gt;affinity scam?&lt;/a&gt; In short, it&amp;rsquo;s when people create a scheme to profit off values without actually &amp;ldquo;walking the walk&amp;rdquo;. At worst, it is a deliberate attack on a particular group of people that masquerades as &amp;ldquo;one of them&amp;rdquo;. It happens to all kinds of groups and movements, and the privacy and security space is no exception.&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s really worth asking why so many &lt;a href=&#34;https://libresolutions.network/articles/alt-tech/&#34;&gt;targeted operations&lt;/a&gt; end up having severe &lt;a href=&#34;https://www.dailydot.com/debug/andrew-tate-the-real-world-hack/&#34;&gt;data breaches.&lt;/a&gt; Is it really too crazy to believe that in this day and age, cyberwarfare is just part of politics? Even Exxon is being investigated for allegedly hiring hackers to go after &lt;a href=&#34;https://www.reuters.com/business/energy/exxon-lobbyist-investigated-over-hack-and-leak-environmentalist-emails-sources-2024-11-27/&#34;&gt;environmentalists.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;We are in serious trouble if we can expect huge amounts of money to go into undermining people&amp;rsquo;s security. At minimum, it means everyone has to be a lot more careful about recommendations from media figures and personalities. This is one of the major reasons I am in no rush to sell any products. I don&amp;rsquo;t inherently believe that commercial success is impossible while providing good security, but I consider that bar extremely high.&lt;/p&gt;
&lt;p&gt;This is largely because nothing exists in a vacuum. If one company does everything they can to be the best they can be, they can still lose. We don&amp;rsquo;t have a &amp;ldquo;perfect market&amp;rdquo; when it comes to digital security. Because a large portion of the public aren&amp;rsquo;t very knowledgeable about the issues, it creates opportunities for them to be taken advantage of. A company that spends a majority of it&amp;rsquo;s time buying PR and marketing will inherently out-compete one that actually invests in the technical merits, all else being equal. But all things aren&amp;rsquo;t equal, many institutions and private interests have a great deal to gain from undermining people&amp;rsquo;s security.&lt;/p&gt;
&lt;p&gt;This is why Free and Open Source Software (FOSS) is a pre-requisite for genuine advancements in privacy &amp;amp; security. By delivering solid software or hardware as a public good, it is much easier for more parties to test and validate any claims, especially security. Despite what many believe, refusing to compromise on Software &amp;amp; Hardware freedom doesn&amp;rsquo;t mean making money is impossible, it just means you have to take a radically different approach. My personal suspicion these days, is that the &amp;ldquo;Unix Philosophy&amp;rdquo; of &amp;ldquo;Do one thing, and do it well&amp;rdquo; can do a lot of good. Instead of single-handedly trying to completely transform the smartphone market all at once, maybe it&amp;rsquo;s better to focus on a single component and delivering it in a robust verifiable way.&lt;/p&gt;
&lt;p&gt;This ultimately brings me to my own objection to the Unplugged phone on a very conceptual level. They pre-load some interesting software options with the phone. With their own dedicated VPN/Messenger/Antivirus and Store apps, it really makes you wonder how much of your life you&amp;rsquo;re trusting to them. Are we supposed to believe that while using sub-standard hardware (according to GrapheneOS), they&amp;rsquo;ve managed to somehow deliver the best secure Messenger/VPN &amp;amp; antivirus without any problems whatsoever? Call me skeptical.&lt;/p&gt;
&lt;h2 id=&#34;can-smartphones-be-safe&#34;&gt;Can smartphones be safe?&lt;/h2&gt;
&lt;p&gt;There really does seem to be a pattern of inferior options being promoted by slick marketing and alternative media. Even the Brax2 phone &lt;a href=&#34;https://www.productreview.com.au/listings/brax2-privacy-phone&#34;&gt;was no exception.&lt;/a&gt; People want to believe there are simple ways to avoid all the pitfalls of our modern digital environment, but that&amp;rsquo;s not possible. Everything involves trade-offs or sacrifice when one is trying to make meaningful progress. When one doesn&amp;rsquo;t understand these trade-offs they can fall prey to outright deceptive claims and become ensnared in something far more malevolent than even the defaults.&lt;/p&gt;
&lt;p&gt;This is a big part of the reason &lt;a href=&#34;https://libresolutions.network/articles/why&#34;&gt;why&lt;/a&gt; this project is about trying to build understanding and context to these problems. Meaningful improvements are possible and within reach, they just require seriousness and dedication. One of the most important steps of all is building up more independent security research. This requires a great deal of funding, education, and promotion for those who either have the skills, or are able to learn them. Anything we can do to &lt;a href=&#34;https://libresolutions.network/operations/bankroll&#34;&gt;bankroll&lt;/a&gt; independent security research will go a long way to answering the questions we have about how to move forward.&lt;/p&gt;
&lt;h2 id=&#34;tldr&#34;&gt;TL:DR&lt;/h2&gt;
&lt;p&gt;I wouldn&amp;rsquo;t recommend buying the Unplugged phone and still see GrapheneOS as the gold-standard for smartphone security. It&amp;rsquo;s important to remember that a great deal of interests have sophisticated means and a huge desire to undermine your security. Tread lightly, and always double-check your assumptions.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>MAHA &amp; The Military - A Medical Freedom Roundtable</title>
		<link>https://libresolutions.network/videos/maha-military/</link>
		<pubDate>Tue, 26 Nov 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/maha-military/</guid>
		
		<image>https://libresolutions.network//media/images/maha-military.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/maha-military.webp" />
		<itunes:image href="https://libresolutions.network//media/images/maha-military.webp" />
		<description></description>
		<content:encoded>&lt;blockquote&gt;
&lt;p&gt;Make American Healthy Again (MAHA). It&amp;rsquo;s the slogan that brought together former adversaries Robert F. Kennedy Jr. and President Donald Trump under a unified vision of a happier, healthier tomorrow. But questions remain: where does MAHA fit into the second Trump administration, and among the competitive agendas of Kennedy&amp;rsquo;s newfound allies?&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;strong&gt;Teachers For Choice:&lt;/strong&gt; &lt;a href=&#34;https://teachersforchoice.org/&#34;&gt;https://teachersforchoice.org/&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;Liam Sturgess:&lt;/strong&gt; &lt;a href=&#34;https://www.liamsturgess.com/&#34;&gt;https://www.liamsturgess.com/&lt;/a&gt;&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Why Does Digital Freedom Matter?</title>
		<link>https://libresolutions.network/articles/why-freedom/</link>
		<pubDate>Tue, 26 Nov 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/why-freedom/</guid>
		
		<image>https://libresolutions.network//media/stock/laptop.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/stock/laptop.webp" />
		<itunes:image href="https://libresolutions.network//media/stock/laptop.webp" />
		<description>The reasons for realignment.</description>
		<content:encoded>&lt;h2 id=&#34;a-defense-of-lost-causes&#34;&gt;A defense of lost causes&lt;/h2&gt;
&lt;p&gt;A lot of the negative feedback I receive is not that digital freedom is undesirable, but generally that it&amp;rsquo;s impossible. Or at least, that it&amp;rsquo;s too difficult to be worth considering. In truth, these are very valid criticisms. At best, digital freedom is very far down the list of people&amp;rsquo;s pressing concerns of today. It is incredibly difficult to argue that a great deal of effort (and opportunity costs) needs to be taken on to radically reinvent our digital landscape. What could possibly justify the immense challenge on so many fronts just to begin making incremental change?&lt;/p&gt;
&lt;p&gt;The purpose of this project, is not to single-handedly succeed at resolving all the massive issues at play. It is plain to see that this is impossible. Instead it is to act as (one of many) guideposts for others to start forging a better path. We have a once-in-a-century opportunity to make an impact on the future of technology from the bottom-up. It is of utmost importance that we take the time to evaluate how to avoid the dire pitfalls and build a better future. This chance is worth seizing. It is highly unlikely that there will be an opportunity this good ever again if the present sentiments of defeatism and apathy take hold.&lt;/p&gt;
&lt;p&gt;Digital freedom is not the most important cause, but it has profound impacts on almost every other cause. As digital systems have infiltrated so many aspects of our lives, it&amp;rsquo;s important to consider how they can be used and abused.. Unless one decides to opt-out entirely, there will always be a degree of impact that must be understood to make optimal choices. A defeatist will tell you that these changes are inevitable and unavoidable. This is the wrong mindset because there are alternatives to an all-or-nothing approach.&lt;/p&gt;
&lt;p&gt;For the same reason a great deal of people won&amp;rsquo;t decide to forsake electricity entirely, there is a phenomenal amount of good that can come from adopting powerful tools. But for all the reasons people are becoming suspicious of corporate social media, we must be chiefly concerned with how these powerful systems can be weaponized against ourselves and others. The goal is not to fight change itself, but take an active role in participating in shaping that change. Because if we refuse to, we will entirely give up our digital sovereignty individually, and collectively&amp;hellip; and who knows what else.&lt;/p&gt;
&lt;h2 id=&#34;digital-consolidation-is-consolidation-of-everything-else&#34;&gt;Digital consolidation &lt;em&gt;is consolidation of everything else&lt;/em&gt;&lt;/h2&gt;
&lt;p&gt;One of the most underestimated forces in our day is how consolidated power in the technology space impacts almost every other issue. The most blatant example is the fact that when there are few viable online platforms, very little has to change for there to be rampant censorship and manipulation. In an environment with more competition and interoperability, there would be less problems and a better experience overall. As more and more people live a majority of their lives locked within corporate digital platforms, their options become drastically reduced.&lt;/p&gt;
&lt;p&gt;We are already seeing how digital platforms are themselves ushering in &lt;a href=&#34;https://archive.is/1ttmL&#34;&gt;Orwellian doublespeak,&lt;/a&gt; as remake new words to express things outside the automated censors. This effect is only going to have more profound impacts as we allow our entire digital landscape to be dictated by a handful of mega-corporations. Since digital platforms are already having a significant impact on culture, a powerful feedback loop is already in effect. The cultural changes from our digital decisions have impacts on our options to make change in the future. When we abandon the free and open web, in favor of a single corporate controlled &amp;ldquo;digital town square&amp;rdquo; we doom the future of free expression no matter who holds the reigns.&lt;/p&gt;
&lt;p&gt;This applies to hardware as well. How many people are constantly frustrated with how badly smartphones have impacted their lives, yet feel powerless to address it? This is beyond mere addiction. As society centers itself around technological assumptions, those assumptions become hard requirements very quickly. There is no reason to believe this will end with smartphones. If we do not take the time to radically reassert individual autonomy separate from technological choices, things can get grim as fast as you can say &lt;em&gt;&amp;lsquo;singularity&amp;rsquo;&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;This is the secret behind the true importance of fighting for digital liberty. Not only can we avoid future dangers, but we can also correct many serious problems in the present day. With a truly holistic and bottom-up approach for building a new digital foundation, fixing problems that seem impossible to resolve becomes much more viable. Suddenly issues such as e-waste, energy efficiency, and digital control are all much easier to tackle with pragmatic solutions. The opportunities are endless when it comes to taking the time to learn, create, and share not just alternatives &amp;hellip;but entirely new paradigms.&lt;/p&gt;
&lt;h2 id=&#34;crucial-objectives&#34;&gt;Crucial objectives&lt;/h2&gt;
&lt;p&gt;It&amp;rsquo;s all well and good to wish for a better future, but it needs to be defined. Clear parameters are required to identify current problems and plan new directions. The only constraints on our ability to create a free cyberspace are our collective drive and creativity. There are many levels of detail that can go into this, but it&amp;rsquo;s clear that the primary objectives should at least be: &lt;strong&gt;privacy,&lt;/strong&gt; &lt;strong&gt;security,&lt;/strong&gt; and &lt;strong&gt;autonomy.&lt;/strong&gt;&lt;/p&gt;
&lt;h3 id=&#34;privacy&#34;&gt;Privacy&lt;/h3&gt;
&lt;p&gt;Privacy is not hiding. It&amp;rsquo;s about informed choice over one&amp;rsquo;s information. Everyone deserves a surveillance-free digital experience to effectively accomplish what they need. Participation in society, or acquiring basic needs should not require one to give up their reasonable expectations of personal privacy. The severe disks of weaponizing personal information individually and at scale are only beginning to become more widely understood. It is a guarantee that there are far more disastrous and un-intuitive impacts that are yet to be discovered.&lt;/p&gt;
&lt;h3 id=&#34;security&#34;&gt;Security&lt;/h3&gt;
&lt;p&gt;Making compromises on security will always cause problems down the road. Having high standards for verifiable security is effectively the starting point of making any kind of guarantees at all. Reasonable precautions need to be taken to ensure systems function as expected. A strong security environment can be a powerful public good that can make cyberspace a great deal better than it currently can be.&lt;/p&gt;
&lt;h3 id=&#34;autonomy&#34;&gt;Autonomy&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://libresolutions.network/articles/digital-autonomy/&#34;&gt;Digital Autonomy&lt;/a&gt; is the cornerstone of a pro-human digital future. Devices and systems must work for their operators not against or on them. This requires radical transparency and deliberate decisions to avoid imposing artificial limitations or restrictions. By taking the &amp;ldquo;protocols not platforms&amp;rdquo; paradigm to the hardware level, people can more freely choose to use or refuse all kinds of options. Personal computing needs to become even more personal, not something imposed from outside forces.&lt;/p&gt;
&lt;h3 id=&#34;other-useful-considerations&#34;&gt;Other useful considerations&lt;/h3&gt;
&lt;p&gt;These really are just a starting point. Since the road is long it makes sense to consider other objectives as well. Elegance should be a priority to make systems maximally usable. Efficiency should be prized as it&amp;rsquo;s own end. Robustness can be a focus to enhance reliability. As you can see, even with all these factors there are boundless opportunities to learn and improve. The truth is that there is no finish line, it&amp;rsquo;s all about constantly refining things for the better.&lt;/p&gt;
&lt;h2 id=&#34;playing-the-long-game&#34;&gt;Playing the long game&lt;/h2&gt;
&lt;p&gt;At the simplest level, a radical shift in our cultural understanding and attitudes surrounding technology is a must. We can no longer afford to naively accept impositions from corporations or governments as if they have no consequences. Above all, education and outreach are essential to addressing this long campaign across time. Perfectionism should be a guiding star and not a obstacle to making change. People from all walks of live will have meaningful feedback on how things can be made better. The better we become at properly incorporating that feedback, the better our digital future will be.&lt;/p&gt;
&lt;p&gt;There are a wide variety of barriers to making this kind of radical change across time. It may sound entirely unreasonable economically. This challenge is something that needs to be confronted with sober ambition. Transforming the entire foundation of our digital experience will always take a great deal of time. Thankfully, there will be significant improvements along the way. Even moderate approaches towards this ideal can have phenomenal impact on people&amp;rsquo;s very lives. We must nurture the garden of cyberspace to flourish a bountiful fruits of innovation, lest we let it wither into a thorny maze of tyranny.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Geopolitics &amp; Empire: Bitcoin’s Rise &amp; Its Future Role…Tulip Mania or Digital Gold?</title>
		<link>https://libresolutions.network/videos/bitcoin/</link>
		<pubDate>Thu, 14 Nov 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/bitcoin/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/bitcoin.ogg" />
			
		
		<image>https://libresolutions.network//media/images/bitcoin-ge.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/bitcoin-ge.webp" />
		<itunes:image href="https://libresolutions.network//media/images/bitcoin-ge.webp" />
		<description>Digging deep into the questions, concerns, and aspirations within the Bitcoin community.</description>
		<content:encoded>&lt;p&gt;It was an honor and pleasure to dig deep into the Bitcoin discussion on &lt;a href=&#34;https://geopoliticsandempire.com/2024/11/15/bitcoin-tulip-gold/&#34;&gt;Geopolitics &amp;amp; Empire.&lt;/a&gt; &lt;a href=&#34;https://roundingtheearth.substack.com/&#34;&gt;Mathew Crawford&lt;/a&gt; brings a wealth of knowledge to the table to take it to the next level. I really enjoyed taking the topic to task with two brilliant friends.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Gabriel of Libre Solutions Network and Mathew Crawford discuss all things bitcoin and how it seems the plan was to have Trump installed and push crypto. They comment on the role of the U.S. military, influencers, BlackRock, the potential future role of bitcoin erasing U.S. debt and functioning as a banking currency, digital gold, tulip mania, viewing the technology as neutral, bitcoin&amp;rsquo;s future price, and more!&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h4 id=&#34;mathew-crawford&#34;&gt;Mathew Crawford&lt;/h4&gt;
&lt;p&gt;&lt;a href=&#34;https://x.com/EduEngineer&#34;&gt;Mathew Crawford&lt;/a&gt; is an Educator, Entrepreneur, Statistician, Finance Specialist, and Founder of &lt;a href=&#34;https://roundingtheearth.substack.com&#34;&gt;Rounding the Earth.&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;comments&#34;&gt;Comments:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://geopoliticsandempire.substack.com/p/gabe-lsn-and-mathew-crawford-bitcoins&#34;&gt;Substack&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://peertube.libresolutions.network/w/gkaw1gr1ra1iWXANt8E5c4&#34;&gt;Fediverse&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;You may also enjoy &lt;a href=&#34;https://libresolutions.network/tags/tnt-radio/&#34;&gt;previous conversations&lt;/a&gt; with Hrvoje from his &lt;a href=&#34;https://geopoliticsandempire.substack.com/s/hrvoje-moric-show-tnt-radio&#34;&gt;TNT Radio show.&lt;/a&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;Podcast intro music is from the song &amp;ldquo;The Queens Jig&amp;rdquo; by &amp;ldquo;Musicke &amp;amp; Mirth&amp;rdquo; from their album &amp;ldquo;Music for Two Lyra Viols&amp;rdquo;: &lt;a href=&#34;http://musicke-mirth.de/en/recordings.html&#34;&gt;http://musicke-mirth.de/en/recordings.html&lt;/a&gt; (available on iTunes or Amazon)&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Did You Enjoy Your Ephemeral Web Experience?</title>
		<link>https://libresolutions.network/articles/ephemeral-web/</link>
		<pubDate>Mon, 14 Oct 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/ephemeral-web/</guid>
		
		<image>https://libresolutions.network//media/stock/candle-smoke.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/stock/candle-smoke.webp" />
		<itunes:image href="https://libresolutions.network//media/stock/candle-smoke.webp" />
		<description>Consequences and considerations from the Internet Archive outage.</description>
		<content:encoded>&lt;p&gt;The &lt;a href=&#34;https://archive.org&#34;&gt;Internet Archive&lt;/a&gt; has been down since October 9th. As of morning eastern time, a provisional read-only version of the Wayback Machine is online.&lt;/p&gt;
&lt;p&gt;Initially when archive.org went down, there was a prompt displaying a message:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&amp;ldquo;Have you ever felt like the Internet Archive runs on sticks and is constantly on the verge of suffering a catastrophic security breach? It just happened. See 31 million of you on HIBP!&amp;rdquo;.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&amp;ldquo;HIBP&amp;rdquo; referring to the breach notification service &lt;a href=&#34;https://haveibeenpwned.com/&#34;&gt;&lt;em&gt;have i been pwned?&lt;/em&gt;&lt;/a&gt;, which is worth checking with any and all emails you happen to use. At the very least it&amp;rsquo;s worth making sure you&amp;rsquo;re not re-using any passwords from previous breaches.&lt;/p&gt;
&lt;p&gt;The outage itself meant that for many, we are already experiencing an &lt;em&gt;ephemeral  web&lt;/em&gt; where the current state is the only state. The old adage &amp;ldquo;&lt;em&gt;the Internet never forgets&lt;/em&gt;&amp;rdquo; relies on a variety of assumptions and compromises. The truth is, a great deal of information disappears from the web on a very regular basis. Projects terminate, companies rebrand and/or change, other sites just disappear without a trace. In the hope of preserving crucial information, various online archives have been used. It takes an immense amount of resources, allegedly 160 petabytes, of data to even attempt to store a record of the web&amp;rsquo;s state. This is something that very few can even consider taking on. This difficulty means that the web will always have ephemeral qualities to a degree, and we have to consider how best to navigate that environment.&lt;/p&gt;
&lt;h2 id=&#34;navigating-the-ephemeral-web&#34;&gt;Navigating The Ephemeral Web&lt;/h2&gt;
&lt;p&gt;Have you ever been in a chat room with disappearing messages? &lt;a href=&#34;https://www.youtube.com/watch?v=T32XfRSaC0w&#34;&gt;Maybe you should.&lt;/a&gt; The web as it exists is very similar to that. Every site and service changes over time. In some ways this may not necessarily be bad, not every byte of data on the web is inherently valuable or desirable. Some people may be relieved that their digital footprint fades over time. But there are serious and troubling concerns as well. As an information management system, the World Wide Web is arguably one of the &lt;em&gt;wonders of the world&lt;/em&gt;. Any decision to deliberately, destroy, conceal or manipulate critical information is itself a massive problem. Beyond mere entropy, there will always be concerted efforts to ensure that particular information is kept from being used to counter various interests.&lt;/p&gt;
&lt;p&gt;The deliberate removal of information online can be as simple as various platforms removing content from their site, it could be institutions breaking links to previously available reports and documents, or even destruction of entire sites. It takes a great deal of effort to preserve information across time. That effort isn&amp;rsquo;t to be taken for granted. Online information destruction certainly isn&amp;rsquo;t new, but there is a troubling, and accelerating trend. One of the more significant warnings is episode 384 of the Corbett Report&amp;rsquo;s podcast &lt;a href=&#34;https://corbettreport.com/episode-384-the-library-of-alexandria-is-on-fire/&#34;&gt;&lt;em&gt;The Library of Alexandria is on Fire&lt;/em&gt;&lt;/a&gt; where James Corbett gives some excellent advice regarding overcoming this problem:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Refuse cloud-confined devices&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The very beginning of preserving information is having the very storage devices under your own control.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Move away from controlled platforms&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Relying on online services to protect information is doomed in the long run.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Save EVERYTHING!&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;As far as your own information management is concerned: if it&amp;rsquo;s not on your own machine, it doesn&amp;rsquo;t exist.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;It&amp;rsquo;s worth reiterating that information management is its own (&lt;em&gt;very worthwhile!&lt;/em&gt;) skill. There&amp;rsquo;s a variety of things you&amp;rsquo;ll want to do on top of preserving information, but saving it is always the first step. Never feel bad merely saving information, but here&amp;rsquo;s some things worth considering after you have:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Indexing:&lt;/strong&gt; Is your information stored in an easily searchable way?&lt;/p&gt;
&lt;p&gt;&lt;em&gt;The easiest way to accomplish this is to use very descriptive file names, so that they can be searched with your operating system, regardless of media type.&lt;/em&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Conversion:&lt;/strong&gt; Sometimes you want information in a different format, this is useful to save space and stay current.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Adding Metadata:&lt;/strong&gt; There&amp;rsquo;s a lot of useful information about saved content that&amp;rsquo;s worth keeping, such as transcriptions, summaries, and citations.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Sharing:&lt;/strong&gt; Why keep it all to yourself? Sharing is caring and can help better protect information by increasing the amount of copies in existence. Remember &lt;a href=&#34;https://libreddit.projectsegfau.lt/r/DataHoarder/comments/y1heob/hoarding_preservation/&#34;&gt;hoarding is not preserving,&lt;/a&gt; but it&amp;rsquo;s a good start!&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;But why do we need information on our machines if the Internet Archive exists? If we can&amp;rsquo;t hope to compete with the 160PB behemoth ourselves, why bother duplicating data ourselves?&lt;/p&gt;
&lt;h2 id=&#34;concerns&#34;&gt;Concerns&lt;/h2&gt;
&lt;p&gt;While it&amp;rsquo;s been &lt;a href=&#34;https://www.theverge.com/2024/10/11/24268040/internet-archive-data-breach-outage-hacked&#34;&gt;confirmed that&lt;/a&gt; the entire Internet Archive should be back online in &amp;ldquo;&lt;em&gt;days not weeks&lt;/em&gt;&amp;rdquo; there are some serious questions to ask in the meantime. At the very least, we have up to 31 million emails breached from a population that is more likely to be journalists and researchers.(&lt;em&gt;independent and mainstream alike!&lt;/em&gt;) This is an important reminder that when one is doing sensitive work, that you should make sure to isolate online identities from each other by using completely different emails. It should go without saying that any information that can be used, &lt;em&gt;will be.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;The outage itself is a serious concern. Given that not only is this an election year, but also many high-stakes events are currently taking place that benefit from having a public information trail. The (&lt;em&gt;hopefully&lt;/em&gt;) temporary outage of the Internet Archive not only temporarily &lt;em&gt;memory-holes&lt;/em&gt; the existing record, but potentially &lt;em&gt;permanently&lt;/em&gt; prevents current events from being properly preserved. This may have profound implications on the future.&lt;/p&gt;
&lt;p&gt;Far more troubling than the outage itself, is the nature of the hack of the Internet Archive itself. With the data from the breach, we know that those who attacked the Internet Archive had access since &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/internet-archive-hacked-data-breach-impacts-31-million-users/&#34;&gt;September 28th.&lt;/a&gt; There is a great deal of damage that attackers could do in even a single day without being detected. Even worse, because the Internet Archive is a &lt;em&gt;record of events&lt;/em&gt; a mere rollback to a previous state is insufficient to reverse serious inside attacks. Independent tech journalist Bryan Lunduke &lt;a href=&#34;https://youtu.be/DZq-eplpWfQ&#34;&gt;raises the serious concern&lt;/a&gt; that these attackers may not be the only ones attacking the Internet Archive, merely the ones that we know about.&lt;/p&gt;
&lt;p&gt;It is difficult to overstate the implications of the Internet Archive potentially being manipulated in real-time. Attackers with high-level access could absolutely manipulate records in difficult to address ways. We have assurances from staff that &lt;a href=&#34;https://x.com/brewster_kahle/status/1844790609573277792&#34;&gt;the data is safe,&lt;/a&gt; but it is an open question how confidently they can make those assurances.&lt;/p&gt;
&lt;h2 id=&#34;what-makes-the-internet-archive-great&#34;&gt;What Makes The Internet Archive Great?&lt;/h2&gt;
&lt;p&gt;Despite all this, should the Internet Archive return, there is no reason to abandon the cause entirely. Imperfections are themselves noteworthy, but never a reason to completely disregard any particular tool. For what it is, the Internet Archive is a phenomenal achievement and a incredibly useful service for a wide variety of people and purposes.&lt;/p&gt;
&lt;h3 id=&#34;trust&#34;&gt;Trust&lt;/h3&gt;
&lt;p&gt;As a long-standing archive, the Internet Archive has garnered a great deal of trust. For many, the site is a go-to resource, and it has partnered with many organizations like libraries and other institutions. This trust is a big part of the reason why citing the Wayback Machine is very often considered as good as citing the original link itself. Other alternatives, may not have the same level of trust, and it may be difficult to rely on them.&lt;/p&gt;
&lt;h3 id=&#34;scale-depth--diversity&#34;&gt;Scale, Depth &amp;amp; Diversity&lt;/h3&gt;
&lt;p&gt;The size alone of the Internet Archive is formidable. Beyond merely archiving versions of the web, it also includes a massive amount of media from all over the world. The cultural and historical relevance of that information is its own treasure not to be taken lightly. No radical new approach will even begin to reach the same size anytime soon.&lt;/p&gt;
&lt;h3 id=&#34;age&#34;&gt;Age&lt;/h3&gt;
&lt;p&gt;Founded in 1996, the Internet archive has a massive head-start over other projects. Despite present circumstances, almost 30 years of being operational is nothing to scoff at. Catching up to 30 years of information at such a scale is an enormous task.&lt;/p&gt;
&lt;h2 id=&#34;limitations-of-the-internet-archive&#34;&gt;Limitations of The Internet Archive&lt;/h2&gt;
&lt;p&gt;Despite these things, there are reasons why one should consider alternative archives for particular purposes. For some situations, these limitations may be deal-breakers, for others they may be fairly trivial. In any case it is still best that one still maintains their own archives of important information, for its own sake and potentially because of the following.&lt;/p&gt;
&lt;h3 id=&#34;centralized&#34;&gt;Centralized&lt;/h3&gt;
&lt;p&gt;The Internet Archive is a massive target. From now, until it stops existing it will always have to contend with a wide variety of threats. From cyber threats like this incident, to even financial and legal troubles. The institution itself is vulnerable to being pressured by a variety of forces that all have their own agendas. This is not to say that a decentralized internet archive is some kind of panacea. Such an undertaking would absolutely have its own challenges and trade-offs.&lt;/p&gt;
&lt;h3 id=&#34;removals&#34;&gt;Removals&lt;/h3&gt;
&lt;p&gt;There are primarily three ways that information is deleted the Internet Archive:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Copyright Infringement:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Since March 2001, their &lt;a href=&#34;https://archive.is/QOhQq&#34;&gt;copyright policy states:&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;The Internet Archive respects the intellectual property rights and other proprietary rights of others. The Internet Archive may, in appropriate circumstances and at its discretion, remove certain content or disable access to content that appears to infringe the copyright or other intellectual property rights of others.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Deletion Requests:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Internet Archive honors &lt;a href=&#34;https://archive.is/uc7n4&#34;&gt;deletion requests&lt;/a&gt; as well, these are reviewed by their team. There are many reasons why a request would be honored, such as removing &lt;a href=&#34;https://blog.lukaszwojcik.net/how-to-delete-personal-data-from-wayback-machine/&#34;&gt;personal information,&lt;/a&gt; but can quite plausibly include a wide variety of other requests as well.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;/robots.txt&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Every website can forbid the Wayback Machine from recording information through their &lt;code&gt;robots.txt&lt;/code&gt; file. This file is generally used to suggest to search engines and other bots what information is supposed to be indexed. Not only does the Wayback Machine &lt;a href=&#34;https://archive.is/tdXaS&#34;&gt;honor this mechanism,&lt;/a&gt; but they also apply it retroactively. Meaning that it is relatively simple for any website operator to &amp;ldquo;memory-hole&amp;rdquo; their own specific content, even on a per-item basis.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id=&#34;a-call-for-innovation&#34;&gt;A Call For Innovation&lt;/h2&gt;
&lt;p&gt;The greatest challenge with independent archives is credibility. Anyone can create their own modified mirror of a web site and claim it&amp;rsquo;s an honest and true archive. If the operators of the site deny its authenticity how can others be sure? It&amp;rsquo;s a reasonable question if &lt;em&gt;any archive&lt;/em&gt; can be trusted on a long enough time frame. One can even argue that generative AI tools can make any and all information falsifiable. Reputation can&amp;rsquo;t be trusted, because it can be sold as a commodity like anything else.&lt;/p&gt;
&lt;p&gt;Credibility alone, is not the only reason to preserve information, however. The truth is that there are many reasons to take on the task even in such conditions. In many scenarios, the information itself would be lost to time forever. Preservation can very often be its own end for a wide variety of reasons. When aiming to hold powerful institutions accountable, very often the information can be corroborated by other facts.&lt;/p&gt;
&lt;p&gt;Trying to independently archive the entire Web is effectively an impossible task. The goal should never be to preserve the totality of information online, but merely what is important. Defining what is important is its own massive challenge, but ultimately it boils down to a personal choice on how to use resources available. It is clear that more tools for independent information management are needed. Either building those tools yourself, or teaming up with others to cooperate on them would be a massive step in the right direction. Indexing and automation are both viable avenues to provide powerful tools for independent researchers.&lt;/p&gt;
&lt;p&gt;We can hope, that for as long as the digital landscape remains somewhat free, that there will be those willing to support investing in building specialized tools that can begin to &lt;em&gt;level the playing field&lt;/em&gt;. If we are not ardent in our support for a better technological future, we may end up with the ones imposed on us via governments and/or corporations.&lt;/p&gt;
&lt;h2 id=&#34;tools-to-consider&#34;&gt;Tools to Consider&lt;/h2&gt;
&lt;h3 id=&#34;other-online-archives&#34;&gt;Other Online Archives:&lt;/h3&gt;
&lt;p&gt;These are definitely worth considering, even in parallel with the Wayback Machine.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://archive.ph/&#34;&gt;Archive Today&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://ghostarchive.org/&#34;&gt;Ghost Archive&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;archiving-tools&#34;&gt;Archiving Tools&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Courtesy of the &lt;a href=&#34;https://github.com/awesome-selfhosted/awesome-selfhosted?tab=readme-ov-file#archiving-and-digital-preservation-dp&#34;&gt;Awesome-Selfhosted list&lt;/a&gt;:
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://archivebox.io/&#34;&gt;ArchiveBox&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/wabarc/wayback&#34;&gt;Wayback&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/iipc/awesome-web-archiving&#34;&gt;[&lt;em&gt;bigger list&lt;/em&gt;]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://webrecorder.net/&#34;&gt;Webrecorder&lt;/a&gt; which is a suite of useful tools for maintaining one&amp;rsquo;s own web archives. Webrecorder aims for accuracy that may not be matched by other tools.&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/gildas-lormeau/SingleFile&#34;&gt;SingleFile&lt;/a&gt; Browser add-on to save pages &amp;ldquo;as a single .html file&amp;rdquo;, which can be a handy alternative to printing a page as a PDF.&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/yt-dlp/yt-dlp&#34;&gt;yt-dlp&lt;/a&gt; for downloading videos &amp;amp; audio&lt;/li&gt;
&lt;li&gt;For those who want to go pro, &lt;a href=&#34;https://wiki.archiveteam.org/&#34;&gt;archive team&lt;/a&gt; is a great place to get started.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;dont-forget-your-backups&#34;&gt;Don&amp;rsquo;t forget your backups!&lt;/h2&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://libresolutions.network/articles/backups&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/diagrams/backups.webp&#39; 
&gt;

&lt;/a&gt;



&lt;/div&gt;
&lt;p&gt;Any data that isn&amp;rsquo;t backed up is considered to be in a superposition of accessible and gone forever. It&amp;rsquo;s there until it just isn&amp;rsquo;t. Since the goal is to preserve information, it&amp;rsquo;s crucial to learn how to protect information now that you&amp;rsquo;ve started collecting it.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Good Governance in Cyberspace: Digital Freedom Policy Framework</title>
		<link>https://libresolutions.network/articles/policy-framework/</link>
		<pubDate>Wed, 09 Oct 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/policy-framework/</guid>
		
		<image>https://libresolutions.network//media/stock/whitehouse.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/stock/whitehouse.webp" />
		<itunes:image href="https://libresolutions.network//media/stock/whitehouse.webp" />
		<description>Ideas for Policies for the People</description>
		<content:encoded>&lt;h2 id=&#34;what-is-policies-for-the-people&#34;&gt;What is &amp;ldquo;Policies for the People?&amp;rdquo;&lt;/h2&gt;
&lt;p&gt;&lt;a href=&#34;https://www.policiesforpeople.com/&#34;&gt;Policies for the People&lt;/a&gt; is a fascinating project aimed to help the public &amp;ldquo;open source&amp;rdquo; policies for a better future. They have several main categories such as Health, Food, Liberty, Economy &amp;amp; Peace. I would encourage you (but especially Americans) to get involved in either writing your own proposals, or at least giving constructive feedback to ones written about issues that are near and dear to you.&lt;/p&gt;
&lt;p&gt;As somebody who is a HUGE FAN of bottom-up strategies, I believe this is a golden opportunity to recognize the potential of elected representatives having organized, genuine bottom-up feedback. The platform is running &lt;a href=&#34;https://www.discourse.org/&#34;&gt;Discourse&lt;/a&gt; which is the go-to choice for many open source projects &amp;amp; communities. The platform itself &lt;a href=&#34;https://github.com/discourse/discourse&#34;&gt;is available&lt;/a&gt; as fully Free and Open source, so it&amp;rsquo;s even possible to setup your own independent instance. I would highly recommend considering how you could adopt this model for your own region or priorities.&lt;/p&gt;
&lt;p&gt;I am thrilled to take a stab at building a better technological future by presenting my vision on what the United States Federal Government can do to improve. My hope is that you find &lt;a href=&#34;https://forum.policiesforpeople.com/t/digital-freedom-policy-framework/2115&#34;&gt;my submission&lt;/a&gt; a worthwhile conversation-starter. If you have feedback, I would highly encourage you signing up to &lt;a href=&#34;https://forum.policiesforpeople.com/&#34;&gt;Policies for the People,&lt;/a&gt; and then replying to &lt;a href=&#34;https://forum.policiesforpeople.com/t/digital-freedom-policy-framework/2115&#34;&gt;the post.&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;executive-summary&#34;&gt;Executive Summary&lt;/h2&gt;
&lt;h3 id=&#34;primary-concerns&#34;&gt;Primary Concerns&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Allowing Foreign governments to dictate free expression online&lt;/li&gt;
&lt;li&gt;Big Tech &amp;amp; Government stifling innovation&lt;/li&gt;
&lt;li&gt;Mass surveillance and privacy risks to citizens&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;overview&#34;&gt;Overview&lt;/h3&gt;
&lt;p&gt;There is an immense amount of opportunity in building conditions for a more free cyberspace. By adopting a strong stance on digital freedoms and protections, Americans can transform the digital landscape. This opportunity represents a chance to truly resolve many pressing concerns, and brings huge economic and cultural benefits.&lt;/p&gt;
&lt;p&gt;When many think of grand-sweeping changes in technology, often they think of the European Union. As a leader pushing for ambitious reforms, the EU is very much in the driver&amp;rsquo;s seat of deciding the future of cyberspace. While there are many benefits to this, the EU does not prioritize classic American values such as free speech. This is quite apparent in many projects and initiatives.&lt;/p&gt;
&lt;p&gt;In this proposal, I share a vision on how the United States can replicate many of the successes from the European Union&amp;rsquo;s strong digital vision, without conceding cyberspace to be dictated by the EU or foreign adversaries. This proposal is a vision for a future of cyberspace where Americans are free to maximize innovation, creativity, and security.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;At a high level the following reforms are required:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;A strategic vision to exceed the European Union&amp;rsquo;s &lt;a href=&#34;https://ngi.eu/&#34;&gt;Next Generation Internet&lt;/a&gt; initiative&lt;/li&gt;
&lt;li&gt;Institutional Safety&lt;/li&gt;
&lt;li&gt;A Digital Bill of Rights&lt;/li&gt;
&lt;li&gt;Creating opportunity for a better cyberspace&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;strategic-vision&#34;&gt;Strategic Vision&lt;/h2&gt;
&lt;p&gt;Protecting the interests of Americans in cyberspace requires a bold new departure from the status quo. For too long, the web has largely stagnated as cyber threats and online harms escalate. Instead of trying to address concerns on a reactionary per-issue basis, a new direction is needed to confront the foundations of these troubles. The goal must be to transform the technological landscape to represent one of innovation, collaboration, and strong security practices.&lt;/p&gt;
&lt;p&gt;First and foremost, there must be recognition of the fact that online freedom issues quickly become national security concerns. If Americans don&amp;rsquo;t feel they can safely and effectively engage online, they become vulnerable to &lt;a href=&#34;https://libresolutionsnetwork.substack.com/p/lessons-from-alt-tech-failures&#34;&gt;being exploited,&lt;/a&gt; undermining their own security. Transformative change is required to adapt to the realities of cyberspace in our time. As the Crowdstrike Global IT outage has shown, top-down security efforts have their own risks. Instead of developing a plan to centrally manage digital affairs, Americans deserve a properly decentralized technological landscape.&lt;/p&gt;
&lt;p&gt;A variety of EU projects are aimed specifically at granting the European Union &lt;a href=&#34;https://www.sovereigntechfund.de/&#34;&gt;digital sovereignty,&lt;/a&gt; but falls short of reclaiming it for the citizenry as well. A cyber strategy for the United States has to recognize the importance of it&amp;rsquo;s own digital sovereignty as well as that of individual Americans. If this opportunity is forsaken, the entire infrastructure of our online interactions can be dictated by the European Union, or even foreign adversaries.&lt;/p&gt;
&lt;p&gt;Thus, the United States Cyber Strategy must pivot away from consolidating power through Big Tech, and towards empowering citizens, families, communities, and businesses to be truly resilient from modern cyber threats. This will require a long-term plan that includes necessary components like right to repair, privacy protections, strong privacy guarantees, and above all transparency and accountability. Americans are not lacking in skills, knowledge, or creativity, what is lacking is a solid foundation to build a modern and free cyberspace.&lt;/p&gt;
&lt;p&gt;The benefits of a bottom-up effort to transform our digital landscape &lt;a href=&#34;https://sfconservancy.org/blog/2015/sep/29/vw/&#34;&gt;are immense.&lt;/a&gt; This taps into vast swaths of under-utilized labor and skills and create the conditions for multi-disciplinary collaboration and innovation. Open Source has proven to be a highly effective and highly resilient model for not only innovation, but also collaboration with throughput vastly superior to constrained models. The future of work is here, it&amp;rsquo;s just about making it economic.&lt;/p&gt;
&lt;p&gt;The purpose of the strategic vision is to realign priorities towards &lt;em&gt;Civilian-based cyber defense&lt;/em&gt;. This principle recognizes the reality that every person has a role to play in keeping digital threats at bay. Therefore radical new approaches are required to foster an environment of education, collaboration, and competition. By creating fertile ground for innovation and bottom-up feedback, many of our present challenges can be &lt;a href=&#34;https://autonomia.digital/en/2024/01/19/free-software-digital-security.html&#34;&gt;transformed into opportunities.&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;civilian-based-cyber-defense&#34;&gt;Civilian-based Cyber Defense&lt;/h3&gt;
&lt;p&gt;The principle of Civilian-based cyber defense is so effective that it has already been partly implemented out of necessity. Organizations like CISA run programs to raise cybersecurity awareness and digital education. This is something that needs to be explored to it&amp;rsquo;s fullest, and brought to the forefront of many cyber &amp;amp; education initiatives. Instead of relying on massive entities to safeguard everyone, a radical new approach is required to tackle modern digital threats. This new approach is equipping every individual to be an &lt;a href=&#34;https://savannah.gnu.org/news/?id=10677&#34;&gt;active participant&lt;/a&gt; in a more safe and secure future.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Understanding the threats&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;These risks are outlined to demonstrate that many of these threats and their components are inseparably intertwined. For too long our institutions are modeled with a vision that cyberspace is entirely separate from the real world and &lt;a href=&#34;https://www.makeuseof.com/smart-glasses-privacy-issues/&#34;&gt;people&amp;rsquo;s lives.&lt;/a&gt; Cyber threats very often include planning, preparation, or even methods that impact real-world infrastructure and people&amp;rsquo;s personal vulnerabilities. The idea that these threats can be mitigated, much less eliminated without a holistic, bottom-up approach is madness at best and arrogance at worst.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Cyber warfare&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Software / Hardware supply chain attacks&lt;/li&gt;
&lt;li&gt;Mass surveillance (foreign and domestic)&lt;/li&gt;
&lt;li&gt;Ransomware&lt;/li&gt;
&lt;li&gt;System disruption&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Cybersecurity &amp;amp; IT&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Malware&lt;/li&gt;
&lt;li&gt;Breaches&lt;/li&gt;
&lt;li&gt;Outages&lt;/li&gt;
&lt;li&gt;Social engineering attacks&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Online Harms&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Harassment&lt;/li&gt;
&lt;li&gt;Cyber-stalking&lt;/li&gt;
&lt;li&gt;Exploitation&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Privacy Risks&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Identity theft&lt;/li&gt;
&lt;li&gt;Personal safety / Extortion&lt;/li&gt;
&lt;li&gt;Undermines trust&lt;/li&gt;
&lt;li&gt;Chills speech and participation&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Fragility&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Single-points of failure&lt;/li&gt;
&lt;li&gt;Dependence&lt;/li&gt;
&lt;li&gt;Censorship&lt;/li&gt;
&lt;li&gt;Lack of competition&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Civilian-Based Cyber Defense in Action&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Education&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Our technological future is always going to be in the hands of our youngest. Their decisions on what to use, how to use it, and what to build on fundamentally reshapes our collective digital experience in real-time. At the very least, it is crucial that this is an informed decision. At the bare minimum, &amp;ldquo;computer literacy&amp;rdquo; should be tracked, fostered, and improved just like actual literacy.&lt;/p&gt;
&lt;p&gt;Beyond schooling, public awareness is crucial. Education and outreach must be a life-long experience. Just as online threats and harms have evolved over the last two decades, we can be quite sure they will continue to evolve at a rapid rate. This can only be ameliorated with an environment where Americans are able to have a meaningful impact on their own digital experience.&lt;/p&gt;
&lt;p&gt;A wide range of initiatives are on the table when one recognizes that the first-line of cyber defense isn&amp;rsquo;t powerful tech giants, but rather individuals themselves.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Research&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Information is the most precious resource. Initiatives that can acquire vital information about pressing concerns are invaluable. America&amp;rsquo;s highly &lt;a href=&#34;https://www.engadget.com/big-tech-layoffs-183005386.html&#34;&gt;skilled and creative workforce&lt;/a&gt; can take advantage of opportunities to leave no stone un-turned when it comes to investigating digital threats, and their solutions. Agencies should be leveraging their unique insight to provide information to the public on ground that needs to be covered.&lt;/p&gt;
&lt;p&gt;Building a national defense strategy around bottom-up innovation requires exhausting lines of inquiry that many technical minds are eager to explore. With properly aligned goals, the digital sovereignty of individuals and national security can lead to powerful strengthening of both. By relying on the same methods to secure both, citizens can have a direct impact on not only improving their lives, but the very fate of the nation.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Collaboration&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Leveraging powerful models, like Open Source development (for both hardware and software) offers huge benefits for innovation. There are many ways to include people with varied expertise to gain multi-disciplinary benefits from broader collaboration. With open and transparent methods of governance, and even tools and techniques, feedback from the front-line can make an even bigger impact.&lt;/p&gt;
&lt;p&gt;Transparent sharing of insights, but also including public feedback into the equation, allows for much more rapid iteration on crucial concepts.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Innovation&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;With the benefits of hardware and software freedom, technologies can be safely used in both public and private contexts. Optimizations can be widely deployed and many can reap the benefits. By building the foundation for a truly free technological landscape, the USA can become the home for boundless innovation. Realigning strategies and goals for a free digital future has immense opportunities for both individuals and institutions.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;institutional-safety&#34;&gt;Institutional Safety&lt;/h2&gt;
&lt;p&gt;While all of the above sounds wonderful and amazing, very little of it is truly possible without trust. This is very much where the European Union fails to deliver on what they intend in their digital strategy. With some reform, the United States is in the unique, enviable position to be a world leader in not just technological innovation, but also digital freedom and security. Improving the relationship between institutions and people, trust can be built towards genuine cooperation and shared interests.&lt;/p&gt;
&lt;h3 id=&#34;de-fanging-the-surveillance-apparatus&#34;&gt;De-FANGing the Surveillance Apparatus&lt;/h3&gt;
&lt;p&gt;The very fact that the European Union has spent so much trying to break free from American companies tells us all we need to know about how much Americans can trust public-private collaboration with these entities. As such, not only do Americans require stronger privacy and security guarantees, but they also deserve a government that doesn&amp;rsquo;t leverage private entities against their interests. Public, short, medium and long term plans must be made to entirely &lt;a href=&#34;https://www.eff.org/deeplinks/2023/11/reauthorizing-mass-surveillance-shouldnt-be-tied-funding-government&#34;&gt;dismantle domestic surveillance.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Cooperation, subsidy, and information sharing with for-profit entities must be phased out. These institutions seize and pacify a huge amount of America&amp;rsquo;s top minds and puts them to work building things that are incompatible with a free digital future. Maintaining proper boundaries between private and public institutions is a vital reform in building meaningful trust in the future. When law enforcement requires information, it must be obtained with a valid court order, both requests and receipts must be properly and transparently disclosed.&lt;/p&gt;
&lt;h3 id=&#34;digital-bill-of-rights&#34;&gt;Digital Bill of Rights&lt;/h3&gt;
&lt;p&gt;The White House currently has a &lt;a href=&#34;https://www.whitehouse.gov/ostp/ai-bill-of-rights/&#34;&gt;Blueprint for an AI Bill of Rights.&lt;/a&gt; Some of the concerns raised are excellent, others are unnecessary barriers to innovation. Even worse however, the AI Bill of Rights is far too narrow, and possibly wastes the opportunity to develop a truly comprehensive Digital Bill of Rights. &lt;a href=&#34;https://www.adbusters.org/articles-coded/digital-bill-of-rights&#34;&gt;A Digital Bill of Rights&lt;/a&gt; must not only apply to government departments, but where possible, to publicly traded and regulated entities. Some of these exist already in some form or another, but a comprehensive (Federal) act is required.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Digital Bill of Rights (Shortlist)&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Access&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Non-discrimination on protected status, politics, or even a wider range of criteria&lt;/li&gt;
&lt;li&gt;Prior notice to disruptions to access with proper due-process&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Data Sovereignty&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Right to refuse data collection&lt;/li&gt;
&lt;li&gt;Control over how information is used and shared&lt;/li&gt;
&lt;li&gt;Right to request, and delete personal data&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Transparency &amp;amp; Accountability&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Clear and transparent disclosure of information sharing and breaches of personal information&lt;/li&gt;
&lt;li&gt;Liability for data misuse&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Freedom of Choice&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;The right to refuse particular devices, services, and systems&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;regulate-digital-public-infrastructure-providers-as-common-carriers&#34;&gt;Regulate digital public infrastructure providers as &amp;ldquo;common carriers&amp;rdquo;&lt;/h3&gt;
&lt;p&gt;Not only as a means to strengthen the Digital Bill of Rights, but also to protect good-faith providers of digital infrastructure. With a broad conception of public digital infrastructure, more Americans can feel they can equitably participate in the digital economy.&lt;/p&gt;
&lt;p&gt;This would include:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;ISPs&lt;/li&gt;
&lt;li&gt;Domain Registrars &amp;amp; Public DNS Providers&lt;/li&gt;
&lt;li&gt;Cloud &amp;amp; Web Hosting Providers&lt;/li&gt;
&lt;li&gt;Payment Providers&lt;/li&gt;
&lt;li&gt;Financial institutions&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;protecting-innovation--security&#34;&gt;Protecting Innovation &amp;amp; Security&lt;/h2&gt;
&lt;p&gt;To compete in the modern digital environment, new approaches are required to stay adaptable. Beyond sustaining various rackets, the goal is to allow American innovation to thrive in an environment that makes people and cyberspace more free. There is significant demand for secure, verifiable systems that put the person first. Instead of falling behind foreign competitors, the USA can reclaim it&amp;rsquo;s status as not only the land of the free, but also free cyberspace.&lt;/p&gt;
&lt;h3 id=&#34;right-to-repair&#34;&gt;Right to Repair&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://www.repair.org/know-your-rights&#34;&gt;Right to repair&lt;/a&gt; involves various reforms that are essential to long-term innovation and security. Of crucial importance is the ability for users to have the capacity to modify potentially defective &lt;a href=&#34;https://sfconservancy.org/copyleft-compliance/firmware-liberation.html&#34;&gt;firmware.&lt;/a&gt; Very often digital products fall behind in security, so much so that the EU is considering harsh import restrictions under the &lt;a href=&#34;https://digital-strategy.ec.europa.eu/en/policies/cyber-resilience-act&#34;&gt;Cyber Resilience Act.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;By encouraging an environment where devices are more free and open by default, users can have the control to obtain the highest security guarantees needed for the situation. This alone has the potential to resolve security issues faster than any single initiative could, by allowing almost everyone to take a role in thwarting cyber threats.&lt;/p&gt;
&lt;h3 id=&#34;prioritize-free--open-source-software--hardware&#34;&gt;Prioritize Free &amp;amp; Open Source Software &amp;amp; Hardware&lt;/h3&gt;
&lt;p&gt;Software &amp;amp; hardware freedom is a very important public good. Open source is a very effective way to put bottom-up feedback and contributions to use. By harnessing these goals, America&amp;rsquo;s technological economy can be radically transformed in a way that provides a great deal of jobs and opportunities. By using Free &amp;amp; Open Source Software, government agencies and departments can not only reclaim their own digital sovereignty, but individuals as well. The technological landscape moves very quickly, and is only poised to accelerate as enthusiasm for decentralized open cooperation improves. It&amp;rsquo;s crucial not to miss the opportunity to embrace this change.&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;&lt;strong&gt;Related Proposals:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://forum.policiesforpeople.com/t/digital-privacy-bill-of-rights/162/1&#34;&gt;Digital Privacy Bill of Rights&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://forum.policiesforpeople.com/t/digital-privacy-act-of-202x/748&#34;&gt;Digital Privacy Act of 202X&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://forum.policiesforpeople.com/t/right-to-repair-legislation/581&#34;&gt;Right to Repair Legislation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://forum.policiesforpeople.com/t/nil-law-attached-to-your-cyber-footprint/152&#34;&gt;NIL Law attached to your cyber footprint&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://forum.policiesforpeople.com/t/the-digital-privacy-and-anti-surveillance-act/465&#34;&gt;The Digital Privacy and Anti-Surveillance Act&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://forum.policiesforpeople.com/t/enhanced-privacy-protection-for-u-s-citizens/545&#34;&gt;Enhanced Privacy Protection for U.S. Citizens&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://forum.policiesforpeople.com/t/how-to-restore-free-speech-through-simple-legislation/35&#34;&gt;How to Restore Free Speech Through Simple Legislation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://forum.policiesforpeople.com/t/rural-broadband-infrastructure/1398&#34;&gt;Rural Broadband Infrastructure&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Mitra: A tool to rebuild online free expression</title>
		<link>https://libresolutions.network/articles/mitra/</link>
		<pubDate>Tue, 08 Oct 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/mitra/</guid>
		
		<image>https://libresolutions.network//media/images/mitra-q&amp;a.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/mitra-q&amp;a.webp" />
		<itunes:image href="https://libresolutions.network//media/images/mitra-q&amp;a.webp" />
		<description>A Q&amp;A with Mitra&#39;s developer Silverpill</description>
		<content:encoded>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;For quite some time, I&amp;rsquo;ve been on the hunt for effective technological solutions. One of the major game-changers online has been the rise of decentralized social media. The &lt;a href=&#34;https://libresolutions.network/tags/fediverse&#34;&gt;Fediverse&lt;/a&gt; is one such system for building and running decentralized social media. In my opinion, the Fediverse is one of the more under-utilized tools by those who want to protect free speech online. Instead of merely moving to greener pastures with a new tech giant, we can take advantage of the opportunity to &lt;a href=&#34;https://peertube.libresolutions.network/w/bVw81Snxdp9nQe2k5wQUDd?start=0s&#34;&gt;transform the social landscape&lt;/a&gt; ourselves.&lt;/p&gt;
&lt;p&gt;I run a few of my own Fediverse servers at the moment, such as &lt;a href=&#34;https://peertube.libresolutions.network&#34;&gt;Peertube,&lt;/a&gt; &lt;a href=&#34;https://codeberg.org/silverpill/mitra&#34;&gt;Mitra,&lt;/a&gt; and &lt;a href=&#34;https://misskey-hub.net/en/&#34;&gt;Misskey.&lt;/a&gt; But when it comes to censorship resistance features, Mitra is a cut above the rest. And so I had asked &lt;a href=&#34;https://mitra.social/@silverpill&#34;&gt;Silverpill&lt;/a&gt; the developer of Mitra if he would join me for a Q&amp;amp;A.&lt;/p&gt;
&lt;h2 id=&#34;qa&#34;&gt;Q&amp;amp;A&lt;/h2&gt;
&lt;h4 id=&#34;in-your-own-words-what-is-mitra&#34;&gt;In your own words, what is Mitra?&lt;/h4&gt;
&lt;blockquote&gt;
&lt;p&gt;Mitra is a social media server for the Fediverse.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h4 id=&#34;why-that-logo-how-did-you-come-up-with-it&#34;&gt;Why that logo? How did you come up with it?&lt;/h4&gt;
&lt;blockquote&gt;
&lt;p&gt;The outer shape is known as &lt;a href=&#34;https://en.wikipedia.org/wiki/Rub_el_Hizb&#34;&gt;Rub el Hizb,&lt;/a&gt; it&amp;rsquo;s an Islamic symbol. There is no deep meaning, I just saw it somewhere and decided to use it as a starting point. I experimented with many different designs and selected one that seemed most interesting and pleasing to the eye. You can spot a bunch of &amp;ldquo;M&amp;quot;s inside.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h4 id=&#34;why-should-more-people-become-familiar-with-and-use-federated-social-media&#34;&gt;Why should more people become familiar with and use federated social media?&lt;/h4&gt;
&lt;blockquote&gt;
&lt;p&gt;You can have your own Twitter, Facebook or YouTube, connected to thousands of other small networks. Isn&amp;rsquo;t that great?&lt;/p&gt;
&lt;p&gt;I think federation is the best architecture for a decentralized social network. The user experience is decent and the network can scale without compromising on decentralization, as was demonstrated by Email, XMPP and Matrix.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/mitra-screenshot.webp&#39; 
&gt;


&lt;p class=&#34;caption&#34;&gt;
    Mitra home 
&lt;/p&gt;


&lt;/div&gt;
&lt;h4 id=&#34;why-did-you-decide-to-build-mitra&#34;&gt;Why did you decide to build Mitra?&lt;/h4&gt;
&lt;blockquote&gt;
&lt;p&gt;Before Mitra I was working with blockchain technology. At some point I realized that decentralized financial infrastructure needs a social layer, and that existing solutions are inadequate. After doing some research on decentralized social protocols I picked ActivityPub because it was mature, well-designed and had a strong developer community with values similar to mine. The missing pieces were decentralized payments and decentralized identity, so I started working on these problems.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h4 id=&#34;what-makes-mitra-unique-compared-to-other-fediverse-servers&#34;&gt;What makes Mitra unique compared to other Fediverse servers?&lt;/h4&gt;
&lt;blockquote&gt;
&lt;p&gt;So, one of my original goals was integrated payments. I tried several ideas and eventually settled on paid subscriptions. This feature provides a way to accept payments in Monero and publish premium content for paying subscribers.&lt;/p&gt;
&lt;p&gt;The second goal was decentralized identity, or &amp;ldquo;nomadic identity&amp;rdquo;, as we call it in the Fediverse. This turned out to be a very difficult task, but I&amp;rsquo;ve made significant progress. Nomadic identity mechanism allows people to have an account that is not tied to any single server, but exists on many servers simultaneously. My implementation of this mechanism is not complete yet and currently can be used only by developers.&lt;/p&gt;
&lt;p&gt;Mitra also can federate over Tor and I2P networks.&lt;/p&gt;
&lt;p&gt;Besides that, it is very lightweight and easy to host, so it might be a good choice even for those who are not interested in subscriptions and nomadic identity.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h4 id=&#34;what-other-fediverse-software-would-you-recommend-servers-clients-etc&#34;&gt;What other Fediverse software would you recommend? (Servers, Clients, etc)&lt;/h4&gt;
&lt;blockquote&gt;
&lt;p&gt;My favorite server is &lt;a href=&#34;https://pleroma.social/&#34;&gt;Pleroma.&lt;/a&gt; I borrowed many ideas from it when Mitra was in the early stages of development. &lt;a href=&#34;https://codeberg.org/streams/streams&#34;&gt;Streams&lt;/a&gt; is also very interesting. It implements nomadic identity in the same way as Mitra, and has many other nice features.&lt;/p&gt;
&lt;p&gt;Among web clients, my favorite was Soapbox, but its developer quit Fediverse (there is now a fork called &lt;a href=&#34;https://github.com/BDX-town/Mangane&#34;&gt;Mangane)&lt;/a&gt;. For Android devices, I recommend &lt;a href=&#34;https://github.com/captainepoch/husky&#34;&gt;Husky.&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h4 id=&#34;in-your-opinion-what-features-are-most-important-for-censorship-resistance&#34;&gt;In your opinion, what features are most important for censorship resistance?&lt;/h4&gt;
&lt;blockquote&gt;
&lt;p&gt;In my work I prefer to focus on the positive side of censorship resistance: digital sovereignty. A server that runs on your own hardware and that doesn&amp;rsquo;t depend on any external services is practically unstoppable. This is already possible today with Tor and I2P, but requires specialized technical knowledge, and even if you have it, you can communicate only with a very small number of people.&lt;/p&gt;
&lt;p&gt;So the most important features are those that make this experience more accessible. Ideally, everyone should be able to send messages to millions of followers from a personal social media server that runs on the phone with unstable internet connection.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3 id=&#34;what-are-the-biggest-threats-to-online-free-speech-and-what-do-you-believe-has-kept-them-at-bay-the-best&#34;&gt;What are the biggest threats to online free speech, and what do you believe has kept them at bay the best?&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;The biggest threat is centralization. It occurs on multiple levels, both technical and social, and every time there is a bottleneck, someone tries to use it to censor their opponents. What keeps it at bay are all those people who invest resources in building decentralized networks and circumvention tools, and those who make information about these tools accessible to the general public.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h4 id=&#34;are-any-of-the-alternative-protocols-like-nostr-meaningful-competition-from-a-censorship-resistance-perspective&#34;&gt;Are any of the alternative protocols (like nostr) meaningful competition from a censorship resistance perspective?&lt;/h4&gt;
&lt;blockquote&gt;
&lt;p&gt;Nostr seems to be the only meaningful competition, although it is still not big enough to matter. Other networks are even smaller, or not really decentralized.&lt;/p&gt;
&lt;p&gt;The current situation is really unfortunate because so much effort is wasted in technological dead ends. Fediverse is the biggest decentralized network and is perfectly capable of supporting decentralized identity, the purported lack of which is often used as an excuse to create a competing protocol.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h4 id=&#34;how-does-a-person-or-even-a-small-group-directly-oppose-online-censorship&#34;&gt;How does a person, or even a small group directly oppose online censorship?&lt;/h4&gt;
&lt;blockquote&gt;
&lt;p&gt;Use decentralized networks and open source software. Educate others. Ultimately, this a collective action problem, and only together we can make censorship prohibitively expensive and therefore ineffective.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h4 id=&#34;what-are-your-short-medium-and-long-term-goals-for-mitra&#34;&gt;What are your short, medium and long term goals for Mitra?&lt;/h4&gt;
&lt;blockquote&gt;
&lt;p&gt;In the short term, I&amp;rsquo;ll be working on several basic features that are still missing, such as polls, audience controls and moderation tools. Medium term plans include finishing nomadic identity system, improving premium subscriptions and implementing groups. I&amp;rsquo;m also planning to release a Rust library for developing ActivityPub applications. In the long term, I want to build a powerful social media server that has everything you need, costs nothing and can run in your pocket.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h4 id=&#34;what-motivates-you-to-continue-building-mitra-into-the-future&#34;&gt;What motivates you to continue building Mitra into the future?&lt;/h4&gt;
&lt;blockquote&gt;
&lt;p&gt;I think a tool like Mitra is necessary, an no one else is working on that, so I have no choice but to build it myself.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h4 id=&#34;outside-of-just-mitra-how-are-you-working-to-make-the-fediverse-even-better&#34;&gt;Outside of just Mitra, how are you working to make the Fediverse even better?&lt;/h4&gt;
&lt;blockquote&gt;
&lt;p&gt;I proposed a number of standards for the Fediverse, covering message signing, quote posts, federated payments, data portability and other things. I also help maintain a platform for publishing those proposals (&lt;a href=&#34;https://codeberg.org/fediverse/fep&#34;&gt;Fediverse Enhancement Proposals,&lt;/a&gt; or FEPs).&lt;/p&gt;
&lt;p&gt;Every Friday I publish a newsletter about the Fediverse: &lt;a href=&#34;https://mitra.social/@weekinfediverse&#34;&gt;https://mitra.social/@weekinfediverse&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h4 id=&#34;whats-the-best-way-to-support-your-work&#34;&gt;What&amp;rsquo;s the best way to support your work?&lt;/h4&gt;
&lt;blockquote&gt;
&lt;p&gt;Try Mitra. If you like what I&amp;rsquo;m doing, you can help by suggesting improvements, testing different clients, reporting bugs and spreading the word.&lt;/p&gt;
&lt;p&gt;If you&amp;rsquo;re a developer, you can contribute to Mitra or implement my FEPs in your own project.&lt;/p&gt;
&lt;p&gt;I also accept donations. My Monero address is &lt;code&gt;8Ahza5RM4JQgtdqvpcF1U628NN5Q87eryXQad3Fy581YWTZU8o3EMbtScuioQZSkyNNEEE1Lkj2cSbG4VnVYCW5L1N4os5p&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Cyber Fix Episode 8: Learning from Others</title>
		<link>https://libresolutions.network/videos/cyber-fix-8/</link>
		<pubDate>Mon, 07 Oct 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/cyber-fix-8/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/cyber-fix-7.ogg" />
			
		
		<image>https://libresolutions.network//media/images/cyber-fix-icon.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/cyber-fix-icon.webp" />
		<itunes:image href="https://libresolutions.network//media/images/cyber-fix-icon.webp" />
		<description>Solutions and technological terrors.</description>
		<content:encoded>&lt;p&gt;Welcome to Cyber Fix, your dopamine-infused tech news update.&lt;br&gt;
My name is Gabriel, here to help get other information junkies up to speed with important tech news. Stay tuned for a light-hearted exploration of hostile cyberspace and what we can do about it.&lt;/p&gt;
&lt;p&gt;Cyber Fix is on hiatus, you may now listen to full episodes on &lt;a href=&#34;https://peertube.libresolutions.network/w/p/2FbUhGmiRbzmf1TUjWP3Xr&#34;&gt;PeerTube&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;stories&#34;&gt;Stories&lt;/h2&gt;
&lt;h3 id=&#34;platform-peril&#34;&gt;Platform Peril&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.404media.co/telegram-changes-policy-says-it-will-provide-user-data-to-authorities/&#34;&gt;Telegram Changes Policy, Says It Will Provide User Data to Authorities&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://x.com/TechloreInc/status/1841569103066124436&#34;&gt;Since 2018, Telegram has been able to disclose IP addresses/phone numbers of criminals to authorities.&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.404media.co/telegram-confirms-it-gave-u-s-user-data-to-the-cops/&#34;&gt;Telegram Confirms it Gave U.S. User Data to the Cops&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://kevquirk.com/blog/my-thoughts-on-the-wordpress-drama&#34;&gt;My Thoughts on the WordPress Drama&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.indiemediatoday.com/p/rokfin-what-is-going-on-a-sale-closing&#34;&gt;Rokfin: What Is Going On? A Sale? Closing?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theverge.com/2024/9/30/24253727/reddit-communities-subreddits-request-protests&#34;&gt;Reddit is making sitewide protests basically impossible&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;solutions-roundup&#34;&gt;Solutions Roundup&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://savannah.gnu.org/news/?id=10677&#34;&gt;Time to take back the Internet&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://antennapod.org/blog/2024/10/hacktoberfest-2024&#34;&gt;AntennaPod is participating in Hacktoberfest 2024 – Join us!&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://bookofadamz.com/how-to-keep-communicating-when-your-internet-is-disrupted/&#34;&gt;How to keep communicating when your internet is disrupted&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://ladybird.org/newsletter/2024-09-30/&#34;&gt;This Month in Ladybird September 2024&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/Redot-Engine/redot-engine&#34;&gt;Redot Game Engine&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;the-fine-details&#34;&gt;The Fine Details:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://x.com/naomibrockwell/status/1840377991303770308&#34;&gt;Modern society has a super complicated relationship with privacy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.thelastamericanvagabond.com/digital-id-foundation-technocracy/&#34;&gt;Digital ID: The Foundation for Technocracy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.eff.org/deeplinks/2024/09/ftc-report-confirms-commercial-surveillance-out-control&#34;&gt;FTC Report Confirms: Commercial Surveillance is Out of Control&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://news.itsfoss.com/youtube-strikes-media-server-video/&#34;&gt;YouTube Doesn&amp;rsquo;t Want You to Use a Media Server at Home&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;&#34;&gt;Tornado Cash: Code Not Speech, Non-Custodial MSBs, Knowledge Not Required&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;cyberwar&#34;&gt;Cyberwar&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://dailysceptic.org/2024/10/02/microsoft-buys-nuclear-power-plant-to-run-ai-and-its-showing-us-the-future/&#34;&gt;Microsoft ‘Buys’ Nuclear Power Plant to Run AI – and it’s Showing Us the Future&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://torrentfreak.com/isps-betrayed-over-pirate-site-blocking-threats-the-reckoning-will-be-invisible-241005/&#34;&gt;ISPs ‘Betrayed’ Over Pirate Site-Blocking Threats, The Reckoning Will Be Invisible&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://hackread.com/dutch-police-hacked-officers-details-exposed/&#34;&gt;Dutch Police Hacked, 63,000 Officers’ Details Exposed&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.lawfaremedia.org/article/the-cyber-resilience-act--an-accidental-european-alien-torts-statute&#34;&gt;The Cyber Resilience Act, an Accidental European Alien Torts Statute?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://archive.is/QDGf8&#34;&gt;U.S. Wiretap Systems Targeted in China-Linked Hack&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;music-credits&#34;&gt;Music Credits:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/n79aphwhpW0&#34;&gt;Y&amp;amp;V - Lune&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/o_v9WSImGIU&#34;&gt;Valcos - A New Light&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/qLYmtdi-GzA&#34;&gt;Killercats - Kaibu&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/hu3FPs2MYc0&#34;&gt;Dark Ages - MaxKoMusic&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;h3 id=&#34;honorable-mentions&#34;&gt;Honorable Mentions&lt;/h3&gt;
&lt;p&gt;These are items that didn&amp;rsquo;t quite make it into the final episode, but noteworthy in their own right.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://arstechnica.com/tech-policy/2024/10/harvard-students-make-auto-doxxing-smart-glasses-to-show-need-for-privacy-regs/&#34;&gt;Meta smart glasses can be used to dox anyone in seconds, study finds&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.com/2024/09/26/unauthenticated_rce_bug_linux/&#34;&gt;That doomsday critical Linux bug: It&amp;rsquo;s CUPS. May lead to remote hijacking of devices&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://xeiaso.net/notes/2024/cups-cve/&#34;&gt;You&amp;rsquo;re probably not vulnerable to the CUPS CVE&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://arstechnica.com/security/2024/09/nist-proposes-barring-some-of-the-most-nonsensical-password-rules/&#34;&gt;NIST proposes barring some of the most nonsensical password rules&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.eff.org/deeplinks/2024/09/digital-id-isnt-everybody-and-thats-okay&#34;&gt;Digital ID Isn&amp;rsquo;t for Everybody, and That&amp;rsquo;s Okay&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/cIBLOkvoVl8&#34;&gt;We Need Internet! Running a 3,000 ft Fiber Optic Cable&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://mrzool.cc/tex-boilerplates/&#34;&gt;LaTeX Boilerplates&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://anytype.io/&#34;&gt;anytime - the everything app for those who celebrate trust &amp;amp; autonomy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.amacad.org/publication/internet-and-engaged-citizenship&#34;&gt;The Internet and Engaged Citizenship&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://citizenlab.ca/2024/10/gender-based-digital-transnational-repression-as-a-global-authoritarian-practice-article-by-the-citizen-lab-published-in-globalizations/&#34;&gt;Gender-based digital transnational repression as a global authoritarian practice&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://dailydarkweb.net/threat-actor-claims-to-have-breached-high-profile-israeli-institutions/&#34;&gt;Threat Actor Claims to Have Breached High-Profile Israeli Institutions&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/QFyZk1nLih8&#34;&gt;CrowdStrike executive testifies on global outage&lt;/a&gt; (Starts ~30mins in)&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://cdt.org/insights/insights-from-a-child-safety-online-symposium-bridging-research-and-policy/&#34;&gt;Insights from a Child Safety Online Symposium: Bridging Research and Policy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/6NsRC0T35WA&#34;&gt;The TENET Media Disaster&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://mstdn.ca/@andykm/113239835423280803&#34;&gt;TekSavavvy Quarterly Transparency Report&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Cyber Fix: Episode 7</title>
		<link>https://libresolutions.network/videos/cyber-fix-7/</link>
		<pubDate>Sun, 22 Sep 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/cyber-fix-7/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/cyber-fix-7.ogg" />
			
		
		<image>https://libresolutions.network//media/images/cyber-fix-icon.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/cyber-fix-icon.webp" />
		<itunes:image href="https://libresolutions.network//media/images/cyber-fix-icon.webp" />
		<description>Exploding pagers and control grid updates</description>
		<content:encoded>&lt;p&gt;Welcome to Cyber Fix, your dopamine-infused tech news update.&lt;br&gt;
My name is Gabriel, here to help get other information junkies up to speed with important tech news. Stay tuned for a light-hearted exploration of hostile cyberspace and what we can do about it.&lt;/p&gt;
&lt;p&gt;Cyber Fix is on hiatus, you may now listen to full episodes on &lt;a href=&#34;https://peertube.libresolutions.network/w/p/2FbUhGmiRbzmf1TUjWP3Xr&#34;&gt;PeerTube&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;part-1&#34;&gt;Part 1&lt;/h2&gt;
&lt;h3 id=&#34;no-joke-exploding-pagers--radios&#34;&gt;No Joke: Exploding Pagers &amp;amp; Radios&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://drmathewmaavak.substack.com/p/death-by-remote&#34;&gt;Death by Remote&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://www.404media.co/experts-lebanon-pager-explosions-likely-not-lithium-batteries-alone/&#34;&gt;Experts: Lebanon Pager Explosions Likely Not Lithium Batteries Alone&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://tube.tchncs.de/videos/watch/9eef3877-b1f2-4b10-8a6e-f57dba645b2c&#34;&gt;Targeted Pagers Explode Across Lebanon&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://www.bunniestudios.com/blog/2024/turning-everyday-gadgets-into-bombs-is-a-bad-idea/&#34;&gt;Turning Everyday Gadgets into Bombs is a Bad Idea&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;digital-blunders&#34;&gt;Digital Blunders:&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://x.com/AutismCapital/status/1836511189796556905&#34;&gt;first Trump Bitcoin transaction takes minutes to complete and they’re unsure if it even went through&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://www.techradar.com/pro/security/researchers-find-hundreds-of-android-apps-using-ocr-to-steal-login-details&#34;&gt;Crypto fans beware — hundreds of Android apps found using OCR to steal login details&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://techcrunch.com/2024/09/10/bumble-to-leverage-ai-to-help-users-with-profiles-and-conversations/&#34;&gt;Bumble to leverage AI to help users with profile creation and conversations&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;solutions-roundup&#34;&gt;Solutions Roundup:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://blog.freecad.org/2024/09/10/the-first-release-candidate-of-freecad-1-0-is-out/&#34;&gt;The first release candidate of FreeCAD 1.0 is out&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://ar.al/notes/encouraging-individual-sovereignty-and-a-healthy-commons/&#34;&gt;Building the world you want to live in&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://samthursfield.wordpress.com/2024/09/17/fairphone-5-review/&#34;&gt;Fairphone 5 review&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://x.com/gnukeith/status/1835879824939766242&#34;&gt;The plan is simple&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://www.privacytools.io/guides/exodus-for-android-finds-trackers&#34;&gt;Exodus for Android: Finds trackers embedded in all your apps&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://radicle.xyz/2024/09/10/radicle-1.0.html&#34;&gt;Radicle 1.0&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://servo.org/blog/2024/09/11/building-browser/&#34;&gt;Building a browser using Servo as a web engine!&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;part-2&#34;&gt;Part 2&lt;/h2&gt;
&lt;h3 id=&#34;tech-news&#34;&gt;Tech News:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://www.macrumors.com/2024/09/18/end-to-end-encryption-rcs-messages/&#34;&gt;End-to-End Encryption Coming for iPhone-to-Android RCS Messages&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://x.com/IncogNetLLC/status/1834227149147935202&#34;&gt;IncogNET is now an accredited registrar for .ST&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://techcrunch.com/2024/09/17/discord-launches-end-to-end-encrypted-voice-and-video-chats/&#34;&gt;Discord launches end-to-end encrypted voice and video chats&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://www.techdirt.com/2024/09/20/ex-cop-wields-law-that-only-protects-cops-to-sue-data-broker-for-selling-his-personal-data/&#34;&gt;Ex-Cop Wields Law That Only Protects Cops To Sue Data Broker For Selling His Personal Data&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;precrime-roundup&#34;&gt;Precrime Roundup:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://ioc.exchange/@matthew_d_green/113113384146496597&#34;&gt;Phones &amp;amp; Precrime&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://archive.is/cOnPx&#34;&gt;Billionaire Larry Ellison says a vast AI-fueled surveillance system can ensure &amp;lsquo;citizens will be on their best behavior&amp;rsquo;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://www.ctvnews.ca/business/pwc-tells-employees-it-will-use-location-data-to-police-back-to-office-rule-1.7031968&#34;&gt;PwC tells employees it will use location data to police &amp;lsquo;back-to-office&amp;rsquo; rule&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://sfstandard.com/2024/09/16/san-francisco-police-bought-drones-illegally-emails-warned/&#34;&gt;Emails show cops knew buying drones broke state law. They did it anyway&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://reclaimthenet.org/australian-intelligence-official-threatens-to-ban-private-messaging&#34;&gt;Australian Intelligence Official Threatens To Ban Private Messaging&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;control-grid-updates&#34;&gt;Control Grid updates:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://darkwebinformer.com/chainalysis-successful-deanonymization-attack-on-monero-2/&#34;&gt;Chainalysis Successful Deanonymization Attack on Monero&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://reclaimthenet.org/canadian-conservatives-propose-bill-for-online-digital-id-verification-and-anonymity-restrictions&#34;&gt;Canadian Conservatives Propose Bill for Online Digital ID Verification and Anonymity Restrictions&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://www.techradar.com/computing/artificial-intelligence/can-ai-make-you-less-gullible-or-is-it-a-conspiracy&#34;&gt;Can AI make you less gullible or is it a conspiracy?&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://x.com/ausvstheagenda/status/1834375535813951606&#34;&gt;This is about Sovereignty&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;music-credits&#34;&gt;Music Credits:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/n79aphwhpW0&#34;&gt;Y&amp;amp;V - Lune&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/o_v9WSImGIU&#34;&gt;Valcos - A New Light&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/qLYmtdi-GzA&#34;&gt;Killercats - Kaibu&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/MT814DNhy_U&#34;&gt;Ephixa &amp;amp; Jim Yosef - Everlasting [NCS Release]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;h3 id=&#34;honorable-mentions&#34;&gt;Honorable Mentions:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://www.cbc.ca/news/business/bakx-boc-cbdc-digital-currency-1.7326887&#34;&gt;Bank of Canada shelves idea for digital Loonie&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://www.ftc.gov/news-events/news/press-releases/2024/09/ftc-staff-report-finds-large-social-media-video-streaming-companies-have-engaged-vast-surveillance&#34;&gt;FTC Staff Report Finds Large Social Media and Video Streaming Companies Have Engaged in Vast Surveillance of Users&amp;hellip;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://blog.torproject.org/tor-is-still-safe/&#34;&gt;Is Tor still safe to use? &lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://nlnet.nl/news/2024/20240919-NGI-Assure-Concluded.html&#34;&gt;NGI Assure Programme Successfully Concluded&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://techcrunch.com/2024/09/21/x-reverses-course-in-brazil/&#34;&gt;X reverses course in Brazil&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://itsfoss.com/compute-module/&#34;&gt;What is a Compute Module? Why should you care about it?&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://cyberscoop.com/oig-audit-calls-for-more-clarity-from-cisa-dhs-on-disinformation-mission/&#34;&gt;OIG audit calls for more clarity from CISA, DHS on disinformation mission&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Private Web Search: A Contradiction in Terms</title>
		<link>https://libresolutions.network/articles/search/</link>
		<pubDate>Wed, 11 Sep 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/search/</guid>
		
		<image>https://libresolutions.network//media/stock/search.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/stock/search.webp" />
		<itunes:image href="https://libresolutions.network//media/stock/search.webp" />
		<description>A look at the fine details of finding information online</description>
		<content:encoded>&lt;p&gt;One of the first things many people do online is search for information. A simple search may not seem like sensitive information, but all of everyone&amp;rsquo;s searches, on every topic, all the time absolutely includes a lot of sensitive information. If that wasn&amp;rsquo;t bad enough, it&amp;rsquo;s relatively simple for those collecting the information to make inferences on that data to learn incredibly sensitive things about individuals.&lt;/p&gt;
&lt;p&gt;There is a wide variety of search engines that have attempted to build their own indexes, or tried to position themselves as privacy-respecting alternatives to mainstream search:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://swisscows.com/en&#34;&gt;Swisscows&lt;/a&gt; is an &amp;ldquo;anonymous search engine&amp;rdquo; hosted in Switzerland.&lt;/li&gt;
&lt;li&gt;Brave is not just a browser, but they have also attempted to put together their own independent &lt;a href=&#34;https://brave.com/search/&#34;&gt;search engine&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://kagi.com/&#34;&gt;Kagi&lt;/a&gt; is a company that hopes to make &lt;a href=&#34;https://help.kagi.com/kagi/why-kagi/why-pay-for-search.html&#34;&gt;paying for search&lt;/a&gt; a sustainable way to improve search functionality.&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://stract.com/&#34;&gt;Stract&lt;/a&gt; is another interesting option that received &lt;a href=&#34;https://libresolutions.network/articles/government-in-tech/&#34;&gt;funding from the EU,&lt;/a&gt; but unfortunately intends on using ads for &lt;a href=&#34;https://stract.com/about&#34;&gt;funding in the future.&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.mojeek.com/&#34;&gt;Mojeek&lt;/a&gt; is another attempt at an independent search provider.&lt;/li&gt;
&lt;li&gt;For those who like their solutions &lt;a href=&#34;https://libresolutions.network/articles/tokenized-resistance&#34;&gt;tokenized&lt;/a&gt; there&amp;rsquo;s &lt;a href=&#34;https://presearch.io/&#34;&gt;Presearch.&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;But if private search is a fruitless endeavor anyways, why not get some &lt;a href=&#34;https://www.ecosia.org/&#34;&gt;trees out of it?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To figure out how to protect our information online, we have to take a serious look at one of the biggest culprits of not only invasions of privacy, but also online manipulation and censorship: &lt;strong&gt;search engines.&lt;/strong&gt; It is incredibly tempting for some to want to replace a known-malicious part of their tech life (like &lt;em&gt;Google&lt;/em&gt;) by merely introducing a &amp;ldquo;better&amp;rdquo; drop-in replacement recommended online. Unfortunately, solving some of the serious problems regarding dragnet surveillance and censorship will require more consideration and effort.&lt;/p&gt;
&lt;h2 id=&#34;understanding-web-search&#34;&gt;Understanding Web Search&lt;/h2&gt;
&lt;p&gt;To many, web search is synonymous with &amp;ldquo;&lt;em&gt;Google&lt;/em&gt;&amp;rdquo;. Google certainly isn&amp;rsquo;t the only search engine out there, but it is by far the largest and most used in the English language. Despite it still being the de-facto standard for many, the concerns related to Google Search are quite numerous. From banning &lt;a href=&#34;https://archive.is/oZgOg&#34;&gt;particular results&lt;/a&gt; and queries, to the significant privacy concerns, there are a lot of reasons why somebody would want to switch to a different search engine.&lt;/p&gt;
&lt;p&gt;But the friction is quite high. Many report that no matter what engine they switch to, they never get quite as good results. This itself can sometimes be a bit of a &amp;ldquo;skill issue&amp;rdquo; given that searching is something one can get better at over time. There definitely is truth to people&amp;rsquo;s trouble however. Any competing search engine has a phenomenal amount of work to do before even beginning to think about being comparable. Any existing search engine has the advantage of time and hindsight. A new project effectively has to out-innovate both of those advantages in addition to building almost entirely from scratch.&lt;/p&gt;
&lt;p&gt;The most valuable and important parts of any search engine are the &lt;em&gt;crawler&lt;/em&gt; and the &lt;em&gt;index&lt;/em&gt;. These are the two crucial components any serious attempt at building a new search engine has to get right.&lt;/p&gt;
&lt;h3 id=&#34;the-crawler&#34;&gt;The Crawler&lt;/h3&gt;
&lt;p&gt;To allow others to search the entire web, you&amp;rsquo;d have to actually &lt;em&gt;visit&lt;/em&gt; the entire web at one point. If for no other reason to load the site and store what&amp;rsquo;s on the site. Building a bot (&lt;em&gt;or set of bots&lt;/em&gt;) to scan the entire internet and record their contents is a massive undertaking. This alone sets a very high minimum on the amount of resources required to build and maintain a search engine. Presumably, you want your search engine to be reasonably up to date, so this requires constant upkeep.&lt;/p&gt;
&lt;p&gt;Loading so many web sites, and downloading any needed resources alone is a huge burden in both bandwidth and storage costs. Some smaller search engines will focus on a particular niche. This comes with significant downsides however, crawling less creates blind spots for your search engine thus limiting its usefulness for others. That can be a perfectly reasonable trade-off when aiming for specialization. &lt;a href=&#34;https://wiby.me/&#34;&gt;Wiby&lt;/a&gt; for example, primarily indexes non-commercial hobbyist style web sites.&lt;/p&gt;
&lt;p&gt;While crawling the web there are effectively two big questions that need answers. 1) How wide do you cast your net over the web to discover resources? and 2) How much information do you collect on each resource? Number 2 is harder because one could just store links and their titles, but a more sophisticated engine will store keywords or even the entire text to have the most accurate information possible. With the the greater accessibility of machine transcription, it may even make sense to download and transcribe audio/video content for even more accuracy.&lt;/p&gt;
&lt;p&gt;If all that wasn&amp;rsquo;t challenging enough, there will always be content online that is inaccessible to your crawler. Any information that requires an account or payment will automatically be refused to your crawler until it becomes well-known and approved by those resources. The more time people create &amp;amp; share information behind these walled-gardens the worse off all search engines inevitably become.&lt;/p&gt;
&lt;h3 id=&#34;the-index&#34;&gt;The Index&lt;/h3&gt;
&lt;p&gt;After you&amp;rsquo;ve crawled all over the web your work still has only really just begun. A proper search engine needs to be fast, complete, and accurate. All of this relies on the information you&amp;rsquo;ve stored being intelligently analyzed and categorized for retrieval. For fast retrieval you&amp;rsquo;ll probably want to calculate scores for common queries in advance, or use mathematics to generate them with a carefully curated subset of your information. A search engine without a crawler is frozen in time, but a search engine without an index is just a massive unsorted collection of online resources.&lt;/p&gt;
&lt;p&gt;Properly building a search index requires a great deal of forethought and maintenance. There will always be ways to improve accuracy and speed. The algorithms built on top of your index may be specifically designed for particular kinds of information. There is ultimately no limit to what can be done to craft the perfect index of the entire web. I would argue that the index is the most important resource of a search engine, big or small.&lt;/p&gt;
&lt;h2 id=&#34;the-problem-of-surveillance&#34;&gt;The Problem of Surveillance&lt;/h2&gt;
&lt;p&gt;This is important to understand to make sense of the privacy risks of search engines. When you use a web search, it&amp;rsquo;s very difficult to hide the fact that you&amp;rsquo;re using it, especially from the provider itself. While tools like Tor &amp;amp; VPNs can mitigate the risk a bit, the vast majority of people won&amp;rsquo;t even take these (far from bullet-proof) measures. This creates a wide variety of concerns, especially as the searches from a wide variety of people starts becoming massively aggregated. Search data from particular people is also very useful information to have against that specific group.&lt;/p&gt;
&lt;p&gt;There have been many &amp;ldquo;private web search&amp;rdquo; providers that have entered the space. Ultimately the first thing they offer is a promise to collect less data about you than Google. While that&amp;rsquo;s good, it&amp;rsquo;s not a high bar. Even when a search engine actually collects very little, the aggregate information as a whole is still a treasure trove of power that can be used against individuals and groups alike. And if no user data is collected at all, that will never stop governments that snoop on their own citizens.&lt;/p&gt;
&lt;p&gt;In a time where people running tech companies are &lt;a href=&#34;https://www.theguardian.com/commentisfree/article/2024/sep/07/telegram-chiefs-arrest-sends-a-clear-message-tech-titans-are-not-above-the-law&#34;&gt;placed under arrest,&lt;/a&gt;  it&amp;rsquo;s time to start wondering how independent a search engine truly can be. Even with no data collection and no snooping involved, every entity will face the pressure to leave out inconvenient information from their index, even merely as a cost saving measure. The difficulty of running a large search engine itself creates so many challenges that are almost impossible for any truly independent organization to achieve without external interference.&lt;/p&gt;
&lt;p&gt;To make matters worse, given the difficulty in hiding that one is using a particular public search engine, it&amp;rsquo;s entirely possible that using an obscure search engine itself reveals a fair amount about a person.&lt;/p&gt;
&lt;h2 id=&#34;alternative-strategies&#34;&gt;Alternative Strategies&lt;/h2&gt;
&lt;h3 id=&#34;metasearch&#34;&gt;Metasearch&lt;/h3&gt;
&lt;p&gt;One strategy is to use a privacy-protecting &lt;a href=&#34;https://www.privacytools.io/privacy-frontends&#34;&gt;front-end&lt;/a&gt; to route your search queries through a variety of public search engines. &lt;a href=&#34;https://docs.searxng.org/&#34;&gt;SearXNG&lt;/a&gt; is a notable example that&amp;rsquo;s highly configurable. Using a metasearch engine alone is a meaningful improvement over using many public search engines. A community of people sharing a metasearch engine provides more people &amp;ldquo;safety in numbers&amp;rdquo;, at least from the search engines themselves.&lt;/p&gt;
&lt;p&gt;Of course, the danger of using a metasearch engine is that one is placing their trust on the operator to be responsible, trustworthy, and competent. Another point to consider is that a metasearch engine can not find information that is concealed (or otherwise not indexed) by the configured search engines.&lt;/p&gt;
&lt;h3 id=&#34;the-pirate-bay&#34;&gt;The Pirate Bay&lt;/h3&gt;
&lt;p&gt;The Pirate Bay is an example of a web service that has been able to stay online despite a massive amount of opposition both legal and technical. It&amp;rsquo;s important to note that this was possible because The Pirate Bay exists to index a narrow set of content (Torrents) and stores the bare-minimum amount of information to work. This allows the service to be quickly mirrored or migrated elsewhere incredibly easily. The larger and more complicated a service is, the harder it is to make resilient to external pressure and influence.&lt;/p&gt;
&lt;h3 id=&#34;searching-particular-sites&#34;&gt;Searching Particular Sites&lt;/h3&gt;
&lt;p&gt;Many seem to forget that various websites often have their own search function. This amnesia is sometimes warranted because sadly many sites own search engine is not as efficient as just using google and &lt;a href=&#34;https://support.google.com/websearch/answer/2466433&#34;&gt;specifying the site.&lt;/a&gt; When looking for specific information, it&amp;rsquo;s often quite effective to search specialized or related wiki&amp;rsquo;s or forums to get a specific answer. This lost art is becoming part of many people&amp;rsquo;s habits again now that search engines are gradually &lt;a href=&#34;https://libresolutions.network/articles/dead-internet&#34;&gt;getting worse&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Of course, searching a specific site is only as private as the site you&amp;rsquo;re visiting is. It is sad to hear that allegedly &amp;ldquo;Gen Z&amp;rdquo; is notorious for using TikTok as their go-to search engine, which is a condemnation of our current situation.&lt;/p&gt;
&lt;h2 id=&#34;can-we-do-better&#34;&gt;Can We Do Better?&lt;/h2&gt;
&lt;p&gt;It&amp;rsquo;s hard to believe that &lt;em&gt;yet another private search engine&lt;/em&gt; is the panacea to resolve all our privacy concerns. While many of them provide non-trivial benefits, for those aiming to make dragnet surveillance impossible, we need to go even further. Breaking away from the cloud works for various kinds of software, why can&amp;rsquo;t it work for search?&lt;/p&gt;
&lt;h3 id=&#34;local-search&#34;&gt;Local Search&lt;/h3&gt;
&lt;p&gt;Usually, your device has an embedded search function that can search files and even settings. This is a very useful thing to have. It doesn&amp;rsquo;t immediately sound like a crazy idea to distribute indexes to devices for people to search on their own. A narrow, but useful search engine would be a powerful thing to include on one&amp;rsquo;s own machine. &lt;a href=&#34;https://kiwix.org/en/&#34;&gt;Kiwix&lt;/a&gt; is a fascinating project that aims to provide (searchable) online resources for offline use.&lt;/p&gt;
&lt;p&gt;Personally, I actually do have my own locally hosted search engine. One of my favorite &lt;a href=&#34;https://gabe.rocks/tech/rss-love&#34;&gt;RSS&lt;/a&gt; readers, &lt;a href=&#34;https://freshrss.org&#34;&gt;FreshRSS&lt;/a&gt; stores every article from each feed I&amp;rsquo;m subscribed to. This means that when I want to find relevant commentary on a particular story, I can easily find stories related to topics I&amp;rsquo;m interested in. Having done this for quite some time, I&amp;rsquo;ve found it a very valuable tool for looking back as issues develop.&lt;/p&gt;
&lt;p&gt;Indexing the entire Internet is an immense affair. It&amp;rsquo;s entirely possible that the best search engine for an individual to represent an incredibly tiny fraction of the entire whole. Where possible it would be nice if such a search engine was able to be dynamically extended with additional indexes. That would mean that provided the device one is searching on is sound, all searches would be safe from prying eyes, and even censorship!&lt;/p&gt;
&lt;h3 id=&#34;information-management&#34;&gt;Information Management&lt;/h3&gt;
&lt;p&gt;What ultimately makes one search engine better than another is &lt;em&gt;relevance.&lt;/em&gt; This is what makes LLM-generated search summaries convincing even when they&amp;rsquo;re obviously wrong. If the solution to make offline search a viable endeavor is sharing small, but useful indexes, then a wide variety of information management tools are needed. Once such tool I&amp;rsquo;ve been starting to use is &lt;a href=&#34;https://logseq.com/&#34;&gt;Logseq&lt;/a&gt; and I&amp;rsquo;ve been quite impressed.&lt;/p&gt;
&lt;p&gt;Software like this, that allows users to leverage their own computing and knowledge in a harmonious way is clearly the way we build not only better privacy, but a much better digital experience for people. Those interested in learning how to build software should consider how to build tools that enable that experience, rather than ones that fit neatly within the cloud paradigm. More and more people are learning to break free from the cloud for their workflows, but often find themselves looking for tools. There are many niches worth filling, so find one you find interesting!&lt;/p&gt;
&lt;h3 id=&#34;building-high-quality-resources&#34;&gt;Building High-quality Resources&lt;/h3&gt;
&lt;p&gt;Condensing information and resources is incredibly valuable. By maintaining a public online resource where you curate useful knowledge, you can greatly assist others in saving time. This is where the Free and Open Web really shines. High quality independent websites are the backbone of a truly free cyberspace and can do innumerable things to tip the scales in favor of people and communities.&lt;/p&gt;
&lt;p&gt;As long as your content is available in accessible and/or machine-readable formats, a great deal can be done to make those resources indexed more easily. With a large collection of valuable information to share, you can reduce the odds that snoopers have a clear idea of what specific information people are accessing. This is why I would highly encourage any web site to include a full-text &lt;a href=&#34;https://libresolutions.network/rss&#34;&gt;RSS archive&lt;/a&gt; of all their posts. You never know when such a thing may be seriously helpful.&lt;/p&gt;
&lt;h2 id=&#34;conclusion&#34;&gt;Conclusion&lt;/h2&gt;
&lt;p&gt;Private web search is almost impossible in our current environment where large institutions are fighting over control of people&amp;rsquo;s very own knowledge. It is crucial to build solutions that broaden people&amp;rsquo;s ability to learn, create &amp;amp; share independently. Information control is a terrifying force that can be incredibly difficult to reverse. For many, search is where they acquire most of their information online, and it&amp;rsquo;s getting increasingly controlled. Thinking about ways to acquire information online without systems acting as gatekeepers is going to become only more important as time goes on.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Teachable Moment: John McAfee&#39;s Gmail Rant</title>
		<link>https://libresolutions.network/articles/teachable-mcafee/</link>
		<pubDate>Wed, 04 Sep 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/teachable-mcafee/</guid>
		
		<image>https://libresolutions.network//media/images/mcafee-glowing.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/mcafee-glowing.webp" />
		<itunes:image href="https://libresolutions.network//media/images/mcafee-glowing.webp" />
		<description>Responding to arguments from a late veteran computer expert</description>
		<content:encoded>&lt;p&gt;I&amp;rsquo;ve seen this video making the rounds and feel compelled to use it as a teachable moment. This is a great example that can be used to go deeper into a couple of important points about privacy &amp;amp; security. It&amp;rsquo;s always important to consider why a particular short, oversimplified video is making the rounds &lt;em&gt;right now&lt;/em&gt;. Often it&amp;rsquo;s not too hard to speculate why nefarious interests would be interested in promoting particularly simplified views. Important ideas take time to understand, so always take the time to reflect on the details when you can, or at least embrace some uncertainty.&lt;/p&gt;
&lt;h2 id=&#34;who-was-john-mcafee&#34;&gt;Who was John McAfee?&lt;/h2&gt;
&lt;p&gt;That&amp;rsquo;s a complicated question to answer. Allegedly John McAfee died of suicide in 2021. John had a compelling technical resume. Besides being known for selling anti-virus software, he also worked for Booz Allen Hamilton, Lockheed, and &lt;a href=&#34;https://en.wikipedia.org/wiki/John_McAfee&#34;&gt;even NASA.&lt;/a&gt; Despite being well credentialed, he was quite a controversial figure with a very dramatic life. What&amp;rsquo;s specifically relevant to his statements here is that he was somebody who got to learn computers very well just as they were getting off the ground. There is no doubt that he was a very skilled technical mind. In addition to this, he would bring important issues like &lt;a href=&#34;https://libresolutions.network/tags/cyberwar&#34;&gt;Cyberwar&lt;/a&gt; into the forefront of the &lt;a href=&#34;https://youtu.be/KMjCie-fTRo&#34;&gt;2016 US presidential election.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;He made some excellent statements regarding online privacy and security. It&amp;rsquo;s obvious that McAfee had a very clear understanding of not only the technological details, but also the broader social implications. During some of his more lucid comments he discusses the important details with clarity that I hope to someday myself. In some ways, I would argue this clip is doesn&amp;rsquo;t represent him at his best. So much so, that I am convinced the wide dissemination of this particular clip is a &lt;a href=&#34;https://roundingtheearth.substack.com/p/mindwar-not-fifth-generation-warfare&#34;&gt;mindwar operation&lt;/a&gt; aimed at not only disarming people from taking their own privacy seriously, but also to discredit some of McAfee&amp;rsquo;s more salient points.&lt;/p&gt;
&lt;p&gt;One final disclaimer is that I am uncertain when this video was recorded, but of all people John would still know better regardless.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://libresolutions.network/media/text/mcafee-gmail-rant.txt&#34;&gt;[Link to transcript]&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;rebuttals--refinement&#34;&gt;Rebuttals &amp;amp; Refinement&lt;/h2&gt;
&lt;h3 id=&#34;overall-message&#34;&gt;Overall message&lt;/h3&gt;
&lt;p&gt;Before addressing the content of the message, there is a lot about the &lt;em&gt;framing&lt;/em&gt; that needs to be addressed. The most important factor is that privacy and security are not a simple binary of &amp;ldquo;safe/unsafe&amp;rdquo;. Safe from who? Unsafe how? There are always finer details that matter. Given McAfee&amp;rsquo;s complicated history, he has a particular (well-funded and well-staffed) adversary in mind and is predominantly concerned with a single threat (the US government).&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://libresolutions.network/media/diagrams/threat%20modeling.webp&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/diagrams/threat%20modeling.webp&#39; 
&gt;

&lt;/a&gt;


&lt;p class=&#34;caption&#34;&gt;
    Feel free to download and share! 
&lt;/p&gt;


&lt;/div&gt;
&lt;p&gt;You&amp;rsquo;re probably (&lt;em&gt;hopefully&lt;/em&gt;) not in the same situation that John McAfee was, therefore your particular risks and circumstances will vary. Not only is this specific advice not particularly applicable to most individuals, many more concerns have become more pervasive threats to individuals and organizations alike. In short, cyberwar is no longer a sci-fi, or state-vs-state affair. Instead governments and corporations are &lt;a href=&#34;https://libresolutions.network/articles/insecurity&#34;&gt;wrestling over control&lt;/a&gt; of not just the public conversation, but our &lt;a href=&#34;https://libresolutions.network/articles/government-in-tech&#34;&gt;technological future&lt;/a&gt; as a whole.&lt;/p&gt;
&lt;p&gt;Thus your average individual (&lt;em&gt;even more for a high-value target!&lt;/em&gt;) needs to be cognizant of a wide variety of threats: stalkers, scammers, online mobs, gangs of cyber criminals, and even tech companies themselves. While McAfee makes some factual points in the video, the overall video leaves a counter-productive impression. It&amp;rsquo;s the opposite of informative, and requires fine correction. In today&amp;rsquo;s environment, things have only gotten much more complicated in the last few years, and certainly the last decade.&lt;/p&gt;
&lt;p&gt;Yes, it is almost certain that a capable, motivated adversary can absolutely seize data from almost anyone no matter how cautious. The question is at what cost? Can every adversary seize everyone&amp;rsquo;s data all the time? That would get quite expensive rather fast, it would become even more expensive if those people were taking strategic measures to enhance their privacy and security. Ultimately, if we wish to de-fang the surveillance and censorship apparatus, getting more people involved to take action to raise the cost of mass surveillance is a highly effective tactic.&lt;/p&gt;
&lt;p&gt;In addition to new adversaries, the game has gotten a lot more complicated with the advancement of new threats to people&amp;rsquo;s digital lives. Various governments are cracking down on various forms of dissent and online speech. Highly sophisticated &lt;a href=&#34;https://www.interpol.int/en/News-and-Events/News/2024/INTERPOL-Financial-Fraud-assessment-A-global-threat-boosted-by-technology&#34;&gt;online scams are on the rise.&lt;/a&gt; The sum total of data collection on people is weaponized to manipulate the public. Even &lt;a href=&#34;https://mastodon.social/users/wchr/statuses/113045679054331232&#34;&gt;employers&lt;/a&gt; are getting in on the mass surveillance game. State and private propaganda influence operations wage cyberwar both covert and overt. And if all that wasn&amp;rsquo;t bad enough, machine learning algorithms are quite capable of making all of the above a lot worse.&lt;/p&gt;
&lt;p&gt;As always, the only constant is change. One can&amp;rsquo;t expect to clip two minutes from somebody with a very unique situation and an incredible depth of knowledge and necessarily expect to fairly represent their sum total expertise. I am certain that if John McAfee was still alive today and didn&amp;rsquo;t have the adversaries he did, he would state things very differently.&lt;/p&gt;
&lt;h2 id=&#34;point-by-point&#34;&gt;Point by point&lt;/h2&gt;
&lt;h3 id=&#34;email&#34;&gt;Email&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;I am dissed constantly for using &lt;em&gt;Gmail&lt;/em&gt; as my email system&lt;br&gt;
&amp;hellip;&lt;br&gt;
if you think you have any privacy whatsoever with an encrypted system whether it’s an email system like Proton mail or an encrypted messaging system like signal you have no fucking privacy&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;The problems with email are pervasive. Even tools like Pretty Good Privacy (PGP) have their limitations. While McAfee is correct to point out that encryption is no &lt;em&gt;&amp;lsquo;silver bullet&lt;/em&gt; to privacy with email, he&amp;rsquo;s completely wrong when it comes to the choice of provider. As he points out later in the video, encryption was designed to thwart man-in-the-middle attacks. He&amp;rsquo;s likely not at all concerned about somebody (other than the govt) compromising Google&amp;rsquo;s infrastructure to get at him. The problem is that in his situation, the vast array of concerns from Google itself are still &lt;a href=&#34;https://campaignsoftheworld.com/news/the-dark-side-of-google/&#34;&gt;worth considering.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;It would be better if McAfee explained that in his situation, abstract concerns like data-mining and data sovereignty are a much lower priority to him when he has to worry about imprisonment (and potentially assassination). But when an email provider (even one such as Proton) has the capability of snooping on emails, there are many reasons why an individual would want to take precautions. This is where the condemnation of Gmail makes perfect sense. From a standpoint of protecting emails from prying eyes of the provider, Google is obviously the worst one to choose.&lt;/p&gt;
&lt;p&gt;That said, Signal and Proton mail are worlds apart in terms of the risks involved. It&amp;rsquo;s not a reasonable comparison to make. Signal was originally designed to protect SMS messages, and eventually this was dropped in favor of becoming a pure messaging app. It&amp;rsquo;s pretty cool these days to dunk on Signal for it&amp;rsquo;s board&amp;rsquo;s membership, but when governments come knocking they repeatedly show they have (almost) nothing to hand over as recently as &lt;a href=&#34;https://signal.org/bigbrother/santa-clara-county/&#34;&gt;last month.&lt;/a&gt; On the other hand Proton has &lt;a href=&#34;https://restoreprivacy.com/protonmail-logs-users/&#34;&gt;repeatedly&lt;/a&gt; handed over user data.&lt;/p&gt;
&lt;p&gt;Notably, there is a &amp;ldquo;secure by design&amp;rdquo; email client that does offer similar protection. It seems surprisingly absent in many discussions around secure messengers, but &lt;a href=&#34;https://delta.chat/en/&#34;&gt;Delta Chat&lt;/a&gt; is a fascinating telegram competitor that I believe is vastly underestimated in this space. Recently Delta Chat was able to respond to Russian authorities that they &lt;a href=&#34;https://delta.chat/en/2020-05-01-roskamnadzor&#34;&gt;have no user data to give away.&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;encryption&#34;&gt;Encryption&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;encryption was designed 35 years ago to prevent a man in the middle attack meaning someone between your transmission and your receipt&lt;br&gt;
&amp;hellip;&lt;br&gt;
encryption is a worthless piece of shit old technology that is being marketed as a safe system. There is no safety anymore, there is no privacy.&lt;br&gt;
&amp;hellip;&lt;br&gt;
you are being sold a fucking bill of goods which is worthless with encryption&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;As explained earlier, this is all relative. Cryptography (encryption) is a tool, and tools need to be applied and understood in their proper context. McAfee is absolutely correct that &amp;ldquo;encrypted&amp;rdquo; has become somewhat of a marketing buzzword that loses meaning rather quickly. Encryption is a very useful tool in a wide variety of contexts. It&amp;rsquo;s quite ironic that many sharing this particular rant would also argue Signal is &amp;ldquo;worthless&amp;rdquo; because it &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/signal-downplays-encryption-key-flaw-fixes-it-after-x-drama/&#34;&gt;didn&amp;rsquo;t encrypt&lt;/a&gt; the local messages database in the desktop client.&lt;/p&gt;
&lt;p&gt;There are different ways to use encryption to protect information. You can protect information in transit (which is what McAfee refers to here), you can encrypt it at &amp;ldquo;rest&amp;rdquo; (which is what Signal was criticized for not doing), and apparently while &lt;a href=&#34;https://phoenixnap.com/blog/encryption-in-use&#34;&gt;in use.&lt;/a&gt; Depending on your situation, these different techniques all have very important effects on what and how it protects. Of course, the details matter. Encrypting not enough is often just as damaging as not encrypting at all.&lt;/p&gt;
&lt;p&gt;This is where my charitable interpretation of what McAfee is expressing is that in his situation, he feels that encryption will not protect him against the particular adversary he&amp;rsquo;s concerned about. That&amp;rsquo;s certainly a defensible position, but it&amp;rsquo;s far from saying encryption is worthless for everyone, everywhere, all the time.&lt;/p&gt;
&lt;h3 id=&#34;smartphones&#34;&gt;Smartphones&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;there&amp;rsquo;s no man in the middle anymore! we don&amp;rsquo;t need them&lt;br&gt;
your fucking smartphone is the surveillance device preferred by every government on the fucking planet&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;This is the strongest point in the entire video, since many individuals will also have a smartphone. It is important to have reasonable expectations about what protections you can have from un-trusted devices you use. Arguably, this is the biggest &lt;em&gt;&amp;lsquo;Achilles Heel&amp;rsquo;&lt;/em&gt; of various privacy software, if it only works on a smartphone your expectations have to be reduced dramatically. This also applies to any system running an atrocious AI data-miner such as &lt;a href=&#34;https://arstechnica.com/gadgets/2024/08/microsoft-will-try-the-data-scraping-windows-recall-feature-again-in-october/&#34;&gt;Microsoft Recall&lt;/a&gt; ( or even &lt;a href=&#34;https://globalnews.ca/news/10580200/kaspersky-cyber-product-us-ban/&#34;&gt;antivirus software&amp;hellip;?&lt;/a&gt; )&lt;/p&gt;
&lt;p&gt;How much you can trust a particular device or system is a complicated question. A great deal has gone into protecting consumer devices, and for various Android devices there are ways to have them &lt;em&gt;&amp;ldquo;De-Google&amp;rsquo;d&amp;rdquo;&lt;/em&gt; that may provide some benefits. But! McAfee&amp;rsquo;s strongest point is also a fairly weak point against encryption in general. Because serious risks to savvy smartphone users are really only presented by governments and tech companies. For those concerned with protecting their data sovereignty, there are significant benefits to encryption even on these devices. At any rate, people always have the choice to perform private tasks on more secure devices.&lt;/p&gt;
&lt;h3 id=&#34;malware&#34;&gt;Malware&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;Do you know how easy it is to plant malware?&lt;br&gt;
Go on pornhub, if you&amp;rsquo;ve been on pornhub someone is now listen[ing] to you.&lt;br&gt;
All you have to do is do a drive-by of a website and it sets the &amp;ldquo;download unauthorized applications flag&amp;rdquo;, the first click and you now have malware that is doing two things:&lt;br&gt;
Watching your inputs before they&amp;rsquo;re encrypted and transmitting them &lt;br&gt;
And reading the outputs after they are fucking [de]crypted people&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;This is another very solid point in general. It&amp;rsquo;s not just state-level actors leveraging malware to &lt;a href=&#34;https://arstechnica.com/tech-policy/2024/06/shopping-app-temu-is-dangerous-malware-spying-on-your-texts-lawsuit-claims/&#34;&gt;collect people&amp;rsquo;s information&lt;/a&gt; or seize &lt;a href=&#34;https://timesofindia.indiatimes.com/india/pegasus-like-spyware-attack-likely-on-select-individuals-warns-apple/articleshow/109227296.cms&#34;&gt;control over people&amp;rsquo;s devices.&lt;/a&gt; As always, this is a greater concern for high-value targets, but even just the technologically naive can fall for opportunistic traps. Again, this doesn&amp;rsquo;t feel like a strong argument against encryption, but rather raises the amount of effort one has to put in managing their digital affairs. Nobody would seriously suggest that just because a thief can throw a brick through your window that you should never lock your doors.&lt;/p&gt;
&lt;p&gt;One could always avoid porn sites and &lt;a href=&#34;https://libresolutions.network/articles/hostile-cyberspace&#34;&gt;hostile cyberspace&lt;/a&gt; all together. It&amp;rsquo;s possible to build more secure systems that protect regular users better. There&amp;rsquo;s always a great deal that you can do to measurably reduce your risk to malware. Just being careful and running an &lt;a href=&#34;https://ublockorigin.com/&#34;&gt;ad-blocker&lt;/a&gt; takes you a great deal of the way there.&lt;/p&gt;
&lt;h3 id=&#34;legal&#34;&gt;Legal&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;I use Gmail for one reason&lt;br&gt;
the last company that requires a fucking subpoena from a government in order to give them your information, and their lawyers have 30 fucking days to review the subpoena&lt;br&gt;
30 days is enough for me, I change my email every 15 days&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;I think relying on a legal strategy to protect your data is more flawed than relying on encryption. Just ask anyone who wants &lt;a href=&#34;https://gdpr.eu/right-to-be-forgotten/&#34;&gt;to be forgotten&lt;/a&gt; online. I don&amp;rsquo;t think anyone can be certain that Google can&amp;rsquo;t figure out which of their users keeps changing accounts every two weeks. The best argument McAfee would have for using Gmail is that he is so attached to the Google ecosystem that it would be pointless for him to try to withhold information from them. Even simple things like using an Android phone, and various cloud services is enough to cross that threshold. But that represents an entirely new problem.&lt;/p&gt;
&lt;h2 id=&#34;not-discussed-but-still-relevant&#34;&gt;Not discussed, but still relevant&lt;/h2&gt;
&lt;h3 id=&#34;interacting-with-others&#34;&gt;Interacting with others.&lt;/h3&gt;
&lt;p&gt;Lets take everything McAfee said at face value for a moment. He claims that in his situation, there&amp;rsquo;s no benefit to him for switching from Gmail to any other nominally secure provider for email. This breaks down the moment somebody else wants to contact him via email or he contacts a person through email. Suddenly he&amp;rsquo;s impacted someone else&amp;rsquo;s ability to protect information from Google just to communicate with him. This is exactly why even if it would do him no benefit to switch, others would benefit from him switching to a different provider. For example, if he was using Proton for mail, any Proton user could send him an email that would be encrypted in transit and at rest, and be at least a fair bit safer than in plain text on Google&amp;rsquo;s servers.&lt;/p&gt;
&lt;h2 id=&#34;conclusion&#34;&gt;Conclusion&lt;/h2&gt;
&lt;p&gt;While John McAfee was a very knowledgeable person, his particular situation leads him to make judgement calls that aren&amp;rsquo;t necessarily right for everyone, especially as the situation evolves. At best, it&amp;rsquo;s an important reminder that your privacy and security are never entirely up to a single technology choice. It is the sum total of all your digital decisions that makes up your overall situation. Systems that handle personal information need to embody the spirit of &amp;ldquo;secure by design&amp;rdquo;. As always, the best way to protect information is not to record it, but the next best thing is to not store it. If it must be stored, than encryption is one tool to protect it from prying eyes.&lt;/p&gt;
&lt;p&gt;If you see somebody sharing that video to make a snide point that protecting privacy is worthless, please consider sharing this post to explain why the reality is much more nuanced than that short clip presents.&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;Rest in peace John McAfee.&lt;br&gt;
I pray that God has mercy on his soul, and for comfort to his loved ones.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Cyber Fix: Episode 6</title>
		<link>https://libresolutions.network/videos/cyber-fix-6/</link>
		<pubDate>Mon, 26 Aug 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/cyber-fix-6/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/cyber-fix-6.ogg" />
			
		
		<image>https://libresolutions.network//media/images/cyber-fix-icon.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/cyber-fix-icon.webp" />
		<itunes:image href="https://libresolutions.network//media/images/cyber-fix-icon.webp" />
		<description>Tech Disasters &amp; Solutions</description>
		<content:encoded>&lt;p&gt;Welcome to Cyber Fix, your dopamine-infused tech news update.&lt;br&gt;
My name is Gabriel, here to help get other information junkies up to speed with important tech news. Stay tuned for a light-hearted exploration of hostile cyberspace and what we can do about it.&lt;/p&gt;
&lt;p&gt;Cyber Fix is on hiatus, you may now listen to full episodes on &lt;a href=&#34;https://peertube.libresolutions.network/w/p/2FbUhGmiRbzmf1TUjWP3Xr&#34;&gt;PeerTube&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;tech-disasters&#34;&gt;Tech Disasters&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/hackers-leak-27-billion-data-records-with-social-security-numbers/&#34;&gt;Hackers leak 2.7 billion data records with Social Security numbers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.troyhunt.com/inside-the-3-billion-people-national-public-data-breach/&#34;&gt;Inside the &amp;ldquo;3 Billion People&amp;rdquo; National Public Data Breach&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/microsoft/microsoft-confirms-august-updates-break-linux-boot-in-dual-boot-systems/&#34;&gt;Microsoft confirms August updates break Linux boot in dual-boot systems&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/microsoft/zero-click-windows-tcp-ip-rce-impacts-all-systems-with-ipv6-enabled/&#34;&gt;Zero-click Windows TCP/IP RCE impacts all systems with IPv6 enabled, patch now&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/google-fixes-ninth-actively-exploited-chrome-zero-day-in-2024/&#34;&gt;Google fixes ninth Chrome zero-day tagged as exploited this year&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.threads.net/@chriswelch/post/C-8LF4BOSAP&#34;&gt;Google Pixel 9&amp;rsquo;s AI photo features&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;solutions-roundup&#34;&gt;Solutions Roundup:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://lunduke.locals.com/post/6020029/total-linux-desktop-pcs-now-over-56-million&#34;&gt;Total Linux Desktop PCs Now Over 56 Million&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://logseq.com/&#34;&gt;Logseq&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.surveillancewatch.io/&#34;&gt;Surveillance Watch&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://arxiv.org/abs/2206.04049&#34;&gt;Hypersyn: A Peer-to-Peer System for Mutual Credit&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://childrenshealthdefense.org/defender/robert-kennedy-jr-chd-standing-biden-administration-censorship-lawsuit/&#34;&gt;RFK Jr. and CHD Get Green Light to Sue Biden Administration for Censorship&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;control-grid-updates&#34;&gt;Control Grid Updates:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://arstechnica.com/security/2024/08/shocker-french-make-surprise-arrest-of-telegram-founder-at-paris-airport/&#34;&gt;Shocker: French make surprise arrest of Telegram founder at Paris airport&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.cryptographyengineering.com/2024/08/25/telegram-is-not-really-an-encrypted-messaging-app/&#34;&gt;Is Telegram really an encrypted messaging app?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://telegram.org/faq#q-do-you-process-data-requests&#34;&gt;How does Telegram process data requests?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://thebaffler.com/salvos/the-crypto-keepers-levine&#34;&gt;The Crypto- Keepers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.eff.org/deeplinks/2024/08/un-general-assembly-and-fight-against-cybercrime-treaty&#34;&gt;The UN General Assembly and the Fight Against the Cybercrime Treaty&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.eff.org/deeplinks/2024/08/eff-and-partners-breton-uphold-fundamental-rights-enforcing-dsa&#34;&gt;EFF and Partners to EU Commissioner: Prioritize User Rights, Avoid Politicized Enforcement of DSA Rules&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.nbcnews.com/news/us-news/disney-says-man-cant-sue-wifes-death-agreed-disney-terms-service-rcna166594&#34;&gt;Disney says man can&amp;rsquo;t sue over wife&amp;rsquo;s death because he agreed to Disney+ terms of service&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;finer-details&#34;&gt;Finer Details:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://x.com/NameIsSpartacus/status/1826121058388423012&#34;&gt;I ain&amp;rsquo;t scared of no nanobots&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;honorable-mentions&#34;&gt;Honorable Mentions:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.welivesecurity.com/en/eset-research/be-careful-what-you-pwish-for-phishing-in-pwa-applications/&#34;&gt;Phishing in PWA applications (iOS &amp;amp; Android)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=iZyqVGHjDGo&#34;&gt;Communities on Nostr with Ditto&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.wired.com/story/the-cloud-is-a-prison-can-the-local-first-software-movement-set-us-free/&#34;&gt;The Cloud Is a Prison. Can the Local-First Software Movement Set Us Free?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.isosceles.com/openssh-backdoors/&#34;&gt;OpenSSH Backdoors&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.jim-nielsen.com/2024/blog-vs-social-posts/&#34;&gt;Blog Posts vs. Social Posts&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.thisdaysportion.com/posts/modes-of-reading-the-independent-web&#34;&gt;Modes of reading the independent web&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://tube.tchncs.de/videos/watch/84879753-be58-4461-84ac-95f96f51d190&#34;&gt;BREAKING: Telegram Founder Pavel Durov ARRESTED&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.w3.org/TR/privacy-principles/#privacy-labour&#34;&gt;Privacy Labor&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;music-credits&#34;&gt;Music Credits:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/n79aphwhpW0&#34;&gt;Y&amp;amp;V - Lune&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/o_v9WSImGIU&#34;&gt;Valcos - A New Light&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/qLYmtdi-GzA&#34;&gt;Killercats - Kaibu&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/Uq-jny83Tlw&#34;&gt;Sad Dubstep Music&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Operation: Hearth</title>
		<link>https://libresolutions.network/operations/hearth/</link>
		<pubDate>Mon, 19 Aug 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/operations/hearth/</guid>
		
		<image>https://libresolutions.network//media/stock/barn-house.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/stock/barn-house.webp" />
		<itunes:image href="https://libresolutions.network//media/stock/barn-house.webp" />
		<description>Making computing more local</description>
		<content:encoded>&lt;p&gt;A radically different digital experience is more within reach than it would seem. With a bit of effort, support, and creativity, small groups and communities can make a huge difference. People can build up, pool, and share digital resources to benefit others. By adapting to the physical realities of digital systems, we can make more beneficial choices. Not only that, but there is the opportunity to restructure cyberspace in a way that is more in tune with people&amp;rsquo;s real-life connections. Despite how &amp;ldquo;pie in the sky&amp;rdquo; this may sound, it is a realistic initiative for gradually liberating people from top-down digital control.&lt;/p&gt;
&lt;p&gt;The secret to &lt;a href=&#34;#&#34;&gt;Operation: Hearth&lt;/a&gt; is the efficient re-allocation of technological resources with people in mind. Big Tech has operated on the basis of providing so much for free, that even highly technical people have lost sight of the importance of these resources. This creates scenarios where entire communities, institutions and even governments &lt;a href=&#34;https://libresolutions.network/articles/government-in-tech/&#34;&gt;struggle with control&lt;/a&gt; over their own digital sovereignty.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&amp;ldquo;Decentralization is the way of the future&amp;hellip;&lt;br&gt;
The revolution is already here. The only question is:&lt;br&gt;
&lt;strong&gt;Do you want to be a part of it?&amp;rdquo;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;James Corbett&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://corbettreport.com/decentralize-everything-how-to-avoid-the-technocratic-nightmare/&#34;&gt;Decentralize Everything: How To Avoid the Technocratic Nightmare&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;I&amp;rsquo;ll re-introduce the three primary resources in cyberspace brought up in my guide &lt;a href=&#34;https://gabe.rocks/tech/reclaiming-cyberspace/&#34;&gt;Reclaiming Territory in Cyberspace&lt;/a&gt; which are: &lt;strong&gt;computing power,&lt;/strong&gt; &lt;strong&gt;bandwidth,&lt;/strong&gt; and &lt;strong&gt;storage.&lt;/strong&gt; Every device you acquire, or put to use has advantages and disadvantages regarding those resources. For example, it is intuitive to even non-technical people that a &lt;a href=&#34;https://thin.computer/index.php/2024/03/21/using-termux-on-android-for-self-hosting-yes-really/&#34;&gt;smart phone&lt;/a&gt; is likely not the device you want to use to provide a web service to millions of users. Our advantage when trying to reclaim cyberspace is that we&amp;rsquo;re not trying to move everyone on big tech to a new super-massive platform. Instead we are trying to do our part to make radical change on the &lt;a href=&#34;https://small-tech.org/&#34;&gt;small&lt;/a&gt; scale. The following strategies are introduced in order from least to most skill required.&lt;/p&gt;
&lt;h3 id=&#34;offline-first-workflows&#34;&gt;Offline-first Workflows&lt;/h3&gt;
&lt;p&gt;Free (and Open Source) Software is fantastic. Many people intuitively understand the benefits of software being collaboratively built in the open, but there is a far greater advantage of using such solutions: offline-first workflows. By ensuring all your working data (such as documents, photos, videos and everything else) is in one place makes it much easier to keep track of and &lt;a href=&#34;https://libresolutions.network/articles/backups&#34;&gt;backup&lt;/a&gt; when needed.&lt;/p&gt;
&lt;p&gt;This is something almost anybody can take advantage of.  The goal is not necessarily to never connect to the Internet, but to do all you can without being reliant on it. A great deal of my software choices have been made with this in mind.&lt;br&gt;
Here is a list of Free (and Open Source) Software that I believe are useful for this:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://libreoffice.org&#34;&gt;LibreOffice&lt;/a&gt; for documents / spreadsheets.&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://inkscape.org&#34;&gt;Inkscape&lt;/a&gt; for creating / editing images as well as PDFs.&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://krita.org&#34;&gt;Krita&lt;/a&gt; for those with artistic talent.&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blender.org&#34;&gt;Blender&lt;/a&gt; a phenomenally powerful tool that can be used for a wide variety of creative tasks. I&amp;rsquo;ve used it for video editing but it&amp;rsquo;s also a very powerful 2d &amp;amp; 3d animation suite!&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://freecad.org&#34;&gt;FreeCAD&lt;/a&gt; A parametric 3d modeler, which means you can design precise components for 3D printing.&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.kicad.org/&#34;&gt;KiCad&lt;/a&gt; allows you to design circuit boards.&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://mozilla.org/en-US/thunderbird&#34;&gt;Thunderbird&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/JetpackDuba/Gitnuro/&#34;&gt;Gitnuro&lt;/a&gt; a tool for git &lt;a href=&#34;https://libresolutions.network/videos/gitnuro&#34;&gt;[Developer interview]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/abb128/LiveCaptions&#34;&gt;LiveCaptions&lt;/a&gt; is a pretty neat utility that provides real-time audio transcription for Linux desktop users.&lt;/li&gt;
&lt;li&gt;&amp;hellip;and many, many more. This is not an exhaustive list by any means.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;sharing-is-caring&#34;&gt;Sharing is Caring&lt;/h2&gt;
&lt;p&gt;The following are strategies that more technical people can use to help bring others the benefits of more localized and (more) trusted computing. The downstream consequences of such a transformation would do wonders to combat censorship, top-down manipulation, and surveillance all at the same time. What many people under-estimate is that it once particular services are established and running, it can be quite trivial to share them in ways that make it even easier to for others to participate.&lt;/p&gt;
&lt;h3 id=&#34;the-home-server&#34;&gt;The Home Server&lt;/h3&gt;
&lt;p&gt;Change really can start at home. If you have a spare computer lying around, or even just a powerful machine, you can start running your own home services. This is a very useful way for technical people to provide their family members with the advantages of a (more) trusted computing experience without as much friction. One of the more popular options for this is to run a &lt;a href=&#34;https://nextcloud.com/athome/&#34;&gt;Nexcloud&lt;/a&gt; server. The options are &lt;a href=&#34;https://github.com/awesome-selfhosted/awesome-selfhosted&#34;&gt;quite limitless&lt;/a&gt; especially if one learns to build their own services.&lt;/p&gt;
&lt;p&gt;The main advantage of a home server is that you can once again gain all the benefits of cloud computing without the drawbacks of putting your data under somebody else&amp;rsquo;s control. With great power comes great responsibility, so it is important to take on challenges gradually as you learn to resolve troubles. Becoming your own (or your family&amp;rsquo;s) IT person can be frustrating and demanding at times. With reasonable expectations, gradual improvements, and a bit of patience by everyone involved, a great deal of good can be accomplished. I would highly recommend experimenting quite a bit to get a feel for what you want to run and support before taking on others as users.&lt;/p&gt;
&lt;p&gt;There are a variety of tools that themselves can help one in their goal of learning to run their own services. While these specific tools are handy, they are by no means a requirement. It&amp;rsquo;s possible to even run your own services from a Windows machine.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://libreserver.org/&#34;&gt;LibreServer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://yunohost.org/#/&#34;&gt;Yunohost&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/Start9Labs/start-os&#34;&gt;StartOS&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;community-services&#34;&gt;Community Services&lt;/h3&gt;
&lt;p&gt;Do you know if you have a local, trusted hosting provider for various online services? It seems highly likely that the real reason many people are stuck with big-tech options is because of a lack of trusted local services. With surveillance and censorship only becoming more extreme, providing private local services seems like a huge opportunity for skilled and well-equipped entrepreneurs who want to protect not only themselves, but others as well.&lt;/p&gt;
&lt;p&gt;Community services are very well suited to systems that perform better at scale. These can be things like e-mail &amp;amp; community discussion platforms, to other more radical ideas such as providing storage and bandwidth for smaller entities in the community. Another benefit is that thanks to the Internet, these community run services can still be quite accessible to the wider-world when needed.&lt;/p&gt;
&lt;p&gt;For those who are remote or isolated for whatever reason, they can absolutely still benefit from online community services. Both skilled and less-skilled people alike can reap the benefits of pooled resources with a wide variety of options. Some may choose to offer open services &lt;a href=&#34;https://disroot.org/en&#34;&gt;to the public,&lt;/a&gt; but that is not the only option.&lt;/p&gt;
&lt;h4 id=&#34;pubnix&#34;&gt;Pubnix&lt;/h4&gt;
&lt;p&gt;I&amp;rsquo;d like to take the opportunity to highlight the concept of a &lt;em&gt;public access unix system.&lt;/em&gt; The provider(s) maintain and run what is essentially a shared computer over the Internet. This means that the capability exists for small online communities (or &amp;ldquo;digital tribes&amp;rdquo;) can have all kinds of community-centered experiences. Once someone with the skill understands how a &lt;a href=&#34;https://tilde.town/~cmccabe/online-communities.html&#34;&gt;pubnix&lt;/a&gt; works, it becomes clear that they are a very powerful tool for empowering small-scale groups of people online.&lt;/p&gt;
&lt;p&gt;An old and famous pubnix is the &lt;a href=&#34;https://en.wikipedia.org/wiki/SDF_Public_Access_Unix_System&#34;&gt;Super Dimension Fortress&lt;/a&gt; and it&amp;rsquo;s something I wish I had encountered when I was learning my way around computers &amp;amp; linux. &lt;a href=&#34;https://sdf.org&#34;&gt;SDF&lt;/a&gt; has been in operation &lt;strong&gt;since 1987&lt;/strong&gt; which makes it older than a large amount of computer users today. It&amp;rsquo;s not the only example, there is also the &lt;a href=&#34;https://tilde.club&#34;&gt;Tilde Club&lt;/a&gt; and a wider network of &lt;a href=&#34;https://tildeverse.org/&#34;&gt;tilde communities.&lt;/a&gt; While these existing pubnixes are excellent and fascinating projects by themselves, I would challenge you to imagine what starting your own would look like.&lt;/p&gt;
&lt;p&gt;Many of these pubnixes provide a near friction-less experience for members who want to start building their own web space on top of it. Of course this is not at all limited to the web, and applies to many other kinds of online services. It&amp;rsquo;s an invaluable model for online communities that deserves much greater traction and awareness.&lt;/p&gt;
&lt;h2 id=&#34;restructuring-cyberspace&#34;&gt;Restructuring Cyberspace&lt;/h2&gt;
&lt;p&gt;With a long goal of radically changing cyberspace in mind, it becomes clear that there is actually quite a bit of work to do. It&amp;rsquo;s easy to be overwhelmed with despair when one understand how far the Internet &lt;em&gt;is&lt;/em&gt; from what it &lt;em&gt;could be&lt;/em&gt;. What should excite you is that much of the effort required presents a treasure-trove of opportunities for learning and innovation. It has never been easier for individuals and groups, to have a positive impact on our digital future.&lt;/p&gt;
&lt;h3 id=&#34;new-software--hardware&#34;&gt;New Software &amp;amp; Hardware&lt;/h3&gt;
&lt;p&gt;As the three primary resources in cyberspace (storage, computing power, bandwidth) become less scarce to smaller groups, new opportunities open up for systems better suited for that environment. Many ideas and techniques that seem implausible now, may very well be critical in building the foundation for a better digital future. The chance to write truly important software, and build revolutionary hardware is becoming more and more accessible. Early innovators can take a chance at building for the future they want, potentially resolving many &amp;ldquo;chicken and egg&amp;rdquo; problems.&lt;/p&gt;
&lt;h3 id=&#34;local-isps--community-networks&#34;&gt;Local ISPs / Community Networks&lt;/h3&gt;
&lt;p&gt;Acquiring and running computing power and having lots of storage definitely helps a person, group, or community gain more digital sovereignty. When it comes to the world-wide-web having low-latency high-speed connections are also quite important. There are many radical approaches to not only making networks &lt;a href=&#34;https://www.ncf.ca/en/high-speed-internet/community-wifi/&#34;&gt;more accessible,&lt;/a&gt; but by building local networks you build resilience from external disruption.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Self-management, the absence of profit, technological appropriation, and a community nature are recurrent characteristics of community networks. Self-management means that the decisions about the infrastructure will be made by the community itself, based on the formulation of its own rules.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://cetic.br/media/docs/publicacoes/7/20221129163841/sectoral_studies_community_networks_and_the_internet_in_brazil.pdf&#34;&gt;Community Networks and The Internet in Brazil&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;A famous example would be &lt;a href=&#34;https://www.cbc.ca/news/science/wifi-nyc-mesh-new-york-city-1.4617106&#34;&gt;NYC Mesh&lt;/a&gt; where enterprising tech volunteers built a powerful community internet for residents in exchange for a &lt;a href=&#34;https://archive.is/UQYTO&#34;&gt;monthly donation.&lt;/a&gt; It&amp;rsquo;s worth pointing out that community networks don&amp;rsquo;t necessarily have to be wireless ones, and there are many advantages to &lt;a href=&#34;https://tech.co/news/chattanooga-fastest-internet-usa-2018-08&#34;&gt;running fiber to homes.&lt;/a&gt; It is possible to design community networks in such a way, that allows for direct connectivity to local services. Even greater censorship resistance can be built on community networks directly connecting to each other across large distances, instead of necessarily being routed through &lt;a href=&#34;https://libresolutions.network/articles/hostile-cyberspace&#34;&gt;hostile cyberspace.&lt;/a&gt;&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Trouble in Tech with Michael Ginsburg</title>
		<link>https://libresolutions.network/videos/trouble-in-tech/</link>
		<pubDate>Fri, 16 Aug 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/trouble-in-tech/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/actionable-truths.ogg" />
			
		
		<image>https://libresolutions.network//media/images/actionable-truth-banner.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/actionable-truth-banner.webp" />
		<itunes:image href="https://libresolutions.network//media/images/actionable-truth-banner.webp" />
		<description>Exploring pitfalls, dead ends, and solutions</description>
		<content:encoded>&lt;p&gt;I had a great conversation with Michael Ginsburg of &lt;a href=&#34;https://www.actionabletruth.media/&#34;&gt;Actionable Truth Media&lt;/a&gt; discussing how people are manipulated into supporting fake decentralization or fake solutions to pressing technological troubles. If you enjoyed our conversations you can visit his website at &lt;a href=&#34;https://actionabletruth.media&#34;&gt;actionabletruth.media&lt;/a&gt; or on his &lt;a href=&#34;https://actionabletruth.substack.com/welcome&#34;&gt;Substack.&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;the-musk-operation-x&#34;&gt;The Musk Operation (X)&lt;/h2&gt;
&lt;p&gt;We briefly touch on how many people are falling into the cult of personality around Elon Musk, ultimately empowering Musk to have more control over their digital lives. Rallying around false saviors has a high opportunity cost in the best case scenario, and makes one complicit in all manner of concerns the worst case.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://x.com/CJHopkins_Z23/status/1823440897851449564&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/cj-musk-trump.webp&#39; 
&gt;

&lt;/a&gt;



&lt;/div&gt;
&lt;h2 id=&#34;web3-technocracy&#34;&gt;Web3 Technocracy&lt;/h2&gt;
&lt;p&gt;While the Odysee team seems to be making an admirable effort taking action against censorship, there is reason to be concerned with the finer details. When one takes a close look at the &amp;ldquo;web3&amp;rdquo; ecosystem, many red flags come into view. Regardless of how one feels about the SEC decision, there are good reasons to take a close look at what new direction Odysee is taking.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://odysee.com/@lbry:3f/theendoflbryinc:d&#34;&gt;The End of LBRY Inc.&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://scribe.rip/@scottcbusiness/what-happened-to-lbry-odysee-ded8c4c24bbb&#34;&gt;What Happened To LBRY &amp;amp; Odysee?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://marginalrevolution.com/marginalrevolution/2023/10/the-sec-burned-lbry-to-the-ground.html&#34;&gt;The SEC Burned LBRY to the Ground&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://fingfx.thomsonreuters.com/gfx/legaldocs/mopakmakkpa/SECURITIES%20LBRY%20ruling.pdf&#34;&gt;Ruling&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://odysee.com/@Odysee:8/FAQOdyseenewtech:e&#34;&gt;FAQ concerning Odysee&amp;rsquo;s new tech&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://x.com/jvlchandra/status/1820863442514797043&#34;&gt;Odysee moving from Ads&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://x.com/jvlchandra/status/1821250660949541328&#34;&gt;Fiat monetization for creators&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/road2hell.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/blockchain/&#34;  &gt;&lt;h2&gt;The road to hell: misplaced optimism in the blockchain space&lt;/h2&gt;&lt;i&gt;&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://arweave.org/&#34;&gt;Meet Arweave: Permanent information storage.&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://x.com/aoTheComputer/status/1800244712093204553&#34;&gt;Additionally, persons in the US will not be able to mint $AO tokens via bridging to the network.&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www3.weforum.org/docs/WEF_Cryptocurrency_Uses_Cases_2020.pdf&#34;&gt;World Economic Forum - Crypto, What Is It Good For?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://x.com/fwdresearch/status/1798748571006902751&#34;&gt;Forward Research, what is Arweave AO&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://mirror.xyz/0x1EE4bE8670E8Bd7E9E2E366F530467030BE4C840/-UWra0q0KWecSpgg2-c37dbZ0lnOMEScEEkabVm9qaQ&#34;&gt;Arweave AO economics&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://x.com/MessariCrypto/status/1821233597954846746&#34;&gt;Decentralized Physical Infrastructure Networks (DePIN)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;internet-shutdowns&#34;&gt;Internet Shutdowns&lt;/h2&gt;
&lt;p&gt;Michael raised the concern around Internet shutdowns. In whole or in part, internet shutdowns are a &lt;a href=&#34;https://youtu.be/smyZdtGD2ds&#34;&gt;recurring phenomenon&lt;/a&gt; as governments &lt;a href=&#34;https://www.accessnow.org/press-release/keepiton-restore-internet-during-student-protests-bangladesh/&#34;&gt;seize control&lt;/a&gt; during times of unrest. World-wide accessible communication is a vitally important objective for those who care about a free and open Internet. In our conversation Michael explores how an internet shutdown could be used to manufacture consent for various policies such as digital ID. Currently, it seems like the primary use of internet blackouts is to &lt;a href=&#34;https://reclaimthenet.org/sierra-leone-cuts-off-internet-protests&#34;&gt;quell dissent.&lt;/a&gt;&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/tott-9-preview.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-9/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #9 Internet Shutdowns&lt;/h2&gt;&lt;i&gt;Information control is the root of modern tyranny.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Cyber Fix: Episode 5</title>
		<link>https://libresolutions.network/videos/cyber-fix-5/</link>
		<pubDate>Sun, 11 Aug 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/cyber-fix-5/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/cyber-fix-5.ogg" />
			
		
		<image>https://libresolutions.network//media/images/cyber-fix.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/cyber-fix.webp" />
		<itunes:image href="https://libresolutions.network//media/images/cyber-fix.webp" />
		<description>Cyber Fix is a show to provide entertaining and insightful analysis of developments in Cyberspace.</description>
		<content:encoded>&lt;p&gt;Cyber Fix is on hiatus, you may now listen to full episodes on &lt;a href=&#34;https://peertube.libresolutions.network/w/p/2FbUhGmiRbzmf1TUjWP3Xr&#34;&gt;PeerTube&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;links-discussed&#34;&gt;Links Discussed:&lt;/h3&gt;
&lt;h4 id=&#34;advertising-and-the-future-of-the-web&#34;&gt;Advertising and the Future of the Web&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.techdirt.com/2024/08/08/google-loses-big-antitrust-fight-which-will-mean-what-exactly/&#34;&gt;Google Loses Big Antitrust Fight, Which Will Mean What, Exactly? &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://techcrunch.com/2024/08/06/breaking-up-google-would-offer-a-chance-to-remodel-the-web/&#34;&gt;Breaking up Google would offer a chance to remodel the web&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://corp.rumble.com/blog/rumble-joins-x-to-sue-advertising-cartel-that-allegedly-conspired-to-withhold-digital-advertising-revenue/&#34;&gt;Advertising Cartel that Allegedly Conspired to Withhold Digital Advertising Revenue&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.businessinsider.com/ad-group-to-suspend-garm-initiative-following-elon-musk-lawsuit-2024-8&#34;&gt;The Global Alliance for Responsible Media is &amp;lsquo;discontinuing&amp;rsquo; after Elon Musk&amp;rsquo;s X filed an antitrust lawsuit against it&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.thisdaysportion.com/posts/firefox-s-new-web-site-advertising-preferences-are-a-dark-pattern-and-the-idea-of-private-personalised-ads-is-nonsense-anyway&#34;&gt;Firefox’s new Web Site Advertising Preferences are a dark pattern and the idea of private personalised ads is nonsense anyway&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://fortune.com/2024/08/05/mozilla-firefox-biggest-potential-loser-google-antitrust-search-ruling/&#34;&gt;Forget Apple, the biggest loser in the Google search ruling could be Mozilla and its Firefox web browser&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;ai-sucks&#34;&gt;AI SUCKS&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.forbes.com/sites/bryanrobinson/2024/07/23/employees-report-ai-increased-workload/&#34;&gt;77% Of Employees Report AI Has Increased Workloads And Hampered Productivity, Study Finds&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.techradar.com/computing/artificial-intelligence/survey-says-ai-is-more-buzzkill-than-buzzword-for-marketing&#34;&gt;Survey says AI is more buzzkill than buzzword for marketing&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://techcrunch.com/2024/07/26/apple-signs-the-white-houses-commitment-to-ai-safety/&#34;&gt;Apple signs the White House’s commitment to AI safety&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=YsLf4lAG0xQ&#34;&gt;AI Safety is a scam&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;crowdstrike-outage-fallout&#34;&gt;Crowdstrike Outage fallout&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.crowdstrike.com/wp-content/uploads/2024/08/Channel-File-291-Incident-Root-Cause-Analysis-08.06.2024.pdf&#34;&gt;Root Cause Analysis&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/crowdstrike-delta-air-lines-refused-free-help-to-resolve-it-outage/&#34;&gt;Crowdstrike: Delta Air Lines refused free help to resolve IT outage&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.techradar.com/pro/microsoft-hits-back-at-delta-says-airline-refused-help-following-crowdstrike-outage-and-even-ignored-an-email-from-satya-nadella-himself&#34;&gt;Microsoft hits back at Delta — says airline refused help following CrowdStrike outage, and even ignored an email from Satya Nadella himself&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/legal/crowdstrike-sued-by-investors-over-massive-global-it-outage/&#34;&gt;CrowdStrike sued by investors over massive global IT outage&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.fsf.org/blogs/community/lets-not-celebrate-crowdstrike-lets-point-to-a-better-way&#34;&gt; Let&amp;rsquo;s not celebrate CrowdStrike &amp;ndash; let&amp;rsquo;s point to a better way &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;solutions-roundup&#34;&gt;Solutions Roundup&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.chris-wood.design/resources/linux-for-ux-designers&#34;&gt;Linux for UX Designers - What I learned after a year of doing design work on Linux&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://system76.com/cosmic&#34;&gt;Cosmic - Launch page&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://ostechnix.com/pop_os-24-04-lts-first-alpha-with-cosmic-desktop-released/&#34;&gt;Pop!_OS 24.04 LTS First Alpha With COSMIC Desktop Is Released&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.system76.com/post/cosmic-team-interview-byoux&#34;&gt;COSMIC Team Interview: Building Your Own User Experience &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://sls.eff.org/&#34;&gt;Street Level Surveillance&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://brainmade.org/&#34;&gt;Brain Made&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://adamd.sdf.org/computers/mini/2024/07/20/FLX1LinuxPhone.html&#34;&gt;Furi Labs FLX1 Linux Phone first impressions&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;after-the-break&#34;&gt;After the Break:&lt;/h3&gt;
&lt;h4 id=&#34;tech-troubles&#34;&gt;Tech Troubles&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.csoonline.com/article/3480918/design-flaw-has-microsoft-authenticator-overwriting-mfa-accounts-locking-users-out.html&#34;&gt;Design flaw has Microsoft Authenticator overwriting MFA accounts, locking users out&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://arstechnica.com/tech-policy/2024/08/doj-sues-tiktok-alleging-massive-scale-invasions-of-childrens-privacy/&#34;&gt;DOJ sues TikTok, alleging “massive-scale invasions of children’s privacy”&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://techcrunch.com/2024/07/31/bumble-and-hinge-allowed-stalkers-to-pinpoint-users-locations-down-to-2-meters-researchers-say/&#34;&gt;Bumble and Hinge allowed stalkers to pinpoint users’ locations down to 2 meters, researchers say&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://techcrunch.com/2024/08/09/ecovacs-home-robots-can-be-hacked-to-spy-on-their-owners-researchers-say/&#34;&gt;Ecovacs home robots can be hacked to spy on their owners, researchers say&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.pcgamer.com/hardware/this-3d-printed-laser-chip-hacking-device-uses-a-dollar20-laser-pointer-costs-dollar500-to-build-and-was-developed-so-that-people-can-do-this-in-their-homes/&#34;&gt;This 3D printed laser chip-hacking device uses a $20 laser pointer, costs $500 to build, and was developed so that &amp;lsquo;people can do this in their homes&amp;rsquo;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;control-grid-updates&#34;&gt;Control Grid Updates&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://torrentfreak.com/z-library-more-domains-seized-than-any-other-pirate-site-in-history-240721/&#34;&gt;Z-Library: More Domains Seized Than Any Other Pirate Site in History&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.therage.co/banks-aml-inefficient-access-to-social-media/&#34;&gt;Banks Find AML &amp;ldquo;Ineffective&amp;rdquo;, Propose Access To Social Media&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://cybernews.com/security/paris-2024-olympic-apps-eavesdropping-on-users/&#34;&gt;Gold rush for data: Paris 2024 Olympic apps are eavesdropping on users&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://news.microsoft.com/2024/08/08/palantir-and-microsoft-partner-to-deliver-enhanced-analytics-and-ai-services-to-classified-networks-for-critical-national-security-operations/&#34;&gt;Palantir and Microsoft Partner to Deliver Enhanced Analytics and AI Services to Classified Networks for Critical National Security Operations&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://techcrunch.com/2024/08/09/as-unrest-fueled-by-disinformation-spreads-the-u-k-may-seek-stronger-power-to-regulate-tech-platforms/&#34;&gt;As unrest fueled by disinformation spreads, the UK may seek stronger power to regulate tech platforms&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;dunking-on-bitcoin&#34;&gt;Dunking on Bitcoin&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://x.com/sheislaurenlee/status/1816950008828272966&#34;&gt;Snowden&amp;rsquo;s Warning to Bitcoiners&amp;hellip;and everyone&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://x.com/jeremykauffman/status/1817895472540905636&#34;&gt;The problems with Bitcoin are cultural.&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://x.com/AaronRDay/status/1820178013847441684&#34;&gt;Bitcoin and Network Effects: A myth?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;fine-details&#34;&gt;Fine Details:&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.pcworld.com/article/2413156/hackers-can-wirelessly-watch-your-screen-via-hdmi-radiation.html&#34;&gt;Hackers can wirelessly watch your display via HDMI radiation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://tv.undersco.re/w/b1d19257-96a8-4ca2-bee2-b526e8e8ee2c&#34;&gt;What Comes Next is Nothing: FOSS, subculture and platform collapse&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.404media.co/podcast-signals-president-meredith-whittaker-on-backdoors-and-ai/&#34;&gt;404 Media Interviews Meredith Whittaker on Backdoors &amp;amp; AI&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/russia-blocks-signal-for-violating-anti-terrorism-laws/&#34;&gt;Russia blocks Signal for &amp;lsquo;violating&amp;rsquo; anti-terrorism laws&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://soatok.blog/2024/07/31/what-does-it-mean-to-be-a-signal-competitor/&#34;&gt;What Does It Mean To Be A Signal Competitor?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;music-credits&#34;&gt;Music Credits:&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/n79aphwhpW0&#34;&gt;Y&amp;amp;V - Lune&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/o_v9WSImGIU&#34;&gt;Valcos - A New Light&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/qLYmtdi-GzA&#34;&gt;Killercats - Kaibu&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/zTdzbNVf6lE&#34;&gt;The Grid by SavfkMusic&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Are You For Or Against Technocracy?</title>
		<link>https://libresolutions.network/articles/rethink-technocracy/</link>
		<pubDate>Thu, 25 Jul 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/rethink-technocracy/</guid>
		
		<image>https://libresolutions.network//media/3-breaking-free.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/3-breaking-free.webp" />
		<itunes:image href="https://libresolutions.network//media/3-breaking-free.webp" />
		<description>Your concrete choice between conscience or control</description>
		<content:encoded>&lt;p&gt;We are far from the time where various dystopian terrors were mere science-fiction. They are here, and we can see their effects. No longer blissfully ignorant, we have a choice, and a role to play in shaping the future. Some see the rise of surveillance, censorship, and consolidation of power as a threat to all we hold dear, others may see it as an opportunity to enrich themselves or resolve crises. This may initially seem like a fair exchange: some data and personal choice in return for mild advancements and security. We have seen this deal turn sour over and over, time and time again. It is poised to only get worse as digital intrusions continue to become more invasive.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/dystopia.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/technocratic-assimilation/&#34;  &gt;&lt;h2&gt;Has the technocracy already assimilated you?&lt;/h2&gt;&lt;i&gt;Where does the balance of power lie within your life?&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;The decision to maintain control over your data, or to avoid &lt;a href=&#34;http://localhost:1313/articles/hostile-cyberspace/&#34;&gt;hostile cyberspace&lt;/a&gt; may seem entirely inconsequential. But each day, each person refutes or reaffirms their support or withdraw from consolidated power and top-down control. Decisions over details that may seem innocuous, such as where to store data, how you work, and what tools are used; all amount to meaningful changes in cyberspace both for good and ill.&lt;/p&gt;
&lt;p&gt;Presently, it seems that the path of least resistance is one fraught with suffering and despair, for ourselves and for others. The best thing about our problems being better understood is that we can identify the sources of problems, and start to find solutions. The hardest part about this burden of knowledge is that we must face our own responsibility for our choices.&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s all well and good to recognize the danger of an all-encompassing totalitarian &lt;a href=&#34;https://libresolutions.network/articles/insecurity/&#34;&gt;cyber-police state.&lt;/a&gt; Complete hubris is to consider that it&amp;rsquo;s &lt;em&gt;just being used incorrectly&lt;/em&gt;. After all, if the problems are entirely &lt;em&gt;who&amp;rsquo;s really in charge&lt;/em&gt;, taking on that responsibility is the clear alternative. This means that there are not merely two choices.&lt;/p&gt;
&lt;p&gt;Alternatively, one can recognize the dangers of such power and work to withdraw their financial, social, and cognitive support for the technological terror that is being constructed. Ultimately working to ensure that no person or people is able to wield such power against others. Doing this requires a lot of hard work, compassion and creativity to truly make waves across time.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/platos-cave.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/cyber-resistance/&#34;  &gt;&lt;h2&gt;Rise of the Cyber Resistance&lt;/h2&gt;&lt;i&gt;Finding the path that works for you&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;But those are not the only options. One may recognize the opportunity within the corrupt workforce to &lt;a href=&#34;https://corbettreport.com/musk/&#34;&gt;seize the power for themselves.&lt;/a&gt; There are all kinds of rationalizations that will comfortably fit within one&amp;rsquo;s mind to justify whatever excesses are necessary to secure such power. Telling themselves &amp;ldquo;If I don&amp;rsquo;t, &lt;em&gt;worse people&lt;/em&gt; will!&amp;rdquo; and that may sometimes be true to some degree, but it&amp;rsquo;s always relative.&lt;/p&gt;
&lt;p&gt;But why take on &lt;em&gt;all that work yourself?&lt;/em&gt; This is something that can easily be outsourced to the &lt;a href=&#34;https://www.thelastamericanvagabond.com/trump-conservatives-technocracy/&#34;&gt;well-funded political machine.&lt;/a&gt; Instead of doing the hard work of understanding how systems actually work, and then working on ways to decentralize power, you can simply watch a new false savior to wage your battles from the comfort of your favorite glowing rectangle. By shirking your responsibility to engage, connect, and understand, you are empowering those who profit off speaking for you. With no mind to accountability in any form, power will be abused without resistance.&lt;/p&gt;
&lt;p&gt;For better or worse, it&amp;rsquo;s not entirely up to you. This is a decision we all make in some form or another, on all kinds of issues. In terms of systems for mechanized control, the consequences can be quite profound. Therefore your decision is not merely a consequence of your preferences, attitude, or stated goals, but actually involves many more decisions like allies, methods, and choices.&lt;/p&gt;
&lt;p&gt;This applies not just to individuals, but institutions like corporations and even governments. If one is quick to blame people for choosing convenience over principles, they must also consider how that multiplies over large organizations. It makes no difference how these systems are organized, be it through government, corporate power, or even on a blockchain the troubles are all the same. It is of utmost concern that the tide of machines being used to manipulate, destroy, and control people is reversed.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/stock/broken-house.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/war-and-technocracy/&#34;  &gt;&lt;h2&gt;The Ugliness of War and Technocracy&lt;/h2&gt;&lt;i&gt;A look at weapons of war in the digital age.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;The purpose of &lt;a href=&#34;https://libresolutions.network/articles/why/&#34;&gt;this project&lt;/a&gt; is to encourage each other to take on the task of making total technocratic control impossible. This means, not merely in &amp;lsquo;&lt;em&gt;the right hands&lt;/em&gt;&amp;rsquo;, not only when convenient, not ever. There are a wide array of convincing pretexts one may use to justify censorship, mass surveillance, or worse. It is my position that these methods &lt;em&gt;themselves&lt;/em&gt; distort incentives against them being used properly, and ultimately lead to terrifying abuses.&lt;/p&gt;
&lt;p&gt;The trouble for those working to re-work the foundations so that future generations may be more free from and over their digital experience, is that it is crucial not to be naive about those with different choices. First one must understand that there are many who are not willing or able to put in the effort to liberate themselves much less others, and forgive them for it. Then also recognize that there are many who will knowingly work to undermine the autonomy of others for their own benefit.&lt;/p&gt;
&lt;p&gt;With the understanding that there are not only those who go along to get along, but a wide array of people competing for dominance, it becomes easier to understand why so much is spend on undermining the efforts of those working to improve cyberspace. The many differing factions vying for control over cyberspace are aligned in a single goal: nobody should be able to liberate the public. That is why you&amp;rsquo;ll often encounter fair-weather allies turn 180 degrees once they&amp;rsquo;ve built a stronger coalition than their opponents.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/affinity-scam.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/redirecting-resistance/&#34;  &gt;&lt;h2&gt;Mass Resistance Redirected&lt;/h2&gt;&lt;i&gt;Selling out for shamefully low prices&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;There is an urgent need for people to set aside petty differences and be honest to keep malevolent forces at bay. It is well past time to push for genuine accountability in our systems and our governance. This requires people to urgently build connections that are stronger than any political or social drama of today.&lt;/p&gt;
&lt;p&gt;The future of a free cyberspace depends on the future of people being free to live without being micro-managed by systems of control. This is why our freedom over technology is inseparably connected with freedom from it in the real world. Instead of conceding cyberspace as a force for intrusion into people&amp;rsquo;s lives, we can &lt;a href=&#34;https://gabe.rocks/tech/reclaiming-cyberspace/&#34;&gt;reclaim it&lt;/a&gt; for each other.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Heads up! Software Freedom Day: Reconnect, Rediscover, Rebuild</title>
		<link>https://libresolutions.network/articles/software-freedom-day/</link>
		<pubDate>Wed, 24 Jul 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/software-freedom-day/</guid>
		
		<image>https://libresolutions.network//media/images/artistic-banner.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/artistic-banner.webp" />
		<itunes:image href="https://libresolutions.network//media/images/artistic-banner.webp" />
		<description>September 21st is Software Freedom Day, celebrate with others!</description>
		<content:encoded>&lt;p&gt;Never before has our ability to build complicated systems been such a threat to our very being. Social manipulation, media addiction, and many other problems lead people to want to disconnect entirely, or capitulate in despair. Many of us know better, and want to share a better digital future with others. Bringing that into being requires more than just using the right tools yourself, or having the perfect setup.&lt;/p&gt;
&lt;p&gt;It is incredibly important our journey to reclaim &lt;a href=&#34;https://libresolutions.network/articles/digital-autonomy/&#34;&gt;digital autonomy&lt;/a&gt; isn&amp;rsquo;t taken on alone. Getting others involved is a fun and engaging way to actually strengthen your community online and offline. The answer is to learn, create, and share together with others. These days, people are almost begging for reasons to leave cyberspace behind and bond with each other in person.&lt;/p&gt;
&lt;p&gt;In just a little less than two months, you have time to prepare what you want to share with others for &lt;strong&gt;Software Freedom Day on September 21st.&lt;/strong&gt; Maybe you&amp;rsquo;d like to organize a get-together, or instead merely get drinks with some friends to &lt;a href=&#34;https://libresolutions.network/tags/digital-autonomy--the-arts/&#34;&gt;talk about your digital experience.&lt;/a&gt; Whatever you choose, there is tons of opportunity in sharing the software freedom with others. This is an excellent chance to rekindle a world-wide movement for digital freedoms, and reconnect with each other.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://digitalfreedoms.org/en/sfd&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/software-freedom-day-2012.webp&#39; 
&gt;

&lt;/a&gt;


&lt;p class=&#34;caption&#34;&gt;
    Resurrecting Software Freedom Day - LibrePlanet 2024 &lt;a target=&#39;_blank&#39; href=&#39;https://framatube.org/videos/watch/3d4c65c5-db42-4b61-b8e7-82564898cc33&#39;&gt;Source&lt;/a&gt;
&lt;/p&gt;


&lt;/div&gt;
&lt;h2 id=&#34;what-is-software-freedom&#34;&gt;What is &amp;lsquo;Software Freedom&amp;rsquo;?&lt;/h2&gt;
&lt;p&gt;Software that is free allows you to inspect it&amp;rsquo;s source code, make your own modifications, and share it with (&lt;em&gt;or without your changes&lt;/em&gt;) with others. Ideally, this means that our software can be more transparent, personal, and flexible. There is a vast array of &lt;a href=&#34;https://www.fsf.org/about/what-is-free-software&#34;&gt;Free Software&lt;/a&gt; available, with over 6000 projects listed on the &lt;a href=&#34;https://directory.fsf.org/wiki/Main_Page&#34;&gt;free software directory.&lt;/a&gt; The free software movement has grown significantly in no small part due to warning about many of our current day struggles as early as four decades ago. Software freedom is about more than just software licenses, it&amp;rsquo;s a mission to reclaim control over your machines and ultimately, your entire digital experience.&lt;/p&gt;
&lt;p&gt;That mission is about more than just our individual experience, but also about withdrawing consent from consolidated top-down control systems. By supporting the digital autonomy of others, you&amp;rsquo;re helping throw a wrench in the gears of the technocratic machine. The less data and control flowing to corporations (&lt;em&gt;or dictated by governments&lt;/em&gt;) the more people can expect their systems to be transparent, efficient, and reliable. The fact that a great deal of &lt;em&gt;Free as in Freedom&lt;/em&gt; software also happens to be &lt;em&gt;free as in low cost&lt;/em&gt; is a great win for accessibility.&lt;/p&gt;
&lt;h2 id=&#34;helpful-resources-for-software-freedom-day&#34;&gt;Helpful Resources for Software Freedom Day&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://digitalfreedoms.org/en/sfd/blog/ten-ways-to-make-your-software-freedom-day-more-fun&#34;&gt;Ten Ways to Make Your Software Freedom Day More Fun!&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://digitalfreedoms.org/en/sfd/events?view=map&#34;&gt;Software Freedom Day - Events Map&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://peertube.libresolutions.network/c/lsn/videos&#34;&gt;Libre Solutions Network Videos&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://video.blender.org/c/blender_reels/videos&#34;&gt;Blender Video&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://switching.software/&#34;&gt;Switching Software&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://tilvids.com/videos/trending&#34;&gt;TILvids&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;the-digital-freedom-foundation&#34;&gt;The Digital Freedom Foundation&lt;/h2&gt;
&lt;p&gt;The &lt;a href=&#34;https://digitalfreedoms.org/&#34;&gt;Digital Freedom Foundation&lt;/a&gt; is a non-profit that aims &amp;ldquo;&lt;em&gt;to empower all people to freely connect, create and share in a digital world that is participatory, transparent, and sustainable.&lt;/em&gt;&amp;rdquo; It&amp;rsquo;s the go-to resource for organizing, or discovering local digital freedom events.&lt;/p&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Event&lt;/th&gt;
          &lt;th&gt;Date&lt;/th&gt;
          &lt;th&gt;Description&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;a href=&#34;https://digitalfreedoms.org/en/sfd&#34;&gt;Software Freedom Day&lt;/a&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;September 21st&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;Software Freedom Day is an annual worldwide celebration of Free Software. It provides a wonderful way to increase awareness and educate others about the value of Free, Libre and Open Source Software.&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;a href=&#34;https://digitalfreedoms.org/en/hfd&#34;&gt;Hardware Freedom Day&lt;/a&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;April 19th&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;Hardware Freedom Day celebrates the benefits of Open Hardware and Open Hardware design initiatives. Imagine what we could do if medical and technical hardware was inexpensive and accessible for manufacture for everyone needing these tools.&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;a href=&#34;https://digitalfreedoms.org/en/dfd&#34;&gt;Document Freedom Day&lt;/a&gt;&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;March 26th&lt;/strong&gt;&lt;/td&gt;
          &lt;td&gt;Document Freedom Day is an international event to celebrate and raise awareness of Open Standards. Without Open Standards how can we successfully communicate, share knowledge and scientific discoveries?&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Hopefully you can get connected with others through these events, or manage to run your own! Change really starts when we get together to share our passions, knowledge, and experiences. There has never been a better time to get people engaged on the wide variety of issues caused by our reliance on Big Tech, or state encroachments on cyberspace.&lt;/p&gt;
&lt;p&gt;Of course, you&amp;rsquo;re always welcome to use the Internet as a last resort!&lt;br&gt;
Feel free to share your thoughts, experiences, or creative work for Free Software Day however you can.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Cyber Fix: Episode 4</title>
		<link>https://libresolutions.network/videos/cyber-fix-4/</link>
		<pubDate>Mon, 22 Jul 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/cyber-fix-4/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/cyber-fix-4.ogg" />
			
		
		<image>https://libresolutions.network//media/images/cyber-fix.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/cyber-fix.webp" />
		<itunes:image href="https://libresolutions.network//media/images/cyber-fix.webp" />
		<description>Cyber Fix is a show to provide entertaining and insightful analysis of developments in Cyberspace.</description>
		<content:encoded>&lt;p&gt;Cyber Fix is on hiatus, you may now listen to full episodes on &lt;a href=&#34;https://peertube.libresolutions.network/w/p/2FbUhGmiRbzmf1TUjWP3Xr&#34;&gt;PeerTube&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;links-discussed&#34;&gt;Links Discussed&lt;/h2&gt;
&lt;h3 id=&#34;wacky-tech-news&#34;&gt;Wacky tech news:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.techdirt.com/2024/07/11/2350-amazon-astro-business-robots-to-become-pointless-paperweights-11-months-after-release/&#34;&gt;$2,350 Amazon ‘Astro’ Business Robots To Become Pointless Paperweights 11 Months After Release &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://futurism.com/the-byte/child-safe-ai-alexa-girl-penny-wall-socket&#34;&gt;Researchers Call for &amp;ldquo;Child-Safe AI&amp;rdquo; After Alexa Tells Little Girl to Stick Penny in Wall Socket&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.web3isgoinggreat.com/single/squarespace-domain-hijacking&#34;&gt;Popular defi protocol websites replaced with wallet drainers amid mass Squarespace domain hijacking&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://stackdiary.com/linksys-velop-routers-send-wi-fi-passwords-in-plaintext-to-us-servers/&#34;&gt;Linksys Velop routers send Wi-Fi passwords in plaintext to US servers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.schneier.com/blog/archives/2024/07/cloudflare-reports-that-almost-7-of-all-internet-traffic-is-malicious.html&#34;&gt;Cloudflare Reports that Almost 7% of All Internet Traffic Is Malicious&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;firefox-woes&#34;&gt;Firefox Woes:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.thisdaysportion.com/posts/firefoxs-new-web-site-advertising-preferences-are-a-dark-pattern-and-the-idea-of-private-personalised-ads-is-nonsense-anyway/&#34;&gt;Firefox’s new Web Site Advertising Preferences are a dark pattern and the idea of private personalized ads is nonsense anyway&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;solutions-roundup&#34;&gt;Solutions Roundup:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://brainfucksec.github.io//firefox-hardening-guide-2024&#34;&gt;Firefox Hardening Guide 2024&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.techradar.com/phones/i-used-a-dumb-phone-for-a-week-here-are-5-things-i-loved-and-5-things-i-missed&#34;&gt;I used a ‘dumb phone’ for a week – here are 5 things I loved and 5 things I missed&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.thepodcasthost.com/business-of-podcasting/what-is-podcasting-2-0-and-why-should-i-care/&#34;&gt;What is Podcasting 2.0? And Why Should I Care?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://firewallsdontstopdragons.com/how-and-why-to-block-ads/&#34;&gt;How and Why to Block Ads&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://kzimmermann.0x.no/articles/end_of_line_proprietary_os.html&#34;&gt;Reaching an &amp;ldquo;end of the line&amp;rdquo; regarding proprietary OSes&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;dispatches-from-the-cyberwar&#34;&gt;Dispatches from the Cyberwar&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://thehackernews.com/2024/07/sap-ai-core-vulnerabilities-expose.html&#34;&gt;SAP AI Core Vulnerabilities Expose Customer Data to Cyber Attacks&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;after-the-break&#34;&gt;After the Break&lt;/h2&gt;
&lt;h3 id=&#34;crowdstrike&#34;&gt;Crowdstrike&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://x.com/SheriefFYI/status/1814208527335850481&#34;&gt;Sherief, FYI&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://x.com/RealGeneKim/status/1814380972068221344&#34;&gt;X thread of the scope of the damage&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://x.com/vincent_vancode/status/1814414074492731585&#34;&gt;Commentary of BSOD&amp;rsquo;d MRI machine&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://infosec.exchange/@da_667/112814798447666589&#34;&gt;How does one secure data?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://bsd.network/@cynicalsecurity/112819827542225590&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/crowdstrike-tos.webp&#39; 
&gt;

&lt;/a&gt;



&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.techradar.com/computing/windows/experts-are-warning-it-could-take-weeks-to-fix-the-global-it-outage-heres-what-we-know&#34;&gt;Experts are warning it could take &amp;lsquo;weeks&amp;rsquo; to fix the global IT outage – here&amp;rsquo;s what we know&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://stackdiary.com/crowdstrike-took-down-debian-and-rocky-linux-a-few-months-ago-and-no-one-noticed/&#34;&gt;CrowdStrike took down Debian and Rocky Linux a few months ago and no one noticed&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://thehackernews.com/2024/07/cybercriminals-exploit-crowdstrike.html&#34;&gt;Major Microsoft 365 outage caused by Azure configuration change&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Read more:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.crowdstrike.com/blog/falcon-update-for-windows-hosts-technical-details/&#34;&gt;Technical Details: Falcon Content Update for Windows Hosts&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.crowdstrike.com/falcon-content-update-remediation-and-guidance-hub/&#34;&gt;Remediation and Guidance Hub: Falcon Content Update for Windows Hosts&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;notable-breaches&#34;&gt;Notable Breaches&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.techtarget.com/searchsecurity/podcast/Risk-Repeat-ATTs-Snowflake-database-breached&#34;&gt;Risk &amp;amp; Repeat: AT&amp;amp;T&amp;rsquo;s Snowflake database breached&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://mjtsai.com/blog/2024/07/12/huge-att-data-breach/&#34;&gt;Huge AT&amp;amp;T Data Breach&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.biometricupdate.com/202407/data-breach-raises-questions-about-fractal-ids-decentralized-identity-architecture&#34;&gt;Data breach raises questions about Fractal ID’s decentralized identity architecture&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;government-and-tech&#34;&gt;Government and Tech&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.techdirt.com/2024/07/08/for-whatever-reason-the-us-post-office-is-still-running-its-mail-cover-surveillance-program/&#34;&gt;For Whatever Reason, The US Post Office Is Still Running Its Mail Cover Surveillance Program&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.bankofcanada.ca/2024/07/staff-discussion-paper-2024-11/&#34;&gt;The Role of Public Money in the Digital Age&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://cyberscoop.com/cyber-budget-priorities-fiscal-2024/&#34;&gt;White House wants to boost cyber funds for fiscal 2026&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://fsfe.org/news/2024/news-20240719-01.html&#34;&gt;EC cuts funding support for Free Software projects&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://kde.org/announcements/2024_ngi_openletter/&#34;&gt;KDE signs petition urging European Union to continue funding free software&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Why Support the Libre Solutions Network?</title>
		<link>https://libresolutions.network/articles/why/</link>
		<pubDate>Fri, 19 Jul 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/why/</guid>
		
		<image>https://libresolutions.network//media/3-breaking-free.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/3-breaking-free.webp" />
		<itunes:image href="https://libresolutions.network//media/3-breaking-free.webp" />
		<description>Advancing the discussion on tech and liberty.</description>
		<content:encoded>&lt;p&gt;&lt;a href=&#34;#im-sold-how-do-i-help&#34;&gt;[Jump to how you can help]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;As more people&amp;rsquo;s lives become entirely dependent on technology, the impacts of the systems and tools we use can only become more profound. By naively accepting the assumptions and systems provided by corporations and governments, we allow ourselves to become prey on their hunting grounds.&lt;/p&gt;
&lt;p&gt;This project was always intended to motivate people to take part in changing the technological landscape from the bottom up. We can all take action in our lives, for a better balance with cyberspace, one that isn&amp;rsquo;t outright dominated by large institutions. Each member of the public is under threat from grave concerns like mass surveillance, censorship, and manufactured dependence. Overcoming this will require time, perseverance, and a commitment to judgement-free education and outreach. As difficult as this can seem, we know that it is demonstrably within our power to fundamentally change our  digital experience.&lt;/p&gt;
&lt;p&gt;Instead of merely presenting one-size-fits-all solutions, the focus has always been on providing the necessary context to build meaningful understanding. I wholeheartedly believe that we can build a digital foundation that isn&amp;rsquo;t corrosive to our autonomy, mental health, and civic participation. It will require a phenomenal amount of work, which is why it&amp;rsquo;s crucial to take on incremental goals while keeping a long-term vision in mind.&lt;/p&gt;
&lt;h3 id=&#34;what-is-that-vision&#34;&gt;What is That Vision?&lt;/h3&gt;
&lt;p&gt;The primary vision of the Libre Solutions Network is to discover, share, and collaborate on actionable steps for individuals and communities to reclaim their &lt;a href=&#34;https://libresolutions.network/articles/digital-autonomy/&#34;&gt;digital autonomy.&lt;/a&gt; Which is when people are in charge of what systems they use, how they are used, and when they are used.&lt;/p&gt;
&lt;p&gt;Without becoming overly invested in particular approaches, this project is about learning important lessons to build a solid understanding. Then with that knowledge, making the journey from where we are to where we would like to be. At the same time, it is important to recognize the shortcomings of approaches that rely too much on insulating people from each other, or from understanding.&lt;/p&gt;
&lt;p&gt;In short, this project aims to be the &amp;ldquo;&lt;em&gt;Teach a man to fish&lt;/em&gt;&amp;rdquo; equivalent to promoting digital autonomy. Instead of striving to find the single best answer of today, the goal is always to build a more complete picture of where we are and where we would like to be. The way forward is going to require people motivated to learn, collaborate, and share. The values this project aims to promote are stewardship, responsibility, and dedication. Collaboration between people of different walks of life requires putting particular concerns aside, and embracing the opportunities that lie ahead.&lt;/p&gt;
&lt;h3 id=&#34;what-makes-this-project-different&#34;&gt;What Makes This Project Different?&lt;/h3&gt;
&lt;p&gt;The Libre Solutions Network is about getting the public excited about opportunities in building a better digital future. A great deal of this includes research into novel solutions as well as long-forgotten techniques to modern-day problems. I&amp;rsquo;ve come to learn that the biggest obstacle to people&amp;rsquo;s privacy, security, and digital autonomy is not doubt, ignorance, or even fear, but actually defeatism.&lt;/p&gt;
&lt;p&gt;Despite the current state of technology being a recent phenomenon, a great deal of people see it as not only inevitable, but also immutable. These are both false. Through the Libre Solutions Network I aim to raise people from the slumber of apathy and despair and reinvigorate people&amp;rsquo;s fierce pursuit for true innovation.&lt;/p&gt;
&lt;p&gt;By putting cutting-edge software into practice I advance and share not only my own technical knowledge, but its application to broader objectives such as censorship resistance and digital autonomy. By recognizing the advantages of tried-and-true techniques, genuinely foundational knowledge can be shared to help others start on a better path.&lt;/p&gt;
&lt;h3 id=&#34;why-gabriel&#34;&gt;Why Gabriel?&lt;/h3&gt;
&lt;p&gt;I have been told throughout my career that I have a gift for communicating technological ideas and problems to those without advanced knowledge. I have witnessed my capacity to bridge understanding between those with tech skills and those without. This project is primarily motivated by my desire to use these skills for good.&lt;/p&gt;
&lt;p&gt;I believe this project is important, and a great deal of compulsion drives me to carry it forward. While I will always work to advance this mission in some form or another, financial constraints limit my ability to allow this project to flourish. I&amp;rsquo;ve spent a great deal of time researching this problem, but I know I&amp;rsquo;ve really only scratched the surface. I believe I am in a unique position to know where the rich veins of insight can be found.&lt;/p&gt;
&lt;p&gt;With more resources for this project I feel like I would be able to make significant investments that could make this project much more effective. Acquiring knowledge in specific areas of interest often results in costs from hardware or even information. Expanding my own knowledge helps me get a clearer picture of the larger whole. The hope is that if I am given the ability to fulfill this mission directly, I can then greatly accelerate other&amp;rsquo;s ability to get up to speed.&lt;/p&gt;
&lt;p&gt;I have ambitious goals. If given the opportunity, I believe this project can grow into a powerful force. Not only for keeping the the encroachments of technocratic control at bay, but it would also do wonders for helping people discover and adopt vastly better ways of working with technology, rather than being forced to work for it.&lt;/p&gt;
&lt;p&gt;Furthermore, I believe that it is about more than merely the goals themselves. Goals are important, and one is almost always lost without them. However, I have a firm appreciation that the means used to accomplish particular goals are themselves worth giving serious consideration. If we truly want to deviate from the digital status quo, prioritizing education as an end to itself is vital. We need to recognize that building up the people&amp;rsquo;s knowledge is a more worthwhile endeavor than providing a &amp;lsquo;solution&amp;rsquo; that teaches them nothing.&lt;/p&gt;
&lt;h3 id=&#34;achievements&#34;&gt;Achievements&lt;/h3&gt;
&lt;p&gt;Over the course of this project, there are a variety of things that have validated its importance to me.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Digital Autonomy First&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;All of my work has been made with censorship-resistance in mind, and decentralized platforms are given first-class treatment. Posts are written for &lt;a href=&#34;#&#34;&gt;this website&lt;/a&gt; which includes a &lt;a href=&#34;https://libresolutions.network/rss&#34;&gt;media-embedded RSS feed&lt;/a&gt; for use with various podcasting apps. In addition to this, videos and audio broadcasts are given first-class treatment on the self-hosted &lt;a href=&#34;https://peertube.libresolutions.network&#34;&gt;PeerTube instance.&lt;/a&gt; Furthermore, for those who are deeply concerned about their anonymity, the website is mirrored on &lt;a href=&#34;http://3vmmhpy7723gkeohqalch5ycesyjl7atnol5jdiqbb55a5be7bcmtrid.onion/&#34;&gt;Tor&lt;/a&gt; &amp;amp; &lt;a href=&#34;http://libresolutionsnetwork.i2p/?i2paddresshelper=szPtrjHWqRnRnKiLEhTCtuZP6xqIau71yPEuxZSYziOzM-2uMdapGdGcqIsSFMK25k~rGohq7vXI8S7FlJjOI7Mz7a4x1qkZ0ZyoixIUwrbmT-saiGru9cjxLsWUmM4jszPtrjHWqRnRnKiLEhTCtuZP6xqIau71yPEuxZSYziOzM-2uMdapGdGcqIsSFMK25k~rGohq7vXI8S7FlJjOI7Mz7a4x1qkZ0ZyoixIUwrbmT-saiGru9cjxLsWUmM4jszPtrjHWqRnRnKiLEhTCtuZP6xqIau71yPEuxZSYziOzM-2uMdapGdGcqIsSFMK25k~rGohq7vXI8S7FlJjOI7Mz7a4x1qkZ0ZyoixIUwrbmT-saiGru9cjxLsWUmM4jszPtrjHWqRnRnKiLEhTCtuZP6xqIau71yPEuxZSYziOzM-2uMdapGdGcqIsSFMK25k~rGohq7vXI8S7FlJjOIx22WZm3WShEGsIwgVYjO6UOdhCqbpa1J5t3O56Hc1IFBQAEAAcAAA==&#34;&gt;I2P&lt;/a&gt; hidden services, which also includes the same RSS feeds.&lt;/p&gt;
&lt;p&gt;The content itself is made with primarily Free Software and/or Open Source tools:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Images:&lt;/strong&gt; Made with &lt;a href=&#34;https://inkscape.org&#34;&gt;Inkscape&lt;/a&gt; and &lt;a href=&#34;https://gimp.org&#34;&gt;GIMP&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Videos:&lt;/strong&gt; Edited using &lt;a href=&#34;https://blender.org&#34;&gt;Blender&lt;/a&gt; and often recorded with &lt;a href=&#34;https://obsproject.com/&#34;&gt;OBS Studio,&lt;/a&gt; some intereviews have taken place over &lt;a href=&#34;https://jitsi.org/&#34;&gt;Jitsi&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Audio:&lt;/strong&gt; Editing done with &lt;a href=&#34;https://www.audacityteam.org/&#34;&gt;Audacity&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Operating System&lt;/strong&gt; My favorite Linux Distribution&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Command-line tools:&lt;/strong&gt; &lt;a href=&#34;https://ffmpeg.org&#34;&gt;ffmpeg&lt;/a&gt; for converting audio/video &amp;amp;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Website:&lt;/strong&gt; &lt;a href=&#34;https://gohugo.io&#34;&gt;hugo&lt;/a&gt; for &lt;a href=&#34;https://libresolutions.network/articles/best-website-for-you/&#34;&gt;static website generation&lt;/a&gt; with a automatic continuous deployment service integrated with &lt;a href=&#34;https://forgejo.org/&#34;&gt;Forgejo&lt;/a&gt; for source control.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Information Management&lt;/strong&gt; &lt;a href=&#34;https://freshrss.org&#34;&gt;FreshRSS&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;World-wide Reach:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Some of my articles, notably &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy&#34;&gt;The Tools of The Technocracy&lt;/a&gt; as well as &lt;a href=&#34;https://libresolutions.network/articles/war-and-technocracy&#34;&gt;The Ugliness of War and Technocracy&lt;/a&gt; have been translated into many languages and widely shared. &lt;a href=&#34;#&#34;&gt;This website&lt;/a&gt; has seen hits from 79 countries all over the world!&lt;/p&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Country&lt;/th&gt;
          &lt;th&gt;Visitors&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;🇺🇸 United States&lt;/td&gt;
          &lt;td&gt;(44%)&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;🇷🇺 Russian Federation&lt;/td&gt;
          &lt;td&gt;(13%)&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;🇨🇦 Canada&lt;/td&gt;
          &lt;td&gt;(7%)&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;🇬🇧 United Kingdom&lt;/td&gt;
          &lt;td&gt;(5%)&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;🇦🇺 Australia&lt;/td&gt;
          &lt;td&gt;(3%)&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;🇳🇱 Netherlands&lt;/td&gt;
          &lt;td&gt;(2%)&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;🇩🇪 Germany&lt;/td&gt;
          &lt;td&gt;(2%)&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;🇨🇳 China&lt;/td&gt;
          &lt;td&gt;(2%)&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;🇫🇷 France&lt;/td&gt;
          &lt;td&gt;(2%)&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;🇦🇹 Austria&lt;/td&gt;
          &lt;td&gt;(1%)&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Despite being Canadian, it seems that more of my known hits are coming from Russia.&lt;br&gt;
Hopefully more Canadians find interest in this work!&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Unique Coverage:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Where possible, I&amp;rsquo;ve covered topics that aren&amp;rsquo;t easy to find elsewhere:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://libresolutions.network/videos/data-shedding&#34;&gt;Data Shedding - A Real-time Privacy Risk&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://libresolutions.network/articles/broken-internet&#34;&gt;Cybergheddon ISP-level De-platforming&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://libresolutions.network/articles/alt-tech&#34;&gt;Lessons from Alt-Tech Failures&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://libresolutions.network/videos/serenum&#34;&gt;Serenum: The &amp;lsquo;From Scratch&amp;rsquo; OS Revolution&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Long-form guides on Actionable Topics&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://gabe.rocks/tech/reclaiming-cyberspace&#34;&gt;Reclaiming Territory in Cyberspace&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://libresolutions.network/articles/diy-audit&#34;&gt;DIY Cyber Audit&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://gabe.rocks/tech/rss-love&#34;&gt;We Don’t Love RSS Enough&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://libresolutions.network/articles/backups&#34;&gt;Securing your Data: Backups&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://libresolutions.network/operations/shadow&#34;&gt;Operation: Shadow&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;testimonials&#34;&gt;Testimonials&lt;/h2&gt;
&lt;blockquote&gt;
&lt;p&gt;A great partner in the fight to liberate our stuff!&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://fighttorepair.substack.com/&#34;&gt;Fight to Repair&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;Gabriel, you doing something unique and useful. Helping people like me navigate the dangers of technology while also appreciating and taking advantage of is invaluable!&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://annecantstandit.substack.com/&#34;&gt;Anne Gibbons&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;Gabriel, awesome that you are helping people to learn about free software and to embrace the freedom and respect the community generates.&lt;/p&gt;
&lt;p&gt;William&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;Excellent and detailed coverage on the tools of technocracy and their privacy invasion and mass social engineering.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://www.alilybit.com/&#34;&gt;A Lily Bit&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2 id=&#34;im-sold-how-do-i-help&#34;&gt;I&amp;rsquo;m Sold! &lt;em&gt;How Do I Help?&lt;/em&gt;&lt;/h2&gt;
&lt;h3 id=&#34;the-basics&#34;&gt;The Basics&lt;/h3&gt;
&lt;p&gt;I greatly appreciate any encouragement or constructive feedback. I&amp;rsquo;ve certainly learned a lot from insight provided by those who appreciate this project, always know that your thoughts, questions, or suggestions are always welcome.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;If nothing else, it can help a lot if you just make sure this resource isn&amp;rsquo;t forgotten.&lt;/p&gt;
&lt;p&gt;Bookmarking the website at &lt;a href=&#34;https://libresolutions.network/&#34;&gt;libresolutions.network&lt;/a&gt; goes a long way.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;I highly recommend following the media-enabled &lt;a href=&#34;https://libresolutions.network/rss&#34;&gt;RSS Feed&lt;/a&gt; or the light text/audio only &lt;a href=&#34;https://libresolutions.network/about/index.xml&#34;&gt;feed.&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Don&amp;rsquo;t forget that there is also a &lt;a href=&#34;https://peertube.libresolutions.network&#34;&gt;PeerTube instance&lt;/a&gt; for all audio and video broadcasts.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Sharing the information in this project with others is always very appreciated.&lt;/p&gt;
&lt;p&gt;If you use social media, you are encouraged to share clips, screenshots and link back!&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;getting-involved&#34;&gt;Getting Involved&lt;/h3&gt;
&lt;p&gt;This project has always been about more than just myself. I&amp;rsquo;ve always greatly appreciated the feedback and insight I&amp;rsquo;ve been given from others who have commented or reached out via other means.&lt;/p&gt;
&lt;h3 id=&#34;financial-support&#34;&gt;Financial Support&lt;/h3&gt;
&lt;p&gt;There are three ways to financially support this project, both Substack and Mitra subscriptions include access to full-length episodes of my new tech news roundup &lt;a href=&#34;https://libresolutions.network/tags/cyber-fix&#34;&gt;&lt;em&gt;Cyber Fix&lt;/em&gt;.&lt;/a&gt; At the time of writing I believe the show is off to a great start, and I look forward to keeping it informative while making it more and more of an enjoyable listen.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://libresolutionsnetwork.substack.com/subscribe&#34;&gt;Substack subscription&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://fedi.libresolutions.network/@lsn/subscription&#34;&gt;Mitra subscription&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Donation through &lt;a href=&#34;https://liberapay.com/Gabe&#34;&gt;Liberapay&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;em&gt;If you are already supporting this work, you have my sincere gratitude!&lt;/em&gt;&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Noise About Signal</title>
		<link>https://libresolutions.network/articles/noise-about-signal/</link>
		<pubDate>Wed, 17 Jul 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/noise-about-signal/</guid>
		
		<image>https://libresolutions.network//media/images/keyboard-key.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/keyboard-key.webp" />
		<itunes:image href="https://libresolutions.network//media/images/keyboard-key.webp" />
		<description>Mulling over recent digital woes</description>
		<content:encoded>&lt;p&gt;Earlier this month, Signal was embroiled in controversy as a known vulnerability in the desktop client was rediscovered by an iOS developer. Initially, the president of the Signal Foundation decided to state that it &lt;a href=&#34;https://x.com/mer__edith/status/1810645893714002039&#34;&gt;didn&amp;rsquo;t need to be fixed,&lt;/a&gt; but after a short period of time, the Signal developers started &lt;a href=&#34;https://github.com/signalapp/Signal-Desktop/pull/6849#issuecomment-2218845070&#34;&gt;working on a fix.&lt;/a&gt; In short, community engagement saved the day and we can all sleep better knowing that a fair amount of people care about security enough to push for meaningful improvements. That&amp;rsquo;s not quite the end of the story though, there are good reasons to consider the fine details.&lt;/p&gt;
&lt;h3 id=&#34;what-was-the-vulnerability&#34;&gt;What was the vulnerability?&lt;/h3&gt;
&lt;p&gt;Many programs you use require &lt;em&gt;persistence&lt;/em&gt; in some form or another.
In the case of Signal, this means that without saving files you would need to re-sync your account every time you open the program and download all your messages again. To solve this, programs generally store file and/or a database in an application data folder under your user account.&lt;/p&gt;
&lt;p&gt;This &lt;em&gt;seems&lt;/em&gt; like a normal and reasonable thing to do, however on desktop platforms there is less protection from the user themselves accessing files. This means that any other program you run has the &lt;em&gt;capability&lt;/em&gt; of stealing that information as long as it is run under your user account. Mobile operating systems like Android and iOS work differently, and try to isolate files on a per-app basis.&lt;/p&gt;
&lt;p&gt;Without any additional protections, such as the user having to enter a password to decrypt the messenger&amp;rsquo;s files, the user&amp;rsquo;s messages are vulnerable to being read by malicious actors. Anyone who seizes access to the files also has access to the user&amp;rsquo;s Signal chats and their content. It&amp;rsquo;s worth noting that for this particular vulnerability, Session (a Signal fork) was also impacted by this problem. In truth, for the same reasons that Signal didn&amp;rsquo;t see it as an important problem in 2018, I would expect other applications to have similar problems.&lt;/p&gt;
&lt;h3 id=&#34;what-are-the-implications&#34;&gt;What are the implications?&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Convenience vs security:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Depending on what the goals for a particular project are, you can rationally defend particular limitations. If a software project merely intends to be a &amp;ldquo;starter option&amp;rdquo; for somebody just beginning to seize control over their digital affairs, ease-of-use may be a higher priority than state-of-the art. It does sound like a terrible idea to those of us who do prioritize privacy and security, but getting more people protected from the most egregious threats can have a huge impact if made easy enough.&lt;/p&gt;
&lt;p&gt;Signal is held to a higher standard however, at least by many who see it as the de-facto standard for a secure messenger. One way to overcome the convenience vs security dilemma is to allow for users to opt-in to better security protections. This isn&amp;rsquo;t necessarily ideal, because people rarely switch away from the defaults. Another solution would be to offer various &amp;ldquo;flavors&amp;rdquo; of the program, with different defaults based on the needs the user has. With regular reminders that enhanced security is available, this could be a best-case scenario for everyone involved at the cost of additional development headache.&lt;/p&gt;
&lt;p&gt;Another solution that I believe should be considered more, is the adoption of hardware token based authentication. Instead of relying entirely on ourselves to remember and constantly enter difficult passwords, using an authentication key can work better. Having a dedicated encryption module can offer a more seamless interaction with various security measures at the cost of more development overhead. In addition to this, hardware keys can not be stolen over the Internet as easily as passwords.&lt;/p&gt;
&lt;p&gt;Of course, without any development work, a sophisticated solution is for experienced users to use something like &lt;a href=&#34;https://www.qubes-os.org/&#34;&gt;Qubes OS&lt;/a&gt; to manually isolate every program on their system in its own virtual machine.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The only constant is change:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Personally, what&amp;rsquo;s really interesting to me is that this scenario really highlights how much people are generally willing to overlook problems when there isn&amp;rsquo;t a readily available &amp;rsquo;turn-key&amp;rsquo; solution. Since 2018, operating system features built for protecting sensitive information have been developed and more widely adopted by other applications. These features gaining prominence is the very thing that moved the needle on making the status quo untenable.&lt;/p&gt;
&lt;p&gt;Not only do threats evolve, but so do solutions. It is possible that many things we currently accept may become disastrous, yet easy to resolve in the future. If nothing else, this is a call to seriously consider long-term sustainability of various habits and techniques, as well as how we can emphasize adaptability in a rapidly changing environment. It is clear that now is not the time for complacency, and that a significant amount of effort is required to truly build a coherent foundation for computing.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;File management:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Consider: &lt;em&gt;Does it even make sense to protect various files as &amp;lsquo;special&amp;rsquo; in the first place&lt;/em&gt;?&lt;/p&gt;
&lt;p&gt;While at first glance one may assume that critical information like decryption keys are inherently more worth protecting than miscellaneous files or other program data, but there are good counter-arguments. For example, any documents or records you keep themselves may have sensitive content that also needs to be protected. In addition to this, most browsers are also vulnerable to the same threat, which means attackers can potentially break into a person&amp;rsquo;s accounts or read their entire browsing history.&lt;/p&gt;
&lt;p&gt;That itself is a big problem, without simple answers. One option is to try to build more protections on top of existing systems, another is to wipe the slate clean and try to rebuild entirely based on lessons learned. If you haven&amp;rsquo;t already, I&amp;rsquo;d highly recommend watching this interview I had with the developer of &lt;a href=&#34;https://samhsmith.com/serenum/&#34;&gt;Serenum&lt;/a&gt; to discuss his attempt at resolving some of these issues from the ground up.&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s a bold direction for sure, but even more important than the project itself is for more people to learn the fundamental levels of computing to help transform the foundation. People vastly underestimate what can be accomplished with a bit of knowledge becoming a bit more common.&lt;/p&gt;
&lt;h2 id=&#34;a-defense-of-pragmatism&#34;&gt;A defense of pragmatism&lt;/h2&gt;
&lt;p&gt;I will reiterate my position that it&amp;rsquo;s always worth using the most secure messenger you can with those around you. Isolating yourself entirely by refusing to compromise with close contacts is a road to being very isolated. Instead of demanding everyone you know only interact with you with a single &amp;lsquo;perfect&amp;rsquo; option &lt;a href=&#34;https://libresolutions.network/articles/the-perfect-messenger&#34;&gt;&lt;em&gt;that doesn&amp;rsquo;t exist&lt;/em&gt;&lt;/a&gt; taking on the burden of being familiar with multiple good &lt;em&gt;or even less bad&lt;/em&gt; options can help move people away from the most egregious circumstances.&lt;/p&gt;
&lt;p&gt;Remember that while your own situation is vital, the big picture matters a great deal too.&lt;br&gt;
To paraphrase the founder of &lt;a href=&#34;https://futo.org&#34;&gt;FUTO:&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&amp;ldquo;A good programmer can often get in the weeds and be like: Hey, this is cool! I solved this hard conceptual problem, but polishing this for a billion users, that&amp;rsquo;s no fun! Who&amp;rsquo;s going to polish it for a billion users? It&amp;rsquo;s gonna be a big company that can pay people money.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://peertube.futo.org/videos/embed/229204e8-af1b-4904-8f72-04cf9ac9cc2b&#34;&gt;FUTO - Using the term &amp;ldquo;open source&amp;rdquo; - a response to everything!&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Protecting digital autonomy needs to be about more than just our own individual self-interest, and more about doing what we can to help others. It is clear now more than ever that we don&amp;rsquo;t just need great programmers, but we also need more people to take these issues seriously, and that can&amp;rsquo;t happen if the solutions are too difficult to use. Despite everything, I find it easier and easier to be an optimist regarding these problems. It definitely seems that we really are only a bit of education, support, and passion away from making radical changes for a better technological future.&lt;/p&gt;
&lt;p&gt;As bleak as things can be, it&amp;rsquo;s reassuring that a great deal of the problems we want to take on are very much in the open. As much as it can feel like rebuilding it all requires starting from scratch, that&amp;rsquo;s not true in the slightest. Important lessons have been learned that can help us steer clear from a wide range of fundamental problems and there is a lot of amazing software to retool or at least learn from.&lt;/p&gt;
&lt;p&gt;I hope you can get excited about considering how things can be different, and how you can fit into making our digital environment better for not only yourself, but also those around you. It seems the opportunities for real change are only just beginning to present themselves.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Digital Autonomy And The Arts with The Starfire Codes</title>
		<link>https://libresolutions.network/videos/arts7/</link>
		<pubDate>Wed, 10 Jul 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/arts7/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/autio/arts7.ogg" />
			
		
		<image>https://libresolutions.network//media/images/arts7.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/arts7.webp" />
		<itunes:image href="https://libresolutions.network//media/images/arts7.webp" />
		<description>Making sense of the online media matrix</description>
		<content:encoded>&lt;p&gt;I spoke with Demi Pietchell from &lt;a href=&#34;https://www.starfirecodes.com/welcome&#34;&gt;The Starfire Codes&lt;/a&gt; to learn from her experience as someone with a long career in online media. We touch on many ongoing concerns such as community dynamics, censorship, the loss of coherence online, and even how that impacts artistic and intellectual creatives.&lt;/p&gt;
&lt;h3 id=&#34;featured-works&#34;&gt;Featured Works:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.starfirecodes.com/p/the-unintentional-online-meritocracy&#34;&gt;The Unintentional Online Meritocracy Experiment&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.starfirecodes.com/p/the-importance-of-intellectual-honesty&#34;&gt;The Importance of Intellectual Honesty&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.starfirecodes.com/p/censorship-an-unethical-violation-of-natural-law&#34;&gt;Censorship: An Unethical Violation of Natural Law&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.starfirecodes.com/p/the-loss-of-meaning-in-a-hyperconnected-age&#34;&gt;The Loss of Meaning in a Hyperconnected Age&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.starfirecodes.com/p/social-fragmentation-examining-the-roots&#34;&gt;Social Fragmentation: Examining the Roots and Finding Reconnection&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The &lt;a href=&#34;https://peertube.libresolutions.network/w/p/1nTQDQee8QWTn1YDC7Wz8H&#34;&gt;Digital Autonomy And The Arts Series&lt;/a&gt; includes an open invitation for discussing how our digital experience impacts our lives. Beyond simply exploring arts &amp;amp; tech, I would be happy to explore other domains as well. If you&amp;rsquo;re interested in exploring this discussion, consider &lt;a href=&#34;mailto://gabriel@libresolutions.network?subject=Digital%20Autonomy&#34;&gt;getting in touch&lt;/a&gt; to share how your passion connects with, or is impacted by technology.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Serenum: The &#39;From Scratch&#39; OS Revolution</title>
		<link>https://libresolutions.network/videos/serenum/</link>
		<pubDate>Mon, 08 Jul 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/serenum/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/serenum.ogg" />
			
		
		<image>https://libresolutions.network//media/images/serenum-banner.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/serenum-banner.webp" />
		<itunes:image href="https://libresolutions.network//media/images/serenum-banner.webp" />
		<description>A conversation with Sam H. Smith</description>
		<content:encoded>&lt;p&gt;I had the honor and pleasure to speak with &lt;a href=&#34;https://samhsmith.com/&#34;&gt;Sam Smith&lt;/a&gt; about the new operating system he&amp;rsquo;s building: &lt;a href=&#34;https://samhsmith.com/serenum/&#34;&gt;Serenum.&lt;/a&gt; We had a conversation about what motivated him to build this system, plans for the future, and where this all meets the bigger picture.&lt;/p&gt;
&lt;p&gt;Now more than ever, it’s time to seriously look closer at the fundamentals of our technological landscape and Sam has done the hard work of building something that could be the beginning of a solid new foundation to build on. For those who want to really advance their technical skills, it’s a great chance to seize the opportunity to understand computers at a very sophisticated level. Even for the ‘non-wizards’ among us, this project should represent a ray of hope in an otherwise tragically bleak technological landscape.&lt;/p&gt;
&lt;p&gt;Even for those among us who aren’t ‘computer wizards’, this project should represent a ray of hope in an otherwise tragically bleak technological landscape. When it comes to forging a new path, I believe that making technology truly personal is something that can be a real game-changer. Even if one isn’t able to engage with or directly support this project, some of the fundamental principles are worth understanding to be aware of just how different things can be.&lt;/p&gt;
&lt;p&gt;This project is fascinating for many reasons, but especially because it’s a call to action for those who wish to start truly innovating for the future. Many programmers, especially inexperienced ones can become intimidated by “low level” development, feeling filtered by complexity and lost in a labyrinth of extremely technical documentation.&lt;/p&gt;
&lt;p&gt;The Serenum project is an opportunity to get in on the ground floor of an exciting new frontier to take one’s technological knowledge to a new level. At the very least, let this conversation to be a reminder to stay curious, push the boundaries of your knowledge, and take the time to truly gain mastery over circuitry.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/serenum-hello.webp&#39; 
&gt;


&lt;p class=&#34;caption&#34;&gt;
    No capture card, sorry! 
&lt;/p&gt;


&lt;/div&gt;
&lt;p&gt;If you&amp;rsquo;d like to learn more about the Serenum operating system, you can take a look at the &lt;a href=&#34;https://samhsmith.com/serenum/release_6/&#34;&gt;latest release.&lt;/a&gt; Interested in more technical background details? Take a look at his original &lt;a href=&#34;https://vimeo.com/887510365/8446cf0e2d&#34;&gt;demo&lt;/a&gt; and follow-up &lt;a href=&#34;https://vimeo.com/889303217/4ea9a13f28&#34;&gt;Q&amp;amp;A.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Keep up with Sam&amp;rsquo;s work at: &lt;a href=&#34;https://twitch.tv/samhsmith&#34;&gt;Twitch,&lt;/a&gt; &lt;a href=&#34;https://www.youtube.com/channel/UC5d70JGqd8oJlCwaEOC_0Kw&#34;&gt;YouTube,&lt;/a&gt; or join the discussion on &lt;a href=&#34;https://discord.gg/PE2k3QN62Q&#34;&gt;Discord.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This is an ambitious project, which in its own right is worth celebrating. I highly recommend thinking seriously about having reasonable expectations for what you intend to get out of this. If you feel you have the desire, time, and patience you may want to consider getting your hands on the hardware. You can do so at &lt;a href=&#34;https://taberna.shop&#34;&gt;taberna.shop.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Other &lt;em&gt;from scratch&lt;/em&gt; operating systems you may have heard of, or be curious about are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://redox-os.org/&#34;&gt;Redox&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.serenityos.org/&#34;&gt;SerenityOS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://reactos.org/&#34;&gt;ReactOS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://toaruos.org/&#34;&gt;ToaruOS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://templeos.org/&#34;&gt;TempleOS&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Cyber Fix: Episode 3</title>
		<link>https://libresolutions.network/videos/cyber-fix-3/</link>
		<pubDate>Sun, 07 Jul 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/cyber-fix-3/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/cyber-fix-3.ogg" />
			
		
		<image>https://libresolutions.network//media/images/cyber-fix.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/cyber-fix.webp" />
		<itunes:image href="https://libresolutions.network//media/images/cyber-fix.webp" />
		<description>Cyber Fix is a show to provide entertaining and insightful analysis of developments in Cyberspace.</description>
		<content:encoded>&lt;p&gt;Cyber Fix is on hiatus, you may now listen to full episodes on &lt;a href=&#34;https://peertube.libresolutions.network/w/p/2FbUhGmiRbzmf1TUjWP3Xr&#34;&gt;PeerTube&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;internet-of-terrors&#34;&gt;Internet of Terrors:&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://cybernews.com/security/rockyou2024-largest-password-compilation-leak/&#34;&gt;RockYou2024: 10 billion passwords leaked in the largest compilation of all time&lt;/a&gt;&lt;br&gt;
&lt;a href=&#34;https://hackread.com/android-spyware-steals-gamers-tiktok-users-data/&#34;&gt;New Android Spyware Steals Data from Gamers and TikTok Users&lt;/a&gt;&lt;br&gt;
&lt;a href=&#34;https://ludic.mataroa.blog/blog/i-will-fucking-piledrive-you-if-you-mention-ai-again/&#34;&gt;I Will F**king Piledrive You If You Mention AI Again&lt;/a&gt;&lt;br&gt;
&lt;a href=&#34;https://hackaday.com/2024/06/30/root-your-sleep-number-smart-bed-discover-it-phoning-home/&#34;&gt;Root Your Sleep Number Smart Bed, Discover It Phoning Home&lt;/a&gt;&lt;br&gt;
&lt;a href=&#34;https://hackaday.com/2024/06/26/bats-can-no-longer-haunt-apple-vr-headsets-via-web-exploit/&#34;&gt;Bats Can No Longer Haunt Apple VR Headsets Via Web Exploit&lt;/a&gt;&lt;br&gt;
&lt;a href=&#34;https://www.resecurity.com/blog/article/cybercriminals-are-targeting-digital-identity-of-singapore-citizens&#34;&gt;Cybercriminals Are Targeting Digital Identity of Singapore Citizens&lt;/a&gt;&lt;br&gt;
&lt;a href=&#34;https://www.mollywhite.net/micro/entry/fighting-bots-is-fighting-humans&#34;&gt;Fighting Bots is Fighting Humans&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;alt-tech-updates&#34;&gt;Alt-Tech Updates:&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://techcrunch.com/2024/06/24/experts-say-telegrams-30-engineers-team-is-a-security-red-flag/&#34;&gt;Telegram says it has ‘about 30 engineers’; security experts say that’s a red flag&lt;/a&gt;&lt;br&gt;
&lt;a href=&#34;https://brave.com/blog/brave-shields-manifest-v3/&#34;&gt;What Manifest V3 means for Brave Shields and the use of extensions in the Brave browser&lt;/a&gt;&lt;br&gt;
&lt;a href=&#34;https://www.bleepingcomputer.com/news/software/proton-launches-free-privacy-focused-google-docs-alternative/&#34;&gt;Proton launches free, privacy-focused Google Docs alternative&lt;/a&gt;&lt;br&gt;
&lt;a href=&#34;https://x.com/naomibrockwell/status/1809291643838951716&#34;&gt;Naomi Brockwell on signal desktop issue&lt;/a&gt;&lt;br&gt;
📢 Update: &lt;a href=&#34;https://x.com/mer__edith/status/1810645893714002039&#34;&gt;Statement by Meredith Whittaker&lt;/a&gt; (President of Signal Foundation)&lt;/p&gt;
&lt;h3 id=&#34;problems-with-x&#34;&gt;Problems with X:&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://www.eff.org/deeplinks/2024/06/hack-age-verification-company-shows-privacy-danger-social-media-laws&#34;&gt;Hack of Age Verification Company Shows Privacy Danger of Social Media Laws&lt;/a&gt;&lt;br&gt;
&lt;a href=&#34;https://reclaimthenet.org/x-re-joins-pro-censorship-advertisers-alliance&#34;&gt;X Re-Joins Pro-Censorship Advertisers’ Alliance&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;solutions-roundup&#34;&gt;Solutions Roundup:&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://theoverlay.ghost.io/sustainability-and-standards-we-need-to-talk-about-building-censorship-circumvention-infrastructure/&#34;&gt;Sustainability and Standards: We Need To Talk About Building Censorship Circumvention Infrastructure&lt;/a&gt;&lt;br&gt;
&lt;a href=&#34;https://mastodon.social/@MakerTube/112729651355807241&#34;&gt;Celebrating 1 year of MakerTube Public Registrations&lt;/a&gt;&lt;br&gt;
&lt;a href=&#34;https://itsfoss.com/lm-studio-linux/&#34;&gt;Using LM Studio to Run LLMs Easily, Locally and Privately&lt;/a&gt;&lt;br&gt;
&lt;a href=&#34;https://ladybird.org/announcement&#34;&gt;Announcing the Ladybird Browser Initiative&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;music-credits&#34;&gt;Music Credits:&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://youtu.be/n79aphwhpW0&#34;&gt;Y&amp;amp;V - Lune&lt;/a&gt; &lt;br&gt;
&lt;a href=&#34;https://youtu.be/o_v9WSImGIU&#34;&gt;Valcos - A New Light&lt;/a&gt; &lt;br&gt;
&lt;a href=&#34;https://youtu.be/qLYmtdi-GzA&#34;&gt;Killercats - Kaibu&lt;/a&gt; &lt;br&gt;
&lt;a href=&#34;https://youtu.be/N4uxaLPEWJc&#34;&gt;My Path - Next Route&lt;/a&gt;&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Insecurity</title>
		<link>https://libresolutions.network/articles/insecurity/</link>
		<pubDate>Wed, 26 Jun 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/insecurity/</guid>
		
		<image>https://libresolutions.network//media/images/wasteland.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/wasteland.webp" />
		<itunes:image href="https://libresolutions.network//media/images/wasteland.webp" />
		<description>How insecurity fuels security problems</description>
		<content:encoded>&lt;p&gt;It&amp;rsquo;s ironic that the more the governments try to close their grip over the minds of the public, the more it begins to slip. From domestic turmoil, rising populist sentiment, and even just economic conditions, people are increasingly feeling a need to have a concrete impact on state policy. Instead of simply leaving it to their managerial handlers, motivated people are working to educate themselves and take action on a wide variety of topics.&lt;/p&gt;
&lt;p&gt;This is incredibly dangerous to &lt;a href=&#34;https://youtu.be/ZggCipbiHwE&#34;&gt;&amp;lsquo;Our Democracy&amp;rsquo;&lt;/a&gt; and those who benefit from how it functions. The greatest fear of those responsible for overseeing the system is that over time, people&amp;rsquo;s actions can actually tip the balance of power away from the delicately constructed &amp;lsquo;pay to play&amp;rsquo; dynamics built within it. If the public manages to wrestle political power away from lobbies, corporate powers, other &amp;lsquo;stakeholders&amp;rsquo;, the less power politicians have to auction to the highest bidder.&lt;/p&gt;
&lt;p&gt;For government officials who perceive their job to be &lt;em&gt;managing the public, rather than serving them&lt;/em&gt;. This is an urgent and pressing crisis. To overcome this a phenomenal amount of research has gone into &lt;a href=&#34;https://www.pewresearch.org/topic/news-habits-media/media-society/misinformation/&#34;&gt;tracking and identifying&lt;/a&gt; how information spreads online, with a huge amount of help from Big Tech no doubt. That was only the first step in then refining information control measures to protect the public from their desire to enact meaningful reform.&lt;/p&gt;
&lt;p&gt;A wide variety of methods were attempted in &amp;ldquo;digital public spaces&amp;rdquo;, such as social media, forums, and even &lt;a href=&#34;https://fandomwire.com/call-of-duty-modern-warfare-3s-disruptive-behaviour-enforcement-explained-and-how-to-appeal/&#34;&gt;video games&lt;/a&gt;. Such methods included &lt;em&gt;shadow-banning&lt;/em&gt; which is when one is banned from being seen without any clear indication, or more overt methods like banning individual accounts that gained traction. Eventually it became clear that the only way to truly &lt;em&gt;fortify&lt;/em&gt; the public from their own ideas was to start leveraging financial control.&lt;/p&gt;
&lt;p&gt;&amp;lsquo;De-monetized&amp;rsquo; is now a well-known term online for when an individual or even company are restricted from receiving funds through a particular platform. This is a double-hitter when it comes to chilling effects on free expression. Not only are those who are impacted potentially forced to shut down operations, but their opposition has more space to grow louder and bolder. Financial de-platforming for political reasons is a very potent tool that has an impact that shouldn&amp;rsquo;t be underestimated.&lt;/p&gt;
&lt;p&gt;As effective as these methods can be, they ultimately rely on people deriving their world views from the &lt;em&gt;parasocial hell&lt;/em&gt; that is corporate social media. Independent web sites, and personal communications have been largely &lt;a href=&#34;https://libresolutions.network/articles/broken-internet/&#34;&gt;but not entirely&lt;/a&gt; unaffected by these measures. This has created a lot of room for those who are motivated enough to begin the work of seriously making a difference. While this may seem like such a minor or trivial thing, but it&amp;rsquo;s actually far from it. It&amp;rsquo;s crucial to understand that when it comes to the ability to broker political power to &amp;lsquo;stakeholders&amp;rsquo; any real opposition has the capacity to spin out-of-control, especially in our highly-connected yet-not-entirely-controlled environment.&lt;/p&gt;
&lt;h3 id=&#34;breaking-in&#34;&gt;Breaking In&lt;/h3&gt;
&lt;p&gt;Because even private dissent and private thoughts are intolerable, and independent web sites and social media are just too much to bear, governments feel the pressure to take drastic action. In what is only the latest assault on people&amp;rsquo;s fundamental natural rights, governments of the world want to break into your home. Not yet literally, nor physically, but they want to have unimpeded insight into the communications between you and your closest contacts. Dinner table talk just isn&amp;rsquo;t the same with a government agent sitting next to you.&lt;/p&gt;
&lt;p&gt;End-to-end encrypted communication outside corporate networks is something those who wish to have total control over information can not tolerate. This is true of any encryption for the most part. From the beginning of the &lt;a href=&#34;https://www.lawfaremedia.org/article/the-shapeshifting-crypto-wars&#34;&gt;crypto wars&lt;/a&gt; governments have always attempted to undermine the public&amp;rsquo;s privacy even at the expense of security. If you listen to &lt;a href=&#34;https://media.privacyinternational.org/videos/watch/a56faeff-d41e-46c6-93fc-9e01eab8383c&#34;&gt;this discussion,&lt;/a&gt; on the history of encryption, you&amp;rsquo;ll learn not only was privacy in the digital realm a very hard-won fight, it&amp;rsquo;s even more important than ever.&lt;/p&gt;
&lt;h2 id=&#34;european-union-strikes&#34;&gt;European Union Strikes&lt;/h2&gt;
&lt;p&gt;The European Union is taking bold action against people&amp;rsquo;s private communications. Ironically, while they &lt;a href=&#34;https://libresolutions.network/articles/government-in-tech/&#34;&gt;support many initiatives&lt;/a&gt; that can support people&amp;rsquo;s digital autonomy, they are moving fast to undermine it from the top-down. Previously they&amp;rsquo;ve proposed &lt;a href=&#34;https://libresolutions.network/articles/eu-cyberwar/&#34;&gt;back-dooring&lt;/a&gt; all online web traffic, but another proposal aims to directly attack private communication with mandated client-side-scanning for illegal material.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/client-side-scanning.png&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;While fighting CSAM and its distribution is a desirable and noble goal, this step ultimately is prone to staggering scope creep without any guarantees of accountability or transparency. In situations where people are given obscene one-sided power over others you will always inevitably see &lt;a href=&#34;https://www.cnn.com/2013/09/27/politics/nsa-snooping/index.html&#34;&gt;abuses.&lt;/a&gt; In case you had doubts, EU ministers have already moved to &lt;a href=&#34;https://www.eureporter.co/business/data/mass-surveillance-data/2024/04/15/leak-eu-interior-ministers-want-to-exempt-themselves-from-chat-control-bulk-scanning-of-private-messages/&#34;&gt;exempt themselves&lt;/a&gt; from the measure. Thankfully, the vote for the legislation seems to be &lt;a href=&#34;https://www.patrick-breyer.de/en/chat-control-vote-postponed-huge-success/&#34;&gt;postponed, for now.&lt;/a&gt; This is a great indication that being vigilant and being proactive can create tangibly beneficial results.&lt;/p&gt;
&lt;h2 id=&#34;a-world-wide-push&#34;&gt;A World-Wide Push&lt;/h2&gt;
&lt;p&gt;It seems as no coincidence, that 2024 marked the year in which the most people voted globally, is also marked as a year with an immense &lt;a href=&#34;https://www.eff.org/deeplinks/2024/06/un-cybercrime-draft-convention-blank-check-unchecked-surveillance-abuses&#34;&gt;world-wide push&lt;/a&gt; for internet regulation. It&amp;rsquo;s not only ironic but highly demonstrative of how inter-twined the balance of power in nominally democratic countries is with online participation.&lt;/p&gt;
&lt;p&gt;Notably, Many internet censorship bills have been making progress in North America and throughout the world. In addition to online ID or age verification laws, more aggressive legislation against various forms of speech is also being proposed in many jurisdictions. Undeniably, these restrictions and impositions create many chilling effects.&lt;/p&gt;
&lt;p&gt;This is a delicate game for those who wish to maintain control. While getting large tech corporations to censor or promote content is effective, the more people who break away to independent alternatives make it exponentially harder. As more and more people truly learn to use technology as an effective tool, rather than a self-curated mind-prison, the more impossible information control becomes. Those who wish to push for meaningful change, transparency, and accountability need to skill-up and adapt without falling into the many well-laid traps.&lt;/p&gt;
&lt;h2 id=&#34;a-chance-for-change&#34;&gt;A Chance for Change&lt;/h2&gt;
&lt;p&gt;All this, motivated the creation of a &lt;a href=&#34;https://libresolutions.network/operations/beehive/&#34;&gt;beehive&lt;/a&gt; called &lt;em&gt;Canadian Cyber Freedom&lt;/em&gt; at &lt;a href=&#34;https://cyberfreedom.ca&#34;&gt;cyberfreedom.ca&lt;/a&gt;. It&amp;rsquo;s intended to be a resource, but also a collaborative environment for Canadians to learn new ways for citizens to engage on political issues. The purpose of the project is to demonstrate that with a small amount of technical knowledge, activists can greatly enhance their efforts.&lt;/p&gt;
&lt;p&gt;Very often legislation comes out before the public gets a chance to understand the issues, much less make fair judgement on them. In most countries, giving the public a close look at legislation that impacts their lives is likely enough to motivate real pushback. With the pace that legislative bodies have to work at, a relatively tiny amount of activists could assemble resources that can adapt and move faster than legislation itself.&lt;/p&gt;

&lt;p&gt;The best way for citizens to move the needle against troubling legislation is for activists to effectively and fairly educate the public. Very often, debates over political issues become needlessly divisive. The way to resolve this is to find ways to collaborate on educating the public on not just the legislation itself, but also the wider issues. The more polished the collected information can become, the more opportunities towards bringing people on-board.&lt;/p&gt;
&lt;p&gt;This requires trusting the recipients of the information a bit. Instead of merely relying on a single emotionally charged opinion piece, sharing the entire picture, warts and all will ultimately lead to better decisions and more rational opposition. &lt;a href=&#34;https://cyberfreedom.ca&#34;&gt;Canadian Cyber Freedom&lt;/a&gt; is just an example, that I hope eventually becomes a meaningful resource. But there are many ways for groups interested on a wide variety of issues to adopt the same pattern to tackle other issues.&lt;/p&gt;
&lt;h2 id=&#34;taking-on-online-harms-directly&#34;&gt;Taking On Online Harms Directly&lt;/h2&gt;
&lt;p&gt;While I am wholeheartedly opposed to giving governments and corporations more control over people&amp;rsquo;s ability to dissent, I am not ignorant of many serious online threats to individuals and especially children. It is understandable that many who recognize these dangers urgently want change that is far too long overdue. Having government &amp;lsquo;child-proof&amp;rsquo; the Internet is just as irrational and likely to backfire as leaving everything on the shoulders of parents. It&amp;rsquo;s not about &amp;lsquo;striking a balance&amp;rsquo; but rather about understanding that the problem is far bigger than just small parameters.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Online spaces don’t exist in a vacuum, they’re a part of our human society. As things become challenging and confusing in life, there is an incredible draw to retreat to online spaces that feel cozier than the rest of the world. &lt;br&gt;
Leading to all kinds of problems:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Sleep deprivation&lt;/li&gt;
&lt;li&gt;Depression&lt;/li&gt;
&lt;li&gt;Over-eating&lt;/li&gt;
&lt;li&gt;Escapism&lt;/li&gt;
&lt;li&gt;Political extremism / radicalization&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Sounds a lot like a millennial doesn’t it? Many of us are internet-addicted for a variety of reasons.
Many of these problems aren’t new, and likely won’t be going away anytime soon. Some appear to have gotten much worse.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://libresolutions.network/articles/think-of-the-children/&#34;&gt;Is the Internet safe for children?
&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Every aspect of people&amp;rsquo;s lives is becoming increasingly intertwined with online services and a wide variety of online interactions. This alone is a serious reason to take a look at a much broader picture. If even a small fraction of people only get their interactions with other human beings mediated by online services, (or even worse &amp;hellip;AI-enabled ones) this alone can compound into a serious crisis of loneliness and despair for those people. Just as the problems have increased, so has the damage. Is it not fair to say that nobody could be prepared for having most of their &lt;a href=&#34;https://www.ctvnews.ca/health/kids-average-daily-screen-use-increased-by-more-than-an-hour-and-twenty-minutes-during-pandemic-analysis-1.6142328&#34;&gt;socialization pushed online?&lt;/a&gt; While the Covid Crisis is a notable event, in this respect it was a mere escalation of an existing trend. Having compassion for those suffering from a wide variety of impacts is a necessary step towards lasting change.&lt;/p&gt;
&lt;p&gt;Placing a larger emphasis on real-life personal interactions is of utmost importance. Quite tragically it seems we are completely forgetting that children need a safe and nurturing environment in the real world. We are all under constant threat to &lt;a href=&#34;https://libresolutions.network/videos/data-shedding/&#34;&gt;online surveillance&lt;/a&gt; and addictive &lt;a href=&#34;https://libresolutions.network/articles/programmable-currency/&#34;&gt;gamified interactions,&lt;/a&gt; which can only cause problems in the long run. With this in mind, I don&amp;rsquo;t believe that all online interactions and systems are equal. Raising maximizing the quality of use for devices and systems, while minimizing dangers from less ideal services is the optimal path for everyone.&lt;/p&gt;
&lt;p&gt;Clearly, resolving this goes far beyond a bit of legislation and hearings. To the degree those blunt instruments can be useful, there&amp;rsquo;s always more direct action people can take in their lives to make a meaningful difference. The first step involves getting a serious sober grasp of the problems. On that, a great starting point would be the work of &lt;a href=&#34;https://www.childrenandtech.co.uk/about&#34;&gt;Catherine Knibbs.&lt;/a&gt; Catherine has written many books on the subject and has worked extensively as a child therapist seeing these troubles up-close. &lt;a href=&#34;https://www.childrenandtech.co.uk/shop/p/online-harm-books-directly-available-from-routledge-or-amazon&#34;&gt;&lt;em&gt;Online Harms and Cybertrauma&lt;/em&gt;&lt;/a&gt; is necessary reading for any online user, in my opinion. You can also check out her &lt;a href=&#34;https://www.youtube.com/channel/UCb2cLs1_9NYeTMglSRT-Spg&#34;&gt;YouTube channel&lt;/a&gt; or &lt;a href=&#34;https://www.instagram.com/catherine_knibbs/&#34;&gt;Instagram account&lt;/a&gt; and share particularly useful videos or ideas with those around you.&lt;/p&gt;
&lt;p&gt;It is extremely important for those who truly care about improving online safety have a strong understanding of these issues. Not only for its own sake, but also so that we can all have serious, reasoned discussions about addressing the root causes of these problems. Problems don&amp;rsquo;t go away merely because we don&amp;rsquo;t approve of popular solutions, there are many who are already in great pain who need care. Instead of allowing tragedy to be exploited for political power, we can all work towards setting proper boundaries at all levels of society. A lot more can be accomplished through compassion and education than scoring cheap political &amp;lsquo;wins&amp;rsquo;.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Cyber Fix: Episode 2</title>
		<link>https://libresolutions.network/videos/cyber-fix-2/</link>
		<pubDate>Mon, 24 Jun 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/cyber-fix-2/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/cyber-fix-2.ogg" />
			
		
		<image>https://libresolutions.network//media/images/cyber-fix.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/cyber-fix.webp" />
		<itunes:image href="https://libresolutions.network//media/images/cyber-fix.webp" />
		<description>Cyber Fix is a show to provide entertaining and insightful analysis of developments in Cyberspace.</description>
		<content:encoded>&lt;p&gt;Cyber Fix is on hiatus, you may now listen to full episodes on &lt;a href=&#34;https://peertube.libresolutions.network/w/p/2FbUhGmiRbzmf1TUjWP3Xr&#34;&gt;PeerTube&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;music-credits&#34;&gt;Music Credits:&lt;/h3&gt;
&lt;p&gt;Y&amp;amp;V - Lune: &lt;a href=&#34;https://youtu.be/n79aphwhpW0&#34;&gt;https://youtu.be/n79aphwhpW0&lt;/a&gt;&lt;br&gt;
Valcos - A New Light: &lt;a href=&#34;https://youtu.be/o_v9WSImGIU&#34;&gt;https://youtu.be/o_v9WSImGIU&lt;/a&gt;&lt;br&gt;
Killercats - Kaibu: &lt;a href=&#34;https://youtu.be/qLYmtdi-GzA&#34;&gt;https://youtu.be/qLYmtdi-GzA&lt;/a&gt;&lt;br&gt;
@SavkMusic - The Traveling Symphony: &lt;a href=&#34;https://youtu.be/Qn3mb4LsoD8&#34;&gt;https://youtu.be/Qn3mb4LsoD8&lt;/a&gt;
GhostrifterOfficial - Resurgence: &lt;a href=&#34;https://youtu.be/IzA39soWYG8&#34;&gt;https://youtu.be/IzA39soWYG8&lt;/a&gt;&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>The Ugliness of War and Technocracy</title>
		<link>https://libresolutions.network/articles/war-and-technocracy/</link>
		<pubDate>Sun, 16 Jun 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/war-and-technocracy/</guid>
		
		<image>https://libresolutions.network//media/stock/broken-house.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/stock/broken-house.webp" />
		<itunes:image href="https://libresolutions.network//media/stock/broken-house.webp" />
		<description>A look at weapons of war in the digital age.</description>
		<content:encoded>&lt;p&gt;For those interested in preserving our nations, free markets, culture, or even basic human rights, we are in an outright harrowing time. Many of these challenges are direct physical assaults like warfare, but there is also a wide variety of abstract dangers. Such as censorship, surveillance, economic warfare, or disaster capitalism. Governments battle against their people for control over policy, and against mega-corporations for control over the public. Families, communities, even entire nations are stuck in the crossfire of larger plans without clear allies to depend on. Marshall McLuhan&amp;rsquo;s quote has become a tired cliche these days as more and more people recognize that vast swaths of humanity are under attack from seemingly every direction.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&amp;ldquo;World War 3 is a guerrilla information war with no division between military and civilian participation.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;- &lt;a href=&#34;https://en.wikipedia.org/wiki/Marshall_McLuhan&#34;&gt;Marshall McLuhan&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;The quote accurately describes what many are feeling, but little else.&lt;br&gt;
It leaves behind many questions to ponder further:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What is the war about?&lt;/li&gt;
&lt;li&gt;Who&amp;rsquo;s waging the war, and against whom?&lt;/li&gt;
&lt;li&gt;Who&amp;rsquo;s winning?&lt;/li&gt;
&lt;li&gt;Is there a side to join or oppose?&lt;/li&gt;
&lt;li&gt;When will it be over?&lt;/li&gt;
&lt;li&gt;What can we do to protect ourselves?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;I don&amp;rsquo;t pretend to have all the answers, but there are useful guides to follow. In the words of &lt;a href=&#34;https://iceni.substack.com/p/spartacast-12&#34;&gt;Spartacus&lt;/a&gt; &amp;ldquo;&lt;em&gt;War has always been a convenient human-shredder for the overclass. It has always been this way. &amp;hellip;It’s a scam. It has always been a scam.&lt;/em&gt;&amp;rdquo;. We&amp;rsquo;re reminded to consider who has always had a hand in orchestrating and profiting off wars: the powerful. Unfortunately, this isn&amp;rsquo;t immediately helpful. Just as the atom bomb changed the balance of power between nations of the world, &lt;a href=&#34;https://libresolutions.network/videos/tnt-radio-network-states/&#34;&gt;network warfare,&lt;/a&gt; where dynamic super-national forces engage in a &lt;a href=&#34;https://roundingtheearth.substack.com/p/call-it-world-war-e&#34;&gt;global civil war,&lt;/a&gt; the game has changed immensely. As super-wealthy cliques accrue wealth and power that rivals nations, governments themselves can easily become mere strategic objectives in larger games.&lt;/p&gt;
&lt;p&gt;It is arguable that network warfare has been the essential root of all human warfare throughout history. The only difference is that both people themselves, and our means of waging war, have the potential to be so disconnected from pre-existing structures of tribes, faiths, or nations. Never before have the warmongers of the past had the entire world potentially at their mercy, as well as the entire population. This form of warfare is total unrestricted warfare, and encompasses all aspects of participation in human society. It has been said that &amp;rsquo;the person is political&amp;rsquo;, paired with the acknowledgement that politics is warfare waged through other means, we understand our predicament more clearly.&lt;/p&gt;
&lt;p&gt;There is a way to keep this simple, without losing the important details. People feel under attack, and they are correct to feel this way. This is because unlike what AI evangelists or &amp;lsquo;Net Zero&amp;rsquo; malthusians will tell you, human beings are the prize. Not just the prize, but the &lt;strong&gt;only prize&lt;/strong&gt;. Tyrants of all scopes of ambition realize that the source of all earthly power stems from effective cooperation between human beings. This requires them to use more and more &lt;a href=&#34;https://corbettreport.com/the-age-of-neurowarfare/&#34;&gt;sophisticated means&lt;/a&gt; of coercion to not undermine the value of total control.&lt;/p&gt;
&lt;p&gt;The point of sharing this is that you understand what &amp;ldquo;side you&amp;rsquo;re on&amp;rdquo; is a much more complex question than various accidents of birth. The physical, economic, and even digital empires run by many or even a few are competing for dominance over you and others. Lending your strength or allegiance to one may or may not be mutually exclusive with others. This naturally leads one to wonder if they can opt-out entirely, and abandon the game of conquest and live a life of peace. We can always pray this is possible, but it&amp;rsquo;s important to recognize that we inherit circumstances that make this require much more intense work than merely not choosing to commit overt aggression.&lt;/p&gt;
&lt;h2 id=&#34;conceptualizing-a-global-civil-war&#34;&gt;Conceptualizing a Global Civil War&lt;/h2&gt;
&lt;p&gt;Economic control is no less devastating than bombs or bullets. Even when direct violence is involved, there are a wide array of ephemeral &amp;lsquo;slow-kill&amp;rsquo; means available. Biowarfare, toxins, or even sabotage of essentials are all means to cause mass poverty, suffering and death. Normalcy bias and plausible deniability allow atrocities to take place without recognition or recourse. Quiet weapons doing minor cumulative damage can make a significant impact despite going undetected and being difficult to attribute. To make matters worse, responsibility can be diffused by providing a vast array of self-destructive means of illusory relief.&lt;/p&gt;
&lt;h3 id=&#34;a-fractal-of-suffering&#34;&gt;A Fractal of Suffering&lt;/h3&gt;
&lt;p&gt;Almost everyone can intuit simple cause and effect, most of the time. What&amp;rsquo;s much harder for many people to grasp is &lt;em&gt;force multipliers&lt;/em&gt;. Various techniques such as propaganda, spycraft, or even financial engineering can make relatively straight-forward attacks work through an incomprehensible maze of complexity. In these circumstances people only identify the pain, not the source of it. This can often lead those who don&amp;rsquo;t wish to feel guilty to justify the existence of that pain for their own comfort.&lt;/p&gt;
&lt;h3 id=&#34;overheated-threat-awareness&#34;&gt;Overheated Threat Awareness&lt;/h3&gt;
&lt;p&gt;With attacks coming from seemingly nowhere and everywhere, there is a natural desire to identify threats. This desire can be leveraged by propagandists and profiteers alike to further their own ends, exhausting the reflex. As people continuously transform themselves into &lt;em&gt;the boy who cried wolf&lt;/em&gt; over and over, the populace becomes numb to the sensation of danger. In circumstances where this numbness has taken hold, people are no longer able to act on their self-preservation instincts, creating easy targets for even the most blatant schemes.&lt;/p&gt;
&lt;h3 id=&#34;propaganda&#34;&gt;Propaganda&lt;/h3&gt;
&lt;p&gt;The &amp;ldquo;&lt;em&gt;information landscape&lt;/em&gt;&amp;rdquo;, which is an abstraction of everyone&amp;rsquo;s thoughts, perceptions, and available information is a &lt;a href=&#34;https://unlimitedhangout.com/2024/03/investigative-reports/weaponizing-reality-the-dawn-of-neurowarfare/&#34;&gt;valuable strategic target&lt;/a&gt; of tyrants. The ability to control, restrict or modify the flow of information gives anyone a significant advantage over others. Pairing this with sophisticated understanding of people&amp;rsquo;s natural desires, fears, and hopes is a phenomenally powerful weapon to wield against individuals and groups alike. Beyond merely being a blunt instrument to rally compliance, propaganda can be weaponized to turn people against themselves, even individually. This immensely toxic pattern mass-produces hurt people who are readily able to hurt others.&lt;/p&gt;
&lt;h3 id=&#34;merchants-of-death&#34;&gt;Merchants of Death&lt;/h3&gt;
&lt;p&gt;War can be big business for propagandists, profiteers, and plunderers alike. It provides the state the pretext to more overtly and more aggressively dominate the financial system. This leads to the mass financial and social engineering of the economic structure to support the war effort.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;To illustrate how U.S. military and intelligence agencies have supported tech startups, consider the case of Keyhole, a small San Francisco-based company that developed software for creating three-dimensional models of the earth’s surface. By patching together satellite images and aerial photos, the program could essentially produce a high-resolution map of the entire planet.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;In-Q-Tel provided seed funding in 2003, and within two weeks, military and intelligence agencies were reportedly using Keyhole’s software to support the U.S. war in Iraq.&lt;/strong&gt; The following year, Google acquired Keyhole for an undisclosed sum. It was renamed Google Earth and today, it is worth approximately $4
billion. In this case, In-Q-Tel’s investment paid off in monetary terms, but the bigger jackpot was the Keyhole program itself, which the CIA and Pentagon immediately deployed in support of military operations.&lt;/p&gt;
&lt;p&gt;Like many DIU and In-Q-Tel investments, Keyhole-Google Earth is a dual-use technology that can be adapted for both military and civilian applications. &lt;strong&gt;The vast majority of In-Q-Tel funded startups acquired by large tech companies have created dual-use products&lt;/strong&gt;, such as &lt;a href=&#34;https://www.geekwire.com/2015/amazons-aws-acquires-portlands-appthwack-seeking-an-easy-way-to-test-apps-in-the-cloud/&#34;&gt;AppThwack&lt;/a&gt; and Elemental Technologies (acquired by Amazon); &lt;a href=&#34;https://blogs.microsoft.com/blog/2014/12/01/microsoft-acquires-acompli-provider-innovative-mobile-email-apps/&#34;&gt;Acompli&lt;/a&gt; and &lt;a href=&#34;https://www.digitalspy.com/tech/a392457/microsoft-acquires-perceptive-pixel-inc/&#34;&gt;Perceptive Pixel&lt;/a&gt; (acquired by Microsoft); Tacit Software (acquired by Oracle);
&lt;a href=&#34;https://www.prnewswire.com/news-releases/ibm-plans-to-acquire-cleversafe-to-propel-object-storage-into-the-hybrid-cloud-300153991.html&#34;&gt;Cleversafe&lt;/a&gt; (acquired by IBM); &lt;a href=&#34;https://www.crn.com/news/networking/300085046/cisco-takes-aim-at-microsoft-with-acquisition-of-mindmeld&#34;&gt;MindMeld&lt;/a&gt; (acquired by Cisco); &lt;a href=&#34;https://www.anandtech.com/show/10858/samsung-acquires-qd-vision&#34;&gt;QD Vision&lt;/a&gt; (acquired by Samsung); and &lt;a href=&#34;https://ipvm.com/reports/sony-acquires-pixim&#34;&gt;Pixim&lt;/a&gt; (acquired by Sony).&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://watson.brown.edu/costsofwar/papers/2024/SiliconValley&#34;&gt;How Big Tech and Silicon Valley are Transforming the Military-Industrial Complex&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;It&amp;rsquo;s hard to imagine the long-term incentive changes when an entire industry becomes a creature of the MIC. When states and super-national entities harness such massive economic power to run sprawling computing power to mechanize warfare, is there even possibly room for accountability? How does all this spending impact journalism, academia, or even governance?&lt;/p&gt;
&lt;h2 id=&#34;cyberwar&#34;&gt;Cyberwar&lt;/h2&gt;
&lt;p&gt;When people imagine cyberwars, they often think of shocking news stories of ransomware attacks by shady hacker groups. This is a very serious concern, but another quite troubling development is the digitization of warfare that has accelerated since people&amp;rsquo;s very lives have become technologically transformed.&lt;/p&gt;
&lt;p&gt;The technological dimension of warfare is staggering. There was a time where the most horrifying technological terror was the atomic bomb. While not eclipsing its destructive power, various &lt;em&gt;tools of precision&lt;/em&gt; like drones, surveillance infrastructure, or autonomous weapons can be part of the construction of all manner of &lt;a href=&#34;https://treacherous.tech/2024/04/14/weaponised-ai-isnt-killer-robots-its-just-humans-killing-on-autopilot/&#34;&gt;inhumane horrors.&lt;/a&gt; The tragic irony is that warfare has generally been quite human. Warriors throughout history taking up arms against other people across the globe, or even withing their own regions, have always had to contend with the atrocities up close. It seems that we may be on the cusp of witnessing this change in real-time.&lt;/p&gt;
&lt;h3 id=&#34;surveillance&#34;&gt;Surveillance&lt;/h3&gt;
&lt;p&gt;Data collected for seemingly innocuous purposes can quickly become &lt;a href=&#34;https://www.theguardian.com/world/2018/jan/28/fitness-tracking-app-gives-away-location-of-secret-us-army-bases&#34;&gt;military intelligence.&lt;/a&gt; There are many non-intuitive uses for even seemingly insignificant data-points collected over time.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Using AI from Palantir, an American firm, Ukrainian counter-intelligence fishes for illuminating linkages in disparate pools of data. &lt;strong&gt;Imagine, for instance, an indebted divorcee at risk of losing his flat and custody of his children who opens a foreign bank account and has been detected with his phone near a site that was later struck by missiles.&lt;/strong&gt; In addition to such dot-connecting, the AI performs &lt;strong&gt;“social-network analysis”&lt;/strong&gt;. If, say, the hypothetical divorcee has strong personal ties to Russia and has begun to take calls from someone whose phone use suggests a higher social status, then AI may increase his &lt;strong&gt;risk score.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://archive.is/TvLvY#selection-991.0-991.40&#34;&gt;How Ukraine is using AI to fight Russia&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;A serious challenge caused by industrialized surveillance is &lt;em&gt;information asymmetry&lt;/em&gt;, where information is known to few but unknown to great many. The first casualty of war is the truth, and this is never more clear when immense amounts of data are collected in secret to be used selectively. Just as cyber threats blur the lines between military and civilian targets, domestic surveillance becomes more of a priority for troubled regimes.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://libresolutions.network/media/images/worldcoin-before-after.webp&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/worldcoin-before-after.webp&#39; 
&gt;

&lt;/a&gt;


&lt;p class=&#34;caption&#34;&gt;
    From War to Worldcoin: collecting biometrics for later use. 
&lt;/p&gt;


&lt;/div&gt;
&lt;h3 id=&#34;machine-learning&#34;&gt;Machine Learning&lt;/h3&gt;
&lt;p&gt;It would be naive, if not outright dangerous to underestimate the consequences of military use of machine learning, and how it can &lt;a href=&#34;https://sub.media/gaza-is-an-image-of-the-future/&#34;&gt;move to dominate our lives.&lt;/a&gt; Artificial intelligence is its own buzzword, but one must not fall into the trap of thinking it&amp;rsquo;s all worthless. The more a problem (or killing) can be accurately reduced to a simple set of variables, the more effective &lt;a href=&#34;https://www.youtube.com/watch?v=XEM5qz__HOU&#34;&gt;these tools&lt;/a&gt; can become. Another danger is that many downsides of contemporary AI tools are still serious concerns. Machine errors can be devastating and must not be used to downplay accountability.&lt;/p&gt;
&lt;p&gt;The military industrial complex (MIC) is a terrifying machine. Media, industry, and economy are all impacted directly or indirectly by it. Between 2022 and 2023 US Department of Defense spending on AI related contracts jumped from $269 million to &lt;a href=&#34;https://time.com/6961317/ai-artificial-intelligence-us-military-spending/&#34;&gt;$4.3 billion.&lt;/a&gt; It is concerning at minimum that this huge amount of resources in military uses of machine learning effectively drains talent from non-combat uses, which could actually improve people&amp;rsquo;s lives and solve serious problems. While it is true that military advancements in technology eventually &lt;em&gt;trickle down&lt;/em&gt; this only happens after an immense amount of avoidable suffering, it is not without cost either.&lt;/p&gt;
&lt;h3 id=&#34;dominating-cyberspace&#34;&gt;Dominating Cyberspace&lt;/h3&gt;
&lt;p&gt;The Internet, despite it&amp;rsquo;s flaws, is a valuable tool for transmitting critical information. During times of conflict it is a common tactic for powers to &lt;a href=&#34;https://www.accessnow.org/press-release/mena-keepiton-internet-shutdowns-2023-en/&#34;&gt;cut off access&lt;/a&gt; as a means of restricting information or aid. It is a mistake to believe that an Internet shutdown means that others can not use their own private (or military) networks to maintain connectivity. This means that Internet shutdowns are a measure that overwhelmingly impacts civilians and may have much smaller cost for the initiator than one would assume.&lt;/p&gt;
&lt;p&gt;Cutting off internet access can also be done in parts. &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-9/&#34;&gt;Sophisticated techniques&lt;/a&gt; can be used to deny, filter and even manipulate content given enough resources. In many circumstances, it may be preferable to simply inspect network traffic rather than outright block it. Interfering with communications changes behavior, but silently monitoring generally doesn&amp;rsquo;t.&lt;/p&gt;
&lt;h3 id=&#34;cyber-attacks&#34;&gt;Cyber Attacks&lt;/h3&gt;
&lt;p&gt;Just as the lines between the physical and digital realities blur in our lives, so too do they in warfare. The more critical systems that depend on inter-connected online services, the more brittle and vulnerable people are to malicious (state-backed or not) entities. The impact can be devastating with little distinction between &lt;a href=&#34;https://www.bbc.com/news/technology-66998064&#34;&gt;civilian and military targets.&lt;/a&gt; Because of this, major cyber attacks certainly get the headlines. The impact of disruptive attacks on infrastructure can not be over-stated, but the risk management solutions by the regime can be just as troubling.&lt;/p&gt;
&lt;p&gt;Governments have made it clear that information counter to their interests being disseminated itself is seen no different as a &amp;lsquo;cyber attack&amp;rsquo;. In recent years there has been greater emphasis on manipulating minds in the name of safety and national security. This is a troubling new direction in justifying the elimination of free expression, and justifying propaganda operations. A regime that treats it&amp;rsquo;s own citizens as if they were any other computing resource will justify very troubling means to meet its objectives.&lt;/p&gt;
&lt;p&gt;As non-combatants, it is not merely enough to demand secure systems. It is crucial that we do not allow the fear of &lt;a href=&#34;https://libresolutions.network/tags/cyberwar/&#34;&gt;cyberwars&lt;/a&gt; to allow institutions to take over our digital or actual lives. There is an immense pressure building for people to set aside &lt;a href=&#34;https://libresolutions.network/articles/digital-autonomy/&#34;&gt;digital autonomy&lt;/a&gt; or even their civil rights in the name of safety. One must be cautioned that conceding these is a road to supporting atrocities without even the pretext of accountability. By being cow-towed into dependence on the regime, the public can very well make themselves unknowing accomplices in what they would otherwise resist with all their might.&lt;/p&gt;
&lt;h3 id=&#34;mechanized-murder&#34;&gt;Mechanized Murder&lt;/h3&gt;
&lt;p&gt;As mechanized murder has become more advanced, and various technologies specialize into broader &amp;ldquo;&lt;em&gt;soft-kill&lt;/em&gt;&amp;rdquo; capabilities, the circumstances become grim in unimaginable ways. Despite conflicts feeling vastly distant for many North Americans, warfare is as real as it as even been. For decades we have seen how many techniques and &lt;em&gt;weapons of war&lt;/em&gt; are first tested in remote conflicts then eventually assimilated into the &lt;a href=&#34;https://www.marketplace.org/2020/06/12/police-departments-1033-military-equipment-weapons/&#34;&gt;domestic control structure.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This raises the stakes when it comes to our moral culpability in supporting such actions. Just as more powerful weapons expand our capacity to unleash terrible atrocities, automated weapons make each decision carry an immense amount of moral weight. Instead of responsibility being diffused between dozens of people, each reacting in the moment, a single person shoulders the entire responsibility for an orchestra of death and destruction.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;The technology on offer may fall far short of Terminator-style robots: in Ukraine, the call to engage with a given target still lies with a human decision maker. But for how long?&lt;/p&gt;
&lt;p&gt;&amp;hellip;&lt;/p&gt;
&lt;p&gt;“If you think of AI as drones autonomously and independently making some decisions to strike or not to strike something, there is no such thing yet,” said Fedorov. “But I think that there is a certain future for it.”&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://www.politico.eu/article/robots-coming-ukraine-testing-ground-ai-artificial-intelligence-powered-combat-war-russia/&#34;&gt;‘Our Oppenheimer moment’ — In Ukraine, the robot wars have already begun&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id=&#34;becoming-a-peacemaker&#34;&gt;Becoming a Peacemaker&lt;/h2&gt;
&lt;p&gt;If you are not already convinced, I would hope that you would consider taking on the role of peacemaker. The powers that are in play are capable of irreversible damage, not only that but our responsibility has never been greater. Despite what the overwhelming propaganda would have you believe, we all have an opportunity to push for peace. By connecting with those around you and working to understand and resolve even minor disputes, greater impacts can build over time. Bring peace to first yourself, then those around you, so that you can all work against cruelty in all its many forms.&lt;/p&gt;
&lt;p&gt;It is good to be proactive in asking ourselves if our words, and actions dehumanize others or build trust and empathy. Taking action in your own life to withdraw your support and presence from institutions and structures that support senseless violence is highly admirable. It is your burden to take on the massive undertaking of consciously evaluating how you support, or hold accountable various human endeavors without losing faith.&lt;/p&gt;
&lt;p&gt;When one sees how bleak things are, it becomes easy to judge. We are all born into cycles that must be broken. Feeling superior to others, or more morally righteous is a prideful pathway to turning into what one wishes to fight. Genuine compassion, patience, and mercy are non-negotiable attributes when it comes to building lasting peace. It is painful to witness further pain caused by ignorance or arrogance, but it is typical that people know not what they do. Taking the time to understand other&amp;rsquo;s frame of mind and how to build trust and understanding is the only reliable path to making progress in dark times.&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;Header photo &lt;a href=&#34;https://www.pexels.com/photo/destroyed-residential-building-under-gray-sky-11518762/&#34;&gt;Destroyed Residential Building Under Gray Sky&lt;/a&gt;&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Cyber Fix: Episode 1</title>
		<link>https://libresolutions.network/videos/cyber-fix-1/</link>
		<pubDate>Wed, 12 Jun 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/cyber-fix-1/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/cyber-fix-1.ogg" />
			
		
		<image>https://libresolutions.network//media/images/cyber-fix.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/cyber-fix.webp" />
		<itunes:image href="https://libresolutions.network//media/images/cyber-fix.webp" />
		<description>Cyber Fix is a show to provide entertaining and insightful analysis of developments in Cyberspace.</description>
		<content:encoded>&lt;p&gt;Cyber Fix is on hiatus, you may now listen to full episodes on &lt;a href=&#34;https://peertube.libresolutions.network/w/p/2FbUhGmiRbzmf1TUjWP3Xr&#34;&gt;PeerTube&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;music-credits&#34;&gt;Music Credits:&lt;/h3&gt;
&lt;p&gt;Y&amp;amp;V - Lune: &lt;a href=&#34;https://youtu.be/n79aphwhpW0&#34;&gt;https://youtu.be/n79aphwhpW0&lt;/a&gt;&lt;br&gt;
Valcos - A New Light: &lt;a href=&#34;https://youtu.be/o_v9WSImGIU&#34;&gt;https://youtu.be/o_v9WSImGIU&lt;/a&gt;&lt;br&gt;
Killercats - Kaibu: &lt;a href=&#34;https://youtu.be/qLYmtdi-GzA&#34;&gt;https://youtu.be/qLYmtdi-GzA&lt;/a&gt;&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Rise of the Cyber Resistance</title>
		<link>https://libresolutions.network/articles/cyber-resistance/</link>
		<pubDate>Mon, 10 Jun 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/cyber-resistance/</guid>
		
		<image>https://libresolutions.network//media/images/platos-cave.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/platos-cave.webp" />
		<itunes:image href="https://libresolutions.network//media/images/platos-cave.webp" />
		<description>Finding the path that works for you</description>
		<content:encoded>&lt;h2 id=&#34;confronting-the-techno-empire&#34;&gt;Confronting The Techno Empire&lt;/h2&gt;
&lt;p&gt;Humanity has a long history of overcoming complicated challenges, even self-inflicted ones. Tyrants desperately want you to believe their control is total, inevitable, and impossible to reverse. This belief is not only a self-defeating illusion, it&amp;rsquo;s also very easy to dismantle. What&amp;rsquo;s harder to dismantle is the idea that many modern technologies aren&amp;rsquo;t inherently evil themselves.&lt;/p&gt;
&lt;p&gt;For many, various devices and systems are themselves manifestations of the malicious intentions behind our modern digital experience. This is a perfectly understandable belief in many circumstances, smartphones themselves are notorious for being the gateway of online intrusion into people&amp;rsquo;s daily lives. Even worse, many of the major companies laying the foundation for almost all of the software and devices we use &lt;a href=&#34;https://unlimitedhangout.com/2021/05/investigative-reports/the-cover-up-continues-the-truth-about-bill-gates-microsoft-and-jeffrey-epstein/&#34;&gt;are themselves attached&lt;/a&gt; to shady organizations and hostile agendas.&lt;/p&gt;
&lt;p&gt;Despite all this, there are many who are diligently working to unravel all of it, piece by piece. This can sound impossible until one takes the time to learn the fundamentals. When one starts to tune out all the propaganda and calm their fears of technological terror they can start to make progress at forging a different path. Those at the forefront of breaking new ground take the time to learn simple physics, a programming language or two, and a bit of engineering. The more skills these &lt;em&gt;cyber rebels&lt;/em&gt; learn, the more cyberspace can be reclaimed for noble causes.&lt;/p&gt;
&lt;p&gt;To those who take the time to reflect, things are in quite a recoverable state. We are a long way into rediscovering and mapping out the ideal software patterns and practices that avoid many, if not the vast majority of our modern-day woes. The truly immense challenges ahead are more fundamental and will require inspiration, creativity and a drive for real innovation. Low-level learning of circuitry, computer engineering, and how to program circuits will be the bedrock of the new cyber resistance. The cyber rebellion is all about making the best of what we have while building that which can truly work for the people rather than against them.&lt;/p&gt;
&lt;p&gt;In the broader fight against tyranny, those with technological aptitude and understanding are vital in many underestimated ways. Just as vehicles adopting more surveillance technologies doesn&amp;rsquo;t make mechanics evil or useless, it creates an opportunity for skilled individuals to participate in a better way. Salvage, reverse engineering, repair, and creation are all vitally important techniques that will only become more important over time. Those practices will also themselves highlight lessons that are crucial to truly improving the devices and systems we use.&lt;/p&gt;
&lt;h2 id=&#34;cyber-rebel-profiles&#34;&gt;Cyber Rebel Profiles&lt;/h2&gt;
&lt;p&gt;Despite aiming for mostly similar goals, many digital rebels operate completely differently and have wildly different preferences. Instead of working to unite the differing flavors and specialties into a single consensus, the optimal path forward requires finding ways in which they can compliment each other. Aligning over shared goals, and knowing when to set differences aside is one of the most valuable skills in these times. The following profiles are generalities, and a single person may find it advantageous to dabble in more than one area of focus.&lt;/p&gt;
&lt;h3 id=&#34;digital-nomad&#34;&gt;Digital Nomad&lt;/h3&gt;
&lt;p&gt;With almost every major platform having serious issues, digital nomads move from pasture to pasture to get the most out of what&amp;rsquo;s offered until things turn sour. These people will likely focus on one or maybe two devices, generally preferring whatever works on-the-go. Simplicity and elegance are valued over having any and every feature available. Often they tend to be quite good software developers, happy to build something that suits their particular needs. Digital nomads prefer systems that works in close proximity like peer-to-peer messengers such as &lt;a href=&#34;https://briarproject.org/&#34;&gt;briar,&lt;/a&gt; and ephemeral services like nostr.&lt;/p&gt;
&lt;h4 id=&#34;resources&#34;&gt;Resources&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://libresolutions.network/operations/shadow&#34;&gt;Operation: Shadow&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://nostr.net/&#34;&gt;All about nostr&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.nihilism.network/servers/anon.html&#34;&gt;Anonymity, Privacy and Plausible Deniability&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;cyber-homesteader&#34;&gt;Cyber Homesteader&lt;/h3&gt;
&lt;p&gt;Instead of taking the web for what it is, these individuals focus on building up their own micro-internet. Self-hosting services, using powerful hardware the cyber homesteader dreams of being able to provide fully-featured network of services for those around them. By building up their own services and community, a cyber homesteader is able to reduce reliance on the Internet as a whole. They have the advantage of leveraging the latest and greatest hardware to enable others to have reasonably secure infrastructure with a decent amount of work. With the same skills, even a pile of old hardware can be transformed into a micro data-center with a high amount of utility.&lt;/p&gt;
&lt;h4 id=&#34;resources-1&#34;&gt;Resources&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://alexgleason.me/blog/run-your-own-server/&#34;&gt;A crash course on running your own servers on a shoestring budget&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.nihilism.network/selfhosting/index.html&#34;&gt;Self-Hosting: Decentralisation and Privacy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/awesome-selfhosted/awesome-selfhosted&#34;&gt;Awesome-Selfhosted&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://delightful.club/&#34;&gt;Delightful Lists&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;specializations&#34;&gt;Specializations&lt;/h2&gt;
&lt;h3 id=&#34;archivist&#34;&gt;Archivist&lt;/h3&gt;
&lt;p&gt;Despite the problems of the current Internet, there&amp;rsquo;s a tremendous amount of valuable information worth preserving. Never before has so much knowledge been able to fit in something as small as a simple microSD card. Just as immediately as people started sharing information, data was beginning to be eroded by time, technical changes, and &lt;a href=&#34;https://corbettreport.com/episode-384-the-library-of-alexandria-is-on-fire/&#34;&gt;outright destruction.&lt;/a&gt; By curating a personal collection of data, the &amp;ldquo;data-hoarder&amp;rdquo; works to ensure valuable insights, great works, and magnificent art isn&amp;rsquo;t lost to entropy forever.&lt;/p&gt;
&lt;h4 id=&#34;resources-2&#34;&gt;Resources&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://wiki.archiveteam.org/index.php/Introduction&#34;&gt;Archive Team - Introduction&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://archivebox.io/&#34;&gt;ArchiveBox&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;computer-wizard&#34;&gt;Computer Wizard&lt;/h3&gt;
&lt;p&gt;A good developer is worth a great deal. With the right focus, well-made software can make what we want to do easier and what we don&amp;rsquo;t want harder. These people are problem solvers through and through, the challenge is to get them interested in the right problems! Computer wizards are also excellent at securing software and systems. Those who learn from the cypherpunks will build systems that are resilient from surveillance and censorship alike.&lt;/p&gt;
&lt;h4 id=&#34;resources-3&#34;&gt;Resources&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.freecodecamp.org/news/what-is-programming-tutorial-for-beginners/&#34;&gt;What is Programming? A Handbook for Beginners&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/practical-tutorials/project-based-learning&#34;&gt;Project Based Learning&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCsBjURrPoezykLs9EqgamOA&#34;&gt;Fireship&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;mechanical-mind&#34;&gt;Mechanical Mind&lt;/h3&gt;
&lt;p&gt;Those with a sophisticated understanding of how hardware works on a physical level can make the impossible doable. Getting the most out of hardware that exists, or being able to reprogram logic circuits are skills that can resolve a great many problems. To a great mechanical mind there aren&amp;rsquo;t good and evil devices,  only components that can be stripped out and put to better use. With the ability to make the most out of existing components, and even build new ones, the opportunities are endless.&lt;/p&gt;
&lt;h4 id=&#34;resources-4&#34;&gt;Resources&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://lcamtuf.coredump.cx/&#34;&gt;Icamtuf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/channel/UC6biysICWOJ-C3P4Tyeggzg&#34;&gt;Low Level Learning&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://learn.adafruit.com/&#34;&gt;Adafruit guides&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;cyber-muse&#34;&gt;Cyber Muse&lt;/h3&gt;
&lt;p&gt;Those with a flair for presentation, can hone their skills in multimedia. No matter what the medium, their expertise is ensuring that tyrants can&amp;rsquo;t stop the signal. Getting the word out by a variety of means, these cyber rebels work to ensure they&amp;rsquo;re heard by other rebels and even those captured by the techno empire. Having a broad understanding of media formats, live production, and various multimedia skills allows them to be very useful in a pinch!&lt;/p&gt;
&lt;h4 id=&#34;resources-5&#34;&gt;Resources&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://kde.org/for/creators/&#34;&gt;KDE for Creators&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.davidrevoy.com/categorie3/tutorials-brushes-extras&#34;&gt;Tutorials: David Revoy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://opensource.com/article/16/12/yearbook-top-open-source-creative-tools-2016&#34;&gt;34 open source tools for creatives&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://libresolutions.network/tags/digital-autonomy--the-arts/&#34;&gt;Digital Autonomy and the Arts&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;retro-conservationist&#34;&gt;Retro Conservationist&lt;/h3&gt;
&lt;p&gt;Nostalgia not a dirty word! One can the principle of &amp;ldquo;If it ain&amp;rsquo;t broke, don&amp;rsquo;t throw it away!&amp;rdquo;. In the 2020s one would be very surprised at what can be accomplished with hardware from a decade ago. A retro conservationist is crucial to keeping systems running across long periods of time, having seen first hand how entropy treats machines. Our culture throws a lot away, and there&amp;rsquo;s a great deal that can be repurposed instead of wasted.&lt;/p&gt;
&lt;h4 id=&#34;resources-6&#34;&gt;Resources&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://8bitnews.io/archive&#34;&gt;8bit News&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://retrocomputingforum.com/&#34;&gt;Retro Computing Forum&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://retrogamecoders.com/blog/&#34;&gt;Retro Game Coders&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;futurist&#34;&gt;Futurist&lt;/h3&gt;
&lt;p&gt;There will always be those fascinated by the latest and greatest to see where the limits are. Following emerging trends can help those both new and experienced adopt new techniques or refine existing practices. Often there are useful new strategies that can be applied in other contexts. Those reflecting on the latest and greatest can get a sense for where new opportunities lie.&lt;/p&gt;
&lt;h2 id=&#34;battlefields&#34;&gt;Battlefields&lt;/h2&gt;
&lt;p&gt;But where will you find all these fantastic net warriors? If you&amp;rsquo;re lucky you may find a couple sticking around on mainstream social media or accessible platforms, but these days you&amp;rsquo;ll find a majority of them engaging in the fight for the web itself.&lt;/p&gt;
&lt;h3 id=&#34;independent-web&#34;&gt;Independent Web&lt;/h3&gt;
&lt;p&gt;We can rebuild the web by &lt;a href=&#34;https://gabe.rocks/tech/reclaiming-cyberspace/&#34;&gt;taking part.&lt;/a&gt; No matter how bad search engines get, or how void of information mainstream websites become, there is always the opportunity of creating an oasis in the desert. Too many forget that the web itself is an open, decentralized, permission-less system that is vital in the fight to oppose tyranny in all its forms.&lt;/p&gt;
&lt;h3 id=&#34;decentralized-social-media&#34;&gt;Decentralized Social Media&lt;/h3&gt;
&lt;p&gt;To some it may come as a surprise to know that social media can already outside corporate control. There are a variety of protocols but the two major ones are nostr and activitypub, both effectively part of the larger &lt;a href=&#34;https://libresolutions.network/tags/fediverse&#34;&gt;Fediverse.&lt;/a&gt; By migrating to owner operated systems surveillance and censorship can both be challenged directly, at the cost of working out how to cooperate in an open network.&lt;/p&gt;
&lt;h3 id=&#34;networks&#34;&gt;Networks&lt;/h3&gt;
&lt;p&gt;There&amp;rsquo;s a very powerful tug-of-war going on. The fight to wrestle control over the entire single world-wide Internet has the potential to destroy it forever. Those interested in the ability for people around the world to challenge power have to wrestle with the consequences either way. There&amp;rsquo;s a wide variety of strategies that can be employed, but overcoming this challenge requires a lot more study by brilliant minds.&lt;/p&gt;
&lt;h3 id=&#34;machine-brawl&#34;&gt;Machine Brawl&lt;/h3&gt;
&lt;p&gt;Changing the technological landscape over the long time requires changes in hardware. There is only so much that can be done in software, eventually more deliberate work is needed to make improvements. It is possible to reclaim many modern conveniences without sacrificing autonomy or privacy if effort is put into improving the very foundation of our digital experience. Those engaged in rewiring the future have a great deal of power to have a massive impact.&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;If you&amp;rsquo;d like to suggest a resource, feel free to &lt;a href=&#34;mailto://gabriel@libresolutions.network?subject=resource&#34;&gt;reach out!&lt;/a&gt;&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>What is Digital Autonomy?</title>
		<link>https://libresolutions.network/articles/digital-autonomy/</link>
		<pubDate>Tue, 28 May 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/digital-autonomy/</guid>
		
		<image>https://libresolutions.network//media/images/breaking-free-banner.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/breaking-free-banner.webp" />
		<itunes:image href="https://libresolutions.network//media/images/breaking-free-banner.webp" />
		<description>Aligning for a good future of technological innovation</description>
		<content:encoded>&lt;h2 id=&#34;when-big-brother-has-all-the-cards&#34;&gt;When Big Brother Has All The Cards&amp;hellip;&lt;/h2&gt;
&lt;p&gt;It is clear to many that modern digital society includes at best trading away one&amp;rsquo;s private life in exchange for fleeting novelty and convenience. At worst, we&amp;rsquo;ve industrialized profiting off people&amp;rsquo;s self-destructive traits to infantilize humanity mentally, socially, and even spiritually. These troubles have been long in the works, with minor exchanges here and there, but now the situation is dire and escalating.&lt;/p&gt;
&lt;p&gt;Just as some people were beginning to grasp how large social media giants manipulate their feeds and minds for profit, an entirely new game has arisen. Companies hyping up their cloud &amp;ldquo;AI&amp;rdquo; chat interfaces as a substitute for any and all means of properly navigating information online. Google has been caught in a &lt;a href=&#34;https://www.theverge.com/2024/5/23/24162896/google-ai-overview-hallucinations-glue-in-pizza&#34;&gt;sticky situation&lt;/a&gt; where its search would return ridiculous answers to ordinary queries. This is really only the tip of the iceberg when it comes to how the web may be transformed if the public acclimates to this form of finding information.&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s easy to hyper-fixate on the flawed use of &amp;ldquo;AI&amp;rdquo; in its present, quirky form. In doing so, one can completely fail to see how to overall trend is moving against people&amp;rsquo;s ability to find information online, or even use their own devices. Not to be outdone, Microsoft decided to eliminate any doubt that the Windows operating system is spyware. Announcing a new feature called &lt;a href=&#34;https://mashable.com/article/microsoft-recall-ai-feature-uk-investigation&#34;&gt;&amp;ldquo;Recall AI&amp;rdquo;,&lt;/a&gt; the system is intended to take at least a dozen screenshots per minute, potentially building a very complete user profile to be sold, or stolen off the device.&lt;/p&gt;
&lt;p&gt;There is a frustrating sense of apathy and defeatism when these stories make headlines. Some will remark the creeping risk created by more surveillance and control, but ultimately many will simply shrug these concerns off like they have done in many other instances. Worst of all, those who do recognize some danger from these threats and encroachments will retreat into total nihilism and exclaim &amp;ldquo;&lt;em&gt;nothing is really secure&lt;/em&gt;&amp;rdquo; or the all-time classic &amp;ldquo;&lt;em&gt;they can get you anyways&lt;/em&gt;&amp;rdquo;. While both of these statements are indisputably true, it&amp;rsquo;s wildly irresponsible to treat every security problem as a reason to care less.&lt;/p&gt;
&lt;p&gt;In the spirit of being charitable, I don&amp;rsquo;t believe the large numbers of people who are apathetic about privacy, ignorant about security risks, or even dismissive of concerns have malicious intent. It seems more likely that much of this is a form of &lt;em&gt;learned helplessness&lt;/em&gt; developed over the long course of attempting to &lt;em&gt;adapt&lt;/em&gt; to technological intrusion. Just as those who reject propaganda outright may feel weary from incessant long-term exposure, those who are subjected to digital slights may too regret them piling up.&lt;/p&gt;
&lt;p&gt;It is not hopeless. It is easy to feel completely at a loss of what to do or where to go next. The solution involves identifying a guiding star to follow towards the right direction. That guiding star is &lt;a href=&#34;https://techautonomy.org/&#34;&gt;&lt;em&gt;Digital Autonomy&lt;/em&gt;.&lt;/a&gt; Which is the acknowledgement our natural rights such as bodily autonomy, freedom of conscience, as well as life, liberty, and happiness are not void in cyberspace. Protecting these natural rights in cyberspace requires more careful consideration of various technological systems and strategies.&lt;/p&gt;
&lt;h2 id=&#34;understanding-digital-autonomy&#34;&gt;Understanding Digital Autonomy&lt;/h2&gt;
&lt;p&gt;A simple definition of digital autonomy is &lt;a href=&#34;https://www.compass.info/news/article/what-is-digital-autonomy-and-why-is-it-important/&#34;&gt;the ability to retain awareness and control over your own affairs in the digital space.&lt;/a&gt; This requires not only for systems and devices themselves to be transparent and consistent, but this also requires community stewardship and education. Many systems and devices are &lt;a href=&#34;https://www.defectivebydesign.org/&#34;&gt;&lt;em&gt;defective by design&lt;/em&gt;&lt;/a&gt; in a variety of ways. Manufacturers will often impose restrictions to protect their interests at the user&amp;rsquo;s expense, or online marketplaces can restrict you from &lt;a href=&#34;https://arstechnica.com/gaming/2024/05/after-you-die-your-steam-games-will-be-stuck-in-legal-limbo/&#34;&gt;content you&amp;rsquo;ve paid for&lt;/a&gt; or remove it entirely. These concerns sound trivial when applied to media, but are far more nefarious when it comes to personal devices or vehicles &lt;a href=&#34;https://www.advrider.com/ride-smart-your-vehicle-or-your-neighbours-vehicle-is-spying/&#34;&gt;spying on you&lt;/a&gt; for a variety of entities. On the road we&amp;rsquo;re taking, many goods are beginning to resemble smartphones in all the wrong ways.&lt;/p&gt;
&lt;p&gt;Your digital belongings need to begin to more resemble your analogue possessions. When you use a notebook, you&amp;rsquo;re likely not confused by the pages or lines inside it. It is not miraculously working to profit some other entity at your expense, and it is wholly yours as long as you choose to keep it. You have the ability to share it entirely, or even in individual sections, even sharing them with the wider world. Of course what is shared can generally be hard to un-share, but at least the choice is yours to begin with.&lt;/p&gt;
&lt;p&gt;In many cases it isn&amp;rsquo;t really about rebuilding everything, but merely how various tools are used and reworking particular features. Even relatively simple things go a long way to enhance a person&amp;rsquo;s digital autonomy while using a system, such as intuitive menus that allow data to be painlessly exported. As more and more people learn to expect these simple methods, they can be further refined to synergize with existing solutions for an even better experience.&lt;/p&gt;
&lt;p&gt;Unfortunately, many of the ideal solutions don&amp;rsquo;t quite exist yet, or not in an easy to substitute way. As the public became accustomed to getting work done on cloud solutions, many offline-first workflows have largely faded into distant memory. There is a great deal of power to be regained as people rediscover, build or learn ways of doing computing work on their own systems without outside interference.&lt;/p&gt;
&lt;p&gt;Despite what defeatists would have you believe, it is possible to build genuinely empowering technology. None of it would have ever been popular at all if there wasn&amp;rsquo;t a spark of ingenuity that drew people in the first place. With a relatively small investment in education, experimentation and encouragement, we could transform the digital landscape to be entirely unrecognizable. Too many assume that a radically better digital future involves no online interaction at all, this is too pessimistic. It&amp;rsquo;s entirely about setting the proper boundaries so that meaningful interactions are enhanced by new tools rather than governed by them.&lt;/p&gt;
&lt;h2 id=&#34;digital-autonomy-is-about-more-than-tech&#34;&gt;Digital Autonomy Is About More Than Tech&lt;/h2&gt;
&lt;p&gt;It is undeniable that the Internet has encroached too far into people&amp;rsquo;s lives. It has gone so far that people in entirely unrelated domains feel the pressure of looming technocracy. I would encourage you to imagine how a vastly better digital ecosystem would impact your passions in life. As part of this conversation, I&amp;rsquo;ve had the pleasure of hosting many conversations with people about how technology intersects with their passions to gain a finer understanding of these issues.&lt;/p&gt;
&lt;h3 id=&#34;digital-autonomy-and-fitness&#34;&gt;Digital Autonomy and Fitness&lt;/h3&gt;
&lt;p&gt;One of the more concerning trends these days is the encroachment of big data on our very bodies. It&amp;rsquo;s important to carefully consider how health information can be weaponized individually and as a society. Never forget that the best health tool is your own mind.&lt;/p&gt;
&lt;h3 id=&#34;digital-autonomy-and-resilient-living&#34;&gt;Digital Autonomy and Resilient Living&lt;/h3&gt;
&lt;p&gt;For those who are more &lt;em&gt;off-grid&lt;/em&gt; it can be interesting to discuss the finer points of being connected to the wider world. I hope you&amp;rsquo;ll enjoy this &lt;a href=&#34;https://peertube.libresolutions.network/w/2ZJBHUtGjecNTaRCY9Stba&#34;&gt;broadcast with Rebecca!&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;digital-autonomy-and-the-arts&#34;&gt;Digital Autonomy and The Arts&lt;/h3&gt;
&lt;p&gt;I am blessed to know many wonderful artists. They were generous enough to launch the digital autonomy discussions with me, and for that I am grateful.&lt;br&gt;
You can watch the entire playlist &lt;a href=&#34;https://peertube.libresolutions.network/w/p/1nTQDQee8QWTn1YDC7Wz8H&#34;&gt;on PeerTube&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;I would be pleased to connect with passionate individuals who are interested in sharing their challenges and hopes when it comes to how technology impacts our lives.&lt;/p&gt;
&lt;p&gt;Please provide a short summary of your passion and what you&amp;rsquo;d like to discuss!&lt;/p&gt;
&lt;h2 id=&#34;take-charge&#34;&gt;Take Charge&lt;/h2&gt;
&lt;p&gt;It&amp;rsquo;s very easy to become overwhelmed. The goal isn&amp;rsquo;t to change everything all at once at the same time. Just like many other transformative changes in life, this is a marathon and not a sprint. You can make simple changes like using Free Software tools like &lt;a href=&#34;https://www.libreoffice.org/&#34;&gt;LibreOffice,&lt;/a&gt; &lt;a href=&#34;https://www.blender.org/&#34;&gt;Blender,&lt;/a&gt; or &lt;a href=&#34;https://inkscape.org/&#34;&gt;Inkscape&lt;/a&gt; to create your own media and documents. Those who are more ambitious may want to try to run their own home server with a variety of services like &lt;a href=&#34;https://www.freshrss.org/&#34;&gt;FreshRSS,&lt;/a&gt; or even their &lt;a href=&#34;https://libresolutions.network/articles/best-website-for-you/&#34;&gt;own website&lt;/a&gt;. The hard part would be migrating communications away from mainstream providers like Facebook. This involves working together with others to negotiate what best fits those participating.&lt;/p&gt;
&lt;p&gt;There is a lot of opportunity in experimenting with and learning the large variety of techniques that people already use to break free from the cloud. As time passes it may be &lt;a href=&#34;https://libresolutions.network/operations/bankroll/&#34;&gt;easier to support&lt;/a&gt; new device manufacturers, or large software projects to really create radical change. The more work that goes into solving this problem the easier things will get. There is little need to be dogmatic or impatient with others, any collaborative success will go a long way towards shaping the future we want.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Introducing Gitnuro</title>
		<link>https://libresolutions.network/videos/gitnuro/</link>
		<pubDate>Thu, 23 May 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/gitnuro/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/gitnuro.ogg" />
			
		
		<image>https://libresolutions.network//media/images/gitnuro.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/gitnuro.webp" />
		<itunes:image href="https://libresolutions.network//media/images/gitnuro.webp" />
		<description>A FOSS Git Client for Newbies and Pros</description>
		<content:encoded>&lt;p&gt;&lt;em&gt;Many hands make light work&lt;/em&gt;. This is the essence behind the idea of &lt;a href=&#34;https://libresolutions.network/operations/beehive/&#34;&gt;Operation: Beehive&lt;/a&gt; which outlines how people can use various software collaboration tools for non-technical uses. Git by it&amp;rsquo;s nature is an offline-first collaborative tool, this perfectly models what the optimal offline/online balance should be for many activities.&lt;/p&gt;
&lt;p&gt;To maintain our digital autonomy, it&amp;rsquo;s crucial to find ways to collaborate without being locked behind cloud platforms or locked-in services. This requires working in completely different ways than how Big Tech has trained people to collaborate within their digital walls. In scouring the net for research and ideas, I stumbled on &lt;a href=&#34;https://github.com/JetpackDuba/Gitnuro&#34;&gt;Gitnuro&lt;/a&gt; which is described as a &amp;ldquo;&lt;em&gt;A FOSS Git multi-platform client for newbies and pros.&lt;/em&gt;&amp;rdquo;&lt;/p&gt;
&lt;p&gt;I hope you find this conversation with me and &lt;a href=&#34;https://jetpackduba.com/&#34;&gt;Abdelilah El Aissaoui&lt;/a&gt; illuminating and inspiring. It was a pleasure to discuss not only his project but also his experiences and what people can do to support excellent software like Gitnuro. If we want to change the technological landscape for the better, it requires is to &lt;a href=&#34;https://libresolutions.network/operations/bankroll/&#34;&gt;&lt;em&gt;put our money where our needs are&lt;/em&gt;&lt;/a&gt; and support independent developers and projects ourselves.&lt;/p&gt;
&lt;p&gt;Abeliah himself gives some excellent tips on what actions people can take. Even simple things like opening quality issues, donations, or even a written thanks can go a long way to reinvigorate their efforts. I hope that you may consider sponsoring Abdelilah &lt;a href=&#34;https://github.com/sponsors/JetpackDuba&#34;&gt;on github,&lt;/a&gt; or any other Free Software project that suits you well!&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Digging Deep into Digital ID</title>
		<link>https://libresolutions.network/videos/digital-id/</link>
		<pubDate>Sun, 05 May 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/digital-id/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/digging-deep-into-digital-id.ogg" />
			
		
		<image>https://libresolutions.network//media/images/digital-id.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/digital-id.webp" />
		<itunes:image href="https://libresolutions.network//media/images/digital-id.webp" />
		<description></description>
		<content:encoded>&lt;p&gt;Join Gabriel &amp;amp; &lt;a href=&#34;https://whiteroseintelligence.com&#34;&gt;Liam Sturgess&lt;/a&gt; in a discussion taking a look at the video &lt;a href=&#34;https://video.canadiancivil.com/w/e4TDrHhd1wHEsTSvK2wCjU&#34;&gt;Canada Fell Behind on Digital ID&lt;/a&gt; by Canadian Civil. The video contrasts Canada&amp;rsquo;s government log-in systems against Australia&amp;rsquo;s RealMe single sign-on, making the argument that Canada should make changes. This video, presents an opportunity to learn from advocates for strong &lt;a href=&#34;https://libresolutions.network/articles/digital-id&#34;&gt;Digital ID&lt;/a&gt; systems, and to refine our understanding of the merits and pitfalls of that position.&lt;/p&gt;
&lt;p&gt;Take the opportunity to watch our response to Canadian Civil&amp;rsquo;s video. You&amp;rsquo;ll likely be surprised about how much you can learn by listening to fierce advocates on &amp;rsquo;the other side&amp;rsquo; on this issue and others. It is far better to be equipped with awareness of your opposition&amp;rsquo;s arguments, rather than to be disarmed by ignorance. We&amp;rsquo;ll encounter some of the very strong arguments behind changing the way Canada currently does things, but also our concerns about how that change may take place.&lt;/p&gt;
&lt;h3 id=&#34;learn-more&#34;&gt;Learn more&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://rumble.com/v2vvbrj-identity-is-yours-and-yours-alone-microjourneys.html&#34;&gt;Identity is Yours, and Yours Alone - Microjourneys&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.immigrantdefenseproject.org/wp-content/uploads/Digital-IDs-FAQ.pdf&#34;&gt;Understanding the Risks of Digital IDs&lt;/a&gt; (PDF)&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://unlimitedhangout.com/2023/10/investigative-reports/sdg16-part-2-enforcing-digital-identity/&#34;&gt;SDG16: Part 2 — Enforcing Digital Identity&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/G1AjkYFlPF4&#34;&gt; Why Covid-19 is the perfect Privacy by Design case (By Stephan Engberg)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.alilybit.com/p/global-progress-in-digital-identification&#34;&gt;Global Progress in Digital Identification Systems&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://mobileidworld.com/alberta-opens-search-digital-id-executive-director-042607/&#34;&gt;Alberta Searches for Digital ID Director Even as Premier Denies Program’s Existence&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://thespinoff.co.nz/internet/07-12-2021/what-is-realme-and-why-do-people-hate-it-so-much&#34;&gt;What is RealMe and why do people hate it so much?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://web.archive.org/web/20211118132100/https://www.health.govt.nz/system/files/documents/pages/ministry_of_health_position_statement_on_the_management_of_unvaccinated_individuals_in_healthcare_settings_.pdf&#34;&gt;Ministry of Health position statement on the management of unvaccinated individuals in healthcare settings&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://wiki.whiteroseintelligence.com/en/SMART-Health-Card&#34;&gt;SMART Health Card&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://rumble.com/v10t0w0-dig-it-104-digital-id-blockchain-and-databases.html&#34;&gt;Dig It! #104: Digital ID, Blockchain &amp;amp; Databases &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://corbettreport.com/digitalid/&#34;&gt;Episode 415 – The Global Digital ID Prison&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://reclaimthenet.org/canadas-conservatives-realize-they-cant-be-anti-digital-id-and-pro-online-age-verification&#34;&gt;Canada’s Conservatives Realize They Can’t Be Anti Digital ID and Pro Online Age Verification&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.michaelgeist.ca/2024/01/bill-s-210-is-just-the-beginning-how-a-canadian-digital-lobby-group-is-promoting-a-standard-to-foster-widespread-adoption-of-age-verification-technologies-in-canada/&#34;&gt;Bill S-210 is Just the Beginning: How a Canadian Digital Lobby Group is Promoting a Standard to “Foster Widespread Adoption of Age Verification Technologies in Canada”&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Due to many technical issues during recording unfortunately the production quality is not as desired. Some cleanup was done, but my apologies for the overall visual quality.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Understanding Hostile Cyberspace</title>
		<link>https://libresolutions.network/articles/hostile-cyberspace/</link>
		<pubDate>Thu, 02 May 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/hostile-cyberspace/</guid>
		
		<image>https://libresolutions.network//media/images/bad-network.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/bad-network.webp" />
		<itunes:image href="https://libresolutions.network//media/images/bad-network.webp" />
		<description>Making sense of various online threats to privacy and security.</description>
		<content:encoded>&lt;p&gt;To make deliberate decisions to improve one&amp;rsquo;s own privacy and security, one must make sense of cyberspace itself, and how it can be weaponized. With the benefit of hindsight, it is quite easy to see the traps that were set out for the public. The great news is that there is a phenomenal amount of &lt;a href=&#34;https://gabe.rocks/tech/reclaiming-cyberspace&#34;&gt;territory to be reclaimed&lt;/a&gt; when people take action. Even a relatively simple shift to offline-first workflows will do wonders to secure control over one&amp;rsquo;s information. Of course, not all applications can be carried out entirely offline. For a variety of reasons, one must make use of the Internet and online services built on top of it. This piece will help people learn to discern the various risks related to &lt;em&gt;&lt;strong&gt;hostile cyberspace&lt;/strong&gt;&lt;/em&gt;, to better choose what to use and how.&lt;/p&gt;
&lt;h2 id=&#34;cyberspace-fundamentals&#34;&gt;Cyberspace Fundamentals&lt;/h2&gt;
&lt;p&gt;What makes computers amazing is that they can talk to each other. Software you use can connect with software running on other machines to do all kinds of fascinating and interesting things. &lt;strong&gt;Cyberspace&lt;/strong&gt; is any and all connected machines, including the services and apps running on them. These apps, services, and websites will all have various features and functionality. Unfortunately not all of this functionality is harmless. Spying, censorship, and even manipulation can be omnipresent threats on various websites and apps. One of the more un-intuitive network security problems is that these machines &lt;em&gt;can lie to each other&lt;/em&gt; which is the root of many serious concerns. Setting aside some of these more advanced concerns, we&amp;rsquo;ll explore how cyberspace is structured.&lt;/p&gt;
&lt;h3 id=&#34;there&#34;&gt;&lt;em&gt;There&amp;rsquo;s No Place Like Home&lt;/em&gt;&lt;/h3&gt;
&lt;p&gt;Home is the machine you&amp;rsquo;re running. Provided you&amp;rsquo;re not infected with &lt;em&gt;malware,&lt;/em&gt; this is your kingdom. You can decide which services to run, what to do with files, and whatever else suits your needs. With enough knowledge you may even be able to modify the device itself to change fundamental behavior. There are many ways for programs to share data on your own machine if you wish, and a great deal that you can do without connecting elsewhere.&lt;/p&gt;
&lt;p&gt;Generally, you&amp;rsquo;ll have a &lt;a href=&#34;https://libresolutions.network/articles/diy-audit/#browsers&#34;&gt;&lt;em&gt;web browser&lt;/em&gt;&lt;/a&gt; installed on your device so you can reach the &lt;em&gt;world wide web&lt;/em&gt;, and the variety of services on it. This is often where most users will spend most of their time if they have not yet been assimilated into a wide variety of cloud-based services. The browser is a very sophisticated program that loads web sites from all over the Internet, but also has many advanced features for web applications. Ensuring that your browser itself is not vulnerable to intrusion, or giving away unnecessary information is vital to your own privacy online.&lt;/p&gt;
&lt;p&gt;Other applications can also interact with online services. Using programs to load data from the web is fairly common, but can also have many of the same concerns as using a browser. Since browsers can generally be uniquely identified by their &lt;a href=&#34;https://www.amiunique.org/&#34;&gt;fingerprint,&lt;/a&gt; specialized software may be designed to access online information without divulging as much information. Some information leakage is unavoidable. By accessing an online resource it is inherently impossible to hide the fact that you&amp;rsquo;ve reached a particular service. The moment your request leaves your own network, it is now under control of the remote operators, and potentially others in-between.&lt;/p&gt;
&lt;h3 id=&#34;reaching-out&#34;&gt;Reaching Out&lt;/h3&gt;
&lt;p&gt;To retrieve information from the Internet, your request has to be routed across the world. The server may be next door, or all the way across the ocean. To make this happen, various &lt;em&gt;routers&lt;/em&gt; will forward along the request to others towards the destination. Once the request is received the response is then forwarded all the way back to your system. Without any issues on the part of the service you connect to, it&amp;rsquo;s entirely possible for traffic between you and your destination to be copied, spied on, censored, or even manipulated. This is why the web uses encryption (HTTPS) to ensure that you have a secure connection to a server. Keep in mind that there are ways this can be overcome. Network security is it&amp;rsquo;s own challenge when it comes to these problems.&lt;/p&gt;
&lt;p&gt;Assuming that your connection to the service isn&amp;rsquo;t being interfered with or abused in any way, it is unfortunate that the &lt;em&gt;service itself&lt;/em&gt; can betray your trust in all kinds of un-intuitive ways. The phrase &amp;ldquo;If it&amp;rsquo;s free, you&amp;rsquo;re the product.&amp;rdquo; certainly applies. Unfortunately, being a paying customer is no inherent defense from malicious activity. Beyond merely selling your data, the service itself can expose you to &lt;a href=&#34;https://www.mcafee.com/learn/what-is-malvertising-and-how-do-you-avoid-it/&#34;&gt;malware through advertizing&lt;/a&gt; or even require you to install dubious software. One of the major contributors to the &lt;a href=&#34;https://libresolutions.network/articles/dead-internet/&#34;&gt;death of the web&lt;/a&gt; is search engines driving traffic to hostile web pages that make browsing the web it&amp;rsquo;s own challenge. To make matters worse many services are hostile to users using privacy enhancing technologies like Tor or those connecting from proxies. By requiring users to reveal their real IP address, they are exposed to having their location, or even identity potentially uncovered.&lt;/p&gt;
&lt;h3 id=&#34;far-far-away&#34;&gt;Far, Far Away&lt;/h3&gt;
&lt;p&gt;That is not the end of potential troubles. The online services you use could be reliant on other services. These distant providers may have undesirable implications for the service itself and your use of it. These &lt;em&gt;third-party services&lt;/em&gt; are generally responsible for many privacy risks, but for a high-value target they may even be a security concern. This risk is so serious that many governments are questioning how it can impact &lt;a href=&#34;https://libresolutions.network/articles/government-in-tech/&#34;&gt;their own data sovereignty.&lt;/a&gt; This is a much more difficult problem to resolve because such information may not be readily available. For the more surface-level technical details a service like &lt;a href=&#34;https://builtwith.com&#34;&gt;BuiltWith&lt;/a&gt; may help, but for some services you&amp;rsquo;ll never have a complete (or honest) picture.&lt;/p&gt;
&lt;h2 id=&#34;defining-hostile-cyberspace&#34;&gt;Defining &amp;ldquo;&lt;em&gt;Hostile Cyberspace&lt;/em&gt;&amp;rdquo;&lt;/h2&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Hostile cyberspace&lt;/strong&gt; is any and every online site or service that engages in malicious activity such as:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Harvesting data&lt;/li&gt;
&lt;li&gt;Manipulating people&lt;/li&gt;
&lt;li&gt;Sharing or failing to secure user data&lt;/li&gt;
&lt;li&gt;Censoring or manipulating content&lt;/li&gt;
&lt;li&gt;Provides features at the expense of dependence (vendor lock-in)&lt;/li&gt;
&lt;li&gt;Distributes malware or serves ads that do&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;p&gt;This includes a vast majority of the Internet. The most blatant examples would be mainstream social media, many smartphone apps and cloud productivity software. An un-intuitive example of hostile cyberspace would be sites and services that &lt;a href=&#34;https://libresolutions.network/articles/alt-tech/&#34;&gt;abuse your trust&lt;/a&gt; with bad practices. The root of hostile cyberspace is making use of storage/bandwidth or computing power that isn&amp;rsquo;t entirely under your control, or that of those you trust. &lt;em&gt;Trust&lt;/em&gt;, in this circumstance, means more than congeniality, but responsibility, stewardship, and competence.&lt;/p&gt;
&lt;h3 id=&#34;people-farming&#34;&gt;People Farming&lt;/h3&gt;
&lt;p&gt;The line between corporate data-harvesting and state surveillance gets ever blurry. The more and more people relying on a single giant organization the more value there is in exploiting and subverting the users and their information. This unfortunately creates a feedback loop where large services can use power gained from large user counts to capture or leverage against other people. Selling user data for profit is one such feedback loop, but there are many others.&lt;/p&gt;
&lt;p&gt;In our time it is not simply about money, influence over minds, especially large numbers, can easily be converted back into money or other forms of power. Profiting off people&amp;rsquo;s online activity aligns incentives to ensure that people are encouraged, or even addicted to being constantly online for the sake of being online, to their own detriment. Taking control of your own mind requires making deliberate choices about what online organizations and systems you allow to influence or even govern your information and activity.&lt;/p&gt;
&lt;h2 id=&#34;shields-up&#34;&gt;Shields Up&lt;/h2&gt;
&lt;p&gt;When one knows that they are interacting with hostile cyberspace there is a variety of measures that can be taken. The most basic but also very efficient measure is to use ad-blockers or other protections like disabling scripts and remote resources. By &amp;ldquo;locking down&amp;rdquo; your browser you limit what can ultimately be used against you. On the network side, you can proxy your requests through a remote server or anonymizing software like Tor. This is useful in situations where you don&amp;rsquo;t want either your location, or precise network details to be known. Using random or otherwise false personal information to fill out forms is one of many ways to work against active data collection.&lt;/p&gt;
&lt;p&gt;None of this, is a silver-bullet however. The more one interacts with hostile cyberspace the more opportunities are presented to compromise the user, thus raising the complexity of proper countermeasures. It can be easy to overlook particular technical details that undo all the work of protecting oneself in hostile cyberspace. It is always about a cost-benefit between what you&amp;rsquo;re willing to do to prevent bad outcomes. The most efficient means, is to merely avoid hostile cyberspace by making use of personal or offline alternatives where possible.&lt;/p&gt;
&lt;h2 id=&#34;avoiding-hostile-cyberspace&#34;&gt;Avoiding Hostile Cyberspace&lt;/h2&gt;
&lt;p&gt;While the majority of the Internet is hostile to your digital autonomy, it would be a mistake to believe that it is entirely so. A non-trivial portion of the web includes many sites that merely provide information and don&amp;rsquo;t engage in the wide array of nefarious practices. Unfortunately in many cases they do not get the same amount of attention due to not usually being commercial ventures. There are rare services and online communities that do value and take responsibility for protecting user information and providing beneficial tools.&lt;/p&gt;
&lt;p&gt;For example, databases of valuable or detailed information aren&amp;rsquo;t necessarily something someone wants to download entirely just to look up a few items. It makes sense for an entity to provide a means for the public (or customers) to have easy access to specific information. This only becomes nefarious once users themselves become a means to a different end than providing information as a service.&lt;/p&gt;
&lt;p&gt;Another example would be cloud services that make use of open standards and Free Software. Taking proper measures to protect user data (such as encryption under control of the user, and good security practices), much can be done to run a service or platform quite responsibly. Useful features like being able to export data or media, as well as run your own instance can provide people the means to try new options before they&amp;rsquo;re ready to commit to maintaining them themselves.&lt;/p&gt;
&lt;p&gt;Ultimately, simplicity is the key. Over-complicated or ambitious solutions can fail in bizarre or unexpected ways. Reasonable expectations, and a pinch of caution can go a long way to make better choices.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Is This The End?</title>
		<link>https://libresolutions.network/articles/end-of-the-web/</link>
		<pubDate>Thu, 18 Apr 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/end-of-the-web/</guid>
		
		<image>https://libresolutions.network//media/images/web-dead.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/web-dead.webp" />
		<itunes:image href="https://libresolutions.network//media/images/web-dead.webp" />
		<description>How long can the free and open web survive attacks at every level?</description>
		<content:encoded>&lt;h2 id=&#34;will-we-watch-the-end-of-the-free-and-open-web&#34;&gt;Will We Watch The End Of The Free And Open Web?&lt;/h2&gt;
&lt;p&gt;These days, people are quick to attack the web for how it is, or more precisely how they make use of it. It doesn&amp;rsquo;t take a technical mind to notice that &amp;lsquo;browsing the web&amp;rsquo; has felt less like an adventure, and more like being at the console for a nuclear power plant. Day-to-day things are boring, but every once in a while panic rises and simple mistakes can have disastrous consequences. People who were around to see it generally miss how the web was before corporate social media: small sites and small communities. We have forgotten the power of small niche online interactions.&lt;/p&gt;
&lt;p&gt;Simple sites, created for fun or as quirky experiments. Among them even blogs containing unique treasures, galleries of personal photography and art.  As online communities grew larger things became so much more serious, and the barrier between the far away alternate reality of the web and real life was fractured. This barrier would crack, and eventually break once a critical mass of people were nudged into not just being online, but being &lt;em&gt;themselves online.&lt;/em&gt; It is quite ironic then, that much of the generations that brought themselves to the open web, may be the ones to see it&amp;rsquo;s demise. A light dims in the distance, as we begin to forget what it was even for.&lt;/p&gt;
&lt;p&gt;The &lt;a href=&#34;https://corbettreport.com/media/&#34;&gt;Media Matrix&lt;/a&gt; has caught up with the Internet Age. Large institutions are no strangers to this rich new medium of the millennium. Far from it, they&amp;rsquo;re already very &lt;a href=&#34;https://libresolutions.network/articles/government-in-tech/&#34;&gt;far into the process&lt;/a&gt; of remolding what could have been into what serves their interests. No longer a refuge from censorship (to the degree it was), or even the insanity of the world, the Internet is far less free than it could be. Corporations lead the charge on surveillance, building all-pervasive &lt;a href=&#34;https://libresolutions.network/videos/data-shedding/&#34;&gt;real-time monitoring of every person&lt;/a&gt; who didn&amp;rsquo;t take proactive measures to limit contact. Governments chose to work to restrict dissent that threatens preferred policies and power. Despite the early Internet being well within living memory, it is no longer for individuals.&lt;/p&gt;
&lt;h2 id=&#34;internet-war-measures&#34;&gt;Internet War Measures&lt;/h2&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/Snowden/status/1779920066840055847&#34;&gt;Snowden warns&lt;/a&gt; that this week, the NSA is being given control over the Internet. This is done through extending the powers in the Foreign Intelligence Surveillance Act (FISA) section 702, allowing the &lt;a href=&#34;https://tube.tchncs.de/videos/watch/f4031e9e-e6a0-4060-b1f7-145723a18612&#34;&gt;NSA to compel&lt;/a&gt; communications services to act as part of the country&amp;rsquo;s surveillance apparatus. The United States is not unique in this regard, there has been an ongoing assault on citizen&amp;rsquo;s digital autonomy that has only escalated since 2020. Late last year, the EU &lt;a href=&#34;https://libresolutions.network/articles/eu-cyberwar/&#34;&gt;proposed&lt;/a&gt; regulation to back-door web traffic as well as build a digital identity framework.&lt;/p&gt;
&lt;iframe src=&#39;https://tube.tchncs.de/videos/embed/f4031e9e-e6a0-4060-b1f7-145723a18612?title=0&#39; style=&#34;height:max-content;aspect-ratio: 16/9;min-height:460px;max-height:15rem;max-width:60rem;&#34; width=&#34;100%&#34; height=&#34;100%&#34;&gt;

&lt;/iframe&gt;
&lt;p&gt;Warfare has changed, and so too has the players. While nations still have conflicts with nations, governments are also becoming more tyrannical as they start to see the public as a threat to their uncontested power. This is made worse by private entities like multi-national corporations increasing their own power, locking large institutions into a negative sum game. No matter what the outcome, people will be worse off for the scramble. As geopolitical, economic, and other tensions rise we can fully expect for institutions to seize and abuse more and more power.&lt;/p&gt;
&lt;p&gt;This means that the Internet is just another battlefield. To maintain untenable policies, institutions first seize control over information, then communication, and lastly the people themselves. The free and open web isn&amp;rsquo;t the reason why liberty is at risk worldwide, it&amp;rsquo;s merely one of the early obstacles to all kinds of atrocious acts. It&amp;rsquo;s easy to forget that many online services can stay very much intact while the ability for people to share vital information or cooperate can be taken from them entirely. Too many fall into the trap of believing that the web is entirely a tool of oppression, and underestimate it&amp;rsquo;s value for opposing tyranny.&lt;/p&gt;
&lt;h3 id=&#34;where-do-things-go-from-here&#34;&gt;Where Do Things Go From Here?&lt;/h3&gt;
&lt;p&gt;Structural assaults such as &lt;a href=&#34;https://libresolutions.network/articles/broken-internet/&#34;&gt;ISP-Level De-platforming&lt;/a&gt; and other interventions make the death of a single Internet for the world all the more certain. As corporations and governments develop their own &lt;em&gt;great firewalls&lt;/em&gt; to micro-manage communication, the net will be fractured into a variety of &lt;a href=&#34;https://theweek.com/news/technology/961002/what-is-the-splinternet&#34;&gt;splinternets.&lt;/a&gt; These &amp;ldquo;split internets&amp;rdquo; will be highly-controlled networks that one may be allowed access to use particular services. This is effectively the final-form of &lt;em&gt;hostile cyberspace&lt;/em&gt; where any communications, content, or even access is completely under control of the operators. Such access can be gated behind authentication or even identification.&lt;/p&gt;
&lt;p&gt;As this escalates, one can fully expect all but the most trivial discussion migrating to &lt;a href=&#34;https://libresolutions.network/operations/shadow&#34;&gt;darknets&lt;/a&gt; while they still function. People themselves will either choose to work within an increasingly hostile and constrained digital environment, or will spend more and more time actively working to resist it. Eventually, this work will eventually culminate in small groups creating their own small internets. Community networks become much more important, and specialized tools will be highly sought after.&lt;/p&gt;
&lt;p&gt;The great danger is if people entirely lose the ability to communicate with the outside world. While the tragedies of the world may weigh heavily on some, it is vital that people do not forsake the world or allow ourselves to be forsaken by it. If tyrants are permitted to perfectly isolate people from each other with the powerful tools that exist today, widespread atrocities are all but inevitable. This is the real challenge before us. Not to save a particular website, not to reform a particular service, or even to seize control ourselves. The single objective is to preserve people&amp;rsquo;s ability to challenge abuse of power and to victimize the defenseless. This requires getting serious &lt;em&gt;and realistic&lt;/em&gt;. It is far beyond anyone to single-handedly resolve all of it. Instead it&amp;rsquo;s critical to prioritize actionable meaningful steps that can be replicated widely for maximum impact.&lt;/p&gt;
&lt;h2 id=&#34;the-simple-heroics-of-a-lost-cause&#34;&gt;The Simple Heroics Of A Lost Cause&lt;/h2&gt;
&lt;p&gt;When one recognizes the value that a free and open web presents to those who wish to hold abusive authority accountable, the more precious even relatively simple things become. When one thinks of a hero, they often think of a champion who receives the praise of all the world and recognition in history. People forget the anonymous everyday heroes who make small acts of charity, cooperation, and hope. The independent web does not need to have the best servers, the most clever software, or even the best minds to make it thrive. It does not need to compete with corporate networks and government control. People working to create, learn, and share together is always enough to make a difference.&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s easy to underestimate the resilience of the World Wide Web. For all it&amp;rsquo;s faults, and all the concessions made, it&amp;rsquo;s still an amazing &lt;a href=&#34;https://hypermedia.systems/hypermedia-reintroduction/&#34;&gt;hypermedia system.&lt;/a&gt; Just as regimes can destroy books, there will always be people who have preserved them. A single person, can have &lt;a href=&#34;https://gabe.rocks/tech/reclaiming-cyberspace/&#34;&gt;an immense impact&lt;/a&gt; to work to preserve and restore information, digital technology has made this phenomenally easier. As long as people have access to digital tools, there will be people willing to store and share important information. The beauty of &lt;a href=&#34;https://libresolutions.network/best-website-for-you/&#34;&gt;simple web sites&lt;/a&gt; is that not only can they make use of many modern media formats, but they&amp;rsquo;re pure data. This means that they can be distributed all kinds of ways.&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s time to seriously consider how you want to take part and make your mark on the future of cyberspace. Will people continue feeding data, money, and power to the machine until the end? No matter where things end up, we still have a choice today. We can choose what services we want to use, run or share. We can make deliberate decisions on which technology we wish to use and avoid, while supporting the right of others to refuse to be locked in. &lt;em&gt;Your participation matters,&lt;/em&gt; and every little action has an impact that can build up over time.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Unjected Shows Nothing But Contempt For Their Users</title>
		<link>https://libresolutions.network/videos/unjected/</link>
		<pubDate>Fri, 12 Apr 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/unjected/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/unjected.mp3" />
			
		
		<image>https://libresolutions.network//media/images/videos2.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/videos2.webp" />
		<itunes:image href="https://libresolutions.network//media/images/videos2.webp" />
		<description>A cautionary example from an arrogant endeavor.</description>
		<content:encoded>&lt;p&gt;Earlier this week, I hastily recorded a video for the &lt;a href=&#34;https://libresolutionsnetwork.substack.com/p/how-stupid-do-they-think-you-are&#34;&gt;substack newsletter&lt;/a&gt; to dennounce the &lt;a href=&#34;https://rumble.com/v4oo5qu-the-unjected-show-058-turbo-cancer-in-youth-or-accelerated-aging.html&#34;&gt;astounding behavior by Unjected&lt;/a&gt; in response to news breaking of their site being found to have &lt;a href=&#34;https://www.dailydot.com/debug/anti-vax-dating-site-unjected-private-user-data-dms/&#34;&gt;serious vulnerabilities.&lt;/a&gt; Instead of informting their users of the risks of their information being vulnerable, the company instead would prefer to downplay and dismiss any concerns and mislead their users about what steps they &lt;em&gt;should&lt;/em&gt; take to protect their private information.&lt;/p&gt;
&lt;p&gt;I have included the video here for anyone who may like to see an exemplary example of the attitude you DON&amp;rsquo;T want to see in operators of a site you frequent. It&amp;rsquo;s important that people learn &lt;a href=&#34;https://libresolutions.network/articles/alt-tech/&#34;&gt;Lessons from Alt-Tech Failures&lt;/a&gt; of the past. It&amp;rsquo;s highly concerning how various ventures will take people&amp;rsquo;s values or identity to wear a skin-suit of them for &lt;a href=&#34;https://libresolutions.network/articles/redirecting-resistance/&#34;&gt;self-serving reasons.&lt;/a&gt; Educate your friends and family of the risks of data breaches, and try to choose only online services you can trust, better yet consider &lt;a href=&#34;https://comfy.guide/&#34;&gt;self-hosting&lt;/a&gt; what you can.&lt;/p&gt;
&lt;p&gt;More importantly, don&amp;rsquo;t let people use the scare tactic of &amp;ldquo;&lt;em&gt;the government can get everything&lt;/em&gt;&amp;rdquo; to dissuade you from putting in the effort to reinforce your own privacy and security. There are many advantages to even incremental steps that can resolve future problems.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://libresolutions.network/media/diagrams/threat%20modeling.webp&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/diagrams/threat%20modeling.webp&#39; 
&gt;

&lt;/a&gt;



&lt;/div&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Lessons from Alt-Tech Failures</title>
		<link>https://libresolutions.network/articles/alt-tech/</link>
		<pubDate>Mon, 08 Apr 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/alt-tech/</guid>
		
		<image>https://libresolutions.network//media/images/cyberwar.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/cyberwar.webp" />
		<itunes:image href="https://libresolutions.network//media/images/cyberwar.webp" />
		<description>Understanding the dangers of letting down your guard.</description>
		<content:encoded>&lt;p&gt;Data breaches are a serious problem. We do not live in an environment where it is safe for people&amp;rsquo;s PII (Personally Identifiable Information) to be widely available. When somebody&amp;rsquo;s data is leaked or stolen, there can be and have been serious repercussions for that person. It is desperately important that we not only carefully choose the platforms we use, but also that they’ve taken steps to protect their users from risks related to &lt;em&gt;the platform itself&lt;/em&gt;. This piece aims to highlight examples where so-called “Alt-Tech” platforms have failed to do so, and hopefully provide meaningful insight from those experiences.&lt;/p&gt;
&lt;p&gt;Big Tech has its own share of blame. By providing convenient access to privately owned (but often publicly funded) infrastructure, people have been lulled into a position of not only dependence, but outright helplessness. If it had not been for the model of &lt;em&gt;everyone throws their private information into a handful of nominally-free services&lt;/em&gt;, it&amp;rsquo;s possible that problems we have to account for today wouldn&amp;rsquo;t exist at all.&lt;/p&gt;
&lt;p&gt;Breaking free requires more than simply switching providers. Consolidating information into a single large target has its own risks, changing the operators of it do not inherently resolve those risks. Sadly, it is all too easy for people to fall into the trap of supporting ill-equipped, negligent or outright malicious providers if they merely &lt;a href=&#34;https://libresolutions.network/redirecting-resistance&#34;&gt;brand themselves differently.&lt;/a&gt; As more people are and have been pushed out of mainstream providers due to escalating and extreme censorship, they may fall into outright traps.&lt;/p&gt;
&lt;h2 id=&#34;can-you-trust-an-online-service&#34;&gt;Can You Trust an Online Service?&lt;/h2&gt;
&lt;p&gt;What most people underestimate these days is the position of trust one puts into any service they use, but especially those they share important information with. Those who profit off mass data collection are very content to keep this information in the dark. By connecting to an online service you are at minimum trusting the fact that you&amp;rsquo;ve accessed it won&amp;rsquo;t be used against you. The problem with data about you being leaked online is that suddenly you&amp;rsquo;re not just worried about big brother, but now you have to ask yourself if you have &amp;lsquo;&lt;em&gt;nothing to hide&lt;/em&gt;&amp;rsquo; from extremist political rivals, people with personal grudges, and a large variety of online cyber-criminals.&lt;/p&gt;
&lt;p&gt;There are many concerns even for well-managed services:&lt;/p&gt;
&lt;h3 id=&#34;passive-data-collection&#34;&gt;Passive Data Collection&lt;/h3&gt;
&lt;p&gt;For the most part, most people are essentially navigating &lt;em&gt;hostile cyberspace&lt;/em&gt;. Passive data collection is what&amp;rsquo;s collected by simply interacting with the service. From tracking scripts to ads, there are many dangers inherent to online services that people will mitigate with tools such as ad-blockers and firewalls.  That&amp;rsquo;s only part of the picture however, as there are many nominally benign forms of passive data collection, which may include:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Recording the IPs of your visits&lt;/li&gt;
&lt;li&gt;Technical details of your device or application (&lt;em&gt;fingerprinting&lt;/em&gt;)&lt;/li&gt;
&lt;li&gt;Storing your activity across the platform&lt;/li&gt;
&lt;li&gt;Logs recording information across time&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;active-data-collection&#34;&gt;Active Data Collection&lt;/h3&gt;
&lt;p&gt;Active data collection is information you have to explicitly provide the service, this can be your account details, ID verification, or any posts and interactions made on the service. Active data collection can include a wide variety of forms including:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Log-ins &amp;amp; Sessions&lt;/li&gt;
&lt;li&gt;Posts and uploads&lt;/li&gt;
&lt;li&gt;Requested personal information and documentation&lt;/li&gt;
&lt;li&gt;Payment information&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;third-parties&#34;&gt;Third-Parties&lt;/h3&gt;
&lt;p&gt;Of course, any nominally dissident service can defeat all the efforts of putting together a rock solid service by slapping Google Analytics on it to track their users. To go even further, it&amp;rsquo;s worth considering the entire &amp;ldquo;tech stack&amp;rdquo; that the service is built on. Is it dependent on hosting from Amazon Web Services or Microsoft Azure? Is it making use of hosted providers that themselves can be restricted or abused? The sad truth is that a lot of malicious activity can be hiding behind a pretty website or smartphone app.&lt;/p&gt;
&lt;h3 id=&#34;application-exploits&#34;&gt;Application Exploits&lt;/h3&gt;
&lt;p&gt;Even in an online service designed with the best of intentions, there are ways in which simple errors can create devastating security breaches. When there is a &lt;em&gt;security vulnerability&lt;/em&gt; in the application running the service, additional data can be stolen from third-parties and misused. The impact can vary greatly in scale and scope: from impacting a small portion of the service, to potentially giving hackers and the curious alike admin-level access.  Even worse, application exploits are a very important tool for hackers to gain system-level access to the operator&amp;rsquo;s systems.&lt;/p&gt;
&lt;h3 id=&#34;system-compromise&#34;&gt;System Compromise&lt;/h3&gt;
&lt;p&gt;System compromise is a disastrous and serious concern. It&amp;rsquo;s hard to imagine things worse than an application exploit giving the hacker admin-level access, but system compromise gives access to every component of the services that run the platform. This means that those who gain access can then modify records, cover their tracks, introduce new &amp;ldquo;features&amp;rdquo;, or disable others. The platform is effectively under new management and any information that&amp;rsquo;s available (far more than one would think) is vulnerable to destruction and publication. Without proactive vigilance from service operators intrusion can go undetected for quite some time.&lt;/p&gt;
&lt;h2 id=&#34;examples-alt-tech&#34;&gt;Examples: Alt-Tech&lt;/h2&gt;
&lt;p&gt;It may seem unfair to focus on &amp;ldquo;Alt-Tech&amp;rdquo; when there are many data-breaches in Big Tech services. It&amp;rsquo;s true that data-selling and data breaches are a serious problem on those platforms, but this is a known problem. What&amp;rsquo;s harder is when people starting a venture to &lt;em&gt;replace&lt;/em&gt; Big Tech are naive or flippant about the many security risks. In the name of &lt;em&gt;being better&lt;/em&gt; than Big Tech these ventures are also taking on the massive challenge of properly safeguarding their users&amp;rsquo; data. Especially when one is aiming to provide services for people who are being mistreated by their own governments. When working to help protect others from state overreach, they should realize the seriousness of their task increases their responsibility significantly. Some may sadly fall into a false sense of security when it comes to so called &amp;ldquo;alt-tech&amp;rdquo; alternatives. While a service that isn&amp;rsquo;t deliberately selling your data can be an improvement, one that gets breached can end up being just as dangerous if not more. When hackers seize the data from a service people trust maybe a bit too much, it can transform that service into a de-facto &lt;em&gt;honeypot&lt;/em&gt;, even if the providers had no intention of being such.&lt;/p&gt;
&lt;h2 id=&#34;ledger&#34;&gt;Ledger&lt;/h2&gt;
&lt;p&gt;Those of you thinking ahead may have anticipated web3 as a solution. Unfortunately, there are many impure implementations of Web3 that allow for private profit and project governance. These projects are just as vulnerable as any other web service. Despite the security advantages of a hardware wallet, the associated Ledger service had &lt;a href=&#34;https://haveibeenpwned.com/PwnedWebsites#Ledger&#34;&gt;its own breach&lt;/a&gt; in summer 2020. This is highly concerning alone due to the privacy and security benefits one may assume from using a dedicated security solution. The breach includes physical addresses, which is a very dangerous data-point to have exposed for many people.&lt;/p&gt;
&lt;h2 id=&#34;parler&#34;&gt;Parler&lt;/h2&gt;
&lt;p&gt;Despite being de-platformed by Amazon Web Services, activists managed to scrape a large variety of public posts and upload terabytes of user content to The Internet Archive. This wouldn&amp;rsquo;t have happened if Parler had dead-simple rate-limiting features that many other services will have to basically keep bots in check. The lack of such feature, and other bad design choices &lt;a href=&#34;https://www.wired.com/story/parler-hack-data-public-posts-images-video/&#34;&gt;created the problem.&lt;/a&gt; The scraping of public data is a grey zone when it comes to data protection. In many circumstances it&amp;rsquo;s not considered a real Data Breach. For the purposes of the impact it has on individuals, it often won&amp;rsquo;t have much of a difference. In this case, Parler&amp;rsquo;s data was used to create an &lt;a href=&#34;https://www.theverge.com/2021/1/14/22231749/parler-interactive-map-video-gps-capitol-attack&#34;&gt;interactive map&lt;/a&gt; of protestors and identify them for legal action or vigilante retaliation. Regardless of how one feels about that particular protest, it&amp;rsquo;s worth keeping in mind that this tactic would be effective against any protest that isn&amp;rsquo;t overwhelmingly popular.&lt;/p&gt;
&lt;h2 id=&#34;gab&#34;&gt;Gab&lt;/h2&gt;
&lt;p&gt;Given the creator&amp;rsquo;s decisions over the years, It&amp;rsquo;s hard to take Gab seriously. Originally created by a &amp;ldquo;buy a website&amp;rdquo; &lt;a href=&#34;https://williamwelna.wordpress.com/2017/01/02/destroying-gab-with-words-on-a-screen-but-at-least-its-not-livejournal/&#34;&gt;online shop called Pusher,&lt;/a&gt; the social media site has had a long history of bizarre technical issues. In hopes to resolve some of these, Gab eventually used the code from the Federated Social Network Mastodon. This created some issues as the mainstream Fediverse urgently reacted to &lt;a href=&#34;https://fediverse.wiki/wiki/The_Gabbening&#34;&gt;work against&lt;/a&gt; Gab&amp;rsquo;s inclusion into the wider network, a political decision that emboldened a culture of thought-policing over parts of the Fediverse. Despite this some other servers would have been interested in federating, but Gab itself decided to not maintain federation.&lt;/p&gt;
&lt;p&gt;Eventually, Gab had &lt;a href=&#34;https://www.campfire.wiki/doku.php?id=gab&#34;&gt;its own data breach&lt;/a&gt; leaking 70GB of user information. The site DDOSecrets is holding on to the data and scraped additions. They claim to have restricted access to the data to &amp;ldquo;journalists and researchers&amp;rdquo; for what little that&amp;rsquo;s worth. This data was one of many treasure troves of data used to research not just &lt;a href=&#34;https://stacks.stanford.edu/file/druid:ns280ry2029/20220601_gabufacturing_dissent.pdf&#34;&gt;extremism,&lt;/a&gt; but also a large swath of people who were displeased with mainstream social media and sought an alternative.&lt;/p&gt;
&lt;p&gt;One can choose to believe that Mr. Torba is sincere in his effort to legitimately represent a large amount of the American public hoping to dissent against various policies. This gets harder to believe when the CTO of Gab has threatened to abuse data to &lt;a href=&#34;https://archive.is/Z7MXi&#34;&gt;build profiles&lt;/a&gt; on their own users. Ever since the site announced they would be &lt;a href=&#34;https://news.gab.com/2024/03/social-media-as-we-know-it-is-dead-and-ai-killed-it/&#34;&gt;pay-walling media attachments,&lt;/a&gt; the rise of anti-anonymity rhetoric by the founder and others is highly concerning. To be clear, it makes no sense to use your personal information on a site with a long history of security issues, no matter what their cause is.&lt;/p&gt;
&lt;h2 id=&#34;unjected&#34;&gt;Unjected&lt;/h2&gt;
&lt;p&gt;Data breaches from dating sites are a non-trivial concern even in ordinary circumstances. People are encouraged to share intimate details about themselves they likely wouldn&amp;rsquo;t on other services. Despite a fairly small amount of users, the &amp;ldquo;dating site for the unvaccinated&amp;rdquo; is a particularly troubling example. The &lt;a href=&#34;https://archive.is/uZrJC&#34;&gt;technical details&lt;/a&gt; are very much worth reading, but an attempt to do them justice will be made. The whole saga involves an embarrassing attempt to downplay and dismiss grave security concerns. When building a service for a community of people one feels are in need of special protection, a lack of concern for user information is a serious red flag.&lt;/p&gt;
&lt;p&gt;In mid 2022 &lt;a href=&#34;https://www.campfire.wiki/doku.php?id=unjected&#34;&gt;Unjected&lt;/a&gt; was caught with their pants down with an application exploit that was &lt;a href=&#34;https://archive.is/bJHcM&#34;&gt;trivially easy to avoid.&lt;/a&gt; Despite its simplicity, that exploit allowed someone to have full admin access immediately. To make things worse, there were other exploits discovered, the site effectively didn&amp;rsquo;t enforce any security at all. Once somebody knew the paths for particular items, they could access whatever they wanted. This meant that from the beginning the site had no real security, only &lt;a href=&#34;https://en.wikipedia.org/wiki/Security_through_obscurity&#34;&gt;security through obscurity&lt;/a&gt; which doesn&amp;rsquo;t help for long, if at all.&lt;/p&gt;
&lt;p&gt;The Severity of the security risks raise more than just technical concerns. Like many other examples, there was a callous hubris on the part of the organization in the face of what should have been taken very seriously. The last thing you as a user want is for a service you rely on to have their spokespeople focused on PR and damage control over actually investigating and resolving potential problems. This absolutely raises the burden for those interested in starting this kind of venture, but the alternative is to lead users into a trap.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;Update:&lt;/strong&gt;&lt;/em&gt; Daily Dot reports that despite two years passing, the original researcher who discovered the 2022 breach confirms that the site is &lt;a href=&#34;https://www.dailydot.com/debug/anti-vax-dating-site-unjected-private-user-data-dms/&#34;&gt;just as insecure as before.&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;givesendgo&#34;&gt;GiveSendGo&lt;/h2&gt;
&lt;p&gt;Crowdfunding is an extremely powerful tool. Large amounts of individuals choosing to donate to accomplish an achievable goal is something &lt;a href=&#34;https://libresolutions.network/operations/bankroll/&#34;&gt;society needs to consider&lt;/a&gt; more and more. Unfortunately, those who have concerns with the largest platform may feel the need to settle for &lt;em&gt;the next best thing&lt;/em&gt;. This was the case for the Canadian Freedom Convoy protest of February 2022. After raising over $10M CAD, GoFundMe had closed the crowdfund. A new fundraiser was created on GiveSendGo that raised over $9.7M CAD, with donors across the country and some abroad. What could have been a success &lt;a href=&#34;https://www.dailydot.com/debug/givesendgo-trucker-convoy-hack-leak/&#34;&gt;ended in disaster&lt;/a&gt; as hackers published a as website that published all the donors information.&lt;/p&gt;
&lt;p&gt;Making the rounds on &lt;a href=&#34;https://archive.is/fUV8F&#34;&gt;Twitter&lt;/a&gt; the release of information about supporters was given &lt;a href=&#34;https://www.foxnews.com/media/twitter-hacked-material-canadian-freedom-convoy-donors-hunter-biden-laptop&#34;&gt;free reign&lt;/a&gt; on the platform. Eventually this lead to retaliation against &lt;a href=&#34;https://www.thestar.com/news/canada/ottawa-officer-gets-punished-for-donating-to-the-freedom-convoy/article_af65d728-ab3d-5909-9743-82a7cece4c9a.html&#34;&gt;those who donated&lt;/a&gt; even &lt;a href=&#34;https://ottawacitizen.com/news/local-news/threats-close-stella-luna-gelato-cafe-after-owners-name-appears-in-givesendgo-data-leak&#34;&gt;relatively small amounts.&lt;/a&gt; This was so egregious that even Ilhan Omar &lt;a href=&#34;https://www.dailymail.co.uk/news/article-10522245/Squad-member-Ilhan-Omar-defends-Ottawa-cafe-owner-donated-Canadian-Freedom-Convoy-truckers.html&#34;&gt;tweeted&lt;/a&gt; &amp;ldquo;&lt;em&gt;I fail to see why any journalist felt the need to report on a shop owner making such an insignificant donation rather than to get them harassed. It&amp;rsquo;s unconscionable and journalists need to do better.&lt;/em&gt;&amp;rdquo;&lt;/p&gt;
&lt;p&gt;This is an excellent example of how political polarization in the public can be manipulated to undermine everyone&amp;rsquo;s rights. The response to the Freedom Convoy protest by the &lt;a href=&#34;https://www.cbc.ca/news/politics/emergencies-act-federal-court-1.7091891&#34;&gt;Canadian Government&lt;/a&gt; as well as the media, is a mark against Canadian civil rights history. We should all be careful by what means we permit institutions to limit peaceful means of resolving conflict. It&amp;rsquo;s never a bad time to to ask ourselves just how far we&amp;rsquo;re willing to let states go to suppress protests and other forms of political dissent.&lt;/p&gt;
&lt;h2 id=&#34;epik&#34;&gt;Epik&lt;/h2&gt;
&lt;p&gt;The more important a service is, the more dangerous information from it being abused can be. Epik was a web hosting provider and domain registrar. It&amp;rsquo;s one thing to have your own website hacked, but if your service provider is hacked you have a whole world of other troubles. The Epik breach was an epic disaster. Hackers effectively stole &lt;a href=&#34;https://www.campfire.wiki/doku.php?id=epik#data_breach&#34;&gt;everything&lt;/a&gt; and made it available as a torrent.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Domain purchases&lt;/li&gt;
&lt;li&gt;Domain transfers&lt;/li&gt;
&lt;li&gt;WHOIS history&lt;/li&gt;
&lt;li&gt;DNS changes&lt;/li&gt;
&lt;li&gt;Email forwards, catch-alls, etc.&lt;/li&gt;
&lt;li&gt;Payment history&lt;/li&gt;
&lt;li&gt;Account credentials&lt;/li&gt;
&lt;li&gt;Over 500,000 private keys&lt;/li&gt;
&lt;li&gt;An employee&amp;rsquo;s mailbox&lt;/li&gt;
&lt;li&gt;Git repositories&lt;/li&gt;
&lt;li&gt;/home/ and /root/ directories of a core system&lt;/li&gt;
&lt;li&gt;Bootable disk images&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;While the media will focus on the most inflammatory websites, a mass dump of the data doesn&amp;rsquo;t quite discriminate. Others who chose to use their service for whatever reason will end up caught in the crossfire. Since Epik&amp;rsquo;s own systems had been infiltrated, this has serious security concerns for any website hosted on their infrastructure at the time.&lt;/p&gt;
&lt;p&gt;If you&amp;rsquo;re curious, you can see the list of &lt;a href=&#34;https://www.campfire.wiki/doku.php?id=covid-19_pandemic:data_breaches&#34;&gt;Data Breaches during the Covid Crisis&lt;/a&gt; I started on &lt;a href=&#34;https://campfire.wiki&#34;&gt;Campfire.Wiki&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;a-concerning-pattern&#34;&gt;A Concerning Pattern&lt;/h3&gt;
&lt;p&gt;Theres a similar pattern among similar incidents where irresponsible operators will put the needs of their business ahead the interests of their users. You can find examples of outright denial, downplaying, or even inadequate solutions touted as a complete fix. When a representative for a service follows the following script, it is a sure sign to never do business with them again:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&amp;ldquo;&lt;em&gt;There was no hack, they&amp;rsquo;re lying, it&amp;rsquo;s FUD!&lt;/em&gt;&amp;rdquo;&lt;/li&gt;
&lt;li&gt;&amp;ldquo;&lt;em&gt;Okay there was a hack but it was a minor glitch and we fixed it.&lt;/em&gt;&amp;rdquo;&lt;/li&gt;
&lt;li&gt;Hackers claim it&amp;rsquo;s not fixed, and post more data&lt;/li&gt;
&lt;li&gt;&amp;ldquo;&lt;em&gt;Okay it was bad, but it&amp;rsquo;s fixed, for &lt;em&gt;real this time&lt;/em&gt;, but they&amp;rsquo;re not in our systems!&lt;/em&gt;&amp;rdquo;&lt;/li&gt;
&lt;li&gt;Media reports that the systems were in fact actually breached and/or data is posted online, potentially because of system compromise or a major vulnerability.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id=&#34;does-it-really-have-to-be-this-way&#34;&gt;Does It Really Have To Be This Way?&lt;/h2&gt;
&lt;p&gt;One may argue that attempting to find solutions to this problem is a hopeless endeavor. If teams of people with serious funding aren&amp;rsquo;t able to solve the problem what hope is there? It is of utmost important that we take a second look and ask ourselves what problem we&amp;rsquo;re actually trying to solve. Are we actually trying to fight against censorship and democratize problem-solving? Are we truly motivated in making sure the problems caused by Big Data are put behind us? Resolving those questions is far beyond the scope of &amp;ldquo;how do I design my next website?&amp;rdquo; The answers lie in taking a look at the fundamentals of cyberspace and being willing to explore a much wider variety of possibilities.&lt;/p&gt;
&lt;h3 id=&#34;education-is-key&#34;&gt;Education Is Key&lt;/h3&gt;
&lt;p&gt;Communities need to prioritize their own technological knowledge capital. Spending time to teach the fundamentals can help people not fall prey to the most prevalent of problems. Relying on governments or corporations to secure the Internet for everyone is asking to be entirely beholden to them. The ideal way forward requires people to be taught not merely how to use various technologies but to understand them at a deep fundamental level.&lt;/p&gt;
&lt;p&gt;When fighting for something that matters, &lt;em&gt;&lt;strong&gt;the details matter.&lt;/strong&gt;&lt;/em&gt; One must not only consider what someone is up to but also how they intend to achieve it. The means of achieving particular goals can very easily and quickly corrupt the entire enterprise. Having the knowledge, but also the courage to call out careless or negligent behavior among one&amp;rsquo;s allies is a very difficult but important thing to do.&lt;/p&gt;
&lt;h3 id=&#34;join-the-self-hosting-revolution&#34;&gt;Join The Self-Hosting Revolution&lt;/h3&gt;
&lt;p&gt;I can personally attest that self-hosting is a fun and liberating venture&amp;hellip;most of the time. It does take a fair amount of skill and effort, especially to maintain across time. While it may not be for every single person, small communities self-hosting services can help distribute the data, and therefore the risk much better than large monolithic platforms. It&amp;rsquo;s much safer to keep everyone&amp;rsquo;s data separate and distributed. To make the most out of this, open protocols are the way to allow a variety of different systems to still maintain some form of interoperability. A heterogeneous network built with a common protocol will be much more resilient to cyber attacks than everyone running the same &lt;em&gt;one-size-fits-all&lt;/em&gt; solution, or pooling their data in the same entities.&lt;/p&gt;
&lt;p&gt;One of the best advantages of self-hosting or running services for a small community is that it reduces your reliance on large platforms. While it may be a challenge to protect your own systems, with proper backups you&amp;rsquo;ll have a lot less to lose than someone on a large platform that got breached or was selling the data anyways. With reasonable expectations, such as accepting that software is never complete but always improving, we can create radical change with relatively simple innovations.&lt;/p&gt;
&lt;h3 id=&#34;opsec-operational-security&#34;&gt;OPSEC (Operational Security)&lt;/h3&gt;
&lt;p&gt;With our existing platforms and services harvesting more and more information on their users, it&amp;rsquo;s worth asking what you&amp;rsquo;re willing to do to &lt;a href=&#34;https://corbettreport.com/salting-your-data-solutionswatch/&#34;&gt;mix things up.&lt;/a&gt; Does every website you use require your real name just to lurk occasionally? Is it even reasonable that most online entertainment includes all kinds of invasive forms of surveillance? Our predicament as individuals is that protecting our private information is a burden that has been placed on us by the circumstances we find ourselves in. It takes proactive work, and careful consideration to not fall into traps.&lt;/p&gt;
&lt;p&gt;Let&amp;rsquo;s ask a few questions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Do you sign up to newsletters with your main or work email?&lt;/li&gt;
&lt;li&gt;How many sites have your only phone number or physical address?&lt;/li&gt;
&lt;li&gt;Do you repeat usernames (or even worse passwords) across services?&lt;/li&gt;
&lt;li&gt;How many accounts do you have open with sites that you haven&amp;rsquo;t interacted with in years?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Each of those are OPSEC problems that you may want to spend time resolving in advance of a breach.
As always it&amp;rsquo;s worth checking known breaches for &lt;a href=&#34;https://haveibeenpwned.com/&#34;&gt;your information.&lt;/a&gt; Sometimes controversial online services will openly share guides with their users on how they can &lt;a href=&#34;https://archive.is/ABkK2&#34;&gt;proactively protect themselves&lt;/a&gt; from being compromised &lt;a href=&#34;https://libresolutions.network/media/images/kiwifarms-new-user-tips.webp&#34;&gt;in the event of a breach.&lt;/a&gt; General understanding and awareness can often go a lot further with a bit of creativity than relying solely on every service being impervious.&lt;/p&gt;
&lt;h3 id=&#34;advice-for-future-alt-tech-projects&#34;&gt;Advice for Future &amp;ldquo;Alt-Tech&amp;rdquo; Projects&lt;/h3&gt;
&lt;p&gt;Think all the above were just chumps or malicious from the start?&lt;br&gt;
Believe that you could do better and want to build the next big thing?&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s still worth it to consider the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Have a plan to detect system intrusion proactively&lt;/li&gt;
&lt;li&gt;Build your product with security as a priority: Make deliberate choices in components and software&lt;/li&gt;
&lt;li&gt;Test your application for exploits based off previous breaches&lt;/li&gt;
&lt;li&gt;Get independent security audits&lt;/li&gt;
&lt;li&gt;Assume you will be breached, take measures to minimize harm&lt;/li&gt;
&lt;li&gt;Treat user information as radioactive: store as little of it as you have to, secure what you must keep&lt;/li&gt;
&lt;li&gt;Make an organized effort to ensure members of the organization are aware of important security practices&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;TL:DR Take cybersecurity seriously and don&amp;rsquo;t bite off more than you can chew.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>The Jason Lavigne Show</title>
		<link>https://libresolutions.network/videos/the-lavigne-show/</link>
		<pubDate>Tue, 26 Mar 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/the-lavigne-show/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/the-lavigne-show.ogg" />
			
		
		<image>https://libresolutions.network//media/images/lavigne-banner.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/lavigne-banner.webp" />
		<itunes:image href="https://libresolutions.network//media/images/lavigne-banner.webp" />
		<description>Reaching far and wide across Canada</description>
		<content:encoded>&lt;p&gt;I had the pleasure of Joining Jason Lavigne on The Lavigne Show. It was an excellent opportunity to share my message with a Canadian audience of liberty-minded individuals across the country. Jason has had a fascinating variety of guests on his show including Hrvoje of Geopolitics &amp;amp; Empire, Doc Malik, JJ Couey and even Dr Robert Malone among many others.
It has been an honor to be featured on the Lavigne Show, and I was absolutely astounded at the positive feedback I received in the live chat.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Online Threats &amp; Technocracy with Hrvoje Morić</title>
		<link>https://libresolutions.network/videos/hrvoje-moric-show-mar-2024/</link>
		<pubDate>Wed, 20 Mar 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/hrvoje-moric-show-mar-2024/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/tnt-radio-mar-20.ogg" />
			
		
		<image>https://libresolutions.network//media/images/tnt-radio.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/tnt-radio.webp" />
		<itunes:image href="https://libresolutions.network//media/images/tnt-radio.webp" />
		<description>A great conversation about the impositions on people&#39;s liberty, both online and in real life.</description>
		<content:encoded>&lt;p&gt;I had an excellent time talking with Hrvoje Morić on his TNT Radio show. I highly recommend getting caught up with some of his great interviews with a very wide variety of fascinating guests. If you don’t already know of Hrvoje, you’re missing out and should absolutely take a look at &lt;a href=&#34;https://geopoliticsandempire.com&#34;&gt;Geopolitics &amp;amp; Empire!&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;breaking-update&#34;&gt;Breaking Update&lt;/h3&gt;
&lt;p&gt;An update from the Geopolitics &amp;amp; Empire telegram channel:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Hrvoje has left the building! I have finally found a guerrilla with enough experience to replace me on TNT Radio. Veteran information warrior Lieutenant General Jason Bermas!&lt;/p&gt;
&lt;p&gt;The Ides of March was my last transmission on TNT Radio after 2 straight and grueling years of non-stop live shows without pause or break&amp;hellip;broadcasting from Croatia and from around the USA and México.&lt;/p&gt;
&lt;p&gt;I am completely frazzled and burned out. I LOVE TNT Radio, they have been amazing to me, they&amp;rsquo;ve never censored me or caused me any problems, in fact&amp;hellip;they&amp;rsquo;ve largely left me alone the entire time. They were basically like: here&amp;rsquo;s a mic, you got 2-3 hours, here&amp;rsquo;s your pay, go!&lt;/p&gt;
&lt;p&gt;But doing 10-15 interviews a week is nuts, personally, for me right now. I desperately need to take a break and slow down. I will re-focus my efforts on Geopolitics &amp;amp; Empire! Stay frosty and stay tuned! 🎙 ✊&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;It’s been an honor to be part of Hrvoje’s show on TNT Radio, and wish him the best!&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Tools of the Technocracy: #12 Network States</title>
		<link>https://libresolutions.network/articles/tools-of-the-technocracy-12/</link>
		<pubDate>Tue, 12 Mar 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/tools-of-the-technocracy-12/</guid>
		
		<image>https://libresolutions.network//media/images/network-state-banner.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/network-state-banner.webp" />
		<itunes:image href="https://libresolutions.network//media/images/network-state-banner.webp" />
		<description>The formalization of world-wide tyranny</description>
		<content:encoded>&lt;h1 id=&#34;tools-of-the-technocracy--12-network-states&#34;&gt;&lt;a href=&#34;https://libresolutions.network/tags/tools-of-the-technocracy-series&#34;&gt;Tools of the Technocracy&lt;/a&gt;:  #12 Network States&lt;/h1&gt;
&lt;h3 id=&#34;the-trap&#34;&gt;The Trap&lt;/h3&gt;
&lt;p&gt;Network states are pitched as a nice-sounding way to improve or sometimes outright replace governments. This is a trap disguised as an opportunity. It would seem that the goal is to &lt;a href=&#34;https://libresolutions.network/articles/redirecting-resistance/&#34;&gt;diffuse&lt;/a&gt; people&amp;rsquo;s desire for accountability into a variety of schemes for private profit. Tragically, even if these became successful, people are to be left behind.  For many, the temptation to eschew all the baggage of existing governments and &amp;lsquo;start fresh&amp;rsquo; is very tempting. Especially for those who are young and beginning their careers, who understandably feel no responsibility for the tragedies of the past. In the long run, those people would be entirely disconnected from the community they fled, potentially leaving many others who aren&amp;rsquo;t so lucky to struggle with the consequences.&lt;/p&gt;
&lt;p&gt;This is the exact opposite of what&amp;rsquo;s needed to actually secure justice for those victimized. Any &amp;lsquo;solution&amp;rsquo; that leaves people disconnected and communities shattered is the worst possible outcome. Instead of &lt;a href=&#34;https://gabe.rocks/thoughts/dont-turn-on-the-flock/&#34;&gt;turning on the public&lt;/a&gt;, ideal solutions need to be oriented in investigating and acting on the truth. Digital tools can help, but they themselves can&amp;rsquo;t be treated as the idol that absolves us of the responsibility to act.&lt;/p&gt;
&lt;p&gt;To make matters worse, false saviors can betray their followers into building &lt;a href=&#34;https://geopoliticsandempire.com/2022/04/23/spiritual-technocracy-great-awakening/&#34;&gt;the very system they aim to avoid&lt;/a&gt;. People&amp;rsquo;s justifiable frustration with the way things are is a very powerful impulse for malevolent forces to exploit. It seems entirely predictable, that once tragedy of nearly any kind strikes, pre-packaged &lt;em&gt;solutions&lt;/em&gt; are conveniently prepared for people to latch on to. By not allowing any crisis go to waste, people&amp;rsquo;s time, focus, and resources are redirected from maintaining things well enough to prevent or mitigate the seemingly inevitable &lt;em&gt;next crisis&lt;/em&gt;. These non-solutions are often very attractive, in the same way fast food is addictive but unhealthy.&lt;/p&gt;
&lt;h3 id=&#34;the-encroachment-phase&#34;&gt;The Encroachment Phase&lt;/h3&gt;
&lt;p&gt;It begins with forces using the unjustifiable aspects of the status quo to bit-by-bit dismantle or eliminate the parts that people rely on. By putting on a performance of impersonating independent reform, various non-state actors &lt;a href=&#34;https://scribe.rip/aspen-ideas/sleeping-through-a-revolution-8c4b147463e5&#34;&gt;can expand their own power&lt;/a&gt; at the expense of people. Often these displays will make use of pretty language or voice long-running concerns that have gone unresolved.&lt;/p&gt;
&lt;p&gt;A well-known example of this model is the company Uber. Uber was not an &lt;em&gt;innovation&lt;/em&gt; that created new opportunities for communities. In many jurisdictions, the company started out &lt;a href=&#34;https://www.cbc.ca/news/canada/ottawa/uber-becomes-officially-licensed-ottawa-1.3790649&#34;&gt;operating as an illegal taxi,&lt;/a&gt; with arguably worse working conditions, and added smart-city style &lt;a href=&#34;https://www.upguard.com/blog/what-caused-the-uber-data-breach&#34;&gt;data risks.&lt;/a&gt; Taking advantage of a highly regulated industry, there was opportunity to &lt;em&gt;move fast and break things&lt;/em&gt;, and seize more central control. It should be noted, that Uber &lt;a href=&#34;https://fourweekmba.com/is-uber-profitable/&#34;&gt;wasn&amp;rsquo;t even profitable.&lt;/a&gt; It ran at a loss up until 2023, making it significantly harder for competitors to participate in the space until then.&lt;/p&gt;
&lt;p&gt;The company is a shining example of how profit-driven digital control can shape governance. As the service gained adoption, the &lt;a href=&#34;https://www.washingtonpost.com/politics/uber-pressures-regulators-by-mobilizing-riders-and-hiring-vast-lobbying-network/2014/12/13/3f4395c6-7f2a-11e4-9f38-95a187e4c1f7_story.html&#34;&gt;riders themselves&lt;/a&gt; were leveraged to pressure governments to adopt more favorable regulation. If local governance is able to be dominated by a single large corporation, it raises serious questions about how much autonomy local residents truly have. Even federal governments, and even multi-nation structures like the EU have had to contend with large corporations and their dominance over industries or domains of life. This tug-of-war over control very often leaves the people taking the raw end of the deal. One has to wonder if governments will use network states to seize more control with vehicles like &lt;a href=&#34;https://www.wired.com/story/itana-binance-charter-cities-institute-africa-tech-startup/&#34;&gt;smart cities&lt;/a&gt;, given how much big tech was weaponized in the last decade.&lt;/p&gt;
&lt;h2 id=&#34;understanding-the-network-state&#34;&gt;Understanding the Network State&lt;/h2&gt;
&lt;p&gt;In mid 2022, Balaji Srinivasan published &lt;a href=&#34;https://thenetworkstate.com/book/tns.pdf&#34;&gt;The Network State: How to Start a New Country&lt;/a&gt;, which more-or-less argues that the existing structure of nations is obsolete. Advancing the idea that &lt;em&gt;&amp;ldquo;The Network&amp;rdquo; is the Next Leviathan&lt;/em&gt;, the book argues that digital technology can enable human beings to cooperate on a scale that entirely outmatches the ways of nation states. By citing a couple of examples, the chapter makes it clear that Network States are explicitly digital and explicitly connected, arguing that mobile is better than stationary, virtual reality is superior to physical interaction, and that &lt;a href=&#34;https://unlimitedhangout.com/2024/02/investigative-reports/tokenized-inc-blackrocks-plan-to-own-the-fractionalized-world/&#34;&gt;smart contracts&lt;/a&gt; are outright better than laws. If this isn&amp;rsquo;t sufficiently staggering, those examples are expanded on with the following:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;These examples can be multiplied. As mentioned before, &lt;strong&gt;Uber and Lyft are better
regulators&lt;/strong&gt; than the State’s paper-based taxi medallions, &lt;strong&gt;email is superior to the USPS&lt;/strong&gt;,
and SpaceX is out-executing NASA. If you think about borders, you now need to think
about the Network’s telepresence (which defeats physical borders) and its encryption
(which erects digital borders). Or if you care about, say, the US census, the Network
gives a &lt;strong&gt;real-time survey&lt;/strong&gt; which is far more up to date than the State’s 10 year process.&lt;/p&gt;
&lt;p&gt;Page 53 &lt;a href=&#34;https://thenetworkstate.com/book/tns.pdf&#34;&gt;The Network State&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Ultimately, the appeal seems to be the lie that our problems with current nation states are that they are merely not &lt;em&gt;efficient enough&lt;/em&gt;. Pretending that geography is a thing of the past now that people can be relegated to exile in cyberspace. By asserting that network states can be more powerful than nations, one is lead into the trap of believing that this is to the benefit of participants. For many people, the abuses from government and institutions come swiftly enough. The desire to make this process faster and more able to change on a whim isn&amp;rsquo;t to the benefit of the people, but rather the owners of the system. Network state advocates argue that one is able to co-own the network with other participants, but if they truly are &lt;em&gt;the Next Leviathan&lt;/em&gt; then one has to wonder what about opposing networks and nations? Many are concerned by China&amp;rsquo;s high-tech &lt;a href=&#34;https://fournier.substack.com/p/elon-musks-x-empire-building-a-trojan&#34;&gt;surveillance and control model,&lt;/a&gt; it seems that network states merely enhance all the worst aspects.&lt;/p&gt;
&lt;p&gt;For all the fanfare, smart contracts are not a marker for fairness or even certainty. Odds are, there are many times you&amp;rsquo;ve agreed to terms you haven&amp;rsquo;t read or didn&amp;rsquo;t truly agree with. By attempting to make governance trust-less, one is effectively placing ultimate trust on these systems. DAOs (&lt;em&gt;&amp;ldquo;Decentralized&amp;rdquo; &amp;ldquo;Autonomous&amp;rdquo; &amp;ldquo;Organizations&amp;rdquo;&lt;/em&gt;) and smart contracts can both be &lt;a href=&#34;https://www.coindesk.com/learn/understanding-the-dao-attack/&#34;&gt;hacked and rolled back&lt;/a&gt;, vastly increasing the challenge of &lt;em&gt;system security&lt;/em&gt;. Jason Lowery has an &lt;a href=&#34;https://youtu.be/Iln2itH2k3s&#34;&gt;excellent explanation&lt;/a&gt; why smart contracts backed by proof of stake are inherently malleable.&lt;/p&gt;
&lt;p&gt;I don&amp;rsquo;t agree with Jason with all his conclusions, but it&amp;rsquo;s really important to understand his position that: &lt;strong&gt;System security depends on physical power (measured in watts).&lt;/strong&gt; Meaning that the system needs a justification in the real material world, and can&amp;rsquo;t solely exist as a social construct. Nation states solve this particular problem with taxes and armies. For a network state to truly replace nation states, it would require similarly powerful means to compel compliance. This means that while some people may come together and make their own authentic democratized network state, but it will still only exist within the wider context of physical power of those outside and within the system.&lt;/p&gt;
&lt;p&gt;This brings us the problem of using Bitcoin or another proof of work system to build a network state. While it&amp;rsquo;s inherently superior to any &amp;ldquo;proof of stake&amp;rdquo; solution, it has many drawbacks that are inherently non-starters. For example, we could not create a truly decentralized and self-sovereign network state with Bitcoin today because the costs to self-custody one&amp;rsquo;s own Bitcoin becomes very prohibitive as the network expands. Scaling this, requires more computing resources, bandwidth and storage that can also increase the costs of running the network. This is the very reason why so many Bitcoin users use so many custodial exchanges and wallets despite Bitcoin being created to eliminate that problem.&lt;/p&gt;
&lt;p&gt;But if proof of work is superior, why are other options even attempted? &lt;strong&gt;To create a powerful illusion.&lt;/strong&gt; The very reason why network states have to pretend that living in augmented reality is superior to physical reality is the same reason they have to use proof of stake, hiding where the power actually is. A great deal of the blockchain space seems devoted to not democratizing power, but competing to build a mirage of doing so. If one advocated building a network state out of Bitcoin, people would immediately realize the immense price of being self-sufficient within that kind of system, in proof-of-stake systems, those costs can be concealed.&lt;/p&gt;
&lt;p&gt;In the name of selling &lt;em&gt;decentralization&lt;/em&gt;, advocates of network states offer a singularity of digital intrusion into people&amp;rsquo;s lives, with a staggering acceptance of surveillance and control packaged as &lt;em&gt;risk management&lt;/em&gt;. In addition to this hard sell, one has to take the claims of digital security at face value. Since any serious interrogation of privacy, security, and lock-in risks reveal many serious concerns. Once these concerns are raised, they are claimed to be addressed in the &lt;em&gt;implementation phase&lt;/em&gt; of the revolution. Why worry about the details when there is a grand cyber-utopian &lt;em&gt;vision&lt;/em&gt; to evangelize?&lt;/p&gt;
&lt;h3 id=&#34;the-next-leviathan&#34;&gt;The Next Leviathan&lt;/h3&gt;
&lt;p&gt;Paradoxically, the very anti-human idea of network states is borne out of it&amp;rsquo;s principle contradiction: Human beings are useful and valuable. All the technocratic hype about automation, blockchain, AI, and virtual reality masks the true power underlying what Balaji calls &amp;ldquo;The Next Leviathan&amp;rdquo;. What those seeking to advance network states correctly understand is that large numbers of people cooperating can be an almost unstoppable force. This Leviathan is a &lt;a href=&#34;https://rumble.com/v40x4r5-rte-discussions-41-the-cybernetics-matrix-revealed.html&#34;&gt;cybernetics machine&lt;/a&gt; that competes with other mass-mind control machines. In doing so, digital systems can be leveraged to transform human beings into cyber-collectivist foot-soldiers.&lt;/p&gt;
&lt;p&gt;To avoid mincing words, this is the &lt;strong&gt;declaration of a permanent, automated, real-time &lt;em&gt;slave auction&lt;/em&gt; with every human being on the planet as fair game.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Understand that when harmonized together many of these new digital systems could be used for extreme levels of digitized tyranny. This series was primarily intended to help others consider the risks of mass-adoption and over-consolidation of various digital tools. Through the course of writing this series, it has become clear that what I suspected was possible is already highly formalized. To understand this, one only needs to read the book &lt;em&gt;The Network State&lt;/em&gt; or watch the entire &lt;a href=&#34;https://youtu.be/x-GfuIFkB_Y&#34;&gt;Network State Conference&lt;/a&gt; without being enchanted by the techno-utopianism.&lt;/p&gt;
&lt;p&gt;Far from a voluntarist utopia, it seems that the archetypical network state is a form of digitized  anarcho-feudalism. Leveraging members to undermine what remaining protections nation states do provide, in exchange for a facsimile nation over cyberspace. Just as young people today are bribed to give up privacy and security in exchange for convenience, the network state offers ways to streamline one&amp;rsquo;s submission to all the same digital intrusions into people&amp;rsquo;s lives. Blockchain tools to manage people and assets, smart technology to streamline systems to control more and more people.&lt;/p&gt;
&lt;p&gt;The dark and twisted truth of this power is that human mind control experimentation has evolved past beyond controlling a single human being, but further into controlling people controlling other people. Artificial intelligence built on machine minds is an immense energy waste and effectively a dead end. It is immensely wasteful to use exponentially more energy to make LLMs (Large Language Models) only marginally more effective. Instead, seizing control of large amounts of human minds can do much more work with far less resources. The next level of artificial intelligence may very well be human intelligence organized into swarms for particular ends. This would necessarily require a form of total mental subjugation to ensure workers are on-task.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://d197for5662m48.cloudfront.net/documents/publicationstatus/174214/preprint_pdf/791ef67bdd4a3441977152b6295f43ab.pdf&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/mind-energy.webp&#39; 
&gt;

&lt;/a&gt;



&lt;/div&gt;
&lt;p&gt;With this in mind, all the machines and digital systems are mere instruments for a more critical goal; wrangling control over people&amp;rsquo;s brain functions. This is an entirely new frontier, and the network state framework effectively argues that he who conquers the most minds wins. If true, it would be a devastating race-to-the bottom in terms of human liberty, as various &lt;a href=&#34;https://roundingtheearth.substack.com/p/mindwar-a-radicalizing-mixture-of&#34;&gt;gurus are positioned to take control&lt;/a&gt; over others, leaving no minds uncorrupted.&lt;/p&gt;
&lt;p&gt;What makes our current time so dynamic is that there is an open bid for those who are willing to manipulate others into control structures of a singular design but varying flavor. If you&amp;rsquo;re ambitious enough, you&amp;rsquo;ll be given the opportunity to sell-out your fellow human beings for &lt;em&gt;shamefully low prices.&lt;/em&gt; What makes the network state powerful is that large amounts of coerced people can be weaponized against critics and dissenters. It is naive to believe that in an era where network states rule uncontested that human rights would be any better protected than they already are, and there are quite a few reasons why things would be even worse off.&lt;/p&gt;
&lt;h2 id=&#34;lies-of-the-network-state&#34;&gt;Lies of the Network State&lt;/h2&gt;
&lt;p&gt;Network states advocate for an entirely new system of power with many different illusions that mask the troubles caused by buying into the &amp;ldquo;digital &amp;gt; physical&amp;rdquo; prison. To successfully market the dissolution of existing nation states, to make way for a world-wide technocracy, one has to be indoctrinated into believing the following lies:&lt;/p&gt;
&lt;h3 id=&#34;elimination-of-violent-competition&#34;&gt;Elimination of Violent Competition&lt;/h3&gt;
&lt;p&gt;Human history has had innumerable acts of war, genocide, and slavery. Much of this is attributed to nation states and their authoritarian ideologies across time. Time again that the very same dangerous superstition can be wrapped up in different language or symbols, just to enact the same regime of terror and cruelty. Network state advocates pretend that once people assemble themselves into self-selected groups, that there will no longer be any reason for violent conflict. To go further, the dream of network states relies on ignorance of various forms of &lt;em&gt;engineered dependence&lt;/em&gt; such as &lt;a href=&#34;https://www.bitchute.com/video/jBn5Zt0tdWcQ/&#34;&gt;disaster capitalism&lt;/a&gt;, industry capture, and coercion from non-state actors. By distracting people with beautiful virtual reality, it provides only escapism from, not means to improve actual reality.&lt;/p&gt;
&lt;h3 id=&#34;decentralization&#34;&gt;Decentralization&lt;/h3&gt;
&lt;p&gt;Fake decentralization is a booming industry. If Facebook or X forced users to maintain a &amp;ldquo;profile server&amp;rdquo; that was responsible for handling all requests, but maintained control over sorting and filtering posts, would that be decentralizing social media? In this case, the data is in the user&amp;rsquo;s control, but not the means in which it is used. The same can be applied to organs of government, a system can dismantle most if not all the laws and regulations, but maintain the power over others.&lt;/p&gt;
&lt;p&gt;There is a bizarre assumption that decentralization can only happen digitally. It seems that decentralization is a post-hoc rationalization of the extreme emphasis on digitization. This is despite the fact that analog options are inherently more decentralized and private. It is the introduction of automated digital systems that placed the burden of privacy and security on the plan. It is also entirely possible that greater digitization of society can create real limits to how decentralized a system can be.&lt;/p&gt;
&lt;h3 id=&#34;that-theyre-needed&#34;&gt;That They&amp;rsquo;re Needed&lt;/h3&gt;
&lt;p&gt;If one recognizes that large groups of cooperating people are a powerful force that can rival nations, there is no need to put so much emphasis on digital systems and surveillance technology. It seems that advocates of network states are eager to have a system that tracks everyone&amp;rsquo;s human connections, rather than simply building infrastructure that helps nurture meaningful connections between people. The adversarial focus against existing nations is also unnecessary, even the advocates themselves admit that most &amp;ldquo;network states&amp;rdquo; would have some form of cooperation (or subversion) of an existing nation state.&lt;/p&gt;
&lt;h3 id=&#34;fixing-statism&#34;&gt;Fixing &amp;ldquo;Statism&amp;rdquo;&lt;/h3&gt;
&lt;p&gt;If government is the problem, don&amp;rsquo;t turbo-charge and automate it. If government isn&amp;rsquo;t the problem, then you&amp;rsquo;d fix the ones you have rather than dismantling it outright. Network states all seem to converge on the worst of both worlds. Network states are not merely an alternate form of government, but they are a model to create far more terrifying governments that are entirely unbound by what restrains existing governments. A principal focus of network states seems to be &lt;a href=&#34;https://youtu.be/KU-6URq8IOo&#34;&gt;undermining or avoiding regulations&lt;/a&gt; or even human rights protections.&lt;/p&gt;
&lt;h3 id=&#34;inevitability&#34;&gt;Inevitability&lt;/h3&gt;
&lt;p&gt;If we accept the premise that network states are inevitable because they are inherently superior to regular nation states, that doesn&amp;rsquo;t at all imply that any of the so-called benefits of network states would materialize. A lot of damage can be done while dismantling nation states without delivering on the good promises made by network state advocates. People can quite likely be very much worse off as problems not yet discovered manifest themselves after it&amp;rsquo;s too late to reverse.&lt;/p&gt;
&lt;p&gt;If network states are such a clear and obvious upgrade over nation states, what is preventing nation states from &lt;a href=&#34;https://libresolutions.network/articles/government-in-tech/&#34;&gt;augmenting themselves?&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;living-in-cyberspace&#34;&gt;Living in Cyberspace&lt;/h3&gt;
&lt;p&gt;There is quite a bit of focus on the immaterial. This is a fanciful distraction from what is taking place in the physical world. Why is there such a rush to capture more and more people into virtual reality prisons? We should ask what is taking place, that people would be forced to adapt to having no control over their actual lives that they must be satiated with surrogate digital activities. &amp;ldquo;Living in cyberspace&amp;rdquo; is a contradiction in terms, hence the emphasis on &lt;a href=&#34;https://youtu.be/yUYpJmk4zKQ&#34;&gt;tiny, cheap, modular homes&lt;/a&gt; for the people evicted from the physical world.&lt;/p&gt;
&lt;h1 id=&#34;solutions&#34;&gt;Solutions&lt;/h1&gt;
&lt;p&gt;The root of the issue when it comes to network states is the frame of mind. By doubling-down on the worst aspects of digitized society, people are pointed towards awful and avoidable directions. Instead of putting time and effort making human dependency work, try to imagine ways in which a people-first approach can keep cyberspace a distinct experience from our waking lives. It&amp;rsquo;s not hard to work to forge a new path, it just takes some creativity and persistence. Take responsibility for holding public and private institutions accountable for overreach, corruption, and fraud.&lt;/p&gt;
&lt;h3 id=&#34;refuse-and-reverse-the-digitization-of-society&#34;&gt;Refuse and Reverse the Digitization of Society&lt;/h3&gt;
&lt;p&gt;It does not matter how trivial or benign the application is, it&amp;rsquo;s clear that mandated use of technology is a recipe for disaster. Remember that it was not so long ago that everything was run with paper forms and correspondence in the mail. Institutions that serve us should be expected to have arrangements for those who choose to go without these intrusions.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://mastodon.social/@lrvick/112079059323905912&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/lance-vick-smartphone-healthcare.webp&#39; 
&gt;

&lt;/a&gt;



&lt;/div&gt;
&lt;p&gt;This is a situation where apathy and defeatism can do a lot of damage. We owe it to future generations not to burden them with shackles that many still do not even understand. You can start small, start with a local bank or a nearby provider. &lt;a href=&#34;https://corbettreport.com/solutionswatch-notcommunity/&#34;&gt;Getting together&lt;/a&gt; to ensure that opt-ing out of these systems is still an option, or making it an option once again is the principal way people reassert their autonomy online and in the real world.&lt;/p&gt;
&lt;h3 id=&#34;be-judicious-about-how-things-are-done&#34;&gt;Be Judicious about How Things are Done&lt;/h3&gt;
&lt;p&gt;There are excellent digital tools, and there are awful digital tools. In addition to this, &lt;a href=&#34;https://youtu.be/7ZSPf7YnGfE&#34;&gt;how they&amp;rsquo;re used&lt;/a&gt; matters a great deal. Just because you agree with the goals of a particular initiative, that doesn&amp;rsquo;t mean that all means to achieve it are desirable or effective. Take the time to understand the impacts, and downsides of particular tactics and methods. There are many things which may seem like a fantastic idea early on, that can have insidious effects after time.&lt;/p&gt;
&lt;p&gt;Ask questions of your allies and opponents alike. Consider alternate motivations and incentives. Raising your tolerance for those asking difficult questions goes a long way to make your mission sustainable, and accountable. Consider what your actual goals are, and if the means you&amp;rsquo;re taking are actually effective towards your ideal goal, or merely in service of someone else&amp;rsquo;s interests.&lt;/p&gt;
&lt;h3 id=&#34;free-minds-and-save-souls&#34;&gt;Free Minds and Save Souls&lt;/h3&gt;
&lt;p&gt;When one is alone, and justifiably fearful of what&amp;rsquo;s going on it&amp;rsquo;s very easy to fall for all kinds of self-destructive scams. Now more than ever it is crucial to recognize the assaults on people and have compassion for their struggles. Doing what we can to support each other and refuse to leave others behind is what can set us apart from those who seek to dominate and control others. Taking the time, in whatever way you can to alleviate fear and suffering can go a long way to directly undermine both analog and digital tyranny.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>A Warning about Network States with Hrvoje Morić</title>
		<link>https://libresolutions.network/videos/tnt-radio-network-states/</link>
		<pubDate>Mon, 11 Mar 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/tnt-radio-network-states/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/tnt-radio-mar-9.ogg" />
			
		
		<image>https://libresolutions.network//media/images/tnt-banner-2.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/tnt-banner-2.webp" />
		<itunes:image href="https://libresolutions.network//media/images/tnt-banner-2.webp" />
		<description>A discussion on TNT Radio</description>
		<content:encoded>&lt;p&gt;In anticipation of publishing a new &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy/&#34;&gt;tools of the technocracy&lt;/a&gt; article, I had a chat with Hrvoje on his show to talk about what I had learned watching through &lt;a href=&#34;https://youtu.be/x-GfuIFkB_Y&#34;&gt;The Network State Conference 2023&lt;/a&gt;. It&amp;rsquo;s clear that the entire concept of Network States as published in &lt;a href=&#34;https://thenetworkstate.com/&#34;&gt;The Network State&lt;/a&gt; and highlighted by the speakers, is at best an attempt to dress up an all-encompassing technocratic terror. At worst, it&amp;rsquo;s a declaration of a world-wide open bid on human surveillance and control. Sharing some initial thoughts for the discussion, follow up article in &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-12/&#34;&gt;Tools of the Technocracy #12&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;More episodes: &lt;a href=&#34;https://geopoliticsandempire.substack.com/s/hrvoje-moric-show-tnt-radio&#34;&gt;https://geopoliticsandempire.substack.com/s/hrvoje-moric-show-tnt-radio&lt;/a&gt;&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/network-state-banner.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-12/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #12 Network States&lt;/h2&gt;&lt;i&gt;The formalization of world-wide tyranny&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Attention Democracy with William Maggos</title>
		<link>https://libresolutions.network/videos/attention-democracy/</link>
		<pubDate>Wed, 06 Mar 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/attention-democracy/</guid>
		
		<image>https://libresolutions.network//media/images/attention-democracy-banner.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/attention-democracy-banner.webp" />
		<itunes:image href="https://libresolutions.network//media/images/attention-democracy-banner.webp" />
		<description></description>
		<content:encoded>&lt;p&gt;In a special converation you would have a hard time finding elsewhere, Gabriel joins William Maggos to discuss the fediverse, attention economy, and the Culture War. Taking a sober look at the very foundation of our media and online discussions, William Maggos introduces the concept of &lt;em&gt;attention democracy&lt;/em&gt;, where we can have a real impact on culture by choosing platforms that put people in charge of helping spread ideas and culture.&lt;/p&gt;
&lt;p&gt;Learn more about William Maggos&amp;rsquo; work at &lt;a href=&#34;https://culturewar.radio/&#34;&gt;Culture War Radio&lt;/a&gt;&lt;br&gt;
Follow &lt;a href=&#34;https://liberal.city/@wjmaggos&#34;&gt;@wjmaggos@liberal.city&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;The RSS Feed linked to the wrong video, this has been corrected&lt;/em&gt;&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>The EU Plan to Reshape the Internet Forever</title>
		<link>https://libresolutions.network/articles/government-in-tech/</link>
		<pubDate>Sun, 25 Feb 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/government-in-tech/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/eu-ngi.mp3" />
			
		
		<image>https://libresolutions.network//media/images/EU-NGI.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/EU-NGI.webp" />
		<itunes:image href="https://libresolutions.network//media/images/EU-NGI.webp" />
		<description>The old continent is bringing a sea of change.</description>
		<content:encoded>&lt;p&gt;The world wide web is no stranger to government control.  The Internet itself was created by the &lt;a href=&#34;https://www.theguardian.com/technology/2016/jul/15/how-the-internet-was-invented-1976-arpa-kahn-cerf&#34;&gt;US Military,&lt;/a&gt; and governments across the world have subsidized Internet infrastructure in all kinds of ways. Many factors, such as the economies of scale, and sheer workforce size give large organizations an immense advantage when it comes to shaping the future of cyberspace. Just as individuals struggle with troubles relating to digital privacy &amp;amp; security, so do large organizations and governments.&lt;/p&gt;

&lt;p&gt;In response, governments across the world are moving fast to address these concerns. With the motive and means to transform the fundamental elements that lay the foundation for our digital lives, a tidal wave of change is taking place and just beginning to accelerate. The winning move isn&amp;rsquo;t to challenge the whole tsunami directly, but rather to find the right waves that can carry us to where we would like to be. Indifference and apathy will certainly lead us to a similar place it took us all during the big tech era: to dependence and exploitation.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&amp;ldquo;I am not familiar with the history of how the Internet/tech companies have infiltrated my life&amp;ndash; I only know one day the past, the before Internet part of life was like in another galaxy, and I was forcibly acclimated into accepting an intrusive technology if I want to use the Internet or a &amp;ldquo;smart&amp;rdquo; phone.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;Written by a friend&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;If nothing else, this should be a reminder of the dire necessity to be vigilant of how governments and large corporations can shape cyberspace to tilt the balance of power against the public. Many governments like to be permissive in all the ways that don&amp;rsquo;t impact prioritized policy objectives, then turn brutal the moment public opinion starts to shift against those policies. As the digital world has taken hold over more and more aspects of our lives, now more than ever, we all need take responsibility for shielding ourselves and others from such abuses.&lt;/p&gt;
&lt;p&gt;Instead of continuing to let the web be dictated by American Tech Companies, Europe has a bold new strategy to plan, build, and &lt;em&gt;enforce&lt;/em&gt; a new vision for cyberspace. The European Union&amp;rsquo;s &lt;a href=&#34;https://www.ngi.eu/&#34;&gt;Next Generation Internet,&lt;/a&gt; or NGI for short, aims to terraform cyberspace to represent the values of their elite. This plan is explicitly aimed at changing the Internet not just for Europeans, but for the entire world as well.&lt;/p&gt;
&lt;h2 id=&#34;understanding-the-next-generation-internet&#34;&gt;Understanding the &amp;ldquo;Next Generation Internet&amp;rdquo;&lt;/h2&gt;
&lt;p&gt;If you take a look at &lt;a href=&#34;https://ngi.eu/wp-content/uploads/sites/48/2019/09/NGI-Brochure_A5_HR_FinalPrinted.pdf&#34;&gt;the brochure&lt;/a&gt;, it self-describes the plan as a &amp;ldquo;Human Internet for a better future&amp;rdquo;. Despite this, the document starts out making it explicitly clear that many technocratic ideals are directly woven into the plan. Surveillance, censorship, and more digital intrusion into our lives aren&amp;rsquo;t depicted as problems to be solved, but rather &lt;em&gt;responsibly managed&lt;/em&gt;.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;The Internet is the &lt;strong&gt;engine of digitisation of our society and our economy.&lt;/strong&gt;
As connectivity increases, the boundaries between the real and the digital world are blurring. With the explosion of the Internet of Things (IoT), multimedia content and social media,the Internet offers an unprecedented access to data and online services.&lt;br&gt;
&lt;strong&gt;Artificial intelligence helps to extract meaning from this data&lt;/strong&gt; and to embed autonomy and intelligence into networks, connected objects and services.
However, there has been an &lt;strong&gt;erosion of trust in the Internet&lt;/strong&gt; following revelations about the exploitation of personal data, large-scale cybersecurity and data breaches, and growing awareness of &lt;strong&gt;online disinformation.&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Do you feel the warm and fuzzy human feelings yet? To go further, this is an excellent example of &lt;strong&gt;&amp;ldquo;brokering legitimacy&amp;rdquo;&lt;/strong&gt;. Which is when advocates for solving a problem undermine their cause by carving out counter-productive exceptions to their principles. This process uses the very real concerns about privacy and security to justify more control. Effectively binding critics of the plan, because it&amp;rsquo;s leveraging the unjustifiable aspects of the status quo to dismantle the parts worth preserving.&lt;/p&gt;
&lt;p&gt;It is naive to believe that the European Union, which very recently pushed to &lt;a href=&#34;https://blog.mozilla.org/netpolicy/files/2023/11/eIDAS-Industry-Letter.pdf&#34;&gt;backdoor everyone&amp;rsquo;s web traffic,&lt;/a&gt; is somehow sincerely interested in the privacy or even security of their citizens. I can wholeheartedly believe that European governments are very concerned about &lt;a href=&#34;https://www.iccl.ie/wp-content/uploads/2023/11/Europes-hidden-security-crisis.pdf&#34;&gt;&lt;em&gt;their own security&lt;/em&gt;&lt;/a&gt; from the public, Big Tech, and foreign entities alike. As &lt;a href=&#34;https://libresolutions.network/tags/cyberwar/&#34;&gt;cyberwars escalate&lt;/a&gt; moves are required to innovate not just their own systems, but to &lt;a href=&#34;https://www.justice.gov/opa/pr/justice-department-conducts-court-authorized-disruption-botnet-controlled-russian&#34;&gt;make changes&lt;/a&gt; to the systems that their citizens use as well. The following quote is from the &lt;a href=&#34;https://youtu.be/qeo7oJGxX7o&#34;&gt;Next Generation Internet Policy Summit in 2020&lt;/a&gt;, I find it exemplary of the kind of spirit that animates the initiative.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://libresolutions.network/media/text/NGI-Anu-Bradford.txt&#34;&gt;[Relevant Transcript]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;In the name of resolving a wide variety of issues created by the US Government and American Tech companies, Europe is working to consolidate information control over the Internet. In hindsight, it appears that the laissez-faire approach governments took with large tech companies was to merely buy time while more sophisticated digital surveillance techniques were built up. Hence the desire for rapid &lt;strong&gt;regulatory and technological &lt;em&gt;innovation&lt;/em&gt;&lt;/strong&gt; emphasized in the above quote.&lt;/p&gt;
&lt;p&gt;In late 2019 &lt;a href=&#34;https://ar.al/&#34;&gt;Aral Balkan&lt;/a&gt; spoke with the &lt;a href=&#34;https://ar.al/2019/11/29/the-future-of-internet-regulation-at-the-european-parliament/&#34;&gt;European Parliament&lt;/a&gt;. Raising many important points, he pleaded with them to kill &amp;lsquo;surveillance capitalism&amp;rsquo;. The &lt;a href=&#34;https://video.lqdn.fr/w/hyvebph9MEGdCJGME4niAh&#34;&gt;video&lt;/a&gt; is absolutely worth watching to get an understanding of how where we are bridges to where the European Union would like to go.&lt;/p&gt;
&lt;iframe src=&#39;https://video.lqdn.fr/videos/embed/861c07f7-7e9b-4e64-9765-cf1de592c8a0?subtitle=en&#39; style=&#34;height:max-content;aspect-ratio: 16/9;min-height:460px;max-height:15rem;max-width:60rem;&#34; width=&#34;100%&#34; height=&#34;100%&#34;&gt;

&lt;/iframe&gt;
&lt;blockquote&gt;
&lt;p&gt;[Regarding citing Facebook]&lt;/p&gt;
&lt;p&gt;If this is the presumption under which you are regulating the Internet,
I despair about the future of human rights and about the future of our democracy.&lt;/p&gt;
&lt;p&gt;&amp;hellip;&lt;/p&gt;
&lt;p&gt;You&amp;rsquo;re going blindly towards a Silicon Valley model, I don&amp;rsquo;t know why you&amp;rsquo;re doing this.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;In short, Aral seems unconvinced that the EU will actually go far enough to radically support citizen&amp;rsquo;s digital autonomy and is instead trying to import aspects of the big tech control regime under state control. It&amp;rsquo;s hard to disagree with that perspective, and he exemplifies what actual opposition to these problems looks like.&lt;/p&gt;
&lt;p&gt;As frustrating as some aspects of the Next Generation Internet vision are, it is to the EU&amp;rsquo;s credit that this is a massive transparent undertaking. Much of it is not only open public knowledge, but features initiatives in which open participation is encouraged. This appears to be the case largely because the concerns around censorship and paternalism seem to be more broadly socially accepted in Europe, a critical sign that social acceptance of censorship is what entrenches it. The way in which the &lt;a href=&#34;https://www.campfire.wiki/doku.php?id=next_generation_internet&#34;&gt;Next Generation Internet&lt;/a&gt; is being rolled out is very effective at neutralizing any outright opposition, to the degree it is even possible. It is easy to see how such sweeping and extreme transformations made in other domains would use a similar model.&lt;/p&gt;
&lt;p&gt;It is a foolish and dangerous mistake to fall into the trap of thinking governments are entirely comprised of out-of-touch bureaucrats with no understanding of technology. In fact, these reforms are being drawn up by people with an incredibly high level of understanding that is quite difficult to match, independent reformers (&lt;em&gt;if there truly are any&lt;/em&gt;) are at a serious disadvantage.&lt;/p&gt;
&lt;h2 id=&#34;fully-embracing-open-source&#34;&gt;Fully Embracing Open Source&lt;/h2&gt;
&lt;p&gt;One of the advantages the European Union has, is that they have recognized the immense opportunity of actually leaning into the open source development model. While North America bickers about &lt;a href=&#34;https://www.forbes.com/sites/williamarruda/2024/02/20/how-the-in-office-vs-remote-debate-is-shaping-the-future-of-work/&#34;&gt;remote work and commercial office space&lt;/a&gt;, the EU is harnessing the power of efficient decentralized work. By taking the &amp;ldquo;build it and they will come&amp;rdquo; approach, they are entirely out-maneuvering competitors with a treasure-trove of opportunity that has been laying dormant in people&amp;rsquo;s apathy and defeatism for over a decade.&lt;/p&gt;
&lt;p&gt;The &lt;a href=&#34;https://www.campfire.wiki/doku.php?id=nlnet_foundation&#34;&gt;NLnet Foundation&lt;/a&gt; funds a wide variety of Open Source projects and tools that fit within the Next Generation Internet vision. This is good in some ways, notably that many of &lt;a href=&#34;https://www.campfire.wiki/doku.php?id=nlnet_foundation&#34;&gt;these projects&lt;/a&gt; are Free Software, which means that if things do go wrong, at least people can modify the projects for their own needs. One does have to wonder what the exact terms of the agreement are, and what &amp;lsquo;carrots and sticks&amp;rsquo; are used to ensure compliance.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/ngi-funding.webp&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;Such explicit means may not be necessary however. It&amp;rsquo;s entirely possible that this is merely a circumstance where both governments and individuals have aligned interests to resist foreign surveillance and control. When it comes to how the Internet is currently controlled, it&amp;rsquo;s not always individual software itself that&amp;rsquo;s the culprit. While Google/Apple/Facebook may be reading your messages, there are other ways to achieve the same goals.&lt;/p&gt;
&lt;p&gt;Open standards, protocols, and Free Software are all things that benefit everyone. The degree of benefit will naturally vary on the nature, purpose and quality of the project. It is critical that people seize the opportunity created from this deluge of resources being thrown into making useful software. To be clear, the NGI vision absolutely includes a lot of genuinely good ideas and solutions that should be taken seriously. It also supports many excellent and important projects that shouldn&amp;rsquo;t be seen as &amp;rsquo;tainted&amp;rsquo; simply due to association with this initiative.&lt;/p&gt;
&lt;p&gt;Like similar initiatives, I believe many of these projects are selected because it is clearly an elegant and efficient way to achieve particular goals. One would hopefully understand that many technologies, but especially digital technologies can be used for good, evil, and everything in-between. An example worth pointing out is &lt;a href=&#34;https://garagehq.deuxfleurs.fr/&#34;&gt;garage&lt;/a&gt; which appears to be building a highly-performant file storage server that organizations and individuals alike can both use for particular purposes. Naturally, there are some aspects which will benefit larger organizations more, but that will vary from project to project.&lt;/p&gt;
&lt;p&gt;To be clear, I still fully intend to use and support &lt;a href=&#34;https://www.ngi.eu/funded_solution/peertube/&#34;&gt;PeerTube&lt;/a&gt; and &lt;a href=&#34;https://www.ngi.eu/funded_solution/misskey/&#34;&gt;Misskey&lt;/a&gt; for the foreseeable future, despite them both being supported, along with wider support for the &lt;a href=&#34;https://libresolutions.network/tags/fediverse&#34;&gt;fediverse&lt;/a&gt;. I am very concerned that EU funding many excellent (and important) FOSS projects will be used by people with different agendas to undermine Free Software generally.&lt;/p&gt;
&lt;p&gt;It would be all-too-easy for private companies to start selling unverifiable software-suites in the name of promising you &amp;ldquo;&lt;em&gt;real security with none of that open-source stuff&lt;/em&gt;&amp;rdquo;. Falling for that kind of &lt;a href=&#34;https://libresolutions.network/articles/redirecting-resistance/&#34;&gt;affinity scam&lt;/a&gt; is how you end up falling for things like the so-called &lt;a href=&#34;https://www.cnet.com/tech/mobile/freedom-phone-the-ultimate-political-tool-and-why-you-should-avoid-it/&#34;&gt;&amp;quot;&lt;em&gt;Freedom Phone&lt;/em&gt;&amp;quot;&lt;/a&gt; which inevitably includes a lot of open source tools because they&amp;rsquo;re just outright better than what most people can achieve in their own time. Simplistic, binary thinking is what sabotages serious and meaningful reform. Even worse it can very often enable the worst aspects of the project by allowing them to be justified by the important parts of the initiative.&lt;/p&gt;
&lt;h2 id=&#34;velvet-glove-iron-fist&#34;&gt;Velvet Glove, Iron Fist&lt;/h2&gt;
&lt;p&gt;Just because there is good to be done, that doesn&amp;rsquo;t mean there aren&amp;rsquo;t rough edges to be concerned about. Keeping in mind that the primary motivation for the Next Generation Internet has more to do with protecting governments from the people rather than the other way around. With decades of surveillance scandals, censorship, and corruption there are good reasons to consider not further empowering governments through digital systems and tools.&lt;/p&gt;
&lt;p&gt;Another serious concern one should consider is that the NGI project is very much a Covid Crisis era initiative. &lt;a href=&#34;https://dapsi.ngi.eu/&#34;&gt;NGI Dapsi&lt;/a&gt; which did support an excellent project like &lt;a href=&#34;https://dapsi.ngi.eu/hall-of-fame/postmarketos/&#34;&gt;PostmarketOS&lt;/a&gt; for linux phones, also sponsored the creation of a &lt;a href=&#34;https://www.campfire.wiki/doku.php?id=vaccine_passport&#34;&gt;vaccine passport&lt;/a&gt; candidate, the &lt;a href=&#34;https://dapsi.ngi.eu/hall-of-fame/dip/&#34;&gt;Digital Immunization Passport&lt;/a&gt;. &lt;a href=&#34;https://brownstone.org/articles/Internet-censorship-everywhere-all-at-once/&#34;&gt;Information control initiatives&lt;/a&gt; such as tracking and combating so-called misinformation and disinformation, are very much a foundational principle of the EU&amp;rsquo;s strategic priorities.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://ngi.eu/wp-content/uploads/sites/48/2019/09/NGI-Brochure_A5_HR_FinalPrinted.pdf&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/ngi-projects.webp&#39; 
&gt;

&lt;/a&gt;



&lt;/div&gt;
&lt;p&gt;In early 2020, The European Commission published their &lt;a href=&#34;https://commission.europa.eu/document/download/ba32bdc7-9324-4eee-b9b3-3d91ad16ce00_en?filename=cnect_sp_2020_2024_en.pdf&#34;&gt;Strategic plan for 2020-2024&lt;/a&gt;. The strategic plan outlined &amp;ldquo;A Europe Fit for the Digital Age&amp;rdquo;, with 6 specific objectives:&lt;/p&gt;
&lt;blockquote&gt;
&lt;ol&gt;
&lt;li&gt;Europe&amp;rsquo;s strategic autonomy is ensured in critical technology areas&lt;/li&gt;
&lt;li&gt;European &lt;strong&gt;single market for data&lt;/strong&gt; where data can flow for the benefit of all and where rules for access and use of data are fair, practical and clear&lt;/li&gt;
&lt;li&gt;Artificial intelligence that is human-centric, ethical, sustainable and that respects EU values&lt;/li&gt;
&lt;li&gt;A fair, competitive and resource efficient digital economy&lt;/li&gt;
&lt;li&gt;A cyber resilient Europe, &lt;strong&gt;promoting digital identities for all&lt;/strong&gt; Europeans, while protecting their e-privacy&lt;/li&gt;
&lt;li&gt;A modern, open and pluralistic society in the digital age &lt;strong&gt;where online disinformation is countered&lt;/strong&gt; and diverse cultural content is available to all Europeans&lt;/li&gt;
&lt;/ol&gt;
&lt;/blockquote&gt;
&lt;p&gt;Objective 1 makes it exceedingly clear why so many resources have been put into great software that actually works well. The EU, unlike the &lt;a href=&#34;https://www.cbc.ca/news/politics/trudeau-says-rules-not-followed-arrivecan-1.7120318&#34;&gt;Canadian government&lt;/a&gt;, actually understands how to get meaningful results. With a strong desire to actually augment their national digital sovereignty, better privacy tools are sorely needed.&lt;/p&gt;
&lt;p&gt;Objective 2 is arguably the most interesting. It seems that the EU intends to become the single broker for all of Europe&amp;rsquo;s data. This is a fascinating (if not outright terrifying) concept, and is effectively the legalization of domestic mass surveillance. It is clear that the level of intrusion will be determined by how the EU leadership decides the benefits they receive outweigh the risks to the public.&lt;/p&gt;
&lt;p&gt;Objective 3 is just an outright fanciful delusion at best and a desire to single-handedly regulate away general-purpose computing at worst. One has to wonder if the &amp;ldquo;EU values&amp;rdquo; referenced in the documentation represent values of the European public or values that are being &lt;em&gt;imposed&lt;/em&gt; on them.&lt;/p&gt;
&lt;p&gt;Objectives 4,5,6 greatly enhance state control over the Internet and where it reaches into public life. After decades of American administrations using &amp;ldquo;national security&amp;rdquo; as a pretext for all kinds of abuses, it&amp;rsquo;s high time we understand that national sovereignty doesn&amp;rsquo;t quite mean what it used to. From everything we have seen, it is clear that this vision is entirely about protecting the European Union&amp;rsquo;s political structure rather than it&amp;rsquo;s people.&lt;/p&gt;
&lt;h2 id=&#34;conclusion&#34;&gt;Conclusion&lt;/h2&gt;
&lt;p&gt;Despite many people being seriously concerned about hostile governments working to destroy the Internet, surprisingly little attention has been paid to the European Union. Many significant regulations have already been put into place and it seems that they are only the beginning. It is understandable, if not outright laudable, for the EU to take it&amp;rsquo;s digital sovereignty seriously. It is however, our role to ensure that we are doing what we can to ensure those gains aren&amp;rsquo;t at the expense of people&amp;rsquo;s ability to dissent or otherwise participate in society.&lt;/p&gt;
&lt;p&gt;Learn about Free Software, learn how to contribute to open source, these models are already clearly demonstrated to be the most efficient way forward on a wide variety of issues. This doesn&amp;rsquo;t automatically mean that everything that is made that way is wholly benign. It means that &lt;strong&gt;our participation matters&lt;/strong&gt;. What we do to decide how we build our tools and how they are used are vitally important concerns. The devil is in the details, as they say. The last thing I want to see, is people sharing this post to say &amp;ldquo;X project is funded under the NGI, so therefore it&amp;rsquo;s bad!&amp;rdquo; in a bizarre &lt;a href=&#34;https://www.kitklarenberg.com/p/signal-facing-collapse-after-cia&#34;&gt;knee-jerk reaction&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Anyone who even partially understands the state of online mass surveillance is keenly aware that the problem is larger than any single project or tool. We should absolutely be concerned about the state and future of projects that are entirely dependent on the EU for funding, but we have a role in this too. If we aren&amp;rsquo;t proactively focused on &lt;a href=&#34;https://libresolutions.network/operations/bankroll/&#34;&gt;supporting development ourselves&lt;/a&gt; we can hardly expect for it to be built out of nothing.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Digital Autonomy &amp; The Arts with Hunter Stabler</title>
		<link>https://libresolutions.network/videos/arts6/</link>
		<pubDate>Sun, 18 Feb 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/arts6/</guid>
		
		<image>https://libresolutions.network//media/images/arts6-banner.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/arts6-banner.webp" />
		<itunes:image href="https://libresolutions.network//media/images/arts6-banner.webp" />
		<description>Part 6: Exploring tools and the social landscape</description>
		<content:encoded>&lt;p&gt;Thrilled to have had an excellent conversation with &lt;a href=&#34;https://hunterstabler.com&#34;&gt;Hunter Stabler&lt;/a&gt; about digital autonomy and the arts. We spoke about many different topics, ranging from Free Software, community, and the broader impact of social media. It was a pleasure to connect with somebody who’s taken many steps towards reclaiming their digital autonomy, and has such incredible talent.&lt;/p&gt;
&lt;p&gt;You can take a look at Hunter’s creations on &lt;a href=&#34;https://pixelfed.social/hunter_stabler&#34;&gt;his Pixelfed.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;We share an affinity for &lt;a href=&#34;https://www.blender.org/&#34;&gt;Blender&lt;/a&gt; &lt;a href=&#34;https://antennapod.org/&#34;&gt;Antennapod&lt;/a&gt; and &lt;a href=&#34;https://xmpp.org/&#34;&gt;XMPP&lt;/a&gt;. Hunter has put together a CNC machine and likes to create with Free Software where possible. Adding that we need to all find ways to collaborate and work together to solve problems of education, outreach, and support.&lt;/p&gt;
&lt;h3 id=&#34;links-discussed&#34;&gt;Links Discussed&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://brownstone.org/articles/the-responsibility-of-intellectuals-2-0&#34;&gt;The Responsibility of Intellectuals 2.0&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://nationalcitizensinquiry.ca/testimony/&#34;&gt;National Citizens Inquiry Testimony&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.salon.com/2024/01/09/impossible-openai-admits-chatgpt-cant-exist-without-pinching-copyrighted-work/&#34;&gt;&amp;ldquo;Impossible&amp;rdquo;: OpenAI admits ChatGPT can&amp;rsquo;t exist without pinching copyrighted work&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://apnews.com/article/ai-generated-election-deepfakes-munich-accord-meta-google-microsoft-tiktok-x-c40924ffc68c94fac74fa994c520fc06&#34;&gt;Tech companies sign accord to combat AI-generated election trickery&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://libresolutions.network/operations/bankroll/&#34;&gt;Operation: Bankroll&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.wired.com/story/air-canada-chatbot-refund-policy/&#34;&gt;Air Canada Has to Honor a Refund Policy Its Chatbot Made Up&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;a-taste-of-freedom-libre-hosters&#34;&gt;A Taste of Freedom: Libre Hosters&lt;/h3&gt;
&lt;p&gt;A very important topic highlighted in this discussion was how somebody without much time or resources can get started with using excellent Free and Open Source Software. One way to become familiar with self-hostable services is to try them out with an online community that provides them.&lt;/p&gt;
&lt;p&gt;Of course, since you are a guest on somebody else&amp;rsquo;s infrastructure it&amp;rsquo;s important to be a good digital citizen and respect their rules and culture while using their services. Of course, if you&amp;rsquo;re an experienced self-hoster with spare resources, consider becoming your own libre hoster for others!&lt;/p&gt;
&lt;p&gt;Here are some examples:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://disroot.org/en&#34;&gt;Disroot&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://libreops.cc/&#34;&gt;LibreOps&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://weho.st/&#34;&gt;weho.st&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Browse others at the &lt;a href=&#34;https://libreho.st/&#34;&gt;libre hosters directory&lt;/a&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;This conversation took place over the &lt;a href=&#34;https://fsf.org&#34;&gt;Free Software Foundation&lt;/a&gt;&amp;rsquo;s &lt;a href=&#34;https://jitsi.member.fsf.org/&#34;&gt;Jitsi Instance&lt;/a&gt;. Consider &lt;a href=&#34;https://fsf.org/donate&#34;&gt;becoming a member&lt;/a&gt; to support Free Software, and gain acess to numerous member&amp;rsquo;s benefits, including an XMPP account. &lt;a href=&#34;https://obsproject.com/&#34;&gt;OBS Studio&lt;/a&gt; was used to record the conversation, and cleanup/edits were done in blender and &lt;a href=&#34;https://www.audacityteam.org/&#34;&gt;audacity&lt;/a&gt;.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Pushing Back against Surveillance and Control with Hrvoje Morić</title>
		<link>https://libresolutions.network/videos/hrvoje-moric-show-feb-2024/</link>
		<pubDate>Fri, 16 Feb 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/hrvoje-moric-show-feb-2024/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/2024-Feb-TNT-Radio.mp3" />
			
		
		<image>https://libresolutions.network//media/images/tnt-radio.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/tnt-radio.webp" />
		<itunes:image href="https://libresolutions.network//media/images/tnt-radio.webp" />
		<description>Delving into the crucial issues impacting people&#39;s digital autonomy.</description>
		<content:encoded>&lt;p&gt;Early this month, Hrvoje and I had a conversation about how governments and corporations are tightening their grip over the information landscape. We discussed some of my latest work, and it was an excellent opportunity to add some finer detail to points that come up often. Near the end, we talk about the &lt;a href=&#34;https://cjhopkins.substack.com/p/the-verdict&#34;&gt;war on dissent&lt;/a&gt; in Germany. It’s important to note that the acquittal of CJ Hopkins &lt;a href=&#34;https://cjhopkins.substack.com/p/the-resistible-rise-of-the-new-normal&#34;&gt;is being appealed&lt;/a&gt; by the German government. Reiterating the importance for us to rally around the importance of Free Speech and Expression in the face of totalitarianism.&lt;/p&gt;

💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>SoundCloud Censors Geopolitics and Empire</title>
		<link>https://libresolutions.network/articles/geopolitics-and-empire-censored/</link>
		<pubDate>Fri, 26 Jan 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/geopolitics-and-empire-censored/</guid>
		
		<image>https://libresolutions.network//media/images/soundcloud-hrvoje.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/soundcloud-hrvoje.webp" />
		<itunes:image href="https://libresolutions.network//media/images/soundcloud-hrvoje.webp" />
		<description>Understanding corporate censorship, and what can be done about it</description>
		<content:encoded>&lt;blockquote&gt;
&lt;p&gt;So I have been a loyal customer to Germany-based SoundCloud since 2015, where my podcast has been hosted&amp;hellip;and now they have finally jumped on the censorship bandwagon&amp;hellip;by deleting one of my interviews from a year ago. &lt;strong&gt;Are there any censorship-resistant podcast hosting providers left?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The censored interview: &lt;a href=&#34;https://geopoliticsandempire.com/2023/02/14/christie-grace-big-pharma-wants-to-force-biologics-on-us&#34;&gt;https://geopoliticsandempire.com/2023/02/14/christie-grace-big-pharma-wants-to-force-biologics-on-us&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://t.me/GeopoliticsAndEmpire/43908&#34;&gt;Geopolitics and Empire on Telegram&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;This particular interview being censored is very notable to me. I was dissapointed to see that an episode of &lt;a href=&#34;https://geopoliticsandempire.com/&#34;&gt;Geopolitics and Empire&lt;/a&gt; was removed, but when I noticed which specific interview was removed it certainly raised an eyebrow. I&amp;rsquo;ve only had a passing awareness of Christie Grace&amp;rsquo;s work, with much of it &lt;a href=&#34;https://christiegrace.substack.com/&#34;&gt;going over my head.&lt;/a&gt; The thing I find specifically concerning is that there is a pattern of those with substantially higher-effort &lt;a href=&#34;https://roundingtheearth.substack.com/p/lies-and-gaslighting-over-the-military&#34;&gt;investigative work&lt;/a&gt; being &lt;em&gt;sidelined&lt;/em&gt; in favor of those who can meet the demand for simple and inflammatory rhetoric.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://x.com/_HeartofGrace_/status/1719904020796449057&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/christie-censored.webp&#39; 
&gt;

&lt;/a&gt;


&lt;p class=&#34;caption&#34;&gt;
    Not cool at all. 
&lt;/p&gt;


&lt;/div&gt;
&lt;p&gt;When it first read her tweet I was stunned. Stunned that someone would have the audacity to demand a domain expert to &lt;em&gt;coach them&lt;/em&gt; how to present ideas instead of&amp;hellip; letting her speak to her expertise and answer questions. There&amp;rsquo;s undeniably a sexist angle to this, as such I also worry that this may be more common than one would expect. It&amp;rsquo;s a tragic mis-allocation of resources for those taking the time to actually put together potentially life-saving information to be maligned by those operating under the premise that it&amp;rsquo;s all &lt;em&gt;just business&lt;/em&gt;. This makes it explicitly clear that what our governments and mega-corporations fear the most is ordinary people choosing for themselves who and what to platform, rather than allowing intermediaries to shape any and all discussions.&lt;/p&gt;
&lt;h2 id=&#34;the-attention-economy-is-the-problem&#34;&gt;The Attention Economy is the Problem.&lt;/h2&gt;
&lt;p&gt;It&amp;rsquo;s really easy for someone to dunk on Hrvoje for using soundcloud. &lt;em&gt;You should be hosting it yourself silly!&lt;/em&gt; Right? That &lt;em&gt;sounds like useful information&lt;/em&gt;, but is naive at best and arrogant at worst in the face of &lt;a href=&#34;https://libresolutions.network/articles/broken-internet/&#34;&gt;infrastructure-level de-platforming.&lt;/a&gt; It is certainly possible for an individual to run a multimedia project as a passion project out of pocket, but the more hurdles that are thrown in the way, the fewer will actually manage to take part.&lt;/p&gt;
&lt;p&gt;It may seem like an &lt;a href=&#34;https://www.youtube.com/watch?v=akeRz7ouICQ&#34;&gt;extreme position&lt;/a&gt; to some, but it is clear that the industry built around supporting media with advertisements is fundamentally malignant. A smaller industry would not be able to get away with &lt;a href=&#34;https://avoidthehack.com/ads-cybersecurity-risk&#34;&gt;infecting users with malware&lt;/a&gt; and &lt;a href=&#34;https://www.iccl.ie/wp-content/uploads/2023/11/Europes-hidden-security-crisis.pdf&#34;&gt;operating as a 24/7 continuous data breach&lt;/a&gt;.&lt;/p&gt;
&lt;h3 id=&#34;we-are-not-powerless&#34;&gt;We are NOT Powerless.&lt;/h3&gt;
&lt;p&gt;Blocking advertisements just makes sense, but to go even further we must explore more democratized and meritocratic ways of hosting, distributing, and sharing multimedia. The Free and Open Web is a beautiful thing, and despite many efforts to seize control over it we can still decide to &lt;a href=&#34;https://libresolutions.network/tech/reclaiming-cyberspace/&#34;&gt;reclaim territory in cyberspace&lt;/a&gt; and make our mark on history.&lt;/p&gt;
&lt;h2 id=&#34;what-is-podcast-hosting&#34;&gt;What is Podcast Hosting?&lt;/h2&gt;
&lt;p&gt;Podcast hosting is a service that stores media files (either audio clips or video) and that allows for various podcast applications or apps to download and play media. Podcasting had its &lt;a href=&#34;https://podnews.net/article/first-podcast-feed-history&#34;&gt;origin in RSS Feeds&lt;/a&gt; and sadly many &amp;ldquo;podcasts&amp;rdquo; stray from this open standard that really began a new independent media revolution. By allowing people to upload media for free, the platform seizes control over the content that is stored on it. If you&amp;rsquo;re lucky, the platform still publishes an RSS feed instead of relying on centralized indexing services.&lt;/p&gt;
&lt;p&gt;A podcast itself is very simple. It&amp;rsquo;s a collection of video and/or audio files with a file that is &lt;strong&gt;machine-readable&lt;/strong&gt; as in it&amp;rsquo;s very simple for a program to parse the information and use it as needed. A slimmed-down example of what this file would look like is this:&lt;/p&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;-webkit-text-size-adjust:none;&#34;&gt;&lt;code class=&#34;language-xml&#34; data-lang=&#34;xml&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#f92672&#34;&gt;&amp;lt;rss&lt;/span&gt; &lt;span style=&#34;color:#a6e22e&#34;&gt;version=&lt;/span&gt;&lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34;2.0&amp;#34;&lt;/span&gt;&lt;span style=&#34;color:#f92672&#34;&gt;&amp;gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#f92672&#34;&gt;&amp;lt;channel&amp;gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        &lt;span style=&#34;color:#f92672&#34;&gt;&amp;lt;title&amp;gt;&lt;/span&gt;Example Podcast&lt;span style=&#34;color:#f92672&#34;&gt;&amp;lt;/title&amp;gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        &lt;span style=&#34;color:#f92672&#34;&gt;&amp;lt;link&amp;gt;&lt;/span&gt;https://example.com/podcast&lt;span style=&#34;color:#f92672&#34;&gt;&amp;lt;/link&amp;gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        &lt;span style=&#34;color:#f92672&#34;&gt;&amp;lt;item&amp;gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#f92672&#34;&gt;&amp;lt;title&amp;gt;&lt;/span&gt;Episode 1&lt;span style=&#34;color:#f92672&#34;&gt;&amp;lt;/title&amp;gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#f92672&#34;&gt;&amp;lt;link&amp;gt;&lt;/span&gt;https://example.com/podcast/episode-1&lt;span style=&#34;color:#f92672&#34;&gt;&amp;lt;/link&amp;gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;            &lt;span style=&#34;color:#f92672&#34;&gt;&amp;lt;enclosure&lt;/span&gt; &lt;span style=&#34;color:#a6e22e&#34;&gt;url=&lt;/span&gt;&lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34;/episode.mp3&amp;#34;&lt;/span&gt; &lt;span style=&#34;color:#f92672&#34;&gt;/&amp;gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;        &lt;span style=&#34;color:#f92672&#34;&gt;&amp;lt;/item&amp;gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;    &lt;span style=&#34;color:#f92672&#34;&gt;&amp;lt;/channel&amp;gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#f92672&#34;&gt;&amp;lt;/rss&amp;gt;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;The file outlines the title and description for the show, as well as a link to where each audio/video clip is stored. Distilled down to this level, a podcast is quite similar to a &lt;a href=&#34;https://libresolutions.network/articles/best-website-for-you/&#34;&gt;static web site&lt;/a&gt; designed for a different kind of application interface. It&amp;rsquo;s pure data that can be stored in a large variety of ways. This means that any simple, inexpensive web hosting can be used to host a podcast. As the size of it grows, you may want to consider how you&amp;rsquo;re purchasing storage, and maybe using something like object storage can help you reduce costs.&lt;/p&gt;
&lt;h3 id=&#34;podcasting-20&#34;&gt;Podcasting 2.0&lt;/h3&gt;
&lt;p&gt;By wholeheartedly embracing this, Adam Curry (aka &amp;ldquo;The Podfather&amp;rdquo;), co-creator of the podcast &lt;a href=&#34;https://www.youtube.com/watch?v=lxLqBZ2MwCA&#34;&gt;has started&lt;/a&gt; an exciting initiative called Podcasting 2.0. This initiative aims to expand the RSS format to include additional features that many &amp;ldquo;podcast&amp;rdquo; platforms refused to adopt. These features include donation links, chapters, and even transcripts. By expanding the RSS format with the &amp;ldquo;podcast namespace&amp;rdquo; Podcasting 2.0 allows for anyone to immediately take advantage of the latest and greatest features using &lt;a href=&#34;https://podcastindex.org/apps?appTypes=open+source&amp;amp;elements=Chapters&#34;&gt;open source software!&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;sharing-is-caring&#34;&gt;Sharing is Caring&lt;/h3&gt;
&lt;p&gt;Censorship resistance is only part of the story. It is down to all of us as individuals to take a proactive role in helping get the word out for independent voices that take the time to make room for conversations that need to happen. Censorship thrives as long as there is tolerance for it, making a deliberate choice to amplify those who are suppressed is a very effective way to counteract it.&lt;/p&gt;
&lt;h3&gt;&lt;/h3&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>New Website: Cyberfreedom.ca</title>
		<link>https://libresolutions.network/articles/building-a-beehive/</link>
		<pubDate>Sun, 21 Jan 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/building-a-beehive/</guid>
		
		<image>https://libresolutions.network//media/images/honeycomb.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/honeycomb.webp" />
		<itunes:image href="https://libresolutions.network//media/images/honeycomb.webp" />
		<description>Let&#39;s get down to business</description>
		<content:encoded>&lt;p&gt;There&amp;rsquo;s something very powerful about splitting up a huge task into tiny pieces and making it easy for people to work on the particular chunks. In hopes to demonstrate how this is done, &lt;a href=&#34;https://cyberfreedom.ca&#34;&gt;cyberfreedom.ca&lt;/a&gt; is now launched to demonstrate &lt;a href=&#34;https://libresolutions.network/operations/beehive/&#34;&gt;Operation: Beehive&lt;/a&gt;. It is still very much a work in progress, but the seed is planted. A lot of basic questions need to be answered, but there&amp;rsquo;s lots to come!&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/honeycomb.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/operations/beehive&#34;  &gt;&lt;h2&gt;Operation: Beehive&lt;/h2&gt;&lt;i&gt;A model for highly productive decentralized work.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h2 id=&#34;what-is-cyberfreedomca&#34;&gt;What is Cyberfreedom.ca?&lt;/h2&gt;
&lt;p&gt;Canadian Cyber Freedom is intended to be a resource for Canadians to identify legislative attacks on their digital autonomy and privacy. The site is a beehive because it&amp;rsquo;s using a version-control system &lt;strong&gt;git&lt;/strong&gt; to manage changes. Once changes are accepted, they are automatically integrated with the site. Anyone is free to clone &lt;a href=&#34;https://code.gabe.rocks/gabriel/cyberfreedom&#34;&gt;the repository&lt;/a&gt; and start making their own changes. Once they&amp;rsquo;ve published their version of the repository (or sent it directly) their updates can be integrated into the project.&lt;/p&gt;
&lt;p&gt;The idea of keeping up with, and extensively detailing all the ways in which the government of Canada is working to undermine Canadians digital liberty is overwhelming. The hope is to recruit motivated volunteers to assist with building a resource that will help Canadians engage with their representatives to turn the tide in favor of liberty. While total success would be wonderful, even enough engagement to demonstrate the tactic would go a long way to change the game.&lt;/p&gt;
&lt;h3 id=&#34;why-all-the-fuss&#34;&gt;Why all the fuss?&lt;/h3&gt;
&lt;p&gt;Many hands make light work. The ability to get many people working together in a decentralized way is severely underestimated. The goal is to exemplify a process that with a little learning, allows everyone to maximize their own ability to contribute to larger projects.&lt;br&gt;
The major challenges are two-fold:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;The project has to be deliberately setup with this kind of workflow in mind. Some data formats or ways of managing information become much more complicated as projects gain participants or become larger.&lt;/li&gt;
&lt;li&gt;It does require a bit of learning on the behalf of volunteers, in exchange for learning a useful skill, they&amp;rsquo;re able to build things that would be impossible for individuals.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;On the other hand, there are also many advantages:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Anti-Fragile Information Sharing&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s a lot harder to suppress information when a variety of people have a copy of it, that can be easily shared over many different mediums.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Highly Scalable&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The more people who get involved, the more can get done quickly&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Inherently Self-Hosted and Offline-First&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s all just managing information, there is no requirement to use websites or services at all. They&amp;rsquo;re just convenient for access and sharing.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Optimal Trust&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;You may want the ability for people to contribute without necessarily trusting them with keys to the kingdom. Using git allows you to pull changes from anyone without having to give them control over your project.&lt;/p&gt;
&lt;p&gt;Once you do want to trust collaborators to help you manage the project, it&amp;rsquo;s as simple as creating an account on your forge for them, and setting up permissions to the repository.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Division of Labor&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The beehive model allows for tech people to focus on tech things (such as site hosting and configuration) while contributors can focus on their areas of expertise such as writing, editing, translation, or creating multimedia content.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;what-can-be-accomplished&#34;&gt;What can be Accomplished?&lt;/h3&gt;
&lt;p&gt;Demonstrating how to decentralize collaboration online and offline is a phenomenal asset to those who wish to endure and oppose total top-down control. The goal is to primarily demonstrate how a task that appears to be too large to take on can be relatively simply transformed into a goldmine of opportunity for all involved. If this process was better understood, the broader community could adopt this model towards creating resources for other kinds of important issues.&lt;/p&gt;
&lt;p&gt;Of course, it would be wonderful if &lt;a href=&#34;https://cyberfreedom.ca&#34;&gt;cyberfreedom.ca&lt;/a&gt; becomes the go-to resource to equip Canadians to engage with their elected officials to gain new ground for digital autonomy in Canada. With a bit of effort this resource could track terrible legislation before it has time to pass and give citizens the confidence to oppose it together. If this proves successful, it would be even possible for people to write new proposals that would greatly enhance the privacy and free expression rights on Canadians.&lt;/p&gt;
&lt;h3 id=&#34;thank-you-a-personal-note&#34;&gt;Thank you: A Personal Note&lt;/h3&gt;
&lt;p&gt;I want to thank everyone reading this at the moment, it&amp;rsquo;s been a very rough start for me but I am very excited for the future of this and other projects. I hope that even if you can&amp;rsquo;t contribute time that you&amp;rsquo;re willing to at least share the idea with others, so that we can all start to bring meaningful change together. Whether you&amp;rsquo;re reading this via email, the website, or RSS feed your support has meant a great deal and your feedback means a great deal.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Digital Autonomy &amp; The Arts with Anne Gibbons</title>
		<link>https://libresolutions.network/videos/arts5/</link>
		<pubDate>Fri, 12 Jan 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/arts5/</guid>
		
		<image>https://libresolutions.network//media/images/arts5-banner.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/arts5-banner.webp" />
		<itunes:image href="https://libresolutions.network//media/images/arts5-banner.webp" />
		<description>Part 5: Understanding our tools and bonding over authenticity.</description>
		<content:encoded>&lt;p&gt;I’m pleased to have had the opportunity to discuss &lt;a href=&#34;https://libresolutions.network/tags/digital-autonomy-the-arts&#34;&gt;Digital Autonomy &amp;amp; The Arts&lt;/a&gt; with Anne Gibbons. Anne is a courageous cartoonist and an inspiration to those who want to learn to make their mark on the canvas of history. We discuss the unique challenges that impact our lives at the cross-section of digital autonomy and artistic expression. I really appreciated having a discussion with a creative and passionate voice with such a wealth of experience.&lt;/p&gt;
&lt;p&gt;You can follow Anne&amp;rsquo;s work on &lt;a href=&#34;https://annecantstandit.com/&#34;&gt;her website&lt;/a&gt; and &lt;a href=&#34;https://annecantstandit.substack.com/&#34;&gt;substack&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;special-thanks-to-margaret-anna-allice&#34;&gt;Special Thanks to Margaret Anna Allice&lt;/h3&gt;
&lt;p&gt;This discussion wouldn’t have taken place if not for &lt;a href=&#34;https://margaretannaalice.substack.com&#34;&gt;Margaret Anna Alice&lt;/a&gt; and I am very thankful for that. Please take the time to watch (and share!) &lt;a href=&#34;https://margaretannaalice.substack.com/p/mistakes-were-not-made-video-dr-mike&#34;&gt;Dr Yeadon’s incredible reading&lt;/a&gt; of &lt;a href=&#34;https://margaretannaalice.substack.com/p/mistakes-were-not-made-an-anthem&#34;&gt;Mistakes Were NOT Made: An Anthem for Justice.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Related links:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.corbettreport.com/the-media-matrix-full-documentary/&#34;&gt;The Media Matrix&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://arstechnica.com/information-technology/2022/11/deviantart-upsets-artists-with-its-new-ai-art-generator-dreamup/&#34;&gt;DeviantArt upsets artists with its new AI art generator, DreamUp&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://peertube.libresolutions.network/w/92rS5X3nfkHyZdknuodz6n&#34;&gt;War and Democide&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Data Shedding</title>
		<link>https://libresolutions.network/videos/data-shedding/</link>
		<pubDate>Thu, 11 Jan 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/data-shedding/</guid>
		
		<image>https://libresolutions.network//media/images/data-shedding.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/data-shedding.webp" />
		<itunes:image href="https://libresolutions.network//media/images/data-shedding.webp" />
		<description>Understanding a severe real-time privacy risk</description>
		<content:encoded>&lt;p&gt;The following video is a summary of &lt;a href=&#34;https://www.iccl.ie/wp-content/uploads/2023/11/Europes-hidden-security-crisis.pdf&#34;&gt;a report&lt;/a&gt; on how programmatic advertising can be weaponized for mass real-time surveillance. This report is highly troubling but not particularly surprising. If you want to learn how it&amp;rsquo;s being used, read up on the &lt;a href=&#34;https://mastodon.social/@wchr/111410591996456032&#34;&gt;mastodon thread&lt;/a&gt; made by one of the report&amp;rsquo;s authors.&lt;/p&gt;
&lt;h3 id=&#34;links&#34;&gt;Links:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://mastodon.social/@wchr/111410591996456032&#34;&gt;Mastodon Thread&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.iccl.ie/wp-content/uploads/2023/11/Europes-hidden-security-crisis.pdf&#34;&gt;Europe&amp;rsquo;s Hidden Security Crisis Report&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;further-reading&#34;&gt;Further Reading:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://unlimitedhangout.com/2021/04/investigative-reports/the-military-origins-of-facebook/&#34;&gt;The Military Origins of Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.corbettreport.com/how-palantir-conquered-the-world/&#34;&gt;How Palantir Conquered the World&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Total_Information_Awareness&#34;&gt;Total Information Awareness&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://avoidthehack.com/ads-cybersecurity-risk&#34;&gt;Understanding Malicious ads&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Securing your Data: Backups</title>
		<link>https://libresolutions.network/articles/backups/</link>
		<pubDate>Fri, 05 Jan 2024 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/backups/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/backups.ogg" />
			
		
		<image>https://libresolutions.network//media/photos/drive.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/photos/drive.webp" />
		<itunes:image href="https://libresolutions.network//media/photos/drive.webp" />
		<description>Don&#39;t overlook the importance of backups!</description>
		<content:encoded>&lt;p&gt;Backups can feel like a chore, but they&amp;rsquo;re actually very empowering. Beyond the peace of mind knowing that you&amp;rsquo;re much less likely to lose data, you&amp;rsquo;re also in a better position to make changes. Many tasks, like moving from Windows to a Free and Open Source operating system, are much easier if you&amp;rsquo;ve already got your own backups. Keeping your data safe can be as simple as making copies and distributing them, all the way up to running your own cloud. The main purpose is always the same, preventing the horrors of data loss.&lt;/p&gt;
&lt;h3 id=&#34;contents&#34;&gt;Contents&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href=&#34;#tools&#34;&gt;Tools&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#example-strategies&#34;&gt;Example Strategies&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#extra-resources&#34;&gt;Extra Resources&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Data loss can be tragic. In a time where commercial services train us to think that everything is at our fingertips, it&amp;rsquo;s easy to forget that some things really are irreplaceable. Sure you can probably hunt down all those memes you&amp;rsquo;ve saved, but personal photographs, notes, and works can all disappear in a moment of surprise to be quickly replaced with a flood of dread and regret.&lt;/p&gt;
&lt;p&gt;There&amp;rsquo;s the harsh saying, data that isn&amp;rsquo;t backed up is already lost. I&amp;rsquo;ve personally felt the loss of some personal data over the years that I&amp;rsquo;ll never get back. There are so many ways to lose data including deleting/overwriting data by mistake, device failure, or hostile attacks like ransomware. The solution is to keep your data on multiple devices in multiple places. Fortune favors the prepared, so it&amp;rsquo;s best to do what you can to avoid such scenarios.&lt;br&gt;
The important steps are: &lt;strong&gt;Simplify, Store, Distribute, Test&lt;/strong&gt;.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://libresolutions.network/media/diagrams/backups.webp&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/diagrams/backups.webp&#39; 
&gt;

&lt;/a&gt;


&lt;p class=&#34;caption&#34;&gt;
    share this poster! 
&lt;/p&gt;


&lt;/div&gt;
&lt;h2 id=&#34;simplify&#34;&gt;Simplify&lt;/h2&gt;
&lt;p&gt;Just like it can be hard to track down a specific form on a cluttered desk, it pays to have a deliberately organized system. Making as much use of your home directory as possible will go a long way. If you were able to have all your important files in a single place, such as &lt;code&gt;C:/Users/Gabriel&lt;/code&gt; on Windows or &lt;code&gt;/home/gabriel&lt;/code&gt; on Linux or Mac, it can be much easier to then copy and transfer those files.&lt;/p&gt;
&lt;p&gt;Of course that&amp;rsquo;s the ideal scenario, things may be saved elsewhere for all kinds of reasons, or even relegated to a particular cloud provider. This creates a new challenge of tracking down particular files in a race against time before they are forgotten all together. The complexity isn&amp;rsquo;t always your fault, programs have the capability of installing their configuration settings in different places, so being aware of what program settings you need to keep safe is very important.&lt;/p&gt;
&lt;p&gt;Using simpler tools, taking an offline-first approach, and spending time to organize important files can go a long way to making your backups simpler. Simple backups can sometimes be fully automated or at least sped up with scripts. This is all even more true when you use multiple devices, the more organized each device is, the less work required to manage it all.&lt;/p&gt;
&lt;h2 id=&#34;store&#34;&gt;Store&lt;/h2&gt;
&lt;h3 id=&#34;recovery-checklist&#34;&gt;Recovery Checklist:&lt;/h3&gt;
&lt;p&gt;For a complete recovery you&amp;rsquo;ll want to account for:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Personal/Work files&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Any file you wouldn&amp;rsquo;t want to have deleted. These include personal photos, documents, scanned documents or media.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Organizational Data&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Calendars and contacts are some of the first things you&amp;rsquo;ll want to ensure you have in a format &lt;a href=&#34;https://github.com/awesome-selfhosted/awesome-selfhosted#calendar--contacts&#34;&gt;under your control&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Passwords&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If you use a password manager, it&amp;rsquo;s very important not to lose all your passwords.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Browser Profiles&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Arguably the most important program to back up the settings for would be your browser. You can also separately back up important data such as bookmarks. By having the entire profile you ensure you keep your settings, add-ons, and many other useful things to avoid disruption.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Configuration files&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;These are the program files mentioned earlier. Where they&amp;rsquo;re stored will vary from program to program, and it may depend on what system you&amp;rsquo;re using.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Installation media&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;At minimum, it&amp;rsquo;s nice to have a fresh start every once in a while. Having an installer on a USB to reinstall your system after any issues is a very useful thing to have when you can just throw all your files back in place.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;System backups&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;You can save time on re-installing your system and programs by maintaining a backup of your system in it&amp;rsquo;s current state. System backups are very useful to get back and running after a catastrophic problem or if a device is lost.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;No matter how much (or how little) simplifying you&amp;rsquo;ve done, you need to figure out how you&amp;rsquo;re going to store your needed files. At minimum you&amp;rsquo;ll want to copy them to some form of external medium or remote server.&lt;/p&gt;
&lt;h3 id=&#34;types-of-backups&#34;&gt;Types of Backups&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Copy&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The most straightforward way to move files is to copy them from place to an external device such as a USB drive or optical media.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Push&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If you have access to a home or remote server, you can regularly push files to keep them accessible.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Pull&lt;/strong&gt;
You could also give a home/remote server the capability to download your files remotely.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Sync&lt;/strong&gt;
It&amp;rsquo;s also possible to use tools to sync files and folders between devices in real-time.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;encryption&#34;&gt;Encryption&lt;/h3&gt;
&lt;p&gt;It&amp;rsquo;s useful to encrypt your backups, so if they fall in the wrong hands all your private files are safe from compromise. Sometimes cloud services will claim your backups are encrypted, but it&amp;rsquo;s critical that you control (and protect) the key that&amp;rsquo;s used to access the files.&lt;/p&gt;
&lt;h3 id=&#34;automation&#34;&gt;Automation&lt;/h3&gt;
&lt;p&gt;Automation saves you time at the cost of initial configuration. It&amp;rsquo;s ultimately up to you how sophisticated you want the backup to be. It can be a very simple regular copy, or very complex with real-time sync and extra features.&lt;/p&gt;
&lt;h3 id=&#34;offline-backups&#34;&gt;Offline backups&lt;/h3&gt;
&lt;p&gt;As far as I know, it&amp;rsquo;s impossible to steal data from an unplugged storage device &lt;a href=&#34;https://thehackernews.com/2022/07/new-air-gap-attack-uses-sata-cable-as.html&#34;&gt;over the Internet.&lt;/a&gt; Even if it was possible, it would be incredibly impractical to target most people. Having a backup that is disconnected from power is safe from all kinds of cyber threats.&lt;/p&gt;
&lt;h3 id=&#34;time&#34;&gt;Time&lt;/h3&gt;
&lt;p&gt;Sometimes files aren&amp;rsquo;t merely lost, but are mistakenly damaged or altered. It&amp;rsquo;s useful to have a version history of particular files or keep multiple system backups from different moments in time.&lt;/p&gt;
&lt;h3 id=&#34;redundancy&#34;&gt;Redundancy&lt;/h3&gt;
&lt;p&gt;Less is absolutely not more in this scenario. If you&amp;rsquo;ve got spare time/resources and want to consider an additional layer of protection, more copies and/or more storage locations significantly increase the odds of being able to recover files in a disaster.&lt;/p&gt;
&lt;h2 id=&#34;distribute&#34;&gt;Distribute&lt;/h2&gt;
&lt;p&gt;There are scenarios where it&amp;rsquo;s vital to have your data not exist in a single physical location. Natural disasters, break-ins, and many other unpredictable incidents can make it impossible to retrieve data once it&amp;rsquo;s gone. Having a backup located somewhere else is how you overcome this.&lt;/p&gt;
&lt;p&gt;For data that isn&amp;rsquo;t personal or sensitive, sharing is a perfectly viable option. If you&amp;rsquo;ve assembled an important curated collection of writing, media, or even just links publishing it online can help ensure your work isn&amp;rsquo;t wasted. You can even distribute files (&lt;em&gt;that you have the rights to!&lt;/em&gt;) on &lt;a href=&#34;https://archive.org/&#34;&gt;archive.org&lt;/a&gt; to make a mark on history.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/photos/drive.webp&#39; 
&gt;



&lt;/div&gt;
&lt;h3 id=&#34;storage-types&#34;&gt;Storage Types&lt;/h3&gt;
&lt;h4 id=&#34;portable-storage&#34;&gt;Portable Storage&lt;/h4&gt;
&lt;p&gt;The easiest way to get started is to copy your personal files to a portable storage device. When one doesn&amp;rsquo;t require a huge amount of space, these are very convenient and work quite well. Portable flash storage is generally quite fast, but may not be suited for long-term storage.&lt;/p&gt;
&lt;h4 id=&#34;optical-media&#34;&gt;Optical Media&lt;/h4&gt;
&lt;p&gt;If you&amp;rsquo;re storing a relatively small amount of data that you don&amp;rsquo;t need to change, optical media such as CDs, DVDs, or Bluray disks may suit your purposes. Data stored on optical media is often likely to last much longer than flash storage when kept in ideal conditions.&lt;/p&gt;
&lt;h4 id=&#34;external-hard-drives&#34;&gt;External Hard Drives&lt;/h4&gt;
&lt;p&gt;A go-to method for people with many files is to back up their files to an external hard drive. These usually require their own power and data cable to work. They can feature faster speeds, and much larger storage space in exchange for a bulkier size.&lt;/p&gt;
&lt;h4 id=&#34;nas--remote-storage&#34;&gt;NAS / Remote Storage&lt;/h4&gt;
&lt;p&gt;A more sophisticated method to store data is to run a server that allows files to be transferred over the network. There are all kinds of methods to setup repositories of data with various different forms of access control.&lt;/p&gt;
&lt;h2 id=&#34;test&#34;&gt;Test&lt;/h2&gt;
&lt;p&gt;Backing up is just the first step! You&amp;rsquo;ll want to make sure the files are properly usable. You don&amp;rsquo;t want to waste the time running a fancy automated fully-encrypted backup system to have that effort tragically wasted the moment you actually need it.&lt;/p&gt;
&lt;h3 id=&#34;file-integrity&#34;&gt;File Integrity&lt;/h3&gt;
&lt;p&gt;If it&amp;rsquo;s been quite some time, it&amp;rsquo;s worth making sure your old file backups aren&amp;rsquo;t corrupted or otherwise damaged. Bit rot, errors, and ordinary wear can all damage the information stored in a backup.&lt;/p&gt;
&lt;h3 id=&#34;disaster-recovery&#34;&gt;Disaster Recovery&lt;/h3&gt;
&lt;p&gt;It&amp;rsquo;s good to make sure you can start with a new/fresh device in the event it gets damaged, or your residence is hit from a natural disaster.&lt;/p&gt;
&lt;h3 id=&#34;encryption-1&#34;&gt;Encryption&lt;/h3&gt;
&lt;p&gt;If your backups are encrypted it&amp;rsquo;s important to make sure you can actually &lt;em&gt;decrypt&lt;/em&gt; the backup. Otherwise, you&amp;rsquo;re just generating random data.&lt;/p&gt;
&lt;h3 id=&#34;improve&#34;&gt;Improve&lt;/h3&gt;
&lt;p&gt;Over time, you&amp;rsquo;ll find things in your backup strategy you want to improve. By testing your backups you have the opportunity to identify problems before you actually need the backup.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;#&#34;&gt;Back to Top&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;tools&#34;&gt;Tools&lt;/h2&gt;
&lt;p&gt;The best backup tool is the one you&amp;rsquo;ll actually use. Each will vary in features, complexity, and ease-of-use. You may be limited by what system you&amp;rsquo;re using and your comfort level with command-line tools.&lt;/p&gt;
&lt;h3 id=&#34;system-features&#34;&gt;System Features&lt;/h3&gt;
&lt;p&gt;Both Windows and Mac have built-in features for file backups and system recovery. There are many Utilities for Linux distributions as well.&lt;/p&gt;
&lt;h3 id=&#34;rsync--rclone&#34;&gt;rsync &amp;amp; rclone&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;rsync&lt;/strong&gt; and &lt;strong&gt;rclone&lt;/strong&gt; are tools that are so useful, either one of them is enough to consider learning how to use command-line tools yourself. Both are excellent tools for transferring and syncing files between multiple systems.&lt;/p&gt;
&lt;h3 id=&#34;disk-cloning&#34;&gt;Disk Cloning&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://clonezilla.org/&#34;&gt;Clonezilla&lt;/a&gt; is a great tool for &lt;a href=&#34;https://youtu.be/ci2VyorBjyQ&#34;&gt;making an image&lt;/a&gt; of an entire disk. This is one of many ways to create a full backup of an entire system or to migrate a system from one disk to another.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;#&#34;&gt;Back to Top&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;example-strategies&#34;&gt;Example Strategies&lt;/h2&gt;
&lt;h3 id=&#34;easy-street&#34;&gt;Easy Street&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Copies personal files to an external hard drive&lt;/li&gt;
&lt;li&gt;Has two extra usb drives one with an OS installer and the other with program installers or scripts&lt;/li&gt;
&lt;li&gt;Regularly rotates the external hard drive with a relative for a secure offsite offline backup&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;the-digital-serf&#34;&gt;The Digital Serf&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Maximizes their use of cloud services&lt;/li&gt;
&lt;li&gt;Uses multi-factor authentication to prevent intrusion&lt;/li&gt;
&lt;li&gt;Distributes data among nameless and innumerable third parties&lt;/li&gt;
&lt;li&gt;Zero digital autonomy, their entire digital life is at the mercy of a single provider without much ability to switch&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;total-sloth&#34;&gt;Total Sloth&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Uses their systems&amp;rsquo; &amp;ldquo;file history&amp;rdquo; feature to have multiple versions of each file across time.&lt;/li&gt;
&lt;li&gt;Once a month, shuts down their system and creates a system image from the drive&lt;/li&gt;
&lt;li&gt;Copies the system image to an encrypted filesystem on an external drive&lt;/li&gt;
&lt;li&gt;&amp;ldquo;Simple as&amp;rdquo; they mutter while driving to their secure locker offsite storage.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;the-leech&#34;&gt;The Leech&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Encrypts files and uploads them to free or cheap cloud storage&lt;/li&gt;
&lt;li&gt;Abuses &lt;a href=&#34;https://youtu.be/4sDuNccDw80&#34;&gt;free signups&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Automates everything, providers hate him.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;diy-cloud&#34;&gt;DIY Cloud&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Self-hosts a variety of services&lt;/li&gt;
&lt;li&gt;All their devices &lt;a href=&#34;https://enblog.eischmann.cz/2023/11/20/nextcloud-as-personal-cloud/&#34;&gt;sync to the home server&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Remote backup server pulls regular backups from the home server&lt;/li&gt;
&lt;li&gt;Doesn&amp;rsquo;t need much of the Internet anymore&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;#&#34;&gt;Back to Top&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;extra-resources&#34;&gt;Extra Resources&lt;/h2&gt;
&lt;h3 id=&#34;video-guides&#34;&gt;Video Guides&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://share.tube/videos/watch/f3840d44-89fb-448b-8e07-e1be26f6bf59&#34;&gt;My backup routine (and why I keep it simple)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://apertatube.net/videos/watch/0dbfa576-6051-4136-a78e-79ad94f4c44a&#34;&gt;Let&amp;rsquo;s Talk About Backups&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://diode.zone/videos/watch/4bfdfc2a-c605-415c-a733-bb68d899faf0&#34;&gt;&amp;lsquo;Don’t eat my data - 30+ years of storage war stories&amp;rsquo; - Steven Ellis (LCA 2020)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/id01_oBuNR4&#34;&gt;How to Move Everything from an Old PC to a New PC&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/2VwpmEA9pYQ&#34;&gt;How to Clone Your OS Hard Drive in Linux to Use with a Different (or the same) Computer
&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;links&#34;&gt;Links&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://whynothugo.nl/journal/2014/08/06/performing-backups-the-right-way/&#34;&gt;Performing backups the right way&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://rclone.org/crypt/&#34;&gt;https://rclone.org/crypt/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://web.archive.org/web/20240107104820/https://old.reddit.com/r/DataHoarder/wiki/backups&#34;&gt;/r/DataHoarder Wiki - Backups&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.engineersgarage.com/data-loss-backup-and-recovery-a-complete-beginners-guide/&#34;&gt;Data Loss, Backup, and Recovery: A Complete Beginners’ Guide&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://ruvi-d.scribe.rip/personal-data-backup-strategies-e06086f4865d&#34;&gt;Personal Data Backup Strategies&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://apebox.org/wordpress/tech/1325&#34;&gt;Building a NAS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/awesome-foss/awesome-sysadmin#backups&#34;&gt;Awesome Sysadmin - Backups&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Backup&#34;&gt;https://en.wikipedia.org/wiki/Backup&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/List_of_backup_software&#34;&gt;https://en.wikipedia.org/wiki/List_of_backup_software&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://wiki.installgentoo.com/wiki/Backups&#34;&gt;https://wiki.installgentoo.com/wiki/Backups&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://wiki.archiveteam.org/index.php/Backup_Tips&#34;&gt;https://wiki.archiveteam.org/index.php/Backup_Tips&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Face to Face on the The Hrvoje Morić Show</title>
		<link>https://libresolutions.network/videos/hrvoje-moric-show-dec-2023/</link>
		<pubDate>Tue, 26 Dec 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/hrvoje-moric-show-dec-2023/</guid>
		
		<image>https://libresolutions.network//media/images/videos2.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/videos2.webp" />
		<itunes:image href="https://libresolutions.network//media/images/videos2.webp" />
		<description>Recorded for December 22nd</description>
		<content:encoded>&lt;p&gt;I’m very grateful for the opportunity to share insights that don’t fit neatly into longer posts. Hrvoje Morić who is well known for &lt;a href=&#34;https://geopoliticsandempire.com/&#34;&gt;Geopolitics &amp;amp; Empire&lt;/a&gt;, is a fascinating person to talk to and a very knowledgeable host. We hit many important topics, opening with how big tech is working to regain people’s trust as well as legislative attacks on people’s online freedom. We also discuss Signal and the Open Technology fund, as well as cost savings from ditching the cloud.&lt;/p&gt;
&lt;p&gt;The Hrvoje Morić Show: &lt;a href=&#34;https://geopoliticsandempire.substack.com/s/hrvoje-moric-show-tnt-radio&#34;&gt;https://geopoliticsandempire.substack.com/s/hrvoje-moric-show-tnt-radio&lt;/a&gt;&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Operation: Bankroll</title>
		<link>https://libresolutions.network/operations/bankroll/</link>
		<pubDate>Wed, 20 Dec 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/operations/bankroll/</guid>
		
		<image>https://libresolutions.network//media/images/bankroll.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/bankroll.webp" />
		<itunes:image href="https://libresolutions.network//media/images/bankroll.webp" />
		<description>Taking control of supporting solutions</description>
		<content:encoded>&lt;h2 id=&#34;putting-your-money-where-your-needs-are&#34;&gt;Putting Your Money Where Your Needs Are&lt;/h2&gt;
&lt;p&gt;This mindset is applicable to all kinds of problems, but I think is particularly suited to the challenge of helping people reduce their dependency on big tech infrastructure and state manipulation. Taking the time to evaluate your resources, and your requirements, you can put together a plan on how you and/or your friends or community can properly support a better path. Getting others involved can magnify your impact significantly, and better represent a variety of people&amp;rsquo;s needs and concerns.&lt;/p&gt;
&lt;p&gt;It has been a huge mistake for people to accept either high fees or surveillance in exchange for computing that should rightly be done under their own control and on their own devices. There will only be so many opportunities to correct that mistake, and time is running short. The desire for institutions to seize control over peoples’ computing is only likely to rise over time, so too will the necessity to be proactively involved in building better tools for people of all walks of life.&lt;/p&gt;
&lt;p&gt;Liberty-minded individuals need to become proactive supporters of the technological ecosystem we wish to participate in. If we appreciate all the benefits we enjoy from useful Free and Open Source Software, then we should reward the effort with proactive funding. In so many ways over the years, people have become familiar with the costs of “free” services that aren’t under their control. The demand for digital autonomy can only rise as corporations and governments around the world become increasingly predatory.&lt;/p&gt;
&lt;h3 id=&#34;now-is-the-best-time&#34;&gt;Now is the Best Time&lt;/h3&gt;
&lt;p&gt;With Big Tech services bootstrapping themselves with debt only to operate at a loss to shove out competition, skating by through lucrative government contracts, they&amp;rsquo;re arguably at the weakest they&amp;rsquo;ve ever been. Corporations are raising prices, reducing services, and having &lt;a href=&#34;https://news.crunchbase.com/startups/tech-layoffs/&#34;&gt;massive layoffs,&lt;/a&gt; forcing their workforce to find opportunities elsewhere. The last thing we want is for skilled, intelligent, and motivated people to continue building tools that work against us rather than for us. It is up to us to reverse this trend. Luckily, we have a great opportunity ahead of us.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/interest-rates.webp&#39; 

 alt=&#39;tradingview chart of descending debt servicing costs over decades&#39;
&gt;


&lt;p class=&#34;caption&#34;&gt;
    Voting with your wallet now matters much more now than it did for the last decade. &lt;a target=&#39;_blank&#39; href=&#39;https://tradingview.com&#39;&gt;Source&lt;/a&gt;
&lt;/p&gt;


&lt;/div&gt;
&lt;p&gt;Now is a very unique window of time to make a serious impact on the future of technology. With interest rates higher than they&amp;rsquo;ve been for quite some time, it&amp;rsquo;s (relatively) harder for corporations and governments to purchase influence. Every dollar you spend (&lt;em&gt;or refuse to spend&lt;/em&gt;) means a great deal about what incentives are created and maintained. This means that what little you can spare &lt;em&gt;can make a real impact&lt;/em&gt;. If you&amp;rsquo;re interested in &lt;strong&gt;bankrolling&lt;/strong&gt; a better technological future, and have resources to spare I can&amp;rsquo;t think of a better opportunity.&lt;/p&gt;
&lt;h2 id=&#34;holding-in-reserve&#34;&gt;Holding in Reserve&lt;/h2&gt;
&lt;p&gt;Of course, I am &lt;strong&gt;not telling you to spend without analyzing your own situation&lt;/strong&gt;. First and foremost, ensure that you&amp;rsquo;re still taking care of your responsibilities and that you&amp;rsquo;re spending money that you would happily part with to make a better future. Odds are there may be charities or local support systems you may want to consider giving to. It can also be fruitful to save. It&amp;rsquo;s possible that you may want to participate in supporting something new or want to get together with others to pledge a larger amount of funds to work on something ambitious.&lt;/p&gt;
&lt;h2 id=&#34;projects-worth-supporting&#34;&gt;Projects Worth Supporting&lt;/h2&gt;
&lt;p&gt;These are intended to be &lt;em&gt;examples&lt;/em&gt; of how somebody can take action themselves to fund a more freedom respecting digital landscape. Suggestions are welcome! The intention is to give you an idea of what may be worth considering. Ideally, you&amp;rsquo;d be using a substantial amount of Free and Open Source Software already and you&amp;rsquo;re just going to budget to support the software and systems you use regularly or find useful.&lt;/p&gt;
&lt;h3 id=&#34;organizations&#34;&gt;Organizations&lt;/h3&gt;
&lt;p&gt;New initiatives and organizations are always needed to bring new ideas into reality, but those not willing to risk their limited resources supporting a long-shot can choose to instead support organizations with a track-record for delivering real results. Supporting an organization may also give benefits like membership, giving you a voice to raise concerns or even vote on important changes. Large organizations are complex machines. They may not be functioning exactly as you like, but by supporting organizations as a block of members, you can try to move them into a better direction.&lt;/p&gt;
&lt;p&gt;No matter what organization you choose to support, be sure to make sure it is aligned (or able to be aligned) with your goals and values. Many large organizations have a tendency to lure in supporters with a &lt;a href=&#34;https://libresolutions.network/articles/redirecting-resistance/&#34;&gt;deceptive brand&lt;/a&gt; that presents itself as noble, but in actuality under-delivers.&lt;/p&gt;
&lt;h4 id=&#34;local-credit-union&#34;&gt;Local Credit Union&lt;/h4&gt;
&lt;p&gt;While not strictly technological, I believe that supporting credit unions is an important step to protecting &lt;a href=&#34;https://home.solari.com/financial-transaction-freedom-ftf/&#34;&gt;financial transaction freedom&lt;/a&gt;. While no organization is safe from state overreach, it&amp;rsquo;s best to proactively put up as much resistance as possible, and build up resilience at the local level. Of course, supporters of digital autonomy should use their voice within any financial institution to encourage them to reduce their own dependency on big tech services, tracking, and other anti-user impositions.&lt;/p&gt;
&lt;p&gt;At the time of writing this, I am currently a member of a credit union.&lt;/p&gt;
&lt;h4 id=&#34;advocates-for-digital-autonomy&#34;&gt;Advocates for Digital Autonomy&lt;/h4&gt;
&lt;p&gt;There are organizations centered around restricting state surveillance like the &lt;a href=&#34;https://www.eff.org/&#34;&gt;Electronic Frontier Foundation&lt;/a&gt;, and Free Software advocacy such as the &lt;a href=&#34;https://www.fsf.org/associate/benefits&#34;&gt;Free Software Foundation.&lt;/a&gt;. Of course, taking it to the local level can help. Donating funds or equipment to local clubs can help those without access to devices, or gain more materials to learn and share.&lt;/p&gt;
&lt;p&gt;At the time of writing, I&amp;rsquo;m currently a Free Software Foundation member, and have donated in the past to &lt;a href=&#34;https://ev.kde.org/&#34;&gt;KDE e.V.&lt;/a&gt; in the past.&lt;/p&gt;
&lt;h4 id=&#34;software-foundations&#34;&gt;Software Foundations&lt;/h4&gt;
&lt;p&gt;If you use &lt;a href=&#34;https://fund.blender.org/&#34;&gt;blender&lt;/a&gt;, &lt;a href=&#34;https://inkscape.org/support-us/donate/&#34;&gt;Inkscape&lt;/a&gt;, &lt;a href=&#34;https://framasoft.org/en/#support&#34;&gt;PeerTube&lt;/a&gt;, or &lt;a href=&#34;https://matrix.org/blog/2023/12/electing-our-first-governing-board/&#34;&gt;matrix&lt;/a&gt; you may want to consider supporting their organizations. Large foundations can work on a variety of initiatives rather than a specific project. Love the Web? you could even become part of maintaining &lt;a href=&#34;https://www.w3.org/donate/&#34;&gt;open web standards.&lt;/a&gt;&lt;/p&gt;
&lt;h4 id=&#34;liberapay&#34;&gt;Liberapay&lt;/h4&gt;
&lt;p&gt;&lt;a href=&#34;https://liberapay.com/Liberapay/&#34;&gt;Liberapay&lt;/a&gt; needs more love. It&amp;rsquo;s a donations platform for much of the Free Software and Open Source community. The platform allows you to support projects or developers directly if they wish, even &lt;a href=&#34;https://liberapay.com/explore/pledges&#34;&gt;pledge&lt;/a&gt; for projects that aren&amp;rsquo;t on the platform.&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s a pleasure to highlight some of the excellent projects collecting donations there:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://liberapay.com/FreeCAD/&#34;&gt;FreeCAD&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://liberapay.com/keepassxc/&#34;&gt;KeePassXC&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://liberapay.com/YunoHost/&#34;&gt;YunoHost&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://liberapay.com/FreeTube/&#34;&gt;FreeTube&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://liberapay.com/FreshRSS/&#34;&gt;FreshRSS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://liberapay.com/mumble/&#34;&gt;Mumble&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;If there is any ever doubt. It&amp;rsquo;s always a good idea to verify with the project&amp;rsquo;s website to ensure you&amp;rsquo;re donating in the right place. Liberapay just makes it easy and convenient to support FOSS projects. Through other means, I&amp;rsquo;ve donated to &lt;a href=&#34;https://grapheneos.org/donate&#34;&gt;GrapheneOS&lt;/a&gt;, Misskey and &lt;a href=&#34;https://framasoft.org/en/#support&#34;&gt;PeerTube&lt;/a&gt; as of the time of writing.&lt;/p&gt;
&lt;h2 id=&#34;purchases&#34;&gt;Purchases&lt;/h2&gt;
&lt;p&gt;The traditional use of the phrase &lt;em&gt;voting with your wallet&lt;/em&gt; refers to &lt;a href=&#34;https://www.corbettreport.com/buycotts-solutionswatch/&#34;&gt;buycotts&lt;/a&gt;, choosing to support a company with better practices than the competition. When it comes to purchasing hardware, the &lt;a href=&#34;https://www.fsf.org/givingguide/v14/&#34;&gt;FSF&amp;rsquo;s Giving Guide&lt;/a&gt; is a good place to look at the advantages of hardware that &lt;em&gt;respects your freedom&lt;/em&gt;. It wasn&amp;rsquo;t long ago that many wouldn&amp;rsquo;t know where to find a computer vendor that sells machines with a linux distribution pre-installed, but now there are many vendors. When it comes to buying hardware, it&amp;rsquo;s a good idea to do a bit of research to ensure it suits your needs well. Choose carefully, but boldly!&lt;/p&gt;
&lt;p&gt;Sometimes it can be nice to get something back in exchange for supporting a wild idea. Other times, you may make a purchase in the hopes of opening an entire new frontier of devices, such as the &lt;a href=&#34;https://unsigned.io/shop/&#34;&gt;Reticulum packet radios&lt;/a&gt; or the &lt;a href=&#34;https://frame.work/ca/en&#34;&gt;framework laptop&lt;/a&gt;. These devices can come at a high price, but are often unique in quality or features.&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;ve had good experiences purchasing from &lt;a href=&#34;https://pine64.com/&#34;&gt;Pine64&lt;/a&gt; and &lt;a href=&#34;https://system76.com/&#34;&gt;System76&lt;/a&gt; and the devices are still working well at the time of writing.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Digital Autonomy &amp; The Arts with Margaret Anna Alice, Visceral Adventure &amp; Liam Sturgess</title>
		<link>https://libresolutions.network/videos/arts4/</link>
		<pubDate>Wed, 13 Dec 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/arts4/</guid>
		
		<image>https://libresolutions.network//media/images/arts4-banner.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/arts4-banner.webp" />
		<itunes:image href="https://libresolutions.network//media/images/arts4-banner.webp" />
		<description>Part 4: Stories Worth Telling, Technocracy, and Wrestling with the Collapse of the Intangible</description>
		<content:encoded>&lt;p&gt;In what has become my most ambitious media project yet, I had the pleasure of hosting a conversation with people I look up to as among my personal heroes. The Digital Autonomy Series is now one of my favorite projects as it allows the Libre Solutions Network to truly start to live up to its name.&lt;/p&gt;
&lt;h2 id=&#34;visceral-adventure&#34;&gt;Visceral Adventure&lt;/h2&gt;
&lt;p&gt;I got to know Tonika through &lt;a href=&#34;https://www.campfire.wiki/doku.php?id=operation_uplift&#34;&gt;Operation Uplift.&lt;/a&gt; Her open mind, kindness, and drive are huge inspiration. I was absolutely blown away by how succinctly she summarized my primary motivation in writing The &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy/&#34;&gt;Tools of the Technocracy.&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;This is the first time the technology has actually caught up with the goal of technocracy. This is why I think this is such a pivotal moment in human civilization. This is the first time that they can actually succeed in their goals and I think that is a huge distinction.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Substack: &lt;a href=&#34;https://visceraladventure.substack.com/&#34;&gt;https://visceraladventure.substack.com/&lt;/a&gt;&lt;br&gt;
Rumble: &lt;a href=&#34;https://rumble.com/user/VisceralAdventure&#34;&gt;https://rumble.com/user/VisceralAdventure&lt;/a&gt;&lt;br&gt;
War and Democide: &lt;a href=&#34;https://visceraladventure.substack.com/p/war-and-democide&#34;&gt;https://visceraladventure.substack.com/p/war-and-democide&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;liam-sturgess&#34;&gt;Liam Sturgess&lt;/h2&gt;
&lt;p&gt;If I was suspicious of any human being having superpowers, it would be  He is an incredibly diligent investigative reporter in addition to being a phenomenal &lt;a href=&#34;https://liamsturgess.bandcamp.com/track/the-things-we-take-with-us&#34;&gt;musician,&lt;/a&gt; voice actor, and producer. If you haven’t already, give &lt;a href=&#34;https://liamsturgess.bandcamp.com/album/foreverland&#34;&gt;Foreverland,&lt;/a&gt; a listen!&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;After all the years have flown away&lt;br&gt;
Meet me at the crossroads come and pray&lt;br&gt;
Looking out across from the open shore&lt;br&gt;
Live a life with open wings and soar&lt;br&gt;
We&amp;rsquo;ll find pieces where we&amp;rsquo;ve been&lt;br&gt;
And live off adrenaline&lt;br&gt;
We&amp;rsquo;ll lift off from where we stand&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Substack: &lt;a href=&#34;https://liamsturgess.substack.com/&#34;&gt;https://liamsturgess.substack.com/&lt;/a&gt;&lt;br&gt;
Rumble: &lt;a href=&#34;https://rumble.com/c/liamsturgess&#34;&gt;https://rumble.com/c/liamsturgess&lt;/a&gt;&lt;br&gt;
Website: &lt;a href=&#34;https://www.liamsturgess.com/&#34;&gt;https://www.liamsturgess.com/&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;margaret-anna-alice&#34;&gt;Margaret Anna Alice&lt;/h2&gt;
&lt;p&gt;George Orwell wrote: “In times of universal deceit, telling the truth is a revolutionary act.” Margaret Anna Alice is a &lt;a href=&#34;https://margaretannaalice.substack.com/p/wake-up-toolkit&#34;&gt;passionate chronicler&lt;/a&gt; who has ensured that the revolution will not go without &lt;a href=&#34;https://margaretannaalice.substack.com/p/mistakes-were-not-made-an-anthem-57a&#34;&gt;the truth.&lt;/a&gt; She has an unparalleled ability to artfully share the voice of reason without mincing words.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;You can deliver yourselves if you try, not by taking action, but merely by willing to be free.&lt;br&gt;
Resolve to serve no more, and you are at once freed. I do not ask that you place hands upon the tyrant to topple him over, but simply that you support him no longer;&lt;br&gt;
then you will behold him, like a great Colossus whose pedestal has been pulled away, fall of his own weight and break into pieces.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://margaretannaalice.substack.com/p/covid-is-over-if-you-want-it&#34;&gt;COVID IS OVER! …If You Want It&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3 id=&#34;more-links&#34;&gt;More links:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://margaretannaalice.substack.com/p/consequential-quotes-aldous-huxleys&#34;&gt;Consequential Quotes: Aldous Huxley&amp;rsquo;s &amp;ldquo;Words &amp;amp; Behavior&amp;rdquo;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://margaretannaalice.substack.com/p/consequential-quotes-war&#34;&gt;Consequential Quotes: War&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://margaretannaalice.substack.com/p/memes-by-themes-8-war-and-peace&#34;&gt;Memes by THemes #8: War &amp;amp; Peace&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://margaretannaalice.substack.com/p/letter-to-a-colluder-stop-enabling&#34;&gt;Letter to a Colluder: Stop Enabling Tyranny&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Why The Perfect Messaging App Doesn&#39;t Exist</title>
		<link>https://libresolutions.network/articles/the-perfect-messenger/</link>
		<pubDate>Sun, 10 Dec 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/the-perfect-messenger/</guid>
		
		<image>https://libresolutions.network//media/images/keyboard-key.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/keyboard-key.webp" />
		<itunes:image href="https://libresolutions.network//media/images/keyboard-key.webp" />
		<description>Making sense of security limitations</description>
		<content:encoded>&lt;p&gt;Surveillance of peoples communications is a severe overreach. Especially the act of monitoring people&amp;rsquo;s sensitive discussions with their most trusted contacts. Large institutions like corporations and governments are &lt;a href=&#34;https://www.techpolicy.press/five-eyes-campaign-against-encryption-threatens-democracy/&#34;&gt;wrestling over control&lt;/a&gt; of and insight from people&amp;rsquo;s private chats. This is largely because there are limitations to only data-mining public communications. All the money and effort spent on propaganda and censorship can be for naught if people are still allowed to make their own minds in private. This is why since the Covid Crisis there has been a rise in &lt;a href=&#34;https://static1.squarespace.com/static/5e9ce713321491043ea045ef/t/612e722e73b7c13f4f89b8f0/1630433860565/PrivateMessaging%2C+PublicHarms_2021.pdf&#34;&gt;research&lt;/a&gt; into how to limit speech in private communications.&lt;/p&gt;
&lt;p&gt;Already, there have been many proposed regulations all over the world, aimed at securing control over people&amp;rsquo;s ability to communicate. Most infamously, we have the EU&amp;rsquo;s &lt;a href=&#34;https://blog.nicco.love/eu-chat-control-is-worse-than-i-thought/&#34;&gt;ChatControl&lt;/a&gt; &amp;amp; Digital Services Act. It&amp;rsquo;s important not to forget that corporations themselves already wield a significant amount of power over public and private communications. While governments helping themselves to slices of that pie is a problem, we should reconsider our role in baking it at all. This is to say, we are all responsible for &lt;a href=&#34;https://reclaimthenet.org/uk-home-office-attacks-private-messaging&#34;&gt;top-down control&lt;/a&gt; of communication with our choices to use platforms that enable it.&lt;/p&gt;
&lt;p&gt;The cost of apathy is quite high. If you&amp;rsquo;ve been at all concerned about the ability for consent to be &lt;em&gt;manufactured&lt;/em&gt; across a variety of issues, it will only be exponentially worse when people aren&amp;rsquo;t permitted to dissent in private, much less public. If that isn&amp;rsquo;t bad enough, there is a sense of defeatism and helplessness by those who haven&amp;rsquo;t begun their journey to take control over their computing. Those who don&amp;rsquo;t truly appreciate the benefits of &lt;a href=&#34;https://fsfe.org/freesoftware/index.en.html&#34;&gt;free software&lt;/a&gt; are very prone to seeing it as an all-or-nothing affair, forgetting that incremental change can have massive benefits. Often, critics of more privacy-focused tools will underestimate the &lt;a href=&#34;https://spyware.neocities.org/articles/discord&#34;&gt;problems&lt;/a&gt; from more popular systems.&lt;/p&gt;
&lt;p&gt;Understandably, you have to take your &lt;a href=&#34;https://antennapod.org/blog/2023/11/google-podcasts-migration&#34;&gt;first steps&lt;/a&gt; to truly feel the difference. While I encourage you to learn how to store your own files, host your own services, and use a variety of Free Software tools, this piece is about why there is no &lt;em&gt;silver bullet&lt;/em&gt; to online communications. Of course this applies to much more than just instant messaging software, but it can be a useful example to highlight a wide variety of important issues. If we truly want to improve our technological landscape, we need a serious and thoughtful approach to understanding the problems.&lt;/p&gt;
&lt;h1 id=&#34;why-the-perfect-messenger-doesnt-yet-exist&#34;&gt;Why The Perfect Messenger Doesn&amp;rsquo;t (&lt;em&gt;Yet!&lt;/em&gt;) Exist&lt;/h1&gt;
&lt;p&gt;People really need to stop letting the fantasy of perfect security get in the way of making gradual improvements. Letting imperfections get in the way of you stepping away from total corporate control will leave you in a very sorry place. See the following &lt;strong&gt;threat modeling&lt;/strong&gt; infographic. Just because you&amp;rsquo;re still vulnerable to &lt;em&gt;state-level threats&lt;/em&gt; doesn&amp;rsquo;t mean it&amp;rsquo;s not worth using a secure password, or proper encryption methods.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://libresolutions.network/operations/shadow#threat-modeling&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/diagrams/threat%20modeling.webp&#39; 
&gt;

&lt;/a&gt;


&lt;p class=&#34;caption&#34;&gt;
    Your risks aren&amp;#39;t a single entity, but involve a variety of adversaries. 
&lt;/p&gt;


&lt;/div&gt;
&lt;h3 id=&#34;what-is-perfect-anyways&#34;&gt;&lt;em&gt;What is Perfect Anyways?&lt;/em&gt;&lt;/h3&gt;
&lt;p&gt;For the purposes of this piece, the &lt;strong&gt;perfect messaging software&lt;/strong&gt; has the following &lt;em&gt;non-negotiable&lt;/em&gt; attributes:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Free Software&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Free and Open Source Software has a variety of benefits that are highly valuable to those interested in computing on their own terms. Open Source software doesn&amp;rsquo;t guarantee security, but potentially has the ability to resolve serious issues quickly, and allows for innovation from broader and more diverse perspectives.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Self-Hostable&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If you&amp;rsquo;re locked-in to a single provider, you&amp;rsquo;re immediately placing them in a position of trust. They may be able to provide better security than you could on your own, but in an ideal world you (or your team/community) would have the option to take on that responsibility.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Interoperable&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Being able to communicate across instances of the server software. This means that large communities, and single users / peer-to-peer deployments should have the ability to seamlessly communicate with each other.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;State of the Art Security&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The perfect software necessarily has to be secure from at least the majority (but ideally all) known risks. This includes threats of impersonation, censorship, and interception.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Significantly Cross-Platform&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no point developing the perfect software only to run on corporate controlled ecosystems. Requiring Some to use a smartphone or other non-ideal software can be a deal-breaker.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Expected Features&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The software should support a majority (&lt;em&gt;if not all&lt;/em&gt;) of the same features people are used to using, such as video and voice calls, Group chats and calls, multimedia, and all kinds of other nice-to-haves.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Additionally, I&amp;rsquo;ll also define these &lt;em&gt;nice to haves&lt;/em&gt; which matter a great deal to gaining traction:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Has a Significant Userbase&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;While obscure software may be sound, safety in numbers applies in digital contexts too.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Independently Funded&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Either as charity, or a crowdfund, it would be important that the project&amp;rsquo;s existence is not beholden to a entity that can be controlled.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Accessible&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Being easy to use is a pre-requisite to being ideal.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Highly Configurable&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There may be reasons for people to prefer slight changes to the software&amp;rsquo;s design. It&amp;rsquo;s important to put the person in control of their own experience.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h1 id=&#34;maybe-youve-heard-of-something-like-that&#34;&gt;Maybe You&amp;rsquo;ve Heard of Something Like That?&lt;/h1&gt;
&lt;p&gt;Maybe such software &lt;em&gt;actually does exist&lt;/em&gt;&amp;hellip; or at least in part&lt;a href=&#34;https://denshi.org/blog/every-chat-client-absolutely-sucks/every-chat-client-absolutely-sucks/&#34;&gt;&amp;hellip;Right?&lt;/a&gt; You may even argue some of my criteria aren&amp;rsquo;t essential at all, and that I&amp;rsquo;m &lt;em&gt;making perfect the enemy of good&lt;/em&gt;. You might actually be right, If you have a suggestion that meets a majority of these criteria, &lt;a href=&#34;mailto:gabriel@libresolutions.network?subject=The%20perfect%20messenger&#34;&gt;let me know&lt;/a&gt; and even if it&amp;rsquo;s close, I&amp;rsquo;ll do a full review.&lt;/p&gt;
&lt;h2 id=&#34;security-is-hard-really-hard&#34;&gt;Security is Hard. &lt;em&gt;Really Hard.&lt;/em&gt;&lt;/h2&gt;
&lt;p&gt;The perfectionists often really underestimate what they demand. A straightforward solution to one security problem can sometimes make another one significantly harder. Seemingly simple questions like &amp;ldquo;&lt;em&gt;Where are the messages stored?&lt;/em&gt;&amp;rdquo; can have profound impact on a variety of security concerns. This doesn&amp;rsquo;t mean there&amp;rsquo;s no point using anything at all, but it&amp;rsquo;s important to understand what benefits you intend to get out of particular options. There can very often be solutions that are well suited to a variety of these problems, and the trade-offs may be worthwhile.&lt;/p&gt;
&lt;h3 id=&#34;metadata&#34;&gt;Metadata&lt;/h3&gt;
&lt;p&gt;Metadata is a &lt;a href=&#34;https://avoidthehack.com/metadata-privacy&#34;&gt;serious concern.&lt;/a&gt; All kinds of additional information about content like who is talking to who, how often, and when can give spies a significant amount of information. The sum total of who you communicate with may seem like innocuous information, but it&amp;rsquo;s very valuable to those who &lt;a href=&#34;https://www.eff.org/deeplinks/2023/05/10-years-after-snowden-some-things-are-better-some-were-still-fighting&#34;&gt;aim to control&lt;/a&gt; the flow of information. Being able to detect when particular figures gain (or lose) influence over others itself is a significant data-point as well.&lt;/p&gt;
&lt;p&gt;Securing metadata is a non-trivial problem to solve, especially if you want to have a variety of community &amp;amp; individually administered services. The advantage of having communications go through a single-point is that erasing metadata is as simple as deleting it (or not preserving it in the first place). This becomes impractical for other reasons though, because if one can be prevented from accessing that single service, its metadata protection is&amp;hellip;irrelevant.&lt;/p&gt;
&lt;h3 id=&#34;encryption&#34;&gt;Encryption&lt;/h3&gt;
&lt;p&gt;The other side of the coin of secure messaging is &lt;a href=&#34;https://proton.me/blog/what-is-encryption&#34;&gt;encryption.&lt;/a&gt; Your messages need to be safe from prying eyes in transit and at rest. There are many factors to consider when understanding what encryption features are available. When information is encrypted with a key, those who have access to the key(s) will be able restore the original information.&lt;/p&gt;
&lt;h4 id=&#34;key-management&#34;&gt;Key Management&lt;/h4&gt;
&lt;p&gt;When messages are encrypted, whose keys are used?&lt;br&gt;
Are messages secured with the participants keys or is a corporation doing all the encryption?&lt;br&gt;
Where are the keys stored? On the device, or with a service provider?&lt;br&gt;
These questions have profound impact on the security of the system and people&amp;rsquo;s messages. Simply taking encrypted to mean secure is an easy trap to fall into.&lt;/p&gt;
&lt;h4 id=&#34;key-exchange&#34;&gt;Key Exchange&lt;/h4&gt;
&lt;p&gt;When someone starts a chat with someone new, how are keys exchanged?
Are the keys shared by users directly? Or is a service provider assigning keys to each participant?&lt;/p&gt;
&lt;h4 id=&#34;end-to-end-encryption&#34;&gt;End-to-End Encryption&lt;/h4&gt;
&lt;p&gt;Are messages secured from being snooped on by the service provider?
What are the guarantees that nefarious changes can&amp;rsquo;t be introduced by the big tech corporation &lt;a href=&#34;https://restoreprivacy.com/messenger-and-facebook-get-signal-based-end-to-end-encryption/&#34;&gt;managing the keys?&lt;/a&gt;&lt;/p&gt;
&lt;h4 id=&#34;encryption-at-rest&#34;&gt;Encryption at Rest&lt;/h4&gt;
&lt;p&gt;Wherever the messages are stored for safekeeping, the last thing anyone wants is for those messages to be stolen and revealed. This means that the messages need to be stored privately, as well as encrypted in case the storage is compromised.&lt;/p&gt;
&lt;h4 id=&#34;perfect-forward-secrecy&#34;&gt;Perfect Forward Secrecy&lt;/h4&gt;
&lt;p&gt;It&amp;rsquo;s a bad idea to have a single key for every message, to protect messages across time they need to be secured with a unique key individually. This means that if a key is discovered or revealed, it can&amp;rsquo;t be used to decrypt past and future communications.&lt;/p&gt;
&lt;h3 id=&#34;external-threats&#34;&gt;External Threats&lt;/h3&gt;
&lt;h4 id=&#34;interception&#34;&gt;Interception&lt;/h4&gt;
&lt;p&gt;Even if your communications are secure, it&amp;rsquo;s possible that they may still be intercepted and stored. This gives attackers time to try breaking encryption as technology advances and more sophisticated techniques are discovered.&lt;/p&gt;
&lt;h4 id=&#34;software-environment&#34;&gt;Software Environment&lt;/h4&gt;
&lt;p&gt;Your messaging software may be perfect, but that may not prevent other parts of your system proactively attempting to spy on you. Even something as innocuous as the &lt;a href=&#34;https://9to5mac.com/2023/12/06/push-notification-spying/&#34;&gt;notifications system&lt;/a&gt; on your smart phone can be used to steal information.&lt;/p&gt;
&lt;h2 id=&#34;interlude-why-is-this-worth-understanding&#34;&gt;Interlude: &lt;em&gt;Why is this Worth Understanding?&lt;/em&gt;&lt;/h2&gt;
&lt;p&gt;It&amp;rsquo;s critical that we get key management &lt;em&gt;right&lt;/em&gt;. After countless data breaches and hacks, it&amp;rsquo;s understandable that institutions want to move people away from difficult (if not impossible) to secure systems like email and sms. You&amp;rsquo;ll notice, both of these systems are used for &lt;strong&gt;authentication&lt;/strong&gt;. Not only that, but sms for 2nd-factor authentication is also what has increased people&amp;rsquo;s dependency on smartphones. We have a &lt;em&gt;chicken and the egg&lt;/em&gt; problem when it comes to authentication. Switching to new systems ultimately requires some way to practically solve &lt;strong&gt;key management&lt;/strong&gt;.&lt;/p&gt;
&lt;h3 id=&#34;diving-into-authentication&#34;&gt;Diving into Authentication&lt;/h3&gt;
&lt;p&gt;There is a &lt;a href=&#34;https://libresolutions.network/articles/real-name-online/&#34;&gt;great push&lt;/a&gt; to end online privacy for all kinds of reasons. Governments and corporations don&amp;rsquo;t really have incentives to protect you from risk, but rather want to &lt;em&gt;protect themselves from your risk.&lt;/em&gt; This is why many workplaces will issue their own devices, locked down under their control and governments are seeking ways to digitize personal identification.&lt;/p&gt;
&lt;p&gt;If we truly want to be in control of our own digital identities, and how they can and can&amp;rsquo;t be used, it&amp;rsquo;s critical that we refuse to be boxed into identity systems modeled after feudalism. Of course, escaping it by oneself is hardly sufficient, as liberty-minded individuals it is of utmost importance that we empower others to also refuse digital tyranny. Tools are a useful part of this, but so is understanding the proper boundaries.&lt;/p&gt;
&lt;p&gt;By allowing a corporation or government to assign you a sole, permanent, digital key management system under their control, you&amp;rsquo;re not a client but a subject. Suddenly as that authentication mechanism becomes embedded in other areas, such as entertainment, finance, and even social interaction one can be penalized in all kinds of cruel and bizarre ways. While using a single, intuitive, and permanent authentication method for everything may seem convenient, it&amp;rsquo;s going to have troubling drawbacks if people don&amp;rsquo;t have at least the option of self-custody.&lt;/p&gt;
&lt;p&gt;Hardware authenticators and global password-less logins aren&amp;rsquo;t inherently evil, but it&amp;rsquo;s easy to see how they will be used to lure people into digital key management systems that take authentication out of their control. This can get much worse as biometrics are integrated into authentication itself. In that scenario it can be much harder to opt-out.&lt;/p&gt;
&lt;p&gt;Anyways, it&amp;rsquo;s worth thinking about.&lt;br&gt;
Back to messaging software.&lt;/p&gt;
&lt;h2 id=&#34;common-pitfalls&#34;&gt;Common Pitfalls&lt;/h2&gt;
&lt;h3 id=&#34;reliance-on-smartphones&#34;&gt;Reliance on Smartphones&lt;/h3&gt;
&lt;p&gt;Mainstream smartphone platforms have constant and pervasive privacy risks, even from the manufacturer&amp;rsquo;s themselves. This makes reliance on smartphones a net-negative for any secure messaging system. Some messengers exist exclusively as smartphone apps, meaning that those who do not use, or would prefer not to use them are locked out entirely. If nothing else, it&amp;rsquo;s nice to have access to a keyboard once in a while.
Requiring a phone number and/or text message to register is functionally the same as requiring a mobile phone to use the system.&lt;/p&gt;
&lt;h3 id=&#34;large-groups&#34;&gt;Large Groups&lt;/h3&gt;
&lt;p&gt;As the number of participants rise, encrypting communications becomes more complex, and less useful as the content becomes all-but public information anyways. In some circumstances, it may be preferable to warn users as groups become too large to keep meaningfully private.&lt;/p&gt;
&lt;h3 id=&#34;third-party-integrations&#34;&gt;Third-Party Integrations&lt;/h3&gt;
&lt;p&gt;It can be very simple to rely on external providers for additional features. These additional features can come with significant privacy risks as clients make requests to these additional services. This can also include problems and security threats inherited from software ecosystem choices like particular libraries and APIs.&lt;/p&gt;
&lt;h3 id=&#34;user-experience-challenges&#34;&gt;User Experience Challenges&lt;/h3&gt;
&lt;p&gt;It can be difficult when a piece of software is superior on a large variety of important criteria, but then fails to be intuitive to use. This can be a significant barrier, and may also include accessibility concerns.&lt;/p&gt;
&lt;h3 id=&#34;free-of-charge-vs-paid-services&#34;&gt;Free of Charge vs Paid Services&lt;/h3&gt;
&lt;p&gt;Who funds development? Where does the hosting for the service come from?
These are critical questions to ask about any project, but it&amp;rsquo;s especially important when it comes to your private communications. There&amp;rsquo;s also the question of non-technical uses of funding. Does the app have an army of (potentially paid) online marketers? Is it featured in advertising or paid sponsorships? Are donations/revenue used for efforts that are more about politics than improving services?&lt;/p&gt;
&lt;h2 id=&#34;open-protocols&#34;&gt;Open Protocols&lt;/h2&gt;
&lt;p&gt;Open, interoperable protocols are exciting. They can help separate specific service providers from being the totality of the system itself. In the long run, hopefully these systems become significantly anti-fragile as they&amp;rsquo;re adopted further. The main advantage of having an open protocol is that a variety of client software can be used, instead of betting everything on a single application. The point of an open protocol is to define a &lt;em&gt;common standard&lt;/em&gt; that different systems can all interact through.&lt;/p&gt;
&lt;p&gt;When it comes to choosing between Matrix and XMPP, you may want to consider &lt;a href=&#34;https://lukesmith.xyz/articles/matrix-vs-xmpp/&#34;&gt;this outline.&lt;/a&gt; That said, open protocols are one of the foundational pieces of building a better technological future.&lt;/p&gt;
&lt;h3 id=&#34;xmpp&#34;&gt;XMPP&lt;/h3&gt;
&lt;p&gt;The &lt;a href=&#34;https://xmpp.org/&#34;&gt;Extensible Messaging and Presence Protocol&lt;/a&gt; has been around since at least 2004. It is a &lt;a href=&#34;https://ijver.me/blog/xmpp-explained/&#34;&gt;fully decentralized&lt;/a&gt; protocol with a variety of clients and servers. Definitely worth considering for fully independent communications infrastructure. XMPP supports multiple end-to-end encryption schemes. Since XMPP is an open protocol, it&amp;rsquo;s possible to &lt;a href=&#34;https://getimiskon.xyz/posts/2022/2022-04-21.html&#34;&gt;build a server from scratch&lt;/a&gt;.&lt;/p&gt;
&lt;h4 id=&#34;clients&#34;&gt;Clients&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;For Linux/Windows: &lt;a href=&#34;https://gajim.org&#34;&gt;Gajim&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;MacOS/iOS: &lt;a href=&#34;https://monal-im.org/&#34;&gt;Monal&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Android: &lt;a href=&#34;https://conversations.im/&#34;&gt;Conversations&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;servers&#34;&gt;Servers&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://prosody.im/&#34;&gt;Prosody&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.ejabberd.im/index.html&#34;&gt;Ejabberd&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://digdeeper.club/articles/xmpp.xhtml&#34;&gt;Advanced guide&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;matrix&#34;&gt;Matrix&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://matrix.org/&#34;&gt;Matrix&lt;/a&gt; is an &amp;ldquo;open network for secure, decentralized communication&amp;rdquo;. The primary client is Element, which is a polished and intuitive cross-platform application. The matrix foundation has some &lt;a href=&#34;https://matrix.org/blog/2023/09/matrix-2-0/&#34;&gt;exciting innovations&lt;/a&gt; in the works, including &lt;a href=&#34;https://thirdroom.io/landing&#34;&gt;VR experiences!&lt;/a&gt;&lt;/p&gt;
&lt;h4 id=&#34;clients-1&#34;&gt;&lt;a href=&#34;https://matrix.org/ecosystem/clients/&#34;&gt;Clients&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://element.io&#34;&gt;Element&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://fluffychat.im/&#34;&gt;Fluffychat&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://schildi.chat/&#34;&gt;SchildiChat&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;servers-1&#34;&gt;&lt;a href=&#34;https://matrix.org/ecosystem/servers/&#34;&gt;Servers&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/matrix-org/synapse/&#34;&gt;Synapse&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://conduit.rs/&#34;&gt;Conduit&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;alternative-messengers&#34;&gt;Alternative Messengers&lt;/h2&gt;
&lt;h3 id=&#34;signal&#34;&gt;Signal&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://www.signal.org/&#34;&gt;Signal&lt;/a&gt; has recently been under harsh scrutiny after recently &lt;a href=&#34;https://www.signal.org/blog/signal-is-expensive/&#34;&gt;asking for donations&lt;/a&gt; to run their service and &lt;a href=&#34;https://www.androidpolice.com/signal-testing-usernames-feature-privacy-messenger/&#34;&gt;beginning testing&lt;/a&gt; on using usernames instead of phone numbers. Despite a &lt;a href=&#34;https://restoreprivacy.com/secure-encrypted-messaging-apps/signal/&#34;&gt;solid history&lt;/a&gt; the hard requirement of using a phone number has been a significant concern.&lt;/p&gt;
&lt;p&gt;For those unable or unwilling to run their own communications infrastructure, Signal is a huge improvement over corporate and mainstream social media messengers and boasts &lt;a href=&#34;https://www.signal.org/blog/pqxdh/&#34;&gt;quantum resistance&lt;/a&gt;. In fact, many of them are adopting a modified (possibly inferior) version of the signal implementation of end-to-end encryption.&lt;/p&gt;
&lt;p&gt;For android, &lt;a href=&#34;https://molly.im/&#34;&gt;Molly&lt;/a&gt; is a fully-free open source alternative client. The majority of issues surrounding Signal are inherent to using a phone with &lt;a href=&#34;https://drewdevault.com/2018/08/08/Signal.html#google-play&#34;&gt;google play services.&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;briar&#34;&gt;Briar&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://briarproject.org/&#34;&gt;Briar&lt;/a&gt; is a fascinating project aimed to allow communication over a variety of networks, including bluetooth. Unfortunately, Briar is limited to running on Android and it would be nice if it supported other platforms. Briar is missing some expected features, but it&amp;rsquo;s censorship resistance features are very sophisticated.&lt;/p&gt;
&lt;h3 id=&#34;simplex&#34;&gt;SimpleX&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://simplex.chat/&#34;&gt;SimpleX&lt;/a&gt; is very much in the same vein as Briar. Looks like an excellent and promising project, but sadly is limited to smartphones. SMP servers can be &lt;a href=&#34;https://simplex.chat/docs/server.html&#34;&gt;self-hosted&lt;/a&gt; and the documentation is quite good.&lt;/p&gt;
&lt;h3 id=&#34;jami&#34;&gt;Jami&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://jami.net/&#34;&gt;Jami&lt;/a&gt; is a peer-to-peer communication suite available for android, Windows &amp;amp; Linux. It can also function as a SIP client to make ordinary phone calls. Jami can take a bit of time to learn, but has a wide array of useful features.&lt;/p&gt;
&lt;h2 id=&#34;what-to-choose&#34;&gt;What to Choose?&lt;/h2&gt;
&lt;p&gt;I generally recommend not putting all your hopes into a single option. By restricting your choices to a single option it can be difficult to coordinate with others. Being flexible can help, but this should be reciprocal. Everyone&amp;rsquo;s situation and desired results will be different, but in general I recommend using the most secure options that you and your contacts are willing to learn/adopt.&lt;/p&gt;
&lt;p&gt;This is no trivial task, which is why you should help inform your contacts why taking their own privacy and security affects them and you. Many hands make light work, and we can achieve a lot when we work together.&lt;/p&gt;
&lt;h2 id=&#34;potential-game-changers&#34;&gt;Potential Game-Changers&lt;/h2&gt;
&lt;p&gt;None of this means we are doomed forever. There is a great deal of opportunity in working to resolve these problems. Not only that, but there are some key innovations that would go a long way to tipping the scales in favor of secure self-custody communications.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Modularity&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;So called &amp;ldquo;&lt;em&gt;freedom tech&lt;/em&gt;&amp;rdquo; needs to embrace the &amp;ldquo;Unix Philosophy&amp;rdquo;: &lt;em&gt;Do one thing, and do it well&lt;/em&gt;. Far too many projects will try to reinvent &lt;em&gt;everything&lt;/em&gt; and predictably fall flat while doing so. For example, when developing software for a particular purpose, consider using an open standard like &lt;a href=&#34;https://openid.net/developers/how-connect-works/&#34;&gt;OpenID connect&lt;/a&gt; or &lt;a href=&#34;https://indieauth.net/&#34;&gt;IndieAuth&lt;/a&gt; to let other software handle authentication. &lt;a href=&#34;https://matrix.org/blog/2023/09/better-auth/&#34;&gt;Separating authentication&lt;/a&gt; from primary functions can allow for other innovations to improve that aspect of more systems.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Hardware Keys&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;A truly Free (&lt;em&gt;as in Freedom&lt;/em&gt;) self-custody system for managing encryption keys could help in many areas. A permission-less system like &lt;a href=&#34;https://fidoalliance.org/fido2/&#34;&gt;FIDO2&lt;/a&gt; could go a long way to make secure options much more user-friendly. Allowing for greater convenience and greater autonomy.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Network Agnosticism&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Assumptions made in the past may not hold for the future of a more surveilled and censored Internet. The ability to seamlessly work with censorship evasion and anonymity technologies like &lt;a href=&#34;https://libresolutions.network/operations/shadow&#34;&gt;Tor and I2P&lt;/a&gt; can go a long way.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Generative Tools&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If metadata is such a big problem, embedded text-generation machine learning models could send out extra communications at random to unused keys. This could make the complexity of mapping actual communications significantly more expensive at minimal computational cost.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Custom Devices&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;People would do well to take inspiration from &lt;a href=&#34;https://hackaday.com/2023/08/07/review-beepy-a-palm-sized-linux-hacking-playground/&#34;&gt;Beepy&lt;/a&gt; which is a custom device one can use with secure messengers. This straightforward concept of a single-purpose device can greatly reduce people&amp;rsquo;s dependency on surveillance devices.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Digital Autonomy and Resilient Living</title>
		<link>https://libresolutions.network/videos/resilient-living/</link>
		<pubDate>Fri, 08 Dec 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/resilient-living/</guid>
		
		<image>https://libresolutions.network//media/images/resilient-living-banner.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/resilient-living-banner.webp" />
		<itunes:image href="https://libresolutions.network//media/images/resilient-living-banner.webp" />
		<description>Understanding down to earth solutions to practical problems.</description>
		<content:encoded>&lt;p&gt;In this feature of &lt;a href=&#34;https://libresolutions.network/tags/digital-autonomy-series&#34;&gt;Digital Autonomy Discussions&lt;/a&gt; Gabriel had a discussion with Rebecca Cunningham who runs &lt;a href=&#34;https://www.redflyermedia.com/&#34;&gt;Red Flyer Media.&lt;/a&gt; She is a Visual Storyteller, Motorcycle Rider, Vagabond, Video Editor, Moto-Journalist, Documentary Filmmaker. We discuss censorship resistance, the rural and urban divide, as well as the many factors of building up one&amp;rsquo;s own independence.&lt;/p&gt;
&lt;h3 id=&#34;resources-referenced&#34;&gt;Resources Referenced:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://meshtastic.org/&#34;&gt;Meshtastic&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://hackaday.io/project/164092-npr-new-packet-radio&#34;&gt;New Packet Radio&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtube.com/playlist?list=PLstAKURZ5YBhvKAuymg_Y0sC4w5aKN66w&amp;amp;si=2rs5-L4tEcDyJuYc&#34;&gt;Bear&amp;rsquo;s Prepper Classroom Playlist&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/live/u5qBwTIklUE?si=nk-z2hzrCZ21pPqF&#34;&gt;Jack Spirko&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtube.com/@lftn?si=olM53Fl06JYhqv_O&#34;&gt;Nicole Sauce&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;more-to-come&#34;&gt;More to Come&lt;/h2&gt;
&lt;p&gt;This series is intended to help bring together different voices to explore how technology can help (or hinder) people&amp;rsquo;s ability to live their lives. This episode is just a taste of the wide array of topics worth giving their own attention.&lt;/p&gt;
&lt;h3 id=&#34;join-the-discussion&#34;&gt;Join the Discussion&lt;/h3&gt;
&lt;p&gt;Would you like to talk about where digital autonomy intersects with your passion?&lt;br&gt;
You&amp;rsquo;re invited! Feel free to &lt;a href=&#34;https://libresolutions.network/videos/2023-11/#digital-autonomy-series&#34;&gt;get in touch.&lt;/a&gt;&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Papers Please: The Attack on Online Privacy</title>
		<link>https://libresolutions.network/articles/real-name-online/</link>
		<pubDate>Sat, 18 Nov 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/real-name-online/</guid>
		
		<image>https://libresolutions.network//media/images/no-trolls-wide.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/no-trolls-wide.webp" />
		<itunes:image href="https://libresolutions.network//media/images/no-trolls-wide.webp" />
		<description>Undermining online anonymity enables tyranny</description>
		<content:encoded>&lt;h2 id=&#34;leaping-at-shadows&#34;&gt;Leaping at Shadows&lt;/h2&gt;
&lt;p&gt;Calls to end anonymity on social media are not new, but every once in a while they return as tensions rise. These renewed calls will suggest more &lt;a href=&#34;https://x.com/CitizenFreePres/status/1724527403798561155&#34;&gt;extreme measures against platforms&lt;/a&gt; that allow even mere pseudonymity, much less complete anonymity. These proposals aim to ensure that the cost of communication with others, or even the public will be privacy. The argument presumes that if everyone was forced to have everything recorded in their real name, then interactions online would always be more civil and productive.&lt;/p&gt;
&lt;p&gt;This is a very disingenuous argument. Seemingly polite and efficient communications under one set of assumptions, at one time, may be seen in an entirely different context years later. Forcing people to speak only with their real names forces all communication to be contextualized within &lt;a href=&#34;https://denisrancourt.ca/entries.php?id=20&#34;&gt;real-life power struggles.&lt;/a&gt; To say it a different way, the progressive leftists &lt;em&gt;are correct&lt;/em&gt; that &lt;strong&gt;free speech isn&amp;rsquo;t free speech if it&amp;rsquo;s constrained by social status and institutional forces.&lt;/strong&gt; Where they tend to go wrong is that they believe that building a new &amp;ldquo;equitable&amp;rdquo; social hierarchy and institutional structure on top can resolve this conflict.&lt;/p&gt;
&lt;p&gt;What they misunderstand, but the establishment power players do understand quite well is that &lt;em&gt;online anonymity changes the game&lt;/em&gt;. The &lt;a href=&#34;https://www.activism.net/cypherpunk/manifesto.html&#34;&gt;cypherpunks&lt;/a&gt; had the right idea, give the people privacy and we can liberate ideas from the humans they&amp;rsquo;re temporarily attached to. You may have heard &lt;em&gt;&amp;ldquo;If voting ever really made a difference, they would make it illegal!&amp;rdquo;&lt;/em&gt;, with that in mind you might reconsider why online anonymity is such a threat to power. Despite being around for quite a while, people tend to misunderstand &lt;strong&gt;what social media is.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is limitless information online, more media than you could ever watch or listen to in many lifetimes. People do need a layer to discover, prioritize and share that content. One of the things that made social media immediately successful was to receive content made by, or suggested by your trusted contacts. Over time, platforms moved to &lt;em&gt;monetize&lt;/em&gt; that trusted attention and started taking over people&amp;rsquo;s feeds. This has lead to many people forgetting what good &lt;a href=&#34;https://libresolutions.network/articles/social-media/&#34;&gt;social media&lt;/a&gt; ever was in the first place. With state censorship and corporate surveillance the deal has only &lt;a href=&#34;https://libresolutions.network/articles/dead-internet/&#34;&gt;gotten worse&lt;/a&gt; and worse over time.&lt;/p&gt;
&lt;p&gt;But hypothetically, the fact that you still &lt;em&gt;can get information from others&lt;/em&gt; near and afar, friend and foe alike is &lt;em&gt;immensely powerful&lt;/em&gt;. Being able to learn from those who don&amp;rsquo;t share your background can help broaden your perspective and make you empathize with those you may not otherwise. Being able to receive information from others across space and time without governments or corporations interfering is &lt;strong&gt;the gamechanger&lt;/strong&gt; that the powerful fear the most. This is why you should be not just suspicious, but outright disgusted at those who wish to restrict all communication to real names only.&lt;/p&gt;
&lt;p&gt;This is why journalists &lt;a href=&#34;https://www.politico.eu/article/the-curse-and-blessing-of-the-anonymous-source/&#34;&gt;have procedures&lt;/a&gt; to protect whistleblowers, who must remain anonymous to keep them safe from retaliation. Unfortunately, as media institutions become corrupted, so too does their ability to properly platform those wishing to fight abuse. A problem with this is that while one may have important information, it may be seen as not worthy of a particular journalists time. We should be grateful that there are &lt;a href=&#34;https://libresolutions.network/operations/shadow/&#34;&gt;tools that can&lt;/a&gt; help whistleblowers speak to the public directly without risking their identity and safety. It&amp;rsquo;s frustrating to see the calls for transparency only go in one direction. The &lt;a href=&#34;https://libresolutions.network/articles/coordinated-attack/&#34;&gt;policy position&lt;/a&gt; is clear: &lt;em&gt;&amp;ldquo;Privacy for me, but not for thee&amp;rdquo;&lt;/em&gt;&lt;/p&gt;
&lt;h2 id=&#34;whats-in-a-name&#34;&gt;What&amp;rsquo;s in a Name?&lt;/h2&gt;
&lt;p&gt;It is quite convenient that &lt;a href=&#34;https://x.com/C_Kavanagh/status/1669505248220839936&#34;&gt;the people&lt;/a&gt; who often advance calls to undermine privacy are those who have &lt;em&gt;already established&lt;/em&gt; profitable personas within the established orthodoxy. When one speaks out in their own name, (&lt;em&gt;as I do&lt;/em&gt;) there is a price being paid to do so. Naturally one is open to criticism and attacks, but also the internet never forgets. We are in a time where one&amp;rsquo;s public positions are always known once they are known. We would all do well to be &lt;em&gt;careful&lt;/em&gt; with what we wish to attach our names to. This is often why those who choose to speak out in their names receive significant praise and trust. After all, if one is willing to stake their entire reputation on an issue, they must always be a strong incorruptible champion. The trouble though, is that things don&amp;rsquo;t always work out that way.&lt;/p&gt;
&lt;p&gt;Not everyone can afford to risk their income, or even their lives, to dissent against power. While there will always be a lucky few, who are able or willing to take that risk, imposing it on others will simply reduce the amount of people willing to speak out. It would be a mistake to restrict all speech to those who can afford to take the risk of speaking in their name. Protecting online privacy allows for more people to speak out about more things. It&amp;rsquo;s very possible that there are people in positions to reveal damning secrets, but don&amp;rsquo;t feel safe pointing others to the truth. From top secret institutions, to corporations, and even families, it&amp;rsquo;s critical that there is always a channel for people to speak out about abuse, especially of the vulnerable. It should be our top priority to ensure that it&amp;rsquo;s &lt;em&gt;possible&lt;/em&gt; to correct grave wrongs.&lt;/p&gt;
&lt;iframe src=&#39;https://tube.tchncs.de/videos/embed/c0b1f5f8-1192-4efc-b9e8-8fa5d8286ba3?title=0&#39; style=&#34;height:max-content;aspect-ratio: 16/9;min-height:460px;max-height:15rem;max-width:60rem;&#34; width=&#34;100%&#34; height=&#34;100%&#34;&gt;

&lt;/iframe&gt;
&lt;p&gt;For the majority of the public, the information landscape has significantly consolidated around a few major services. With the exception of those who have already fled to &lt;a href=&#34;https://libresolutions.network/articles/call-to-action-join-the-fediverse/&#34;&gt;decentralized alternatives,&lt;/a&gt; the majority of social media users have their attention constrained to a couple of corporate controlled entities. Those entities are under pressure of more state control to direct that attention. This means that anyone choosing to speak out in their name has to be careful about how they use their limited resources to make an impact. Those with power and influence can easily bribe, flatter, or otherwise compromise those with a large following. One may have a critical message to share, but the means they use to disseminate it can be quite restrictive.&lt;/p&gt;
&lt;p&gt;To make things worse, using real names doesn&amp;rsquo;t eliminate the worst of abuse and hostility. Hate and rage is often freely expressed (and sometimes rewarded) when taken out on &lt;a href=&#34;https://www.campfire.wiki/doku.php?id=divisive_rhetoric_about_the_unvaccinated&#34;&gt;officially sanctioned targets&lt;/a&gt;, creating scenarios where those speaking out in their names are likely to be more cruel than one can be without naming themselves. When people are attacked by those with a well-known identity, it can often be more personal than a few low-effort attacks from trolls. This gets worse when everyone has to be named. Without the choice of opt-ing out of giving up your identity, you are forced to run the risk of eventually being turned into an &amp;ldquo;&lt;em&gt;acceptable target&lt;/em&gt;&amp;rdquo; with no recourse.&lt;/p&gt;
&lt;p&gt;This is true of taken names as well. Pseudonymity doesn&amp;rsquo;t protect against attacks, slander, sanction or almost any other measure that can silence a real name. The major advantages of using a pseudonym is that your content can be disconnected from you as a person, and that your pseudonym is disposable. In fact, using a pseudonym instead of your real name was generally considered to be &lt;em&gt;basic internet safety&lt;/em&gt; until social media companies started selling your data. When one demands all pseudonyms be unmasked, I ask: &amp;ldquo;What gives you the right to demand everyone&amp;rsquo;s personal information?&amp;rdquo;. Because unlike a pseudonym, your real name &lt;strong&gt;isn&amp;rsquo;t disposable&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;This is not to say that there shouldn&amp;rsquo;t be places where people choose to interact with their real names, but we should vehemently resist a one-size-fits-all imposition. Shoving anonymity and pseudonymity out of real-discussions won&amp;rsquo;t improve things, but in fact is more likely to cause more radicalization and abuse. Discussions without real names attached can be less personal, so rational thought can take the wheel instead of heightened emotions. Emotions are part of the human experience. We should guide our thoughts and actions with love and compassion, just not at the expense of wrestling with difficult ideas.&lt;/p&gt;
&lt;h2 id=&#34;society-needs-its-radicals&#34;&gt;Society Needs Its Radicals&lt;/h2&gt;
&lt;p&gt;Much of the desire to purge online spaces of privacy has to do with the idea of building a &lt;em&gt;perception&lt;/em&gt; of proper care and etiquette. There is nothing wrong with an exclusive space curating their own ideal experience, the troubles come when that becomes the only permissible model. Unlike the real-life metaphors people will cling to, such as bars and concert halls, the internet practically has no space limits. Outside of the raw storage to hold media, and the bandwidth to carry it, there is no reason one space has to exist at the expense of another. What does happen, is that legacy institutions resist and attack attempts to build democratized competition.&lt;/p&gt;
&lt;p&gt;Radicals and their wild ideas can challenge long-held assumptions that may no longer hold, or resolve an untenable contradiction. New ways of thinking, new ways of solving problems are always a threat to entrenched power. Not all wild ideas are good ones, but the only way to find out which ones is to give them a chance to be understood. The more an institution is build on assumption, the more vulnerable it is to being disrupted by new concepts and different views. This means that those institutions will treat those ideas as an existential threat, regardless of their merits.&lt;/p&gt;
&lt;p&gt;The advantage of isolating ideas, is that they can move faster than people. You have permission to copy this text, and share it with your friends, and they have the same granted to them, and so on. If this caught on, this piece and it&amp;rsquo;s points would spread faster than any institution could keep up with. This is true of any written words, but we&amp;rsquo;re seeing it apply more and more to images, and video as digital technology advances. Anything that becomes detached from it&amp;rsquo;s origin and spread gets the benefit of being interpreted and reinterpreted from all kinds of different contexts. This can either add clarity, or refute the concept entirely.&lt;/p&gt;
&lt;p&gt;Online &lt;em&gt;and offline&lt;/em&gt; anonymity is &lt;a href=&#34;https://libresolutions.network/articles/anonymity/&#34;&gt;worth protecting,&lt;/a&gt; but there&amp;rsquo;s so much more that we can do. If we really want to move on from corrupt institutions, captured governments, and hostile media, it&amp;rsquo;s possible we need to rediscover ways to cooperate without all the extra noise of who is who. A crucial task is building up tools, infrastructure, and projects that democratize information without compromising on people&amp;rsquo;s privacy. This is because with a bit of creativity, all of us can &lt;a href=&#34;https://libresolutions.network/operations/beehive/&#34;&gt;work together&lt;/a&gt; in ways that are impossible to shut down. A group of people working anonymously for a common purpose are significantly more expensive and complicated to infiltrate, bribe, or control. It&amp;rsquo;s really easy to manipulate and pick apart a few popular figures, or pit their fans against each other. Successfully building efficient bottom-up tools can create a win-win scenario: institutions either reform themselves to adapt to the new circumstances, or are made obsolete by new structures. Either way, the people can choose to move things in a better direction.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>The EU Cyberwar on People &amp; the Web</title>
		<link>https://libresolutions.network/articles/eu-cyberwar/</link>
		<pubDate>Mon, 06 Nov 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/eu-cyberwar/</guid>
		
		<image>https://libresolutions.network//media/images/web surveillance &amp; control.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/web%20surveillance%20&amp;%20control.webp" />
		<itunes:image href="https://libresolutions.network//media/images/web%20surveillance%20&amp;%20control.webp" />
		<description>Digital ID and undermining browsers</description>
		<content:encoded>&lt;p&gt;The largest institutions from governments, alliances, and multi-national corporations are all wrestling for control over total digital dominance of the public. Your own access to information, and control over your data are both important objectives to these organizations. This battle over people&amp;rsquo;s digital lives is not without it&amp;rsquo;s consequences. There are disastrous possibilities if any group manages to secure surveillance and/or control over everyone&amp;rsquo;s online communications, transactions, and information.&lt;/p&gt;
&lt;p&gt;This problem isn&amp;rsquo;t new. Even back in 2002, Stephan Engberg was one of many warning about how knee-jerk approaches to digital security can end up creating new unnecessary risks. From convenience to institutions with control over our lives, there are all kinds of ways in which security and control can be out of the people&amp;rsquo;s hands. Essential services like banking, communication, and access to necessities can very easily be gated behind &amp;ldquo;&lt;em&gt;secure&lt;/em&gt;&amp;rdquo; options fraught with problems.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/privacy-engineering-group-bigdata-vs-smalldata.webp&#39; 
&gt;


&lt;p class=&#34;caption&#34;&gt;
    Privacy Engineering Group - Stephan Engberg &lt;a target=&#39;_blank&#39; href=&#39;https://youtu.be/G1AjkYFlPF4&#39;&gt;Source&lt;/a&gt;
&lt;/p&gt;


&lt;/div&gt;
&lt;p&gt;There is a temptation, to try to build a &lt;em&gt;privacy respecting&lt;/em&gt; foundation to build digital identity on. Stephan himself is working on Citizenkey, which aims to make anonymous verification possible, with the possibility of de-anonymization through a trusted third party. As an alternative route to total top-down control and tyranny, this would seem like a decent compromise, but unfortunately there is little reason to believe it would stay that way. The assumption that institutions have the right to treat people like livestock to be tracked is &lt;em&gt;itself the problem&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;There is no reason that as our lives are transformed by additional digital options, that we must accept losses of privacy to move forward. This arrogant fallacy merely suits those who want to rent-seek on advances in technology by privatizing (or brokering) control of it. At least while we still can, it&amp;rsquo;s important to remember that each and every one of us cna choose a different path.&lt;/p&gt;
&lt;h1 id=&#34;the-poison-pill&#34;&gt;The Poison Pill&lt;/h1&gt;
&lt;p&gt;The EU recently had to &lt;a href=&#34;https://digitalcourage.social/@echo_pbreyer/111301651490673542&#34;&gt;back-off extreme client-side-scanning&lt;/a&gt; measures, to much fanfare, even calling it a victory. Repealing merely the most offensive part of legislation that can enable and sanction state overreach is not a long-term solution. As we can see, the EU is already
rolling forward with more egregious attacks on people&amp;rsquo;s privacy.&lt;/p&gt;
&lt;p&gt;An &lt;a href=&#34;https://blog.mozilla.org/netpolicy/files/2023/11/eIDAS-Industry-Letter.pdf&#34;&gt;open letter&lt;/a&gt; signed by Mozilla, and other tech organizations and companies, decries the inclusion of a &lt;strong&gt;root certifiate&lt;/strong&gt; into browsers. A &lt;a href=&#34;https://last-chance-for-eidas.org/art45interception.html&#34;&gt;root certificate&lt;/a&gt; is a digital file that validates SLL certificates for websites, for any website. If I can place a root certificate on your device (or have it included in your browser) I have the ability to decrypt &lt;strong&gt;all of your online traffic&lt;/strong&gt;. This has been done &lt;a href=&#34;https://censoredplanet.org/kazakhstan&#34;&gt;by despotic regimes&lt;/a&gt; to snoop on internet traffic and opens the door to even more egregious acts of online censorship. Not only are the root certificates required, but under the regulations browsers are not allowed to revoke the certificates if they are abused.&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s great to have organizations like the Linux Foundation, and companies like Cloudflare stand up for our internet security right? &lt;em&gt;Not so fast!&lt;/em&gt; All the fanfare about eIDAS 2.0 seems to suspiciously exclude the fact that the regulation itself builds a framework for digital ID. These organizations are merely standing against the worst part of legislation that will undermine digital freedoms. If we can&amp;rsquo;t trust our governments to &lt;strong&gt;not&lt;/strong&gt; include provisions like the root certificate addition, trusting hem with digital ID is merely another opportunity to exploit the public.&lt;/p&gt;
&lt;h1 id=&#34;digital-id&#34;&gt;Digital ID&lt;/h1&gt;
&lt;p&gt;It&amp;rsquo;s well understood that most internet traffic is bots these days. It&amp;rsquo;s only becoming harder and harder for us and the controllers to tell who is a person and who is a digital agent acting on someone&amp;rsquo;s behalf. Surveillance and control of the outside world is still an expensive and violent affair. &lt;a href=&#34;https://libresolutions.network/tags/digital-id&#34;&gt;Digital ID&lt;/a&gt; is something that can mitigate both these problems. By forcing you to give up anonymity (or even pseudonymity) in a variety of places, you can be controlled by those who control the system.&lt;/p&gt;
&lt;p&gt;During the Covid Crisis &lt;a href=&#34;https://www.campfire.wiki/doku.php?id=vaccine_passport&#34;&gt;vaccine passports&lt;/a&gt; functioned as a  beta test for Digital ID. Access to all kinds of entertainment and recreation was contingent on having a digital wallet that included your health information, many people lost their employment for lacking one. Far from a hypothetical, China used the health pass system to &lt;a href=&#34;https://www.reuters.com/world/china/china-bank-protest-stopped-by-health-codes-turning-red-depositors-say-2022-06-14/&#34;&gt;suppress bank runs.&lt;/a&gt; This has given many insight into the abuses that are possible if access to services and essentials is gated behind a programmable identification.&lt;/p&gt;
&lt;p&gt;While sympathy for those without vaccine passports wasn&amp;rsquo;t particularly high where I lived, it&amp;rsquo;s important to understand what this system does to all of our fundamental rights. For quite some time now, the western world has made civil rights progress by establishing groups that are protected from particular kinds of discrimination. Just as it wasn&amp;rsquo;t any help to protect people from medical discrimination during the covid crisis, this framework will be wholly inadequate at protecting people from automated &lt;em&gt;individual discrimination&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;If the power structure has insight to all of a person&amp;rsquo;s activities, what they read, and what they say. It becomes easier to oppress particular people for reasons that aren&amp;rsquo;t attached to a protected class. More and more people&amp;rsquo;s fundamental rights will be eroded by a constant flow of conjured &lt;em&gt;exceptions&lt;/em&gt; to individual rights protections. In the Covid Crisis the discrimination was over health decisions, but the exact same framework could be used towards other ends. One day, a tyrant could use the system to punish those who are &lt;em&gt;neurodivergent&lt;/em&gt;, or otherwise &lt;em&gt;deviant&lt;/em&gt; from the ideal model citizen.  Instead of punishing people for crimes, you can use permissioned control of society to punish individuals for &lt;em&gt;what they are&lt;/em&gt; and for particular aspects of their lives.&lt;/p&gt;
&lt;h3 id=&#34;slowly-then-all-at-once&#34;&gt;Slowly, Then All At Once&lt;/h3&gt;
&lt;p&gt;Bit by bit, people have granted large corporations more and more control over people&amp;rsquo;s lives. Governments are keenly interested in having an impact on this new source of power. The great challenge is that there may come a time where it is impossible for people within this system to reverse the effects and regain control. Digital IDs being launched voluntarily, is no guarantee that they will remain optional.&lt;/p&gt;
&lt;p&gt;From &lt;a href=&#34;https://digital-strategy.ec.europa.eu/en/faqs/qa-digital-identity-regulation-proposal&#34;&gt;the FAQ&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;The main novel element offered by the new rules is that everyone will have a right to have a EU Digital Identity Wallet which is accepted in all Member States. But at the same time, there will be no obligation. Users will be able to control what personal data they want to share with online services. While &lt;strong&gt;public services and &lt;em&gt;certain private services will be obliged to recognise&lt;/em&gt; the EU Digital Identity Wallet&lt;/strong&gt;, its security features make it attractive for all private service providers to recognise it for services that require strong authentication, creating new business opportunities.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;The fundamental issue is if people are willing to let top-down state control be inserted into all aspects of their lives like the internet was. Will people allow their governments to use corporations acting on their behalf, to carry out the same overreach? Will those who truly want to protect individual rights, find ways to help others outside this system? Is it already too late?&lt;/p&gt;
&lt;h1 id=&#34;what-can-we-do&#34;&gt;What Can We Do?&lt;/h1&gt;
&lt;h3 id=&#34;right-to-be-offline&#34;&gt;Right To Be Offline&lt;/h3&gt;
&lt;p&gt;Accept that there are situations where people shouldn&amp;rsquo;t be forced to use a particular electronic system or device. Accept that anonymity, especially online, is one of the best ways to protect against total surveillance. Anything that can be done to support those who choose not to be identified, or to refuse interacting with particular systems and services can go a long way.&lt;/p&gt;
&lt;h3 id=&#34;pushback&#34;&gt;Pushback&lt;/h3&gt;
&lt;p&gt;Get connected with people in your jurisdiction and get informed about the state of cyber laws and protections affecting you. A single person writing in to their bought-and-paid for politician isn&amp;rsquo;t sufficient. This has to be one of the issues that a coalition is built around to find a better direction. Cooperating with others to run your own digital services as a community would be a radical improvement.&lt;/p&gt;
&lt;h3 id=&#34;withdraw-your-consent&#34;&gt;Withdraw Your Consent&lt;/h3&gt;
&lt;p&gt;Don&amp;rsquo;t make tyranny easier by complying. Anything you can do that adds friction to the process of tracking and controlling everyone&amp;rsquo;s activity can really make an impact. Choosing to avoid big tech services where possible, or refusing to adopt an &amp;ldquo;optional&amp;rdquo; government program can be something that reduces it&amp;rsquo;s chance of catching off broadly.&lt;/p&gt;
&lt;hr&gt;
&lt;h3 id=&#34;more-resources&#34;&gt;More Resources&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/eu-digital-identity-wallet&#34;&gt;European Digital Identity&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.eid.as/&#34;&gt;blog.eIDAS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://digital-strategy.ec.europa.eu/en&#34;&gt;Shaping Europe’s digital future&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>A Grayjay Review</title>
		<link>https://libresolutions.network/articles/grayjay/</link>
		<pubDate>Thu, 02 Nov 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/grayjay/</guid>
		
		<image>https://libresolutions.network//media/images/grayjay.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/grayjay.webp" />
		<itunes:image href="https://libresolutions.network//media/images/grayjay.webp" />
		<description>Highlighting an example of how mass media could be more organic.</description>
		<content:encoded>&lt;h1 id=&#34;what-is-grayjay&#34;&gt;What is Grayjay?&lt;/h1&gt;
&lt;p&gt;&lt;a href=&#34;https://grayjay.app/&#34;&gt;Grayjay&lt;/a&gt; is an android app. It&amp;rsquo;s in early development but already works as an excellent video player. The goal of the app is to allow you to watch videos from creators on many platforms on a single app. This means that it doesn&amp;rsquo;t matter as much to you if the person is on Youtube, Twitch, or Odysee you can subscribe to them all from a single app, even without an account! I imagine for many people who&amp;rsquo;ve wanted to break away from certain large platforms, but have stuck around for a few great creators, this is a good option to solve that problem.&lt;/p&gt;
&lt;p&gt;My immediate impression of the grayjay app was a good one. It seems like there&amp;rsquo;s a very well-designed interface for browsing and watching videos. As someone using a de-googled grapheneOS phone, it was an outright upgrade. Where before I wouldn&amp;rsquo;t be able to cast youtube videos to chromecast at all, with Grayjay I was able to cast right away. I had no issues trying to follow people on supported platforms and everything just felt seamless.&lt;/p&gt;

&lt;a href=&#39;https://libresolutions.network/media/video/grayjay.mp4&#39;&gt;

&lt;video muted autoplay preload=&#34;none&#34;&gt;
    &lt;source src=&#39;https://libresolutions.network/media/video/grayjay.mp4&#39;&gt;
&lt;/video&gt;

&lt;/a&gt;

&lt;p&gt;I really like the design choice to have a solid user interface and abstract each platform into a plugin with particular features. You can even filter by platform in search, and even disable particular platforms as a whole in the sources tab. You really are very in control with this app, you can choose to limit what platforms are featured on the &amp;ldquo;home&amp;rdquo; tab, and even search. I&amp;rsquo;m sure things like comments and payments will be different from platform to platform but it served the very basic role of being an excellent app to follow and search various video content creators.&lt;/p&gt;
&lt;h2 id=&#34;can-this-help-fight-against-censorship&#34;&gt;Can This Help Fight Against Censorship?&lt;/h2&gt;
&lt;p&gt;In short, I&amp;rsquo;d say I&amp;rsquo;m very optimistic. While this app can&amp;rsquo;t stop anyone from being banned on a particular platform, it is already a very effective tool for following people across many platforms. Putting &lt;a href=&#34;https://docs.polycentric.io/&#34;&gt;polycentric&lt;/a&gt; to aside for a moment, the very fact that it&amp;rsquo;s possible to create new plugins to support other sites and integrate them ourselves means a great deal. I believe if Grayjay (and apps like it) started to become more common, we would see much better adoption for interoperable permission-less protocols. If most people were using this app to watch their videos, they could choose whatever plugins they wish. Some sources and plugins could be more or less censored than others, but the power of this system Software means that the user is in control.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/grayjay-platforms.webp&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;For example, while at the time of writing the peertube plugin had some issues, I myself was able to correct them by writing my &lt;a href=&#34;https://gabe.rocks/tech/grayjay-peertube/&#34;&gt;own peertube plugin.&lt;/a&gt; This is an excellent demonstration of what makes free software very powerful. I didn&amp;rsquo;t need to ask for permission, the code and details were just sitting there for me to take the initiative. This means that in a very short time I was able to conform grayjay to work with my own self-hosted &lt;a href=&#34;https://peertube.libresolutions.network&#34;&gt;peertube instance&lt;/a&gt; and make it work even better than the current state.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/grayjay-settings.webp&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;It&amp;rsquo;s actually quite hard to overstate what this actually means. This particular app can be used to support any platform your device has access to. Any set of videos on a website can be first-class citizens on the grayjay app. I can definitely say I think this really does &lt;em&gt;level the playing field&lt;/em&gt; when it comes to online media. Suddenly, those who want to follow my peertube can with the same app they use to follow their mainstream youtube channels. Every user gets full control over what they do and don&amp;rsquo;t want to see.&lt;/p&gt;
&lt;h2 id=&#34;moving-forward&#34;&gt;Moving Forward&lt;/h2&gt;
&lt;p&gt;In conclusion I do think this is the start of something exciting. There is a lot of excellent free software apps on &lt;a href=&#34;https://f-droid.org/&#34;&gt;F-Droid&lt;/a&gt; so I hope this can be someone&amp;rsquo;s start into becoming more comfortable with free software in general. The more you shift away from proprietary software the more you appreciate the gains made by using software that respects you as the user. If you like what this app has to offer I would highly recommend trying out &lt;a href=&#34;https://antennapod.org/&#34;&gt;AntennaPod&lt;/a&gt; for Android as well. It&amp;rsquo;s an excellent podcast app that supports multimedia and works pretty well as an RSS reader too. I would argue that it does most of what you would want out of an app like Grayjay, but the more the merrier.&lt;/p&gt;
&lt;p&gt;I do have some concerns however, one of the problems FUTO is trying to solve is &lt;em&gt;decentralized online identity&lt;/em&gt;. As someone concerned about the implications of Elon Musk trying to transform Twitter into &amp;ldquo;&lt;em&gt;the everything app&lt;/em&gt;&amp;rdquo; I&amp;rsquo;m not sure building an open-source &lt;em&gt;everything-app&lt;/em&gt; is a good goal. Grayjay works very well as a multimedia app, and I think it&amp;rsquo;s great for that. I&amp;rsquo;m not sure I would want to then start entangling everyone&amp;rsquo;s personal lives directly with it. The advantage of a decentralized online identity would be that when someone is removed from a platform, or even gets &lt;a href=&#34;https://libresolutions.network/articles/broken-internet/&#34;&gt;censored by ISPs&lt;/a&gt; there would be a way for the audience to migrate to other options or even a &lt;a href=&#34;https://libresolutions.network/operations/shadow/&#34;&gt;hidden service&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;That said, the advantage of free software is that it really is what we make of it. People can definitely appreciate the great features this offers, and even entirely strip out whatever future enhancements are added on top. I think Grayjay is an excellent example of how to build censorship resistant software, even if it itself isn&amp;rsquo;t reaching the ideal of Free and Open Source Software.&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;I have not been paid by &lt;a href=&#34;https://futo.org&#34;&gt;FUTO&lt;/a&gt; or anyone else to make this review, or try the software.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;Correction: Grayjay isn&amp;rsquo;t Free and Open Source (FOSS)&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;The PeerTube plugin &lt;a href=&#34;https://gitlab.futo.org/videostreaming/plugins/peertube&#34;&gt;is licensed under the GPL&lt;/a&gt; a Free Software License, but the &lt;a href=&#34;https://gitlab.futo.org/videostreaming/grayjay&#34;&gt;Grayjay app isn&amp;rsquo;t,&lt;/a&gt; it&amp;rsquo;s licensed under a &lt;a href=&#34;https://futo.org/about/futo-statement-on-opensource/&#34;&gt;different&lt;/a&gt; license. &lt;strong&gt;Why does this matter?&lt;/strong&gt; Essentially, FUTO is welcoming user control and collaborative innovation when it comes to their plugin system, but not the app itself. To go further, this increased my concerns stated below about integrating other identity features. In short, the Grayjay app is useful, but still lacks essential software freedoms. If you&amp;rsquo;re interested in an android app that can truly decentralize the media landscape, I&amp;rsquo;ll reiterate my endorsement of &lt;a href=&#34;https://antennapod.org/&#34;&gt;antennapod&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://x.com/FUTO_Tech/status/1719527096534311365&#34;&gt;FUTO Tech explains it on twitter&lt;/a&gt;&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Digital Autonomy and the Arts: Part 3</title>
		<link>https://libresolutions.network/videos/arts3/</link>
		<pubDate>Sat, 21 Oct 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/arts3/</guid>
		
		<image>https://libresolutions.network//media/images/arts-3-maa.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/arts-3-maa.webp" />
		<itunes:image href="https://libresolutions.network//media/images/arts-3-maa.webp" />
		<description>Featuring Margaret Anna Alice</description>
		<content:encoded>&lt;p&gt;It is my honor and pleasure to have worked alongside such a passionate and talented writer. &lt;a href=&#34;https://margaretannaalice.substack.com/p/dissident-dialogues-margaret-anna&#34;&gt;Margaret Anna Alice&lt;/a&gt; is an inspiration to those worldwide who wish to resist and dismantle totalitarianism. She is one of many critical voices in these turbulent times.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Margaret Anna Alice writes about media narratives, politics, propaganda, mass control, psychology, history, philosophy, language, film, art, music, literature, culture, and health with a focus on COVID at &lt;a href=&#34;https://margaretannaalice.com/&#34;&gt;Margaret Anna Alice Through the Looking Glass&lt;/a&gt;.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3 id=&#34;must-see-works&#34;&gt;Must-see works:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/ueUXNL-A3Zg&#34;&gt;Mistakes Were NOT Made: An anthem for Justice&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://margaretannaalice.substack.com/p/wake-up-toolkit&#34;&gt;Wake-up Toolkit&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://margaretannaalice.substack.com/p/are-you-a-good-german-or-a-badass&#34;&gt;Are You a Good German or a Badass German?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://margaretannaalice.substack.com/p/anatomy-of-a-philanthropath-dreams&#34;&gt;Anatomy of a Philanthropath: Dreams of Democide &amp;amp; Dictatorship&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://margaretannaalice.substack.com/p/profiles-in-courage-the-canadian&#34;&gt;Profiles in Courage: The Canadian Truckers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/bASZkhDROzo&#34;&gt;Ode to a Whistleblower (Poem by Margaret Anna Alice; Video for Tribute to Daniel Ellsberg)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/Bd7dM59vocg&#34;&gt;Do You Remember? (Collaboration Between Margaret Anna Alice &amp;amp; Visceral Adventure)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;You can support Margaret Anna Alice&amp;rsquo;s excellent work by:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Subscribing on &lt;a href=&#34;&#34;&gt;Substack&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Sending Bitcoin to &lt;a href=&#34;bitcoin:bc1ql706rr7vj7c7nzxnqfp9rldw8ddfc20f492jk0&#34;&gt;bc1ql706rr7vj7c7nzxnqfp9rldw8ddfc20f492jk0&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Purchasing &lt;a href=&#34;https://margaretannaalice.substack.com/p/get-the-book-the-vapor-the-hot-hat&#34;&gt;The Vapor, The Hot Hat, &amp;amp; The Witches Potion&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Applied Cyberwar: Hardware Exploits</title>
		<link>https://libresolutions.network/articles/hardware-trojan/</link>
		<pubDate>Thu, 19 Oct 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/hardware-trojan/</guid>
		
		<image>https://libresolutions.network//media/images/cpu-camera.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/cpu-camera.webp" />
		<itunes:image href="https://libresolutions.network//media/images/cpu-camera.webp" />
		<description>Just how bad is it?</description>
		<content:encoded>&lt;p&gt;Recently a &lt;a href=&#34;https://archive.ph/PGUdP&#34;&gt;rumor&lt;/a&gt; that the tragic Hamas attack was enabled by a potential &lt;a href=&#34;https://www.albawaba.com/node/was-huawei-behind-israels-failure-detect-hamas-plans-1536954&#34;&gt;lack of backdoors&lt;/a&gt; accessible by western / &lt;a href=&#34;https://allaboutcookies.org/what-is-the-five-eyes-alliance&#34;&gt;5 Eyes&lt;/a&gt; intelligence. Despite this, I wouldn&amp;rsquo;t recommend rushing to order a Huwawei phone for privacy reasons. If my &lt;a href=&#34;https://libresolutions.network/operations/shadow/#threat-modeling&#34;&gt;threat model&lt;/a&gt; called for investigating hardware attacks, simply changing providers would be insufficient to keep them at bay. Understanding hardware exploits requires a bit of understanding about how systems run, so let&amp;rsquo;s take advantage of this teachable moment.&lt;/p&gt;
&lt;p&gt;You&amp;rsquo;re definitely going to want to revisit &lt;a href=&#34;https://libresolutions.network/articles/cyberwar/&#34;&gt;A Non-Combattant&amp;rsquo;s Guide to Cyberwar&lt;/a&gt; and &lt;a href=&#34;https://libresolutions.network/articles/warlord-technology/&#34;&gt;Escalating Cyberwar: Warlord Technology&lt;/a&gt; if you haven&amp;rsquo;t already. The important take-away is that there are &lt;em&gt;very advanced tools&lt;/em&gt; for infiltrating systems using software. In addition to this, when working to combat hardware-based threats, you&amp;rsquo;re going to need serious regular &lt;a href=&#34;https://libresolutions.network/articles/diy-audit/&#34;&gt;cyber audits.&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;its-all-broken&#34;&gt;It&amp;rsquo;s All Broken&lt;/h2&gt;
&lt;p&gt;It can sound &lt;a href=&#34;https://synergeticdesign.substack.com/p/why-free-software-is-useless-when&#34;&gt;very bleak&lt;/a&gt; when one understands just how &lt;a href=&#34;https://www.cs.cmu.edu/~rdriley/487/papers/Thompson_1984_ReflectionsonTrustingTrust.pdf&#34;&gt;vulnerable digital systems&lt;/a&gt; can be. The sad truth is that if somebody is willing to spend significant effort, resources, and time it&amp;rsquo;s not a matter of if, but rather &lt;strong&gt;when&lt;/strong&gt; they&amp;rsquo;ll be able to breach your systems. At least for now, it can be a reasonably safe assumption that those who make a reasonable effort to protect themselves can at least secure themselves from un-targeted attacks, and otherwise make themselves a less valuable target.&lt;/p&gt;
&lt;p&gt;The challenge is that modern hardware and software is essentially a &lt;a href=&#34;https://youtu.be/kZRE7HIO3vk&#34;&gt;massive jenga tower&lt;/a&gt; of accumulated &lt;a href=&#34;https://en.wikipedia.org/wiki/Technical_debt&#34;&gt;technical debt.&lt;/a&gt; For those who require utmost security and reliability, almost everything available today is absolutely unsuitable for that purpose. &lt;strong&gt;Supply chain attacks&lt;/strong&gt; can be done by compromising either the physical components of the device, or the software built into the &lt;em&gt;tech stack&lt;/em&gt;. The &lt;strong&gt;tech stack&lt;/strong&gt; is everything required to run software on your device.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://libresolutions.network/media/diagrams/device-stack.webp&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/diagrams/device-stack.webp&#39; 
&gt;

&lt;/a&gt;


&lt;p class=&#34;caption&#34;&gt;
    Imagine that any one of these layers can be compromised 
&lt;/p&gt;


&lt;/div&gt;
&lt;p&gt;The biggest reason why simply switching hardware providers is not sufficient to mitigate hardware threats; is that someone capable of &lt;a href=&#34;https://puri.sm/posts/anti-interdiction-update-six-month-retrospective/&#34;&gt;intercepting a shipment&lt;/a&gt; sent to you can then attack the device directly. If you&amp;rsquo;re already concerned about government surveillance, especially targeted surveillance, you&amp;rsquo;ll need a proper way to validate that the systems you&amp;rsquo;re using are free of unwanted changes, bugs, and not tampered with. In addition to this, you&amp;rsquo;ll want to make sure your verified clean hardware actually &lt;a href=&#34;https://ryf.fsf.org/&#34;&gt;Respects your Freedom!&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;While hardware backdoors are a serious concern, it&amp;rsquo;s important to pay serious attention to the software environment you&amp;rsquo;re running. There&amp;rsquo;s absolutely zero point making changes aimed at mitigating hardware based attacks if you&amp;rsquo;re planning to run software that is known to spy on you on behalf of the same organizations. With all that out of the way, let&amp;rsquo;s take the topic head-on.&lt;/p&gt;
&lt;h2 id=&#34;the-hardware-attacks&#34;&gt;The Hardware Attacks&lt;/h2&gt;
&lt;p&gt;If the manufacturer (or manufacturer&amp;rsquo;s suppliers) introduce a defect or modification to their product, that modification can be exploited. Naturally the defect would be exploited by those who put it in there, but it&amp;rsquo;s worth understanding that the very same defect could be exploited by others. This is why it is of utmost importance that we the public make it exceptionally clear that we will never accept undermining security or privacy in the name of safety, especially when it empowers unaccountable entities. In the long-run the only solution to this problem is designing hardware so that it can be independently verified with only a moderate amount of effort and tools.&lt;/p&gt;
&lt;p&gt;Almost every device is complex enough that it&amp;rsquo;s not all developed by a single entity. A single company could place a nefarious component into their portion of a device. It is safe to assume that most manufacturers would be testing for defects to detect obvious intrusions, but what if the modification doesn&amp;rsquo;t impact device functionality? There is currently a lot of research into this. I&amp;rsquo;ve come across a couple of papers discussing &lt;a href=&#34;https://vista.cs.technion.ac.il/wp-content/uploads/2020/10/Day1-Lecture-1-Sylvain-Guilley.pdf&#34;&gt;fascinating strategies&lt;/a&gt; for detecting that.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://tehranipoor.ece.ufl.edu/wp-content/uploads/2021/07/09-Hardware-Trojans.pdf&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/hardware-trojan.webp&#39; 
&gt;

&lt;/a&gt;


&lt;p class=&#34;caption&#34;&gt;
    Click the image to view the slides, definitely worth your time 
&lt;/p&gt;


&lt;/div&gt;
&lt;p&gt;Antennas are strange devices, the little I&amp;rsquo;ve spent learning about radio communications has made me realize how little I understand about these devices. In a really strange way, anything can be an antenna if it&amp;rsquo;s run with enough power, at a high enough frequency&amp;hellip;  Wireless communication definitely is one of the more interesting developments. To say nothing of some of the more bizarre advancements like quantum computing.&lt;/p&gt;
&lt;p&gt;Even as a highly technical person, it gets really easy for the layers of abstraction to fool you into assuming that lower level details like hardware and firmware are always pristine. It&amp;rsquo;s important to understand that at a fundamental level all these devices do is store, process and relay information. It&amp;rsquo;s quite possible for a device to use information sent to it in deceptive ways, and there are &lt;a href=&#34;https://hackaday.com/2022/07/22/satan-turns-hard-drive-cable-into-antenna-to-defeat-air-gapped-security/&#34;&gt;very un-intuitive attacks&lt;/a&gt; at the physical levels. These threats are very serious and almost impossible for a single person to attempt to mitigate. If it is the case that all our institutions are hostile, corrupt, and incapable of reform, it is then long past time for people to proactively cooperate on establishing the &lt;em&gt;means&lt;/em&gt; to design, manufacture, and &lt;strong&gt;validate&lt;/strong&gt; devices independently.&lt;/p&gt;
&lt;h2 id=&#34;firmware&#34;&gt;Firmware&lt;/h2&gt;
&lt;p&gt;Alright, so you&amp;rsquo;ve used the latest and greatest techniques to validate that your hardware is free of any hardware intrusions or defects. Your team has triple-checked the specifications of every component to the smallest detail, and tested each component for common problems. As you start running software on it, you start to detect strange behavior. Suddenly, your device that you spend so much effort validating isn&amp;rsquo;t working as intended.&lt;/p&gt;
&lt;p&gt;You re-compile all your software from scratch in an effort to solve the problem, but it hits you. There&amp;rsquo;s a whole &lt;em&gt;layer of code&lt;/em&gt; between the software and the hardware. Many hardware components are themselves &lt;em&gt;programmable&lt;/em&gt;. A passive component is something that serves a very simple and direct purpose, like a light that shines with power. Logic circuits are components that themselves have memory that allows them to be programmed with additional instructions or parameters that defines how they process information.&lt;/p&gt;
&lt;iframe src=&#39;https://tube.tchncs.de/videos/embed/02e76ea7-5735-4de3-b426-58e2d291376b&#39; style=&#34;height:max-content;aspect-ratio: 16/9;min-height:460px;max-height:15rem;max-width:60rem;&#34; width=&#34;100%&#34; height=&#34;100%&#34;&gt;

&lt;/iframe&gt;
&lt;p&gt;It may be complete overkill for a rogue intelligence outfit to compromise an entire system. Instead, it would be much easier to introduce changes to the closed-source firmware on the wireless radios for all kinds of smart devices. With that level of intrusion, it would be very difficult and expensive for someone to detect and correct, and the hardware and software would be none the wiser. This is why it&amp;rsquo;s important to not only insist on &lt;em&gt;free as in freedom&lt;/em&gt; software, but hardware and firmware as well.&lt;/p&gt;
&lt;p&gt;Some other interesting videos:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/HNwWQ9zGT-8&#34;&gt;Spyware at The Hardware Level - Intel ME &amp;amp; AMD PSP
&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/Lr-9aCMUXzI&#34;&gt;How Intel wants to backdoor every computer in the world | Intel Management Engine explained&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/IW2YsxSj6zE&#34;&gt;Dissecting the AMD Platform Security Processor &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/GQE3a8WLeds&#34;&gt;GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;machines-can-lie&#34;&gt;Machines Can Lie&lt;/h2&gt;
&lt;p&gt;Programmable chips are incredible tools. So many amazing possibilities are enabled by the fact that they often are designed for &lt;strong&gt;abstraction&lt;/strong&gt;. For example, a display may not actually expose direct control over all it&amp;rsquo;s nitty-gritty details, but instead accepts commands to display pictures and text. This can make it much easier to build a simple device, but it comes at the cost that the other components sending the information are unable to ensure that what was sent is actually what is displayed. With this understanding, it&amp;rsquo;s quite easy to see why security is such a hard problem. On some level, it is all downstream of physics.&lt;/p&gt;
&lt;p&gt;It is clear that governments, corporations, and intelligence outfits have the &lt;em&gt;means and motive&lt;/em&gt; to corrupt our devices and systems. We are aware that this happens in a non-zero amount of cases, including in western countries. It is anyone&amp;rsquo;s guess how deep and how pervasive the problem is. It is an important problem to keep in mind when thinking of what direction we want our tools to go in, and how we intend to use them. On the other hand, I find this information not to be terribly practical on a day-to-day level. A big part of this is the fact that it&amp;rsquo;s often very unnecessary to compromise hardware to spy on people or steal their data. If anything, people themselves have shown themselves to be all too willing to comply with surveillance and control if it&amp;rsquo;s merely sold under the right pretext.&lt;/p&gt;
&lt;p&gt;Personally, I believe the best way to act on this knowledge is to realize the dire necessity of building genuinely transparent, efficient and accountable institutions that can work to tackle these difficult problems. We can&amp;rsquo;t do it alone, but I&amp;rsquo;m more than confident we can get intelligent people together to make some serious progress.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Mass Resistance Redirected</title>
		<link>https://libresolutions.network/articles/redirecting-resistance/</link>
		<pubDate>Thu, 05 Oct 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/redirecting-resistance/</guid>
		
		<image>https://libresolutions.network//media/images/affinity-scam.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/affinity-scam.webp" />
		<itunes:image href="https://libresolutions.network//media/images/affinity-scam.webp" />
		<description>Selling out for shamefully low prices</description>
		<content:encoded>&lt;p&gt;As scary as those with the means and motivation to dominate the world are, there&amp;rsquo;s something immensely more powerful. The people. No matter how powerful you, or even your entire crew are, you still can&amp;rsquo;t quite stand up to the rest of the world alone. This was my primary motivation to write &lt;em&gt;Tools of the Technocracy&lt;/em&gt;, the out-in-the-open desire to power up the tools of mass subjugation is a terrifying prospect. Fear, isolation, propaganda, and violence are all means which the powerful use to keep people in line. What&amp;rsquo;s less familiar to people is how bribery, flattery, and &lt;a href=&#34;https://en.wikipedia.org/wiki/Circe&#34;&gt;seduction&lt;/a&gt; can be used.&lt;/p&gt;
&lt;p&gt;In my opinion, the greatest strategic mistake made by who (&lt;em&gt;or what&lt;/em&gt;) rules the earth, is that they unloaded absolutely every dirty trick at once. I wrote the &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy/&#34;&gt;Tools of the Technocracy&lt;/a&gt; to take my part in documenting how technological weapons can, and could be used to dominate and control others. Not only is it incomplete, but even if it was, it would only be a very small fraction of the entire picture. I can definitely admit to being shockingly naive to mass mind control when I began writing it. At the time, I believed that the brainwashing was essentially 60% economic, and 40% mass media.&lt;/p&gt;
&lt;p&gt;Despite being aware of even some of the examples listed below, it was only once I understood &lt;a href=&#34;https://roundingtheearth.substack.com/p/how-the-magic-trick-works-cutting&#34;&gt;the magic trick&lt;/a&gt; did I begin to better conceptualize how highly motivated activists can be &lt;a href=&#34;https://consentfactory.org/2023/09/20/mr-mikes-mondo-imbroglio-or-how-not-to-launch-a-global-anti-censorship-movement/0&#34;&gt;assimilated&lt;/a&gt; into the very same thing they want to fight. This really isn&amp;rsquo;t unique to any particular idea or movement. Every sufficient &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-11/&#34;&gt;power structure&lt;/a&gt; is going to develop defenses against becoming overthrown.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;One of the stronger adaptations a dominance hierarchy can have is flexibility. A rigid system is too vulnerable to being outright overthrown by radicals. Instead of single-handedly orchestrating your machinations, it can be quite effective to open bid those actions to those you will reward handsomely. This is an excellent tactic to prevent defectors, because those interested in their own self-advancement will align themselves to your goals. Suddenly your vast conspiracy to dominate others is working as a decentralized network with plausible deniability, with the added bonus of components being entirely replaceable.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-11/&#34;&gt;Tools of the Technocracy: #11 Social Credit&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;There are two components to this:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Allowing for particular changes, but nothing that undermines your power.&lt;/li&gt;
&lt;li&gt;Making your opposition complicit in maintaining it.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Instead of taking your opposition head on, redirecting their focus, energy and &lt;em&gt;resources&lt;/em&gt; on means in your favor or even under your control saves you a phenomenal amount of work. This means that you don&amp;rsquo;t need to be convinced to stop fighting, you can self-destructively stew in anger and rage at the machine while it feeds on your essence. Anger is an important part of the human experience. Denouncing anger as a problem is its own problem, but it&amp;rsquo;s important that your anger is properly focused and channeled. Whatever you&amp;rsquo;re fighting for, it&amp;rsquo;s important to keep in mind why, and how you intend to achieve your goals.&lt;/p&gt;
&lt;h2 id=&#34;false-saviors&#34;&gt;False Saviors&lt;/h2&gt;
&lt;p&gt;A clear-cut example of how this is achieved is a &lt;em&gt;false savior&lt;/em&gt;. A figure is thrust into the spotlight as the answer to major problems. By dressing the figure up with your ideals, goals, and dreams you replace an ordinary human being on an altar of your own hubris. False saviors can be the work of powerful interests choosing to &lt;em&gt;lead the opposition themselves&lt;/em&gt; or &lt;strong&gt;made&lt;/strong&gt; as leaders get corrupted by fame, attention, or other compromising factors.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/false-saviors.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/beware-false-saviors&#34;  &gt;&lt;h2&gt;Beware false saviors&lt;/h2&gt;&lt;i&gt;Putting faith into leaders is a road to disappointment. &lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;False saviors are erected by placing the complicated task of solving vastly complicated problems on the shoulders of a single person. No matter how powerful a single person is, they are still mortal and have the same weaknesses as many of us. In addition to this, the more power you put in someone&amp;rsquo;s hands, the more it inevitably corrupts them. This is because &lt;em&gt;power has strings attached&lt;/em&gt;, no system exists in a vacuum and there will always be constraints on how powers can be used. Just as human beings can and will be corrupted, entire organizations are arguably &lt;em&gt;more vulnerable&lt;/em&gt; to all the same factors.&lt;/p&gt;
&lt;h2 id=&#34;the-affinity-scam&#34;&gt;The Affinity Scam&lt;/h2&gt;
&lt;p&gt;If one wanted to financially liquidate their opponents, lawfare may be one option, but there&amp;rsquo;s a far more effective means of separating your enemies from their wealth: &lt;a href=&#34;https://www.investopedia.com/terms/a/affinityfraud.asp&#34;&gt;Affinity fraud&lt;/a&gt;. By dressing up your financial enterprise with sleek branding that gives your opponents the &lt;em&gt;impression&lt;/em&gt; it&amp;rsquo;s run by those who are &lt;em&gt;just like them&lt;/em&gt; with the same values and goals. It is naive to assume that frauds targeted at activists are merely interested in money, instead of other goals like sabotage and infiltration. With money taken from your opponents, you can then use it to buy influence over them.&lt;/p&gt;
&lt;h3 id=&#34;philanthropaths&#34;&gt;Philanthropaths&lt;/h3&gt;
&lt;p&gt;There is a particular brand of &amp;ldquo;&lt;em&gt;philanthropist&lt;/em&gt;&amp;rdquo; that dresses themselves up in &lt;em&gt;the greater good&lt;/em&gt;, but who&amp;rsquo;s methods don&amp;rsquo;t pass even the most basic scrutiny. They may claim to use their vast wealth to solve important problems, yet are actually engaging in very profitable &lt;a href=&#34;https://unlimitedhangout.com/2021/08/investigative-reports/american-federation-of-teachers-sells-out-to-rockefellers-trilateralists-and-big-tech/&#34;&gt;impact investing&lt;/a&gt; by seizing control over the problem and enabling it.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;A philanthropath wants you dead … for the good of humanity.&lt;br&gt;
A philanthropath wants you enslaved … for the good of liberty.&lt;br&gt;
A philanthropath wants you silenced … for the good of free speech.&lt;br&gt;
A philanthropath wants you confined … for the good of your health.&lt;br&gt;
A philanthropath wants to surveil you … for the good of security.&lt;br&gt;
A philanthropath wants you to eat orthopterans … for the good of the planet.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://margaretannaalice.substack.com/p/anatomy-of-a-philanthropath-dreams-3fd#%C2%A7anatomy-of-a-philanthropath&#34;&gt;Anatomy of a Philanthropath by Margaret Anna Alice&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Philanthropaths will generally focus on the most widely appealing causes, who opposes solving poverty, hunger, and disease? Those who don&amp;rsquo;t have the desire or the time to evaluate or properly investigate the actual issues will very often fall victim to this kind of scheme. This kind of impact investing often builds power structures that get in the way of &lt;a href=&#34;https://youtu.be/JIiaV-g-op0&#34;&gt;meaningful local solutions&lt;/a&gt; to these serious problems.&lt;/p&gt;
&lt;h3 id=&#34;grifting&#34;&gt;Grifting&lt;/h3&gt;
&lt;p&gt;Are universal ideals &lt;em&gt;too mainstream&lt;/em&gt; for you? How about something more &lt;em&gt;specific&lt;/em&gt;? You&amp;rsquo;re completely different from the brainwashed masses, instead you see things how they actually are and are willing to pile up lots of money on top of your active social media engagement. &amp;ldquo;&lt;em&gt;Grifting&lt;/em&gt;&amp;rdquo; is the art of liquidating a highly motivated niche. &lt;em&gt;It&amp;rsquo;s just business after all.&lt;/em&gt;&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://web.archive.org/web/20230908105405/https://twitter.com/libertysafeinc/status/1699245595867971969&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/liberty-safe.webp&#39; 
&gt;

&lt;/a&gt;


&lt;p class=&#34;caption&#34;&gt;
    So-called &amp;#34;Liberty Safes&amp;#34; actually had a backdoor into all their products. &lt;a target=&#39;_blank&#39; href=&#39;https://twitter.com/libertysafeinc/status/1699245595867971969#m&#39;&gt;Source&lt;/a&gt;
&lt;/p&gt;


&lt;/div&gt;
&lt;p&gt;Individuals, organizations, and even charities can run into the terminal stage where their existence is dependent on the problem they set out to ameliorate. Over time, insidious but disastrous conflicts of interest can pile up in very unintuitive ways. This is actually termed quite well by progressives, for environmental concerns it&amp;rsquo;s called &lt;a href=&#34;https://www.wwf.org.uk/learn/guide-to-greenwashing&#34;&gt;&lt;em&gt;greenwashing&lt;/em&gt;&lt;/a&gt; and in the tech space there&amp;rsquo;s &lt;a href=&#34;https://puri.sm/posts/privacy-washing-do-as-i-say-not-as-i-do/&#34;&gt;privacy washing.&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;“The behavior of any bureaucratic organization can best be understood by assuming that it is controlled by a secret cabal of its enemies.”&lt;/p&gt;
&lt;p&gt;Robert Conquest&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;em&gt;Robert may be on to something that&amp;rsquo;s more than just a mere assumption.&lt;/em&gt;&lt;/p&gt;
&lt;h3 id=&#34;outright-robbery&#34;&gt;Outright Robbery&lt;/h3&gt;
&lt;p&gt;By tapping into outrage, panic, and urgency, nefarious agents can short-circuit their victims better sense-making. The well-informed expert may be sponsored by outright scams while they deliver you hard-hitting critical information. We all need to make a living, but some blame can be put on those who take sponsorships without any &lt;a href=&#34;https://home.solari.com/not-again-wolves-loose-in-the-gold-and-silver-market/&#34;&gt;due-dilligence.&lt;/a&gt;  The more profitable a scam is, the more eyeballs it can purchase through buying more advertizing, if the only goal is to simply liquidate opposition of money this alone is sufficient to create a powerful feedback loop.&lt;/p&gt;
&lt;h3 id=&#34;resistance-for-sale&#34;&gt;Resistance for Sale!&lt;/h3&gt;
&lt;p&gt;I would argue, that activist communities &lt;em&gt;themselves&lt;/em&gt; have been commodified and resold online. We all feel a natural need to connect with others and work together. This is a very important facet of the game, but when money and &lt;a href=&#34;https://roundingtheearth.substack.com/p/parasocial-dunbar-hacking&#34;&gt;dunbar hacking&lt;/a&gt; is involved, it can raise some serious red flags. Once you&amp;rsquo;ve got a captive audience, it&amp;rsquo;s very easy to then divert them with all the normal manipulative tactics to divert their attention and resources. Small insular communities are vulnerable to being transformed into a cult even when they don&amp;rsquo;t begin as one.&lt;/p&gt;
&lt;h2 id=&#34;understanding-the-difference&#34;&gt;Understanding the difference&lt;/h2&gt;
&lt;p&gt;This wouldn&amp;rsquo;t be the &lt;strong&gt;Libre Solutions Network&lt;/strong&gt; if I didn&amp;rsquo;t have any thoughts on how to proactively tackle this problem. Affinity scams are entirely about exploiting vulnerable, isolated, and scared people who are concerned about very real issues. It may be quite difficult to understand their concerns. Odds are if you have no idea why someone is wrapped up in a bizarre cult, it&amp;rsquo;s because you&amp;rsquo;re not sufficiently aware of their concerns.&lt;/p&gt;
&lt;h3 id=&#34;become-a-human-again&#34;&gt;Become a Human Again&lt;/h3&gt;
&lt;p&gt;The best way to rob would-be scammers of targets is to be a trusted judgement-free friend to someone. That way they can be potentially much more likely to consult you with something that&amp;rsquo;s raised red flags. Everyone needs a trusted circle of people who genuinely care about them, and tragically for some it can&amp;rsquo;t even be their own family. There will always be desperate lonely people, who may even be &lt;strong&gt;over-represented&lt;/strong&gt; &lt;em&gt;in activist groups&lt;/em&gt; because their work may be their own way to ask for help.&lt;/p&gt;
&lt;h3 id=&#34;learning-from-others&#34;&gt;Learning from Others&lt;/h3&gt;
&lt;p&gt;Building on the last point, consider that those with different values and beliefs than you, even opposing ones, can be correct about issues you care about. By escaping your echo chamber you can learn from those who have a radically different perspective that gives you meaningful opportunities to grow. This requires you to &lt;em&gt;humanize them as well as yourself to them&lt;/em&gt;. Be a great ambassador for your beliefs by being genuinely willing to listen to others, even when it&amp;rsquo;s exceedingly difficult.&lt;/p&gt;
&lt;h3 id=&#34;results-matter&#34;&gt;Results Matter&lt;/h3&gt;
&lt;p&gt;Self-awareness is critical. Work to understand your principal concern well enough to at least explain how a particular initiative or cause will meaningfully solve the problem, ideally without causing harm. At the very least, try to evaluate products and services on their genuine merits, rather than who is endorsing them.&lt;/p&gt;
&lt;h3 id=&#34;walking-the-walk&#34;&gt;Walking the Walk&lt;/h3&gt;
&lt;p&gt;For any particular concern, there are at least a couple of actions a figure or community can take that demonstrate they understand the problem and are willing to spend meaningful effort to correct it. Choices matter and compromises add up like tetris blocks. Practical compromises may seem like a winning trade in the moment, only to turn out to be a deal with the devil over time.&lt;/p&gt;
&lt;h3 id=&#34;all-money-is-blood-money&#34;&gt;All Money is Blood Money&lt;/h3&gt;
&lt;p&gt;Become incredibly skeptical of money, especially large sums of money. Wealth may not have to be a zero-sum game, but in many circumstances it certainly acts as one, or even negative-sum. Everyone needs currency to provide for their essentials, or to build the life they want, but understand that everything has a cost. It&amp;rsquo;s possible that the true cost of money is on your soul, rather than it&amp;rsquo;s pure monetary value. Remember, you can&amp;rsquo;t take it with you.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Imagine a giant picket line. The strike is over the future of humanity. People can either cross the picket line to work for those who want to enslave (and eventually destroy) humanity, being showered with fleeting opportunities and resources… or to stand up for oneself and find new ways to build elsewhere. The tragically sad truth is that there is a near limitless supply of desperate scabs who would happily (even knowingly) trade all of our futures for some present sustenance or comfort. You may be angry at these people, even willing to attack them, but they are not the root cause. Much of the harm that has already been done has created much tragedy and many victims.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-11/&#34;&gt;Tools of the Technocracy: #11 Social Credit&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/chains.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-11&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #11 Social Credit&lt;/h2&gt;&lt;i&gt;What&amp;#39;s new is old.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>DIY Cyber Audit</title>
		<link>https://libresolutions.network/articles/diy-audit/</link>
		<pubDate>Sat, 30 Sep 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/diy-audit/</guid>
		
		<image>https://libresolutions.network//media/3-breaking-free.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/3-breaking-free.webp" />
		<itunes:image href="https://libresolutions.network//media/3-breaking-free.webp" />
		<description>Your launchpad for improving your own digital autonomy.</description>
		<content:encoded>&lt;p&gt;It&amp;rsquo;s good for people to take their own cybersecurity seriously. It&amp;rsquo;s a huge topic, and it can be difficult to decide what&amp;rsquo;s worth starting with, or expending a lot of effort on. This guide is intended to walk you through some of the basic &amp;ldquo;bare-minimum&amp;rdquo; steps one would want to take in improving their online security. In addition to pure security goals, this piece aims to emphasize how to reduce your dependency on systems that seize control of your information and workflows. It is my opinion that consolidated power inevitably leads to abused power, therefore one should take an active role in reducing their participating in enabling nefarious entities.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;But why?&lt;/strong&gt;&lt;/em&gt; you may ask. If the corporate platforms, services, and tools are &lt;em&gt;working fine&lt;/em&gt;, why put any effort in changing? It&amp;rsquo;s easy to fall into the trap of believing our actions are of no consequence, and that compromises made along the way don&amp;rsquo;t accrue debts. Over the last decade, people have given corporate digital giants (aka &amp;ldquo;&lt;em&gt;Big Tech&lt;/em&gt;&amp;rdquo;) immense power in society. While it has already been abused in many ways, more concentrated power means more abuse.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://libresolutions.network/media/diagrams/threat%20modeling.webp&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/diagrams/threat%20modeling.webp&#39; 
&gt;

&lt;/a&gt;



&lt;/div&gt;
&lt;p&gt;It&amp;rsquo;s largely a matter of personal responsibility on where you want to draw the line. Maybe it suits you to simply focus on preventing unwanted intrusion to your important accounts, or you could be willing to invest time and resources to do everything within your power. Your goals and aspirations are important to consider. Sometimes a small bit of effort can be strategically used to get the maximum benefit, others like to dedicate lots of effort over a significant amount of time. Ultimately the best moves are the ones that get the best impact with the effort and time you&amp;rsquo;re able to expend.&lt;/p&gt;
&lt;p&gt;This overview is intended to be a starting-point for someone interested in reducing what sensitive information is shared about themselves, and keeping their systems safer from unwanted intrusion.&lt;/p&gt;
&lt;h3 id=&#34;more-great-guides&#34;&gt;More Great Guides:&lt;/h3&gt;
&lt;p&gt;It may seem redundant to list other guides with similar information. Every project is going to have it&amp;rsquo;s own perspective, prioritization, and level of detail. If this guide is not to your liking, I would hope that one or many of these will suit your needs.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://ssd.eff.org&#34;&gt;Surveillance Self-Defense&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.thenewoil.org/&#34;&gt;The New Oil&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://avoidthehack.com/getting-started-cybersecurity&#34;&gt;Getting Started: Basic Personal Cybersecurity for Everyone&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://home.solari.com/faq/cybersecurity-what-we-do/&#34;&gt;Cybersecurity – What We Do&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://digdeeper.club/articles/ninja.xhtml&#34;&gt;Ninja&amp;rsquo;s Guide to the Internet&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://brainfucksec.github.io/a-good-privacy-list&#34;&gt;A Good Privacy List&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://restoreprivacy.com/&#34;&gt;Restore Privacy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://gunther.link/posts/privacy-basics/&#34;&gt;10 Basic Steps to Digital Privacy&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;contents&#34;&gt;Contents&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;&amp;hellip;More is to come!&lt;/em&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href=&#34;#the-regular-audit&#34;&gt;The Regular Audit&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#the-pebkac-vector&#34;&gt;PEBKAC Vector&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#account-security&#34;&gt;Accounts&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#e-mail&#34;&gt;Email&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#browsers&#34;&gt;Browsers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#network-security&#34;&gt;Network Security&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id=&#34;the-regular-audit&#34;&gt;The Regular Audit&lt;/h2&gt;
&lt;p&gt;I&amp;rsquo;d like to introduce you to the concept of a &lt;strong&gt;&lt;em&gt;regular&lt;/em&gt; security audit&lt;/strong&gt;. Instead of trying to reinvent your entire digital life overnight, it can be helpful to set aside some amount of time to make gradual changes, or to spend dedicated time solving a particular problem. This can help you transform a giant task over time, without too much immediate disruption to how you currently do things.&lt;/p&gt;
&lt;p&gt;You can commit to whatever time interval works for you. It could be monthly, quarterly, or even yearly is worth considering over never at all. This can help you budget the time you&amp;rsquo;d like to spend on making changes, as well as help you keep an eye out for things to address later.&lt;/p&gt;
&lt;p&gt;One helpful strategy would be to tier specific practices to certain intervals. For example making sure to run updates more regularly, but worry about changing passwords on a less frequent basis.&lt;br&gt;
A hypothetical plan could look like this:&lt;/p&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;📆 Interval&lt;/th&gt;
          &lt;th&gt;✅ Task&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Weekly&lt;/td&gt;
          &lt;td&gt;Running Updates&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Weekly&lt;/td&gt;
          &lt;td&gt;&lt;a href=&#34;#inbox-cleaning&#34;&gt;Cleaning your inbox&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Weekly&lt;/td&gt;
          &lt;td&gt;File Backups&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Monthly&lt;/td&gt;
          &lt;td&gt;Changing important passwords&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Monthly&lt;/td&gt;
          &lt;td&gt;Deleting unused apps &amp;amp; extensions&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Quarterly&lt;/td&gt;
          &lt;td&gt;System Backups&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Quarterly&lt;/td&gt;
          &lt;td&gt;Checking for &lt;a href=&#34;https://haveibeenpwned.com/&#34;&gt;breaches&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Quarterly&lt;/td&gt;
          &lt;td&gt;&lt;strong&gt;Helping others&lt;/strong&gt; make changes&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Yearly&lt;/td&gt;
          &lt;td&gt;Complete password rotation&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Yearly&lt;/td&gt;
          &lt;td&gt;Online footprint &lt;a href=&#34;#online-footprint&#34;&gt;inspection&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;strong&gt;Why?&lt;/strong&gt; Committing to a regular plan can help correct errors and keep you accountable. It also gets you focused on more proactive actions instead of always playing catchup.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;#contents&#34;&gt;Back to Contents&lt;/a&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;the-pebkac-vector&#34;&gt;The PEBKAC Vector&lt;/h2&gt;
&lt;p&gt;The easiest way for someone or something to infiltrate your accounts and systems is your own capacity to make a mistake. Hence the, &lt;em&gt;Problem-Exists-Between-Keyboard-and-Chair&lt;/em&gt; vector. (&lt;em&gt;That&amp;rsquo;s you!&lt;/em&gt;) One of the more obvious examples is how much people have been trained to share intimate details of their lives on corporate social media. Beyond just embarrassment, a lack of proper precautions can lead to having your entire system compromised. Consequences of that can range from mild regret to financially devastating.&lt;/p&gt;
&lt;h3 id=&#34;phishing-attacks&#34;&gt;Phishing Attacks&lt;/h3&gt;
&lt;p&gt;Phishing is when communications are sent out to trick a person to accidentally load a program, or divulge specific information. &lt;a href=&#34;https://www.phishing.org/what-is-phishing&#34;&gt;Phishing&lt;/a&gt; is very effective when combined with other attacks. The more someone (or &lt;em&gt;something&lt;/em&gt;) can learn about you, the more effective phishing messages can be tailored to you. It is not out of the question that voice cloning, and other &lt;a href=&#34;https://libresolutions.network/tags/machine-learning&#34;&gt;generative AI&lt;/a&gt; tools will be used to &lt;a href=&#34;https://proton.me/blog/what-is-email-spoofing#how-does-email-spoofing-work&#34;&gt;impersonate&lt;/a&gt; trusted contacts.&lt;/p&gt;
&lt;p&gt;From &lt;a href=&#34;https://libresolutions.network/articles/cyberwar/&#34;&gt;A Non-Combattant&amp;rsquo;s Guide to Cyberwar&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;There are many different ways [phishing] can be carried out:&lt;br&gt;
&lt;strong&gt;E-mail:&lt;/strong&gt; one kind of attack is an urgent email that requires you to immediately click a certain link. That link will then present a fake log-in form disguised as a legitimate site. This could be used to steal your credentials. If the site itself has a vulnerability, merely clicking the link itself could be enough to compromise your account.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Attachments:&lt;/strong&gt; any file sent your way may be more than meets the eye. There are a variety of methods that allow a file that’s opened to either run as a virus, or send your data elsewhere.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;None of this is exclusive to e-mail&lt;/strong&gt;.&lt;br&gt;
Messaging apps, and online communities can all enable the same problems.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/spam-attack.webp&#39; 
&gt;


&lt;p class=&#34;caption&#34;&gt;
    The line between spam and phishing is very blurry 
&lt;/p&gt;


&lt;/div&gt;
&lt;p&gt;Sometimes, an adversary being able to figure out &lt;em&gt;which accounts are yours&lt;/em&gt; is enough to get very useful information, or to break into already compromised accounts. Other times, getting you to run some malware can give up complete control of your system. The best defense is to be aware of phishing, and take precaution before opening links or attachments.&lt;/p&gt;
&lt;iframe src=&#39;https://archive.org/embed/protect-your-devices-from-hackers&#39; style=&#34;height:max-content;aspect-ratio: 16/9;min-height:460px;max-height:15rem;max-width:60rem;&#34; width=&#34;100%&#34; height=&#34;100%&#34;&gt;

&lt;/iframe&gt;
&lt;p&gt;Video: &lt;a href=&#34;https://archive.org/details/protect-your-devices-from-hackers&#34;&gt;Protect Your Devices From Hackers – Don&amp;rsquo;t Get &amp;lsquo;0wned&amp;rsquo;&lt;/a&gt; by &lt;a href=&#34;https://archive.org/search?query=creator%3A%22AJ%2B+and+the+Electronic+Frontier+Foundation%22&#34;&gt;AJ and the Electronic Frontier Foundation&lt;/a&gt;&lt;/p&gt;
&lt;h4 id=&#34;for-each-channel-a-purpose&#34;&gt;For each channel, a purpose.&lt;/h4&gt;
&lt;p&gt;Reflect on how and in what way your trusted contacts will interact with you. Having separate email address(es) for different purposes can help filter specific messages for you, this will help you know if a particular message is genuine or not. Very often services will give you the option to enter a code instead of clicking a link, which is helpful in this situation. If you&amp;rsquo;re sure  you must click a link, it can be worth copying it (&lt;em&gt;with a right-click, or long touch&lt;/em&gt;) first, then inspecting it yourself before opening it.&lt;/p&gt;
&lt;p&gt;Even something as simple as keeping in mind who tends to give you a phone call and who else prefers to use an end-to-end encrypted messaging app. If someone is reaching out to you in an unusual way, that can be an indication that something isn&amp;rsquo;t right. This applies to workplaces too, it can be a good idea to avoid mixing your career with your personal life, having an account for each can keep things separated.&lt;/p&gt;
&lt;h3 id=&#34;big-tech-services&#34;&gt;Big Tech Services&lt;/h3&gt;
&lt;p&gt;Another way you may be outright, voluntarily handing out your information is when using cloud-driven and/or &lt;a href=&#34;https://www.fsf.org/windows/#abuses&#34;&gt;non-free&lt;/a&gt; software and services. Moving your data to your own devices, or at least to services run without &lt;a href=&#34;https://en.wikipedia.org/wiki/Vendor_lock-in&#34;&gt;vendor lock-in&lt;/a&gt;.&lt;/p&gt;
&lt;h4 id=&#34;disentangle-yourself-from-cloud-platforms&#34;&gt;Disentangle Yourself from Cloud Platforms&lt;/h4&gt;
&lt;blockquote&gt;
&lt;p&gt;There is no cloud, just somebody else&amp;rsquo;s computer!&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Many online tools are just a &lt;a href=&#34;https://www.gnu.org/philosophy/who-does-that-server-really-serve.en.html&#34;&gt;&lt;em&gt;service as a software substitute&lt;/em&gt;.&lt;/a&gt; This means that while you gain the convenience of sophisticated technologies at scale, you will also be unable to choose the terms of your computing. Simple things like using your own software like &lt;a href=&#34;https://www.libreoffice.org/&#34;&gt;LibreOffice&lt;/a&gt; or &lt;a href=&#34;https://inkscape.org/&#34;&gt;Inkscape&lt;/a&gt; to create media allows you to keep your information under your own control. By not relying on external services for creating documents, presentations, or even notes you can go a long way to help reassert your own autonomy.&lt;/p&gt;
&lt;p&gt;Choosing how you use social media will also have a significant impact. If you&amp;rsquo;re willing to put up with some inconvenience, it can be worth using &lt;a href=&#34;https://libredirect.github.io/&#34;&gt;alternate front ends&lt;/a&gt; for mainstream services to browse without being directly associated with an account. This can definitely help those who want to break away but don&amp;rsquo;t want to miss out on important information.&lt;/p&gt;
&lt;h3 id=&#34;online-footprint&#34;&gt;Online Footprint&lt;/h3&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/tott-4.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-4/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #4 Online Identity&lt;/h2&gt;&lt;i&gt;What is following you in your digital tracks?&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h4 id=&#34;take-control-of-your-social-media&#34;&gt;Take Control of your Social Media&lt;/h4&gt;
&lt;p&gt;Being deliberate with your social media &lt;a href=&#34;https://www.socialpilot.co/blog/ultimate-guide-manage-social-media-privacy-settings&#34;&gt;privacy settings&lt;/a&gt; is very important. Understand what features are available, and what it means for who can see what.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Who can see posts you make?&lt;/li&gt;
&lt;li&gt;Is your profile searchable by site-members or anyone?&lt;/li&gt;
&lt;li&gt;Does someone have to request access to see your information?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;It&amp;rsquo;s important to consider what you&amp;rsquo;d like to be public, vs what is best left offline.&lt;br&gt;
The best way to protect information is to never record it in the first place!&lt;/p&gt;
&lt;h4 id=&#34;find-yourself-in-search-engines&#34;&gt;Find Yourself in Search Engines&lt;/h4&gt;
&lt;p&gt;You can see how easy it is to get information on you by performing your own searches. Given that search engines will make an attempt to find results relevant to you, it&amp;rsquo;s worth trying multiple search engines rather than making assumptions off a single search. Including details about yourself may help narrow the results.&lt;/p&gt;
&lt;h4 id=&#34;consider-alternate-identities&#34;&gt;Consider Alternate Identities&lt;/h4&gt;
&lt;p&gt;On other platforms, you may have an identity that isn&amp;rsquo;t your real name. It&amp;rsquo;s generally a good idea not to repeat usernames across platforms unless the intention is for them to be publicly associated.&lt;/p&gt;
&lt;h4 id=&#34;close-dormant-accounts&#34;&gt;Close Dormant Accounts&lt;/h4&gt;
&lt;p&gt;If you no longer use a service, you may want to consider closing the account if the option is available. If nothing else, it ties up another loose end.&lt;/p&gt;
&lt;h4 id=&#34;privacy-policies&#34;&gt;Privacy Policies&lt;/h4&gt;
&lt;p&gt;Digital products and platforms will have a published &lt;a href=&#34;https://time.com/3986016/google-facebook-twitter-privacy-policies/&#34;&gt;&lt;em&gt;privacy policy&lt;/em&gt;&lt;/a&gt; that ideally outlines what information is collected and how it&amp;rsquo;s used. They will vary in content, clarity, and detail.&lt;/p&gt;
&lt;p&gt;For online platforms privacy policies can help you understand:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What information the platform collects&lt;/li&gt;
&lt;li&gt;If your information is being shared with or sold&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Another document is a &lt;strong&gt;warrant canary&lt;/strong&gt;. A &lt;a href=&#34;https://www.okta.com/identity-101/warrant-canary/&#34;&gt;warrant canary&lt;/a&gt; is a document that explains that the organization hasn&amp;rsquo;t received any requests for information from governments and/or law enforcement agencies. It&amp;rsquo;s a useful thing to have, because law enforcement agencies will sometimes gag providers from informing their clients, or even stakeholders.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&amp;ldquo;Two government officials who spoke on the condition of anonymity said the Justice Department obtained an individualized order from a judge of the Foreign Intelligence Surveillance Court last year. &lt;strong&gt;Yahoo was barred from disclosing the matter.&lt;/strong&gt;&amp;rdquo;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://www.nytimes.com/2016/10/06/technology/yahoo-email-tech-companies-government-investigations.html&#34;&gt;Yahoo Said to Have Aided U.S. Email Surveillance by Adapting Spam Filter&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h4 id=&#34;legislative-protections&#34;&gt;Legislative Protections&lt;/h4&gt;
&lt;p&gt;Depending on your jurisdiction, you may be entitled to privacy protections. Notably, EU Citizens are covered by the &lt;a href=&#34;https://www.sophos.com/en-us/cybersecurity-explained/gdpr&#34;&gt;GDPR&lt;/a&gt; which grants outlines regulations for organizations handling data deletion requests from individuals. It is worth being familiar with what privacy protections exist (or &lt;em&gt;don&amp;rsquo;t exist&lt;/em&gt;) in your locale.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;#contents&#34;&gt;Back to Contents&lt;/a&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;account-security&#34;&gt;Account Security&lt;/h2&gt;
&lt;h3 id=&#34;using-a-password-manager&#34;&gt;Using a Password Manager&lt;/h3&gt;
&lt;p&gt;While a notebook of passwords can be lost or stolen, there are digital means to keep track of accounts and passwords. Conveniently, some managers have integrated browser extensions that can make it easy to log in with stored passwords. These tools can go a long way towards improving your account security a lot easier to maintain.&lt;/p&gt;
&lt;p&gt;Two password managers that I&amp;rsquo;ve used:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://keepassxc.org&#34;&gt;KeePass XC&lt;/a&gt; (Offline)&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://bitwarden.com&#34;&gt;Bitwarden&lt;/a&gt; (&lt;a href=&#34;https://github.com/dani-garcia/vaultwarden&#34;&gt;Self-Hostable&lt;/a&gt;)&lt;/li&gt;
&lt;/ul&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://libresolutions.network/media/diagrams/account-security-tools.webp&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/diagrams/account-security-tools.webp&#39; 
&gt;

&lt;/a&gt;



&lt;/div&gt;
&lt;h3 id=&#34;long--unique-passwords-per-account&#34;&gt;Long &amp;amp; Unique Passwords per account&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Why?&lt;/strong&gt; So that one account breach doesn&amp;rsquo;t spread to others.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://bitwarden.com/password-strength/&#34;&gt;&lt;em&gt;How strong is your password?&lt;/em&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Reusing passwords means that if your password is found in a &lt;a href=&#34;https://haveibeenpwned.com/&#34;&gt;data breach&lt;/a&gt; or hack, it can be used to gain access to other accounts.&lt;/p&gt;
&lt;p&gt;Using a password manager can help you generate significantly longer passwords that are significantly harder to break, and may be more random than what you can come up with yourself.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://avoidthehack.com/getting-started-cybersecurity#developgoodpasswordmanagementpra...&#34;&gt;Learn to develop good password management practices&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;turn-on-either-totp-or-hardware-two-factor-authentication-where-possible&#34;&gt;Turn on either ToTP or hardware two-factor authentication, where possible&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Why?&lt;/strong&gt; By adding two-factor authentication you significantly raise the difficulty of attacks on your accounts. This can also buy you time to reset your password if it’s stolen. Multi-factor authentication is very important for protecting important accounts.&lt;/p&gt;
&lt;h3 id=&#34;unique-e-mail-addresses-per-account&#34;&gt;Unique e-mail addresses per account&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Why?&lt;/strong&gt; To make phishing campaigns much easier to identify.&lt;/p&gt;
&lt;p&gt;Some e-mail providers support adding additional words to &lt;a href=&#34;#e-mail&#34;&gt;your email.&lt;/a&gt; For example you may be able to use &lt;code&gt;+shopping&lt;/code&gt; at the end of your email as: &lt;code&gt;name+shopping@example.com&lt;/code&gt;. This is good for filtering mail, but makes your alternate e-mails potentially discoverable.&lt;/p&gt;
&lt;p&gt;If you&amp;rsquo;d like unique e-mails forwarded to your own e-mail address, an e-mail forwarding &amp;amp; aliasing service like &lt;a href=&#34;https://relay.firefox.com/&#34;&gt;firefox relay&lt;/a&gt; or &lt;a href=&#34;https://addy.io/&#34;&gt;addy.io&lt;/a&gt; can help. Many people will already have multiple e-mails from different providers, some of them may support aliases or disposable addresses.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;#contents&#34;&gt;Back to Contents&lt;/a&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;e-mail&#34;&gt;E-mail&lt;/h2&gt;
&lt;p&gt;Email is something that&amp;rsquo;s critical to get right. Almost every online account allows for accounts to be recovered (or stolen!) through email. This means that it&amp;rsquo;s the most important account to secure. Rotating your e-mail password more often than other accounts can definitely make a difference in the long run.&lt;/p&gt;
&lt;p&gt;Beyond just being able to steal accounts, a hijacked email can also be used to spread scams and malware to others. Taking &lt;a href=&#34;#account-security&#34;&gt;account security&lt;/a&gt; seriously is important!&lt;/p&gt;
&lt;h3 id=&#34;choose-a-great-provider&#34;&gt;Choose a Great Provider&lt;/h3&gt;
&lt;p&gt;Choosing a provider can be difficult. Even when one finds a great one, it&amp;rsquo;s not worth entirely relying on a single provider. If you run your own website, e-mail hosting can sometimes be included with web hosting. Of course, there&amp;rsquo;s always the option of running it yourself. That however, has its own &lt;a href=&#34;https://cfenollosa.com/blog/after-self-hosting-my-email-for-twenty-three-years-i-have-thrown-in-the-towel-the-oligopoly-has-won.html&#34;&gt;challenges&lt;/a&gt;, but there are many &lt;a href=&#34;https://bookofadamz.com/how-to-make-your-own-whatsapp-signal-telegram-competitor/&#34;&gt;advantages&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Email Provider Recommendations:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://digdeeper.club/articles/email.xhtml&#34;&gt;E-mail providers - which one to choose?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://restoreprivacy.com/email/secure/&#34;&gt;10 Best Private and Secure Email Services for 2023&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://gunther.link/posts/email/&#34;&gt;Finding a Privacy-Friendly Email Provider&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.privacyguides.org/en/email/&#34;&gt;Privacy Guides - Email Services&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;criteria-to-consider&#34;&gt;Criteria to consider:&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Privacy&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There are limits to how private e-mail can be, but it&amp;rsquo;s at least worth selecting a provider that isn&amp;rsquo;t profiting off &lt;a href=&#34;https://www.theguardian.com/technology/2014/apr/15/gmail-scans-all-emails-new-google-terms-clarify&#34;&gt;scanning your mail.&lt;/a&gt;&lt;br&gt;
Things to consider for privacy:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;How long the provider has been in business&lt;/li&gt;
&lt;li&gt;Reputation of the provider&lt;/li&gt;
&lt;li&gt;Jurisdiction&lt;/li&gt;
&lt;li&gt;Business model and funding sources&lt;/li&gt;
&lt;li&gt;End-to-End Encryption&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Features&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Different options may have some variation in offerings.
Important features can be:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Webmail&lt;/li&gt;
&lt;li&gt;Storage size&lt;/li&gt;
&lt;li&gt;Custom Domains&lt;/li&gt;
&lt;li&gt;Disposable aliases&lt;/li&gt;
&lt;li&gt;Multiple accounts/mailboxes&lt;/li&gt;
&lt;li&gt;Encryption / PGP Support&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#using-an-e-mail-client&#34;&gt;Client&lt;/a&gt; (IMAP &amp;amp; POP) Support&lt;/li&gt;
&lt;li&gt;Forwarding and Filters&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;I personally believe the best-case scenario for mass e-mail providers are responsibly run local non-profit enterprises. As online communication has become more central to people&amp;rsquo;s lives, competitive local infrastructure needs to take a more central role. While on the total other end of the spectrum, there also needs to be a place for less personal, but still quite small, providers that operate indiscriminately. Both have a very important place in safeguarding online freedom from a variety of threats.&lt;/p&gt;
&lt;h3 id=&#34;email-encryption&#34;&gt;Email Encryption&lt;/h3&gt;
&lt;p&gt;Every e-mail provider is going to market itself as secure. &lt;em&gt;Secure from &lt;strong&gt;what&lt;/strong&gt;?&lt;/em&gt; One may ask. Security is about proactive measures taken against particular problems. Nothing is 100% secure. Many security features proudly proclaimed by big tech services are really just about protecting information &lt;em&gt;in transit&lt;/em&gt; as it goes from your machine to theirs. It&amp;rsquo;s very difficult for a provider to protect you from &lt;em&gt;themselves&lt;/em&gt;, even when there&amp;rsquo;s desire to. There is always a degree of trust involved with hosting your data on somebody else&amp;rsquo;s computer.&lt;/p&gt;
&lt;p&gt;Domestic government (and corporate) surveillance is a serious concern as well. Many of us in the so-called &amp;ldquo;Free World&amp;rdquo; have to be concerned about the &lt;a href=&#34;https://www.thenewoil.org/en/guides/less-important/five-eyes/&#34;&gt;5 prying eyes&lt;/a&gt;. With all this in mind, I would never put too much faith email &lt;a href=&#34;https://www.theguardian.com/commentisfree/2014/may/20/why-did-lavabit-shut-down-snowden-email&#34;&gt;security guarantees&lt;/a&gt;. Even in the best of circumstances,treat e-mail like you would a postcard in the mail; not for anything particularly sensitive or private.&lt;/p&gt;
&lt;h4 id=&#34;strategy-1-inbox-level&#34;&gt;Strategy 1: Inbox Level&lt;/h4&gt;
&lt;p&gt;There are many end-to-end encrypted &lt;a href=&#34;https://blog.thenewoil.org/2023-review-skiff-mail&#34;&gt;(&amp;ldquo;zero knowledge&amp;rdquo;)&lt;/a&gt; mailboxes provided by larger privacy-focused email providers. How it works is that in addition to your emails being secured in transit, they are also encrypted when they are stored. This means that as long as your account/password are secure, your email&amp;rsquo;s content can only be read by you. This often comes at the cost of lack of third-party client support.&lt;/p&gt;
&lt;p&gt;This strategy has advantages, but mostly its ease-of-use. It saves you the time of having to manage your own encryption keys, meaning that others should be able to send you encrypted emails right away. The downside of this strategy is that you&amp;rsquo;re still placing a significant amount of trust on the provider, especially if you&amp;rsquo;re using it for sensitive information.&lt;/p&gt;
&lt;h4 id=&#34;strategy-2-message-level&#34;&gt;Strategy 2: Message Level&lt;/h4&gt;
&lt;p&gt;When using your own email client, you can choose to &lt;a href=&#34;https://emailselfdefense.fsf.org/en/&#34;&gt;proactively encrypt&lt;/a&gt; emails with PGP. For recipients who&amp;rsquo;ve already setup their keys, some clients will be able to auto-discover the correct key for you so it can be fairly convenient. This strategy ensures that the email is secure as long as the recipients keys are, from all other parties. If your recipient already publishes their PGP key. (&lt;em&gt;Here&amp;rsquo;s&lt;/em&gt; &lt;a href=&#34;https://gabe.rocks/pubkey.txt&#34;&gt;&lt;em&gt;mine&lt;/em&gt;&lt;/a&gt;)&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://libresolutions.network/media/images/email-security.webp&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/email-security.webp&#39; 
&gt;

&lt;/a&gt;


&lt;p class=&#34;caption&#34;&gt;
    A Joke, but one with some elements of truth in it. 
&lt;/p&gt;


&lt;/div&gt;
&lt;h4 id=&#34;metadata-headaches&#34;&gt;Metadata headaches&lt;/h4&gt;
&lt;p&gt;Regardless of which strategy you use, due to how e-mail works it&amp;rsquo;s impossible to conceal who you are sending it to, and many other details. Encrypted mail will protect the contents of the mail, but not extra information like when it was sent. For those who absolutely need to keep their contacts a secret, like investigative reporters, there are better options than e-mail.&lt;/p&gt;
&lt;h3 id=&#34;using-an-e-mail-client&#34;&gt;Using an e-mail Client&lt;/h3&gt;
&lt;p&gt;Using Free Open Source Software clients put you back in charge of your mail. While webmail and apps can be very convenient, they can often be very opinionated on how you &lt;em&gt;should&lt;/em&gt; interact with your mail. Mail clients are a very important tool. Some will provide privacy features like blocking e-mail trackers, and other useful tools like custom filtering.&lt;/p&gt;
&lt;p&gt;Instead of leaving your mail on a server forever, you can move them to your computer for offline access. Every client will have its own features, but having the capability to encrypt &lt;a href=&#34;https://www.curtiswallen.com/pgp/&#34;&gt;emails with PGP&lt;/a&gt; is a non-trivial advantage.&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;m a huge fan of &lt;a href=&#34;https://www.thunderbird.net/&#34;&gt;Mozilla Thunderbird&lt;/a&gt; though there are other e-mail clients, &lt;a href=&#34;https://www.privacyguides.org/en/email-clients/&#34;&gt;Privacy Guides&lt;/a&gt; has an excellent list of recommendations.&lt;/p&gt;
&lt;h4 id=&#34;configuring-your-client&#34;&gt;Configuring Your Client&lt;/h4&gt;
&lt;p&gt;It may seem intimidating, but  if you have an uncommon mail provider, or roll you own email you may need to &lt;a href=&#34;https://support.mozilla.org/en-US/kb/manual-account-configuration&#34;&gt;configure your client.&lt;/a&gt; This requires a few more options than just a username/password. To understand what the options mean you have to realize that you&amp;rsquo;re setting up two things:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Incoming Server:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Which needs:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The mail server&amp;rsquo;s hostname (such as pop.example.com)&lt;/li&gt;
&lt;li&gt;Choosing either IMAP or POP as the protocol, this changes how the server handles mail that&amp;rsquo;s delivered.&lt;/li&gt;
&lt;li&gt;The port number the server is running on&lt;/li&gt;
&lt;li&gt;your email &amp;amp; password&lt;/li&gt;
&lt;li&gt;Security settings&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Outgoing Server:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Which needs:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The SMTP (&lt;em&gt;Simple Mail Transfer Protocol&lt;/em&gt;) server&amp;rsquo;s hostname&lt;/li&gt;
&lt;li&gt;The server&amp;rsquo;s port number&lt;/li&gt;
&lt;li&gt;Your email &amp;amp; password&lt;/li&gt;
&lt;li&gt;Security settings&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;You&amp;rsquo;ll want to consult your e-mail providers documentation for the specific values. Contacting customer service may help. These settings are what&amp;rsquo;s required to configure any mail client, though some will be able to fill in some of the details when you provide your email address.&lt;/p&gt;
&lt;h4 id=&#34;delta-chat&#34;&gt;Delta Chat&lt;/h4&gt;
&lt;p&gt;&lt;a href=&#34;https://delta.chat/&#34;&gt;Delta Chat&lt;/a&gt; is a mail client that looks and functions as an end-to-end encrypted messaging app. It&amp;rsquo;s an absolutely brilliant technique. Despite none of my contacts being (&lt;em&gt;currently&lt;/em&gt;) willing to take it seriously, I actually believe that delta chat is one of the more underrated online messengers.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://delta.chat&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/delta-chat.webp&#39; 

 alt=&#39;delta chat running on multiple devices&#39;
&gt;

&lt;/a&gt;



&lt;/div&gt;
&lt;p&gt;In theory, it should be very easy to adopt because it doesn&amp;rsquo;t require anyone to create any new accounts. It handles encryption key management for you, and uses your own inbox for storage. Of course, it can also send regular emails to those who don&amp;rsquo;t have it yet. For those who find &lt;a href=&#34;https://www.signal.org/&#34;&gt;signal&lt;/a&gt; requiring a phone number to be too much, I consider delta chat a must-have.&lt;/p&gt;
&lt;h3 id=&#34;inbox-cleaning&#34;&gt;Inbox Cleaning&lt;/h3&gt;
&lt;p&gt;Junk mail piles up. Over the years, it can be easy to accumulate more and more spam and incoming mail that becomes unmanageable. This causes a lot of people to essentially ignore their e-mails all-together. If you&amp;rsquo;re not quite at the point of just abandoning that particular email and starting fresh, there&amp;rsquo;s a lot you can do to reduce the amount of unsanctioned messages.&lt;/p&gt;
&lt;h4 id=&#34;folders-and-filtering&#34;&gt;Folders and Filtering&lt;/h4&gt;
&lt;p&gt;Odds are, a lot of regular incoming correspondence is expected in advance. This means that you can create sub-folders for particular domains, and use filters to sort your mail for you.This can keep the important stuff at hand, while allowing you to sort through the rest at your convenience.&lt;/p&gt;
&lt;h4 id=&#34;unsubscribe-without-mercy&#34;&gt;Unsubscribe Without Mercy&lt;/h4&gt;
&lt;p&gt;Getting your email added or removed from marketing lists can really add-up over time. Reducing your incoming emails to what you specifically want can make a massive impact. &lt;br&gt;
You can clean a busy inbox with this process:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Find an example of something you no longer wish to receive&lt;/li&gt;
&lt;li&gt;Hit the &amp;ldquo;unsubscribe&amp;rdquo; button (usually near the bottom) on the email and get removed from the list&lt;/li&gt;
&lt;li&gt;Search for messages from that sender and delete them all&lt;/li&gt;
&lt;li&gt;Repeat every so often&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Eventually, you&amp;rsquo;ll find you&amp;rsquo;re entirely free of unwanted incoming e-mails except for outright spam.&lt;/p&gt;
&lt;h4 id=&#34;the-spam-war&#34;&gt;The Spam War&lt;/h4&gt;
&lt;p&gt;If you&amp;rsquo;re getting a great number of spam, it&amp;rsquo;s a sign that your email has appeared on &lt;a href=&#34;https://haveibeenpwned.com&#34;&gt;many kinds of lists&lt;/a&gt;. Not having it published publicly can help, but fighting spam is a team effort. It&amp;rsquo;s worth your time to report egregious examples, but eventually you&amp;rsquo;ll want to setup your own filters for it. Where possible, if you have a filter that&amp;rsquo;s working well, I&amp;rsquo;d recommend having it also mark the message as spam.&lt;/p&gt;
&lt;p&gt;Both &lt;a href=&#34;https://fightspam.gc.ca/eic/site/030.nsf/frm-eng/MMCN-9EZV6S&#34;&gt;Canadians&lt;/a&gt;, and &lt;a href=&#34;https://reportfraud.ftc.gov/&#34;&gt;Americans&lt;/a&gt; can report spam to law enforcement.&lt;/p&gt;
&lt;h3 id=&#34;trackers&#34;&gt;Trackers&lt;/h3&gt;
&lt;p&gt;There are two common types of e-mails you can send/receive.
Plain text, which as the name implies is just text and is therefore entirely free of trackers. Emails can also be HTML, like web pages. This allows for them to look appealing, include images, and unfortunately trackers!&lt;/p&gt;
&lt;p&gt;When you load an e-mail that loads content (like images) from a remote server, those assets can be used to send information. This can be used to get all kinds of engagement stats about how even you as an individual respond to particular messages. A troubling consequence of this is that those running &lt;a href=&#34;#phishing-attacks&#34;&gt;phishing&lt;/a&gt; campaigns are able to use that information to come up with more compelling scams.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;#contents&#34;&gt;Back to Contents&lt;/a&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;browsers&#34;&gt;Browsers&lt;/h2&gt;
&lt;p&gt;You may be reading this in a browser. As you likely are aware, a web browser is a powerful program that displays &amp;amp; runs web pages and web applications. For many, it&amp;rsquo;s their primary gateway to the world wide web as well as the internet as a whole. Being complacent about what browser(s) you&amp;rsquo;re using is a surefire way to put your information in the hands of questionable external forces.&lt;/p&gt;
&lt;h3 id=&#34;understanding-the-web&#34;&gt;Understanding the Web&lt;/h3&gt;
&lt;p&gt;A good place to start is to refresh your understanding of what the web &lt;em&gt;actually is&lt;/em&gt;. Like many things in our technological landscape, it wasn&amp;rsquo;t built in a day, or even by a single person. It&amp;rsquo;s an amalgamation of the work of many different people, institutions, and even governments over time. I&amp;rsquo;m very passionate about people choosing to &lt;a href=&#34;https://gabe.rocks/tech/reclaiming-cyberspace/&#34;&gt;take an active role&lt;/a&gt; in shaping cyberspace. Collectively, we do have a real impact on the future of the World Wide Web.&lt;/p&gt;
&lt;p&gt;To begin, we have to start with the simplest of web pages. These are &lt;strong&gt;static web sites&lt;/strong&gt; that display a set amount of text, images, or media.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/diagrams/web%20static.webp&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;Far from being mere &lt;a href=&#34;https://en.wikipedia.org/wiki/Hypertext&#34;&gt;&lt;em&gt;hypertext&lt;/em&gt;,&lt;/a&gt; the web now includes multimedia applications. Web 2.0 was when web sites became &lt;em&gt;dynamic&lt;/em&gt;. Forums, Wikis, and even the first social media sites were dynamic because user interaction fed into a database that was used to generate web content. The earliest of these could work without many (if any) scripts at all, and were processed by the web site&amp;rsquo;s &lt;strong&gt;back-end&lt;/strong&gt; software.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/diagrams/web%20dynamic.webp&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;A web page can load real-time data from an online service, and/or stream audio and video. Because of this, the browser is the primary tool in many people&amp;rsquo;s digital life. Like anything else, this includes a variety of risks and trade-offs.&lt;/p&gt;
&lt;p&gt;The addition of more content and features to the web has made browsers themselves increase in complexity significantly. In theory, a browser would only need to support downloading the page, and displaying the text on it. As the web has evolved, browsers now support all kinds of multi-media, interactivity, and online gaming.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/diagrams/web%20apps.webp&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;While this isn&amp;rsquo;t necessarily news to you, what is worth understanding is that all of these additional features have meaningful trade-offs when it comes to privacy &amp;amp; security. There are those who yearn for a return of the days of just clean pure hypertext. If that sounds like something you&amp;rsquo;re interested in, &lt;a href=&#34;https://gemini.circumlunar.space/&#34;&gt;gemini&lt;/a&gt; is right up your alley. For the rest of us who would like to enjoy a wide variety of modern enhancements to the web, there is much to account for.&lt;/p&gt;
&lt;h3 id=&#34;surveillance&#34;&gt;Surveillance&lt;/h3&gt;
&lt;p&gt;In many ways, it helps to think of much of the Web as a street filled with surveillance cameras. Without making significant effort, it&amp;rsquo;s trivial for those watching to keep track of where you go on a regular basis. In addition to this, the places you visit &lt;em&gt;themselves&lt;/em&gt; may also be spying on you in exchange for a pithy sum.&lt;/p&gt;
&lt;h4 id=&#34;cookies--storage&#34;&gt;Cookies &amp;amp; Storage&lt;/h4&gt;
&lt;p&gt;It&amp;rsquo;s pretty useful to be able to log-in to a website. It&amp;rsquo;s also very handy for the server to save some additional information on your end so when you return you can continue as normal. Using &lt;em&gt;sessions&lt;/em&gt; is how servers keep track of who they&amp;rsquo;re talking to. Naturally, if you divulge more information about yourself to a particular service, the more that information can be corroborated with other data points. Without saving cookies, log-ins and site settings would be lost immediately, but that doesn&amp;rsquo;t mean you need to hold onto them forever.&lt;/p&gt;
&lt;h4 id=&#34;scripts&#34;&gt;Scripts&lt;/h4&gt;
&lt;p&gt;Either scripts from the site itself, or remote scripts pulled in from other services can do a wide range of things to try to uniquely identify you. On the other hand, many sites will not work at all and refuse to display something as simple as an article. Many tracking blockers will block all external scripts, but others will make exceptions that keep certain mainstream sites working.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/diagrams/web%20scripts.webp&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;The best practice would be to block any unnecessary scripts. There are many &lt;a href=&#34;#browser-add-ons&#34;&gt;add-ons&lt;/a&gt; that can make this easier. &amp;ldquo;Unnecessary&amp;rdquo; can be a very broad categorization however, in some cases you may consider it worth blocking any and all scripts everywhere. This is the recommended setup when using the Tor Browser, because scripts can do many things to de-anonymize a visitor.&lt;/p&gt;
&lt;p&gt;Sadly many of these invasive scripts have been thrust on the public without much alternative. As a web developer, it may be tempting (or even good for your resume) to develop using the latest fancy script frameworks, it&amp;rsquo;s important to remember that you can maintain all the advantages of dynamic web sites without it. When security and privacy of your users is paramount, it&amp;rsquo;s something worth considering.&lt;/p&gt;
&lt;h4 id=&#34;fingerprinting&#34;&gt;Fingerprinting&lt;/h4&gt;
&lt;p&gt;Now that you&amp;rsquo;ve put in the effort to properly mitigate unwanted data leakage. There&amp;rsquo;s still another nasty problem. If you require perfect anonymity online, it&amp;rsquo;s worth understanding that your &lt;a href=&#34;https://coveryourtracks.eff.org&#34;&gt;browser fingerprint&lt;/a&gt; can be used to uniquely identify you online. This is a problem, but it&amp;rsquo;s one not worth working on at the expense of protecting important information.&lt;/p&gt;
&lt;h3 id=&#34;choosing-a-browser&#34;&gt;Choosing a Browser&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://digdeeper.club&#34;&gt;DigDeeper.club&lt;/a&gt; has an excellent if troubling &lt;a href=&#34;https://digdeeper.club/articles/browsers.xhtml&#34;&gt;post on browsers&lt;/a&gt;. Unfortunately the major take-away is that the situation is very dire:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;The only reasonable choice is &lt;a href=&#34;https://www.palemoon.org/&#34;&gt;Pale Moon&lt;/a&gt;. &lt;strong&gt;Or, just try wean yourself off the modern web&lt;/strong&gt; by sticking to websites such as the ones on Neocities, &lt;a href=&#34;https://wiby.me&#34;&gt;wiby.me&lt;/a&gt;, etc. which are functional in NetSurf or terminal browsers. I hate to kill the positivity of yet another summary, but if reality forces me to - what can I do?&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;(&lt;em&gt;emphasis mine&lt;/em&gt;)&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;If you require using the modern web&lt;/strong&gt; (ie. most &amp;ldquo;normal&amp;rdquo; websites) I recommend reading through &lt;a href=&#34;https://digdeeper.club/articles/browsers.xhtml&#34;&gt;the guide&lt;/a&gt; carefully and choosing what strikes the right balance for you.&lt;/p&gt;
&lt;p&gt;Reading through the browser guide leaves the impression that a serious web &amp;amp; browser renewal is something people from all walks of life should strongly consider.&lt;br&gt;
The root of the problem is two-fold:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Additional features on modern web sites introduce additional privacy risks&lt;/li&gt;
&lt;li&gt;To support these features, browsers themselves become more complicated to support, maintain, and validate&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;I intend to follow-up on this particular section, and I think it&amp;rsquo;s important to think-through how things should be done. This is one of the many reasons I emphasize more people getting involved, rather than let governments and corporations dictate it for us.&lt;/p&gt;
&lt;h4 id=&#34;the-more-the-merrier&#34;&gt;The More the Merrier&lt;/h4&gt;
&lt;p&gt;Because browsers are tools, it doesn&amp;rsquo;t often make sense to entirely limit yourself to a single one. There are some advantages to using different browsers for different &amp;ldquo;spheres&amp;rdquo; of your life. Above all, it&amp;rsquo;s best to understand why you&amp;rsquo;re using a particular browser for a certain task. If you&amp;rsquo;re really in love with a particular browser, you may be able to use multiple &lt;em&gt;profiles&lt;/em&gt; with different &lt;a href=&#34;https://divestos.org/pages/browsers&#34;&gt;settings&lt;/a&gt; in mind for different uses. Even something as simple as having separate bookmarks for each profile would make it easy to stay consistent.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://youtu.be/j5r6jFE8gic&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/browser-tierlist.webp&#39; 
&gt;

&lt;/a&gt;



&lt;/div&gt;
&lt;p&gt;In all cases you&amp;rsquo;ll likely want to alternate browsers for different tasks, with at least one clearing cookies/logins/history on reload. You may also want to search for a &lt;a href=&#34;#hardening&#34;&gt;hardening guide&lt;/a&gt; for whatever browser you choose, depending on your particular needs. It can help to have a hardened browser for most of your basic web tasks, with exceptions made for sites/services you need/trust and alternate ones for other things. &lt;strong&gt;Compartmentalization&lt;/strong&gt; can go a long way especially with many browsers offering built-in VPNs. &lt;em&gt;More on VPNs later&lt;/em&gt;&lt;/p&gt;
&lt;h3 id=&#34;hardening&#34;&gt;Hardening&lt;/h3&gt;
&lt;p&gt;Here is an excellent &lt;a href=&#34;https://brainfucksec.github.io/firefox-hardening-guide&#34;&gt;firefox hardening guide&lt;/a&gt; for firefox.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Hardening&lt;/em&gt; is the process of changing settings for particular privacy and security. Sometimes these changes include disabling tracking from the program itself! A good place to start is opt-ing out of any telemetry or analytics reporting. Then I would generally recommend taking the most extreme settings you can bear day-to-day, and consider increasing as you adapt. Some more &amp;lsquo;&lt;em&gt;extreme&lt;/em&gt;&amp;rsquo; changes would be &lt;a href=&#34;https://avoidthehack.com/webrtc-leaks-how-to-fix&#34;&gt;disabling WebRTC&lt;/a&gt; to protect your IP at the cost of some real-time applications breaking.&lt;/p&gt;
&lt;p&gt;Many of these changes will either be in your browsers settings panel or additionally &lt;code&gt;about:config&lt;/code&gt; on firefox based browsers. On desktop Firefox Arkenfox&amp;rsquo;s &lt;a href=&#34;https://github.com/arkenfox/user.js/wiki&#34;&gt;user.js&lt;/a&gt; file is a highly-recommended change for getting the most optimal settings. This alone may be a good reason to pick a firefox or its derivatives over google chrome and its derivatives.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/browser-tools.webp&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;If you&amp;rsquo;re using &lt;a href=&#34;https://brave.com/shields/&#34;&gt;brave shields&lt;/a&gt; you have an intuitive interface for being as strict as possible. It also has the advantage of being built into the browser for additional performance gains. On other browsers &lt;a href=&#34;https://ublockorigin.com/&#34;&gt;uBlock Origin&lt;/a&gt; is the go-to add-on for having complete control over what resources sites can access. Learning how to use these tools can do a great deal of good.&lt;/p&gt;
&lt;h3 id=&#34;browser-add-ons&#34;&gt;Browser Add-ons&lt;/h3&gt;
&lt;p&gt;A browser can feel very limiting without many &lt;a href=&#34;https://digdeeper.club/articles/addons.xhtml&#34;&gt;essential add-ons.&lt;/a&gt;  Ad-blocking is de-facto necessary for browsing a great deal of the web to salvage some of your time and attention.&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;ve personally used:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://ublockorigin.com/&#34;&gt;uBlock Origin&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://github.com/gorhill/uMatrix&#34;&gt;uMaxtrix&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s great to have full control over requests on a site-by-site basis. It takes a bit of learning, but is a very powerful tool that I&amp;rsquo;d love to see built-in to new FOSS browsers. By blocking specific kinds of remote requests across the board, you can disable all third-party ads.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://libredirect.github.io&#34;&gt;LibRedirect&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;A very useful tool for redirecting all kinds of mainstream social media links to dedicated (somtimes self-hosted!) web proxies.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://bitwarden.com&#34;&gt;Bitwarden&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://keepassxc.org/&#34;&gt;KeePassXC&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;See &lt;a href=&#34;#account-security&#34;&gt;Account Security&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://decentraleyes.org/&#34;&gt;Decentraleyes&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;If you&amp;rsquo;re going to allow remote scripts, it can be handy to proactively cache them, so that you&amp;rsquo;re not constantly being tracked by loading them on each visit to separate sites.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;#contents&#34;&gt;Back to Contents&lt;/a&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;network-security&#34;&gt;Network Security&lt;/h2&gt;
&lt;p&gt;Computer networks are fascinating things. The ability to link two devices over a long distance to accomplish sophisticated tasks is what makes much of our modern computing environment seem outright magical. Of course, where there&amp;rsquo;s power there&amp;rsquo;s also danger, the massive capabilities of networked systems vastly complicate the challenges of securing systems. To do the best you can, it&amp;rsquo;s important to have a basic understanding of computer networking and take reasonable precautions.&lt;/p&gt;
&lt;p&gt;An important place to start is to understand that every data connection relies on a physical connection on some form. You can relay data between two computers by linking them directly, or use routers to share data with networks outside your own &lt;em&gt;local network&lt;/em&gt;.&lt;/p&gt;
&lt;h3 id=&#34;local-area-network-lan&#34;&gt;Local Area Network (LAN)&lt;/h3&gt;
&lt;p&gt;Odds are, you likely have a modem/router machine in your house. It runs your local network and also provides a WiFi access point to wireless devices. This allows for all devices on the network to use the router to connect to your internet service provider (ISP).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The importance of protecting your local network can not be overstated&lt;/strong&gt;. Usually, your router will have a web admin access that you can use to ensure only devices you&amp;rsquo;ve authorized are connected. Managing access to your local network is your first-line of defense against many nefarious threats. For low-value targets, physical access may be sufficient, but for high value targets or high-traffic locations, the considerations differ.&lt;/p&gt;
&lt;h3 id=&#34;wifi&#34;&gt;WiFi&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Use a strong WiFi password.&lt;/strong&gt; Any device connected to your WiFi may as well be wired directly into every other computer or device on the network. Due to their nature as broadcasted signals, wireless networks are difficult to properly secure and may be vulnerable to &lt;a href=&#34;https://thehackernews.com/2024/05/new-wi-fi-vulnerability-enabling.html&#34;&gt;unintuitive attacks.&lt;/a&gt; An open network, or even a weakly secured one creates opportunity for &lt;a href=&#34;https://www.wired.com/2012/05/google-wifi-fcc-investigation/&#34;&gt;spying,&lt;/a&gt; compromise, or infiltration. There are many ways in which WiFi signals can be intercepted or jammed, in most cases it&amp;rsquo;s best to run sensitive systems over a direct wired connection. In situations where WiFi is needed, there are options such as segregating wireless clients from the same network. An option is to have the wireless network entirely disconnected or to relegate different devices to separate VLANs.&lt;/p&gt;
&lt;h3 id=&#34;router&#34;&gt;Router&lt;/h3&gt;
&lt;p&gt;Routers are what move messages between networks. Your router may connect to an internal modem that acts as a gateway to your internet service provider to connect to the rest of the Internet. Like any device on your network, it&amp;rsquo;s very important to ensure that you&amp;rsquo;re &lt;a href=&#34;https://download.fsfe.org/routers/rf-survey-report-2023.pdf&#34;&gt;able to choose&lt;/a&gt; a router that has up to date software and &lt;a href=&#34;https://therecord.media/tp-link-router-vulnerability-botnets&#34;&gt;isn&amp;rsquo;t compromised.&lt;/a&gt; Given its important role in your network, having a router you can trust is arguably one of the most important aspects of network security. At least in Canada, the status quo for many customers is to rely on a single device managed by their ISP, for better or worse. In some cases, people will decide to buy their own device running software that they trust and is maintained, to separate their network from the ISP provided router.&lt;/p&gt;
&lt;h3 id=&#34;firewalls&#34;&gt;Firewalls&lt;/h3&gt;
&lt;p&gt;A firewall is a useful tool to manage connections that come in the network. While it&amp;rsquo;s worth remembering that &lt;a href=&#34;https://firewallsdontstopdragons.com/buy-the-book/&#34;&gt;&lt;em&gt;Firewalls Don&amp;rsquo;t Stop Dragons&lt;/em&gt;,&lt;/a&gt; they are a vital tool in making connecting to the Internet without necessarily giving complete access. A firewall accepts incoming connections and ignores any connections that aren&amp;rsquo;t explicitly allowed. Firewalls can be software on a router, such as the one included in many ISP-provided routers or a dedicated device. A go-to recommendation for custom firewall software is &lt;a href=&#34;https://opnsense.org/&#34;&gt;OPNsense&lt;/a&gt; which is built on &lt;a href=&#34;https://www.pfsense.org/&#34;&gt;pfsense&lt;/a&gt;.&lt;/p&gt;
&lt;h3 id=&#34;domain-name-system-dns&#34;&gt;Domain Name System (DNS)&lt;/h3&gt;
&lt;p&gt;Every site or service online has a &lt;em&gt;publicly routable IP address&lt;/em&gt;, to connect to it your browser or applications need to get the correct IP address from the service&amp;rsquo;s &lt;em&gt;domain&lt;/em&gt;. This means that DNS is effectively a real-time system divulging what you&amp;rsquo;re connecting to, how often, and when. One solution to resolve this is to encrypt your DNS queries. To do this, you&amp;rsquo;ll want to make sure your devices and browsers are configured with a deliberately chosen &lt;a href=&#34;https://dnscrypt.info/public-servers&#34;&gt;DNS provider&lt;/a&gt;. Encrypting your DNS requests is as important as not making them to a malicious or negligent entity.&lt;/p&gt;
&lt;p&gt;There are many providers, but this only protects you from protecting onlookers from monitoring your requests, the provider may still have that information. Another important technique is to &lt;em&gt;cache&lt;/em&gt; your requests with a &lt;em&gt;recursive DNS resolver&lt;/em&gt;. This means that your devices will all connect to a resolver you run yourself, it then asks another DNS provider for the information and remembers it for a short period of time. &lt;a href=&#34;https://pi-hole.net/&#34;&gt;Pihole&lt;/a&gt; is a fairly popular option for achieving this, and it also includes ad-blocking features.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Why?&lt;/strong&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&amp;hellip;for many actors, &lt;a href=&#34;https://ssd.eff.org/module/why-metadata-matters&#34;&gt;metadata&lt;/a&gt; is far more valuable than the content. From a privacy perspective, DNS seems to be one of the most under-appreciated aspects of protecting oneself.&lt;br&gt;
In many ways it is because most good VPNs will handle DNS as well, but there are other considerations.&lt;/p&gt;
&lt;p&gt;DNS can also be set at the application level. Browsers, for example, will have their own DNS settings. Most major browsers now support &lt;a href=&#34;https://support.mozilla.org/en-US/kb/firefox-dns-over-https&#34;&gt;DOH&lt;/a&gt;, which is a very convenient way to encrypt your browser’s DNS queries. For encrypting all of your system’s DNS queries you may want to consider using &lt;a href=&#34;https://dnscrypt.info/faq/&#34;&gt;DNSCrypt&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://gabe.rocks/tech/reclaiming-cyberspace/#dns&#34;&gt;Reclaiming Territory in Cyberspace - DNS&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3 id=&#34;end-to-end-protection&#34;&gt;End-to-End Protection&lt;/h3&gt;
&lt;p&gt;For a connection to be fully secure, it needs to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Reach its destination&lt;/li&gt;
&lt;li&gt;Not be modified or interfered with&lt;/li&gt;
&lt;li&gt;Have reasonable protection against being identified&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This turns out to be quite a high bar, even encryption often only protects the content of communications but it can be much easier to observe who&amp;rsquo;s communicating with who, how often, or other metadata. You can do everything right on your end but if you connect to a malicious or compromised service, you can have problems. Man-in-the-middle attacks are even possible with modern encrypted websites, anyone able to use a certificate recognized by your device can do many malicious things including &lt;a href=&#34;https://blog.mozilla.org/netpolicy/files/2023/11/eIDAS-Industry-Letter.pdf&#34;&gt;deep packet inspection&lt;/a&gt; to effectively nullify most web encryption. Resolving this is much more complicated, and requires much more effort.&lt;/p&gt;
&lt;h3 id=&#34;proxies-vpns--darknets&#34;&gt;Proxies, VPNs &amp;amp; Darknets&lt;/h3&gt;
&lt;p&gt;For computer networks to work, every computer needs a public IP address. How this works in practice (with IPv4 usually&amp;hellip;) is that your machine has a number that your router knows, which has a number your ISP knows, which is then shared with the rest of the internet. That last number is your IP (public) address. Using a VPN does two things: 1) encrypts traffic between you and the service 2) forwards your connections through one of their IP addresses.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Virtual Private Network are often seen as the solution to all online privacy issues. This is people being mislead by slick advertising. VPNs are very useful for accessing content that is blocked in specific regions or protecting your IP from being known by online services. There are many ways users using a VPN can have their IP leaked so it is essential to make sure you are using your VPN properly.&lt;/p&gt;
&lt;p&gt;Your internet service provider (ISP) may not be trustworthy so you may want to use a VPN, it is important to realize that by using a VPN you are effectively transferring the risk of your ISP logging, tracking, censoring your information to that VPN provider. Like ISPs VPNs are businesses and it is foolish to assume they will put your needs as an individual or customer before the interests of their business.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-5/&#34;&gt;Tools of the Technocracy: #5 Networks&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Just like DNS providers, your ability to trust your VPN provider is quite important as well. Your ability to protect your information from them is just as difficult as masking your internet activity from your ISP. In addition to this, VPNs are prone to very unintuitive attacks. &lt;a href=&#34;https://mullvad.net/en/blog/2024/5/3/dns-traffic-can-leak-outside-the-vpn-tunnel-on-android&#34;&gt;DNS leaks&lt;/a&gt; are when your VPN is working fine, but your DNS queries are being routed from your home IP address instead of the VPN providers, effectively unmasking you. Ironically, VPNs are often recommended in circumstances where you can&amp;rsquo;t trust the network, such as a public WiFi, but this is the exact scenario where a &lt;a href=&#34;https://thehackernews.com/2024/05/new-tunnelvision-attack-allows.html&#34;&gt;recent attack&lt;/a&gt; would allow somebody to reroute your traffic outside the VPN. A proxy is a simpler way of changing where your requests come from than a VPN, but has similar concerns.&lt;/p&gt;
&lt;p&gt;Unless you plan to work &lt;em&gt;entirely offline&lt;/em&gt;, you&amp;rsquo;re going to have to consider how you connect to the internet, and specific sites &amp;amp; services.&lt;/p&gt;
&lt;p&gt;I would argue, that it&amp;rsquo;s more important these days to hide one&amp;rsquo;s IP address than it was in the past. &lt;a href=&#34;https://en.wikipedia.org/wiki/Internet_geolocation&#34;&gt;Internet geolocation&lt;/a&gt; as only gotten more precise over time. Depending on the accuracy, someone may be able to identify &lt;a href=&#34;https://www.maxmind.com/en/locate-my-ip-address&#34;&gt;your neighborhood.&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;There is no one-size-fits-all solution when it comes to VPNs. Just like email, there are many VPN services out there and you should choose the service that works best for you. Depending on which one you choose, you can benefit from an increased level of security when connected to networks you wouldn’t ordinarily trust. But this means you&amp;rsquo;re placing your trust in the VPN.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://ssd.eff.org/module/choosing-vpn-thats-right-you&#34;&gt;Choosing the VPN That&amp;rsquo;s Right for You&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Consider your goals:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Are you just trying to avoid disclosing your IP with sites &amp;amp; services you visit?
Good VPNs &amp;amp; Proxies will suit this purpose.&lt;/li&gt;
&lt;li&gt;Are you trying to evade &lt;a href=&#34;https://libresolutions.network/articles/broken-internet/&#34;&gt;ISP-level censorship&lt;/a&gt; and connect to services that are online but inaccessible to you? This is what Tor was built for, potentially being difficult to identify is also a useful feature but is much &lt;a href=&#34;https://support.torproject.org/faq/staying-anonymous/&#34;&gt;less guaranteed.&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Or are you trying to connect to specific &amp;ldquo;hidden services&amp;rdquo; served anonymously?&lt;br&gt;
Then you&amp;rsquo;ll need want to consider &lt;a href=&#34;https://libresolutions.network/operations/shadow&#34;&gt;darknets&lt;/a&gt; like Tor or I2P.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;#contents&#34;&gt;Back to Contents&lt;/a&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;&lt;em&gt;Thank you taking the time to read this overview.&lt;br&gt;
Any comments, questions or &lt;a href=&#34;mailto:gabriel@libresolutions.network?Subject=diy%20audit&#34;&gt;feedback&lt;/a&gt; would be appreciated.&lt;/em&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;Is this all there is to do? Of course not!
I hope that this can be a good starting reference for those who don&amp;rsquo;t know where to begin.&lt;/p&gt;
&lt;h2 id=&#34;additional-resources&#34;&gt;Additional resources&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://gabe.rocks/tech/reclaiming-cyberspace/&#34;&gt;Reclaiming Territory in Cyberspace&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://libresolutions.network/operations/shadow&#34;&gt;Operation: Shadow&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://gofoss.net/&#34;&gt;Go FOSS&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Conceptualizing Mind-reading Technology</title>
		<link>https://libresolutions.network/articles/brain-transparency/</link>
		<pubDate>Mon, 25 Sep 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/brain-transparency/</guid>
		
		<image>https://libresolutions.network//media/images/brain-chip.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/brain-chip.webp" />
		<itunes:image href="https://libresolutions.network//media/images/brain-chip.webp" />
		<description>Rorschach testing for social control</description>
		<content:encoded>&lt;h2 id=&#34;when-the-war-on-your-mind-goes-hot&#34;&gt;When the War on your Mind Goes Hot&lt;/h2&gt;
&lt;p&gt;From influence, profit, and power there are innumerable reasons why some and institutions would want the ability to &lt;a href=&#34;https://iceni.substack.com/p/covid-19-deep-dive-part-iv-mind-control&#34;&gt;manipulate your thoughts.&lt;/a&gt; Of course, an efficient tool to learn how to control other&amp;rsquo;s thoughts is to be able to read them in real-time. When it comes to online platforms a great deal of the mind-manipulation is done indirectly.&lt;/p&gt;
&lt;p&gt;Ranking algorithms, Censorship, and financial incentives will all radically transform how people individually act as a group, but there will always be more &lt;em&gt;direct forces&lt;/em&gt; that can be used. The problem with direct mind control devices is that they are difficult to understand. Just like social media, the applications are likely going to appear entirely harmless and innocuous to mask nefarious intent.&lt;/p&gt;
&lt;p&gt;In this piece, I want to use an example to illustrate &lt;strong&gt;brain transparency&lt;/strong&gt;. Which is the primary application of mind-reading technology. Instead of using indirect means to learn your thoughts; such as likes, comments, or what sites you visit, instead insights can be gleaned directly from your mind. With advanced technology and sophisticated understanding of how the brain actually works, mind-reading technology is far closer than one would imagine.&lt;/p&gt;
&lt;h1 id=&#34;brain-transparency&#34;&gt;Brain Transparency&lt;/h1&gt;
&lt;p&gt;Without even asking, I&amp;rsquo;m very sure you can identify the patterns embedded in the two AI generated images below. From a distance, you can clearly see the pattern, but when you tune in to the fine details you can see that the image doesn&amp;rsquo;t look too unusual without the extra context.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/ai-illusion.webp&#39; 

 alt=&#39;Two AI generated images, one with a spiral embedded andother with a checker pattern.&#39;
&gt;


&lt;p class=&#34;caption&#34;&gt;
    Image &lt;a target=&#39;_blank&#39; href=&#39;https://www.creativebloq.com/news/ai-optical-illusion-generator&#39;&gt;Source&lt;/a&gt;
&lt;/p&gt;


&lt;/div&gt;
&lt;p&gt;Like any other illusion, it works because your brain works to identify patterns. Some patterns (like text) are more universal than others. If you wanted to construct a system that wanted to understand the person better than they know themselves, you could test them in a variety of ways with specific patterns that only resonate with specific people&amp;hellip;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;If your childhood involved countless hours spent capturing, training and battling Pokémon, there may be a &lt;a href=&#34;https://www.youtube.com/watch?v=kEIuQRHElcQ&#34;&gt;wrinkle in your brain&lt;/a&gt; that is fond of images of Wobbuffet, Bulbasaur and Pikachu.&lt;br&gt;
Stanford psychologists have identified preferential activation to Pokémon characters in the brains of people who played Pokémon videogames extensively as kids.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://news.stanford.edu/2019/05/06/regular-pokemon-players-pikachu-brain/&#34;&gt;Stanford researchers identify brain region activated by Pokémon characters&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;This leads one to ask: Could patterns be &lt;em&gt;deliberately placed&lt;/em&gt; to then further manipulate people in ways others wouldn&amp;rsquo;t notice? Like a perfect &lt;em&gt;dogwhistle&lt;/em&gt;. Effectively turning everyone into a &lt;em&gt;sleeper agent&lt;/em&gt; that can be identified, and manipulated. It&amp;rsquo;s not just what you know, but &lt;em&gt;how you know it&lt;/em&gt;. It&amp;rsquo;s also what you don&amp;rsquo;t know, or can&amp;rsquo;t recognize. Everyone is different. There will always be ways to precisely target people with this knowledge, for either marketing, manipulation, or even psychological torture.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/meme-illusions.webp&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;Far from being mere memes on the internet, once people start putting electrodes on their heads, the game changes dramatically. We have already seen how social media deteriorated people&amp;rsquo;s ability to connect and communicate with each other, advanced mind-reading technology makes direct mind control a lot more of a pressing concern. It&amp;rsquo;s possible that profit-seeking algorithms for social media have already had this effect in some form, but with devices that receive direct input from our minds, the results can be much more extreme. Tagging people based on what patterns their brains recognize is only one out of countless ways advanced technology can learn how people think.&lt;/p&gt;
&lt;h2 id=&#34;applications&#34;&gt;Applications&lt;/h2&gt;
&lt;p&gt;As an example, let&amp;rsquo;s pretend that I run a major communication platform. Let&amp;rsquo;s name it after a single letter of the alphabet. X (for eXample) is a place where people believe they can participate in the &lt;em&gt;digital town square&lt;/em&gt;. As the operator of X, I have access to all the users information, as well as devices they&amp;rsquo;ve purchased from me. Instead of using machine learning to ban or censor users, I merely work to please users who fall for my preferred (or sponsored) propaganda, and frustrate those who aren&amp;rsquo;t properly learning from the propaganda. I introduce a new fictional character that represents the values I&amp;rsquo;m pushing. Those who can&amp;rsquo;t immediately recognize that character must be avoiding the propaganda, so they must be nudged or corrected.&lt;/p&gt;
&lt;p&gt;There really isn&amp;rsquo;t much of a debate on &lt;em&gt;if&lt;/em&gt; this technology should be used to control people. Instead, we have technocrats gleefully announcing all the social problems that would be solved if we merely put all of our minds in the capable hands of the powerful. Many simply dismiss practical application of cutting-edge biology as sci-fi, which leads ethical considerations to be debated after the damage is done.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Did you happen to watch Nita Farahany’s &lt;a href=&#34;https://youtu.be/hfqD5aW0X5U&#34;&gt;presentation at Davos&lt;/a&gt; about Brain Transparency?&lt;br&gt;
Did you ever wonder why she wasn’t booed off the stage?&lt;br&gt;
It’s because everyone there implicitly accepts this sort of heinous rhetoric. They’ve gone all-in on these technocratic fantasies of theirs. They don’t even hide it. They’re actively normalizing ideas that would have been unthinkable a few years ago.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://iceni.substack.com/p/spartacast-07&#34;&gt;Spartacast 7&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;There&amp;rsquo;s something about this topic that is downright terrifying to the soul. Those who recognize what&amp;rsquo;s at stake can clearly see that a terrifying system of mental control has already been constructed. Speculating on future harms may seem fruitless when the already applied forms of conditioning, propaganda, and punishment have taken control in serious ways already. The difference this time is that dissenters are much easier to identify.&lt;/p&gt;
&lt;p&gt;Those who cooperate with the regime can be marked in their minds, in a way that is very difficult (if not outright impossible) to fake. If there was ever a time to take the time to truly reflect on how you&amp;rsquo;re using your thoughts and what impact there having, we may be approaching the end of the line. This is why I&amp;rsquo;m highly concerned about the &lt;em&gt;adapt or be left behind&lt;/em&gt; messaging embedded in discussions about machine learning tools, and potential cybernetic augmentations. What someone thinks is opting-in for career advancement may in fact come with some extremely invasive strings attached. One may want to reconsider the entire point of &amp;ldquo;getting ahead&amp;rdquo; when the price is complete control over your words, actions, and even thoughts. I have a feeling, that in the long run, these consequences will vastly outweigh potential benefits.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Signs the &#39;Dead Internet Theory&#39; is correct</title>
		<link>https://libresolutions.network/articles/dead-internet/</link>
		<pubDate>Thu, 21 Sep 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/dead-internet/</guid>
		
		<image>https://libresolutions.network//media/images/graveyard.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/graveyard.webp" />
		<itunes:image href="https://libresolutions.network//media/images/graveyard.webp" />
		<description>What would it mean? What could be done about it?</description>
		<content:encoded>&lt;h1 id=&#34;the-dead-internet-theory&#34;&gt;The &amp;ldquo;Dead Internet&amp;rdquo; Theory&lt;/h1&gt;
&lt;p&gt;The basic concept of the &lt;a href=&#34;https://en.wikipedia.org/wiki/Dead_Internet_theory&#34;&gt;dead internet theory&lt;/a&gt; is that a vast majority of the engagement online is artificial. And/or that every single human being on the Internet isn&amp;rsquo;t actually connected to everyone else, but merely a chosen subset of people. One of the reasons this idea has gotten so much traction is that it eerily explains much of people&amp;rsquo;s online experience. While it&amp;rsquo;s possible that the feeling is just a figment of people&amp;rsquo;s nostalgia for exploring the web for the first time, there are actual trends and circumstances that support the idea.&lt;/p&gt;
&lt;p&gt;The following is a couple of signs that definitely point to the idea that the &lt;strong&gt;Dead Internet Theory&lt;/strong&gt; is likely, and/or at least possible. Afterwards, I&amp;rsquo;ll outline why this trend should be reversed, and how you can help.&lt;/p&gt;
&lt;h2 id=&#34;immense-bot-traffic&#34;&gt;Immense Bot Traffic&lt;/h2&gt;
&lt;p&gt;An individual has to make the decision to choose to engage, bots are just full auto. As long as there&amp;rsquo;s currency, influence, or power to be gained from online participation, we can naturally assume the amount of bots online will steadily increase left unchecked. It&amp;rsquo;s worth noting that not all bot traffic is inherently malicious. Timely notifications, alerts and announcements are all things people may want to be provided automatically.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Examples:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.statista.com/statistics/1264226/human-and-bot-web-traffic-share/&#34;&gt;Statista Estimates that merely 25% of web traffic is actually human&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.bbc.com/news/technology-66850821&#34;&gt;Mr Musk has long said that his solution for getting rid of bots and fake accounts on the social media platform is charging for verification.&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;content-generation-tools&#34;&gt;Content Generation Tools:&lt;/h2&gt;
&lt;p&gt;By lowering the barrier to human-like participation, bots can get more human reactions, making them much more effective. Being able to put together sentences, or speak with a voice can drastically change the game for even other bots. In this competitive arms race, new tools have a profound impact for both people and bots alike.&lt;/p&gt;
&lt;h3 id=&#34;examples&#34;&gt;Examples:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;ChatGPT&lt;/li&gt;
&lt;li&gt;Midjourney&lt;/li&gt;
&lt;li&gt;Voice Cloning&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;big-tech-consolidation&#34;&gt;Big Tech Consolidation&lt;/h2&gt;
&lt;p&gt;It&amp;rsquo;s a lot easier to manipulate people on a small set of online services, than over a wide ecosystem of independent online sites and communities. By herding the public onto only a few services, coordination also becomes much easier.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Examples&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;People only use a small set of apps&lt;/li&gt;
&lt;li&gt;People can&amp;rsquo;t name more than 10 websites&lt;/li&gt;
&lt;li&gt;Search &lt;a href=&#34;https://www.thestar.com/business/google-search-has-gotten-worse-here-s-the-trick-people-have-found-to-get-around/article_5d51869b-6be0-5de7-ae12-18e9b93f8323.html&#34;&gt;sucks now&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;reach-control&#34;&gt;Reach Control&lt;/h2&gt;
&lt;p&gt;With control over major platforms, it&amp;rsquo;s possible to counter breakthrough narratives before they gain momentum. Not only is this capability a highly profitable commodity, it&amp;rsquo;s also a highly effective &lt;em&gt;mass mind control&lt;/em&gt; weapon. Screens are always going to be finite, and so are people&amp;rsquo;s attention and lifespan. There will always be power in having direct control over prioritizing what others can see, even when you&amp;rsquo;re not outright gate-keeping information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Examples:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Non-chronological &amp;ldquo;home&amp;rdquo; and &amp;ldquo;explore&amp;rdquo; feeds&lt;/li&gt;
&lt;li&gt;Curated Trending&lt;/li&gt;
&lt;li&gt;Facebook&amp;rsquo;s &lt;a href=&#34;https://www.engadget.com/facebook-misinformation-virality-circuit-breaker-143924221.html&#34;&gt;virality circuit breaker&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.twitter.com/en_us/topics/product/2023/freedom-of-speech-not-reach-an-update-on-our-enforcement-philosophy&#34;&gt;Freedom of speech, not reach&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;virtualized-segregation&#34;&gt;Virtualized Segregation&lt;/h2&gt;
&lt;p&gt;One of the spookier claims associated with the Dead Internet Theory is that people are effectively segregated from other human beings and relegated to an &lt;a href=&#34;https://geopoliticsandempire.substack.com/s/hrvoje-moric-show-tnt-radio&#34;&gt;&lt;em&gt;algorithm ghetto&lt;/em&gt;&lt;/a&gt;. At first glance this seems like something that would be impossible to test for. It would be safe to assume that the state-of-the art surveillance and identification tools would be used to filter users. In addition to this, platforms could (directly or indirecly) share information with each other to coordinate the isolation beyond a single platform or medium.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How it works in practice:&lt;/strong&gt; &lt;a href=&#34;https://wowpedia.fandom.com/wiki/Sharding_(term)&#34;&gt;World of Warcraft sharding&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;When too many players are in an area, the game automatically creates a new &amp;ldquo;shard,&amp;rdquo; a copy of that area. Players entering the area will be placed on the new shard. The world appears identical from the player&amp;rsquo;s perspective, with minor differences:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Players can only see other players on the same shard.&lt;/li&gt;
&lt;li&gt;Each shard has its own set of NPCs. As such, rare NPCs may respawn at different times on different shards.&lt;/li&gt;
&lt;li&gt;Each shard has its own set of objects such as herbs and mining nodes.&lt;/li&gt;
&lt;li&gt;Shards can be any geographic size but are usually limited to zones or smaller areas. The borders of a sharded area are invisible to players.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;By design, players usually do not notice when the game moves them between shards&lt;/strong&gt;, but players may notice NPCs momentarily disappear.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;The simplest way to understand sharding is to think of it as people being split into multiple parallel dimensions. There are performance reasons to do this, but there are also other advantages to be gained from keeping people unable to coordinate. For systems simpler than online games (like social media) sharding doesn&amp;rsquo;t have to be absolute. Potentially, a system that does segregate people by default, could still make it possible to occasionally interact outside the bubbles to maintain the illusion of an open platform.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Other Examples&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.forbes.com/sites/kashmirhill/2014/06/28/facebook-manipulated-689003-users-emotions-for-science/?sh=324e2617197c&#34;&gt;Facebook&amp;rsquo;s mood manipulation experiment&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Personalized curation for geographical or &lt;a href=&#34;https://blog.google/canada-news-en/#overview&#34;&gt;political circumstances&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Delaying feed updates or excessively &lt;a href=&#34;https://www.nytimes.com/2023/07/01/business/twitter-rate-limit-elon-musk.html&#34;&gt;rate-limiting&lt;/a&gt; access. (Sharding by time, rather than groups)&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;internet-censorship--shutdowns&#34;&gt;Internet Censorship &amp;amp; Shutdowns&lt;/h2&gt;
&lt;p&gt;The internet even in it&amp;rsquo;s current form can&amp;rsquo;t survive the current trend of escalating censorship and demands for top-down control. Left unabated, &lt;a href=&#34;https://www.bbc.com/news/blogs-trending-40494909&#34;&gt;these forces will continue&lt;/a&gt; to transform the web into merely another highly advanced propaganda machine.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://libresolutions.network/articles/broken-internet/&#34;&gt;ISP-level de-platforming&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.eff.org/deeplinks/2023/08/isps-should-not-police-online-speech-no-matter-how-awful-it&#34;&gt;EFF- ISPs Should Not Police Online Speech&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;human-disengagement&#34;&gt;Human Disengagement&lt;/h2&gt;
&lt;p&gt;Ironically, as the digital world has encroached more and more into peoples lives, actual participation hasn&amp;rsquo;t kept pace. Commerce has greatly expanded online at the cost of centralizing control into a small set of payment providers. As the perceived value of engaging online drops, the easier it becomes for manipulators to take complete control.&lt;/p&gt;
&lt;h3 id=&#34;potential-examples&#34;&gt;Potential Examples:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;None of your contacts participate online regularly&lt;/li&gt;
&lt;li&gt;Being inundated with low-effort comments&lt;/li&gt;
&lt;li&gt;Getting to know people online feels impossible&lt;/li&gt;
&lt;li&gt;Content and seems entirely disconnected from real-life events&lt;/li&gt;
&lt;li&gt;The tone of online spaces is vastly different&lt;/li&gt;
&lt;li&gt;A complete lack of humor&lt;/li&gt;
&lt;/ul&gt;
&lt;h1 id=&#34;so-is-the-dead-internet-theory-actually-true&#34;&gt;&lt;em&gt;So is the Dead Internet Theory actually true?&lt;/em&gt;&lt;/h1&gt;
&lt;h2 id=&#34;its-not-dead-but-its-dying&#34;&gt;It&amp;rsquo;s not dead, but it&amp;rsquo;s dying.&lt;/h2&gt;
&lt;p&gt;The internet is less of a single body and more of an ecosystem. There has undeniably been immense disruption, habitat loss, and disasters. That isn&amp;rsquo;t to say that things can&amp;rsquo;t improve.&lt;/p&gt;
&lt;h2 id=&#34;what-you-can-do&#34;&gt;What you can do:&lt;/h2&gt;
&lt;p&gt;Are you ready to &lt;a href=&#34;https://gabe.rocks/tech/reclaiming-cyberspace/&#34;&gt;reclaim cyberspace?&lt;/a&gt; It&amp;rsquo;s a massive undertaking but many hands make light work. By taking control of your online presence, content, and attention you are already making a massive impact on how the future of the web. Instead of providing unpaid labor for top-down information management systems, you can genuinely contribute to a global and public information superhighway.&lt;/p&gt;
&lt;h3 id=&#34;maintain-a-non-commercial-web-space&#34;&gt;Maintain a non-commercial web space&lt;/h3&gt;
&lt;p&gt;I don&amp;rsquo;t believe it would take very many people at all taking an active interest in maintaining truly independent and personal &lt;a href=&#34;https://libresolutions.network/articles/anonymity/&#34;&gt;(or anonymous)&lt;/a&gt; spaces online to have a massive impact on censorship resistance and meaningful interactions online.&lt;/p&gt;
&lt;h3 id=&#34;use-open-protocols-instead-of-corporate-platforms&#34;&gt;Use open protocols, instead of corporate platforms&lt;/h3&gt;
&lt;p&gt;Your own web space is just the beginning. There&amp;rsquo;s a world of opportunity to explore open protocols &amp;amp; systems for chat, audio/video calls, social media, collaboration, and many other things you can imagine.&lt;/p&gt;
&lt;h2 id=&#34;if-you-like-this-idea-and-want-to-discuss-it-with-others-please-share-this-image&#34;&gt;If you like this idea, and want to discuss it with others, please share this image!&lt;/h2&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://libresolutions.network/media/diagrams/dead-internet.webp&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/diagrams/dead-internet.webp&#39; 
&gt;

&lt;/a&gt;



&lt;/div&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Operation: Shadow</title>
		<link>https://libresolutions.network/operations/shadow/</link>
		<pubDate>Tue, 12 Sep 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/operations/shadow/</guid>
		
		<image>https://libresolutions.network//media/images/intelligence.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/intelligence.webp" />
		<itunes:image href="https://libresolutions.network//media/images/intelligence.webp" />
		<description>Anonymity is a lot less dangerous than uncontested power</description>
		<content:encoded>&lt;h1 id=&#34;navigating-hostile-cyberspace&#34;&gt;Navigating Hostile Cyberspace&lt;/h1&gt;
&lt;p&gt;Many people are outright victims of virtual imprisonment.
Social media addiction is just the surface of a panopticon of &lt;a href=&#34;https://videos.lukesmith.xyz/w/cBDUuKfSqxcrK4Kbh7ieJf&#34;&gt;data-mining and manipulation.&lt;/a&gt; If this wasn&amp;rsquo;t bad enough, governments and public-private partnerships alike are further working to &lt;a href=&#34;https://www.thedefensepost.com/2023/08/31/ussocom-ai-disinformation-social-media/&#34;&gt;analyze, contain, and restrict dissent.&lt;/a&gt; This asymmetric use of technology enables innumerable abuses and consolidates power in terrifying ways. Almost everyone recognizes that people&amp;rsquo;s behavior has changed drastically due to online pressures, very few imagine the sum total effects this has on society.&lt;/p&gt;
&lt;p&gt;If only there was some way out! A way to not attach every click, paragraph read, or comment left to a &lt;em&gt;permanent record&lt;/em&gt;. A way to opt-out of this all-pervasive system of &lt;em&gt;individualized discrimination&lt;/em&gt;. There is such a way: &lt;strong&gt;anonymity&lt;/strong&gt;. Anonymity used to be the default online. Someone downloading a web page didn&amp;rsquo;t automatically need to divulge who they were individually. Even when websites had user accounts, they could be disposable and didn&amp;rsquo;t need to collect so much sensitive personal information.&lt;/p&gt;
&lt;p&gt;More and more services are collecting, and sometimes requiring increasing amounts of personal information. This can disproportionally create risks for some. Things have deteriorated into such a state where one requires constant effort &lt;em&gt;not to divulge who they are&lt;/em&gt; to certain entities online. There is a wide variety of technical means available for those interested in following specific individuals, or even subsets of the population across cyberspace.&lt;/p&gt;
&lt;p&gt;There have been many prominent voices pushing for the eradication of online anonymity. Elimination of online anonymity is the digital equivalent of banning cash. In a misguided attempt to crack-down on crime and abuse you rob people of privacy and protection from discrimination when they need it most. One individual may not want a public profile attached to their name, but is still comfortable divulging their information in particular situations. Individuals from all walks of life should be empowered to only provide their identities when necessary and desired.&lt;/p&gt;
&lt;h2 id=&#34;threat-modeling&#34;&gt;Threat Modeling&lt;/h2&gt;
&lt;p&gt;You may feel no danger seeking out information, or speaking your mind online, but that&amp;rsquo;s no comfort for others who might. Different people will have different risks, and the louder one aims to be the more enemies they tend to accrue. Anonymous speech potentially enables anyone on earth, to raise attention to a grave injustice with a much lower risk of retaliation. This is an essential trait to combat tyranny of all kinds worldwide.&lt;/p&gt;
&lt;p&gt;Issues can be big or small, but no matter how powerful a person is, they are still one human being. There are absolute limits to how much they can protect themselves from retaliation from rivals, stalkers, and abusers. These threats can all be individual people, groups, or even entire institutions. Below, a threat modeling infographic is provided.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://libresolutions.network/media/diagrams/threat%20modeling.webp&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/diagrams/threat%20modeling.webp&#39; 
&gt;

&lt;/a&gt;



&lt;/div&gt;
&lt;p&gt;If one requires &lt;em&gt;perfect&lt;/em&gt; anonymity, attaining it is quite a feat. That said, it&amp;rsquo;s important to understand that this is not an all-or-nothing ordeal. Every step one takes to protect themselves online, affords them some defense against particular threats. One does not need to be a mastermind cyber-criminal to appreciate the benefits of incremental security improvements. It is critical to not let a sense of defeatism or nihilism creep in, small improvements &lt;em&gt;do have a large impact&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;As the web itself becomes nearly entirely consolidated by large corporations, hostile governments, and public-private partnerships, there are bound to be many who choose to make a conscious choice to go a different direction. Even if you&amp;rsquo;re not willing to go as far to protect your digital independence, there&amp;rsquo;s quite a bit you can do to help make it possible for more and more people. I don&amp;rsquo;t take this lightly, but I consider this piece the most important I have written to date. Even more important than &lt;a href=&#34;https://gabe.rocks/tech/reclaiming-cyberspace/&#34;&gt;Reclaiming Territory in Cyberspace&lt;/a&gt;. The &lt;em&gt;dark web&lt;/em&gt; and it&amp;rsquo;s derivatives is a topic that is surrounded by myth and rumors of questionable intent. There is quite a bit of technical knowledge that is vital for people to understand, even without the desire to interact with these systems.&lt;/p&gt;
&lt;h2 id=&#34;where-did-all-the-whistle-blowers-go&#34;&gt;Where did all the whistle-blowers go?&lt;/h2&gt;
&lt;p&gt;Anonymity protects those who don&amp;rsquo;t wish to be mistreated or otherwise silenced because of who they are. Many authors have published books or articles under a pen name, other times people would put up posters while concealing their identities. There is a significant bias against those choosing to speak out without exposing their identity. There is an understandable reason for this; staking your entire reputation on a cause or a mission can add significant weight to one&amp;rsquo;s words and actions. On the other hand, those who speak out in their name are shackled to pressures and incentives of their own existence in a world that is much bigger than themselves. Anonymity is one of the few scenarios where ideas can truly be judged on their merits, rather than associated with a person or groups reputation and perception.&lt;/p&gt;
&lt;p&gt;You should never take anything anyone says at face value. Confide in trusted friends, research the claim yourself, but never dismiss something entirely because it merely comes without a name. While in some ways we are all more free to express ourselves than ever, the costs of non-conformity with present and future dogmas are permanent and extreme. Many problems today exist because hardly anyone is willing to threaten their livelihood rebuking authority, even when desperately necessary. This is terrifying because it creates a positive feedback loop that selects against any bottom-up feedback in society. People will constantly acknowledge that their leaders in government, business, or even civil society are deaf to their concerns and needs. If nobody will speak out&amp;hellip;how can things change? In light of this anonymous speech is arguably more important than non-anonymous speech. It potentially allows for grave errors to be corrected, if nobody is willing to stake their social standing on it.&lt;/p&gt;
&lt;p&gt;The suppression of anonymity takes two major forms:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Introducing surveillance or identity verification as a requirement in more circles of life.&lt;/li&gt;
&lt;li&gt;Proactively working to de-anonymize people or discourage them from protecting information that exposes them to risks.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;You can refuse to participate in domains where you&amp;rsquo;re forced to give up your identity, but once an anonymous person becomes known, they will never again be unknown. This is especially likely in the case of dissidents or critics, who may have valid reasons for protecting their identity.&lt;/p&gt;
&lt;h2 id=&#34;online-anonymity-is-important-despite-being-near-impossible&#34;&gt;Online anonymity is important, despite being near impossible&lt;/h2&gt;
&lt;p&gt;Big services like Google, Microsoft, and Amazon (among others) spend a massive amount of effort trying to understand every person that uses their platform(s). So much so, that there is a great deal of surveillance infrastructure that &amp;rsquo;trickles down&amp;rsquo; to glean even more information from people elsewhere across the web. When using any of these top-down platforms you are at minimum an unpaid worker providing data about you and people in general. For better-or-worse every action you take while using these systems is you acting as an informant for the stakeholders that they represent. Far too many people assume they aren&amp;rsquo;t saying a thing if they merely lurk or passively view content. To the contrary, where your attention goes says a great deal about you and even others.&lt;/p&gt;
&lt;h3 id=&#34;a-coordination-problem&#34;&gt;A coordination problem&lt;/h3&gt;
&lt;p&gt;The web, or even the Internet as it exists wasn&amp;rsquo;t built in a day or by a single entity. The internet is largely a compromise between all kinds of different people, groups, and institutions. At least for now, no single entity has complete control over all of it, and we should all hope it stays that way. Beyond merely pleading, there is a great deal many of us can do. Even choosing to use a site or platform that collects moderately less information can have lasting impacts. If people understood how much effort was made to steer their attention, they would appreciate how much of a valuable force it really is. Due to the very complexity of how things are now, there is no &amp;lsquo;silver bullet&amp;rsquo; that can easily, simply, or quickly solve all or even many of the problems. Focusing on incremental change isn&amp;rsquo;t just the best option, it&amp;rsquo;s all anyone can do to make a difference.&lt;/p&gt;
&lt;h2 id=&#34;the-internets-achilles-heel-dns&#34;&gt;The Internet&amp;rsquo;s Achilles Heel: DNS&lt;/h2&gt;
&lt;p&gt;What is a website? is &lt;code&gt;www.example.com&lt;/code&gt; a website? That address is a &lt;strong&gt;domain name&lt;/strong&gt; that allows your browsers and apps to connect to a specific server. DNS stands for &lt;em&gt;domain name system&lt;/em&gt;. In theory, DNS is actually &lt;a href=&#34;https://opennic.org/&#34;&gt;decentralized&lt;/a&gt; because while there are well established DNS servers and registrars, all it does is connect network addresses to names. There is little other than inertia preventing people from using alternative systems.&lt;/p&gt;
&lt;p&gt;As it exists, most web administrators will generally register their domain with a regular &lt;strong&gt;domain registrar&lt;/strong&gt; which is a company that runs their own &lt;strong&gt;nameservers&lt;/strong&gt;. Usually, this requires a real name and address. In addition to this, payment methods like credit cards or non-private cryptocurrencies will make easy work of identifying who registered a particular domain. Because of this, and many other things it&amp;rsquo;s almost impossible to host a website or online service anonymously as an individual person or group. While people who visit your site may not know who you are, but it&amp;rsquo;s trivial for somebody to find out.&lt;/p&gt;
&lt;h3 id=&#34;domain-seizures&#34;&gt;Domain Seizures&lt;/h3&gt;
&lt;p&gt;Due to the lack of anonymity, it&amp;rsquo;s entirely possible for governments or even public-private partnerships to demand domains be seized. Domains are registered by legal entities and many domains have already been seized to combat all kinds of criminal activity. The danger of this is that there may be a future where domain registrars have to police the content on domains registered by them. Just as Facebook, YouTube, and Twitter/X in the past have taken an editorial stance over their platform, it&amp;rsquo;s not impossible for registrars to do the same.&lt;/p&gt;
&lt;h3 id=&#34;dns-censorship&#34;&gt;DNS Censorship&lt;/h3&gt;
&lt;p&gt;The registrars are only part of the equation. Nameserver operators can also be compelled to &lt;a href=&#34;https://torrentfreak.com/govts-must-encourage-or-compel-internet-companies-to-fight-piracy-230831/&#34;&gt;block sites&lt;/a&gt; in the name of preventing copyright infringement, serious crimes, or political expediency. Already we are seeing countries like France become &lt;a href=&#34;https://www.politico.eu/article/macron-mulls-cutting-access-social-media-during-riots/&#34;&gt;more totalitarian&lt;/a&gt; online &lt;a href=&#34;https://archive.ph/vOIzM&#34;&gt;for political reasons&lt;/a&gt;. It would be naive to believe that this isn&amp;rsquo;t already a worsening trend.&lt;/p&gt;
&lt;h3 id=&#34;surveillance&#34;&gt;Surveillance&lt;/h3&gt;
&lt;p&gt;Because DNS queries are so useful for understanding how people use the Internet, it&amp;rsquo;s trivial for Internet Service Providers (ISPs) and other entities to sell valuable batches of &lt;em&gt;unencrypted dns queries&lt;/em&gt;. In most cases the default setup is unencrypted and possibly not cached, meaning many entities know who&amp;rsquo;s visiting what sites, and how often. This is but one of many ways to track people across the Internet. There are many more ways in which people are identified and manipulated online. It&amp;rsquo;s perfectly reasonable to want to simply side-step all the insanity and simply start fresh.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/tott-4.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-4/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #4 Online Identity&lt;/h2&gt;&lt;i&gt;What is following you in your digital tracks?&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h1 id=&#34;using-a-darknet&#34;&gt;Using a Darknet&lt;/h1&gt;
&lt;p&gt;The simplest &amp;ldquo;darknet&amp;rdquo; is a computer (or group of them) not connected to the Internet. It&amp;rsquo;s quite straight-forward for someone to keep an &amp;ldquo;air gapped&amp;rdquo; (disconnected) machine as an offline repository for records and information management. Any means to connect one computer to another, that&amp;rsquo;s not widely accessible is technically a &amp;ldquo;darknet&amp;rdquo;. The phrase &lt;em&gt;the deep web&lt;/em&gt; is often associated with Tor hidden services, but has also been quite erroneously used to describe fringe or unpopular websites on the regular internet.&lt;/p&gt;
&lt;h2 id=&#34;anonymous-browsing&#34;&gt;Anonymous browsing&lt;/h2&gt;
&lt;p&gt;A major use of darknets is for people to browse the &amp;ldquo;regular internet&amp;rdquo; &lt;a href=&#34;https://anonymousplanet.org/&#34;&gt;anonymously.&lt;/a&gt; This is one of the primary uses of Tor. Anonymous browsing is a significant challenge and requires a significant amount of caution. However, the benefit of being a Tor user on the Internet is that with some caution, you blend in with all the other Tor users. Unlike using a personal use VPN, using a darknet to &lt;strong&gt;proxy&lt;/strong&gt; your connection to the regular internet allows you to act like a fish in a massive school of internet fish. The bigger the school, the lest identifiable, and ideally less of a target you are.&lt;/p&gt;
&lt;h2 id=&#34;hidden-services&#34;&gt;Hidden Services&lt;/h2&gt;
&lt;p&gt;Hidden services are where darknets get really neat. Remember everything said above about DNS? Forget it! Hidden services sidestep all those issues all at once. There are other ways to decide who connects to who. An alternative method is to have each site generate encryption keys that secure the connection, and identifies them as a key. Once this is in place, it&amp;rsquo;s possible to route messages anonymously through the network. Through a marvel of modern mathematics, you have a new layer to the Internet where it&amp;rsquo;s possible to have truly private and communications that can&amp;rsquo;t be censored.&lt;/p&gt;
&lt;h2 id=&#34;website-mirroring&#34;&gt;Website Mirroring&lt;/h2&gt;
&lt;p&gt;By making your website &lt;a href=&#34;https://xmrpower.bearblog.dev/mirror-your-website-tor-i2p/&#34;&gt;accessible over darknets&lt;/a&gt;, you&amp;rsquo;re allowing those who may come from oppressive regimes to access your content. In addition to this you protect your online presence from censorship and domain seizure. It&amp;rsquo;s best to mirror a &lt;a href=&#34;https://libresolutions.network/articles/best-website-for-you/&#34;&gt;static site&lt;/a&gt; that doesn&amp;rsquo;t rely on cookies or javascript. Running a hidden service yourself is free, so it&amp;rsquo;s an option to archive a website after you no longer with to pay for regular hosting.&lt;/p&gt;
&lt;h2 id=&#34;securedrop&#34;&gt;SecureDrop&lt;/h2&gt;
&lt;p&gt;The possibility of online anonymity and hidden services are potentially a great boon to &lt;a href=&#34;https://youtu.be/LkgN244ggzs&#34;&gt;whistle-blowers&lt;/a&gt; from all walks of life. In an environment where your average well-rounded citizen is capable of at least browsing the darknet, those who wish to right terrible wrongs may have the capability of speaking out without retaliation. Many damaging and twisted scandals could be broken far earlier, preventing even more damage in the long run.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://securedrop.org/&#34;&gt;SecureDrop&lt;/a&gt; is a fancy tool that allows people to submit information anonymously over tor. Running as a packaged hidden service, and being Free Open Source Software, it&amp;rsquo;s even easier to democratize real transparency.&lt;/p&gt;
&lt;h1 id=&#34;examples&#34;&gt;Examples&lt;/h1&gt;
&lt;h3 id=&#34;diy-vpn&#34;&gt;DIY VPN&lt;/h3&gt;
&lt;p&gt;In a close circle of trust, it can be helpful to share information or provide members only-services. You can create your own darknet by creating your own VPN or using SSH tunnels. Using either &lt;a href=&#34;https://www.wireguard.com/&#34;&gt;Wireguard&lt;/a&gt; or OpenVPN you can create your own private network for you own internal services. For a small group and community, you can significantly protect your digital activities from prying eyes by rolling your own hidden services on your own virtual private network.&lt;/p&gt;
&lt;h3 id=&#34;sneakernet&#34;&gt;Sneakernet&lt;/h3&gt;
&lt;p&gt;Embrace the analogue and burn your information to optical disks and send them in the mail like how netflix started! Got some homing pigeons? You can be the bleeding-edge of &lt;a href=&#34;https://en.wikipedia.org/wiki/IP_over_Avian_Carriers&#34;&gt;IP over Avian Carriers&lt;/a&gt;. A local community could use &lt;a href=&#34;../beehive&#34;&gt;Operation: Beehive&lt;/a&gt; to cooperate on all kinds of interesting projects over a sneakernet.&lt;/p&gt;
&lt;h2 id=&#34;tor&#34;&gt;Tor&lt;/h2&gt;
&lt;p&gt;Tor is short for &lt;strong&gt;The Onion Router&lt;/strong&gt;. &lt;a href=&#34;https://youtu.be/uPLSVAz-I_Q&#34;&gt;Onion Routing&lt;/a&gt; is how messages sent within the tor network stay anonymous. Tor uses special clients called &lt;em&gt;bridges&lt;/em&gt; that allow traffic from the network to go to the regular internet, allowing people using tor to access regular websites.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://www.torproject.org/&#34;&gt;Tor Project Website&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://youtu.be/zQW3MdF25B8&#34;&gt;How to Access the Dark Web - Mental Outlaw&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;snowflake-&#34;&gt;Snowflake ❄️&lt;/h3&gt;
&lt;p&gt;If you&amp;rsquo;re interested in supporting those working to protect their privacy and/or overcome censorship, &lt;a href=&#34;https://snowflake.torproject.org/&#34;&gt;Snowflake&lt;/a&gt; is a great way to help people connect to the Tor network.&lt;/p&gt;
&lt;h3 id=&#34;distributions&#34;&gt;Distributions&lt;/h3&gt;
&lt;p&gt;There are a variety of linux distributions created to assist in aspects of using the Tor network. &lt;strong&gt;Tails&lt;/strong&gt; is a temporary operating system to make every session start identically on the Tor network. Like tails, &lt;strong&gt;Whonix&lt;/strong&gt; routes all it&amp;rsquo;s traffic over Tor. If that&amp;rsquo;s still not enough for you &lt;strong&gt;Qubes OS&lt;/strong&gt; allows you to create disposable whonix virtual machines.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://youtu.be/u5Lv_HXICpo&#34;&gt;TailsOS Guide for the Ultra Paranoid - Mental Outlaw&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;i2p&#34;&gt;I2P&lt;/h2&gt;
&lt;p&gt;Not as interested in touching the regular internet? Are you looking for a darknet with hidden services specifically in mind? The &lt;strong&gt;Invisible Internet Protocol&lt;/strong&gt; (I2P) may suit your needs.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://geti2p.net/en/&#34;&gt;I2P Project Website&lt;/a&gt;&lt;br&gt;
&lt;a href=&#34;https://i2pd.website/&#34;&gt;I2Pd&lt;/a&gt;&lt;/p&gt;
&lt;iframe src=&#39;https://tube.tchncs.de/videos/embed/8b304fd9-03c2-4daa-a8af-ed097e8ab0d7&#39; style=&#34;height:max-content;aspect-ratio: 16/9;min-height:460px;max-height:15rem;max-width:60rem;&#34; width=&#34;100%&#34; height=&#34;100%&#34;&gt;

&lt;/iframe&gt;
&lt;p&gt;&lt;a href=&#34;https://tube.tchncs.de/videos/watch/8b304fd9-03c2-4daa-a8af-ed097e8ab0d7&#34;&gt;I2P Tour: Search Engines, Free Anonymous Email, Interesting Eepsites&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;limitations&#34;&gt;Limitations&lt;/h2&gt;
&lt;p&gt;Perfect anonymity is extremely difficult. While darknets can protect your private information online, it can be difficult to hide that you&amp;rsquo;re using one. This makes darknet users, and those who wish to protect their privacy online in general, significant political targets from those who would like to seize control over digital communications in whole or in part.&lt;/p&gt;
&lt;h3 id=&#34;user-error&#34;&gt;User Error&lt;/h3&gt;
&lt;p&gt;The greatest threat to one&amp;rsquo;s online privacy and security is &lt;a href=&#34;https://www.computerhope.com/jargon/p/pebkac.htm&#34;&gt;PEBKAC&lt;/a&gt; errors. Your own mistakes, and capability to be manipulated is not to be underestimated. If you require perfect anonymity, ensure that you are diligent and don&amp;rsquo;t become complacent. Even as someone who doesn&amp;rsquo;t need anonymity, you&amp;rsquo;re not immune to cybersecurity threats and all kinds of information can be leveraged against you.&lt;/p&gt;
&lt;h3 id=&#34;fingerprinting&#34;&gt;Fingerprinting&lt;/h3&gt;
&lt;p&gt;Despite the best efforts of many intelligent and skilled people, perfection is far from within reach. Many sophisticated surveillance tools are precisely tuned to identify patterns and correlations. This means that even the smallest technical detail can be used to potentially identify people&lt;/p&gt;
&lt;h3 id=&#34;browser-features&#34;&gt;Browser features&lt;/h3&gt;
&lt;p&gt;A great deal of the modern &amp;lsquo;conveniences&amp;rsquo; that current-day browsers have tend to leak sensitive information, when making choices about your setup, it can be wise to rely on basic text and images rather than full single-page applications.&lt;/p&gt;
&lt;h3 id=&#34;size-of-the-network&#34;&gt;Size of the network&lt;/h3&gt;
&lt;p&gt;When swimming in a school of fish, numbers matter. Efforts to discourage people from knowing how to use privacy tools greatly undermines everyone&amp;rsquo;s ability to not only be anonymous online, but also to escape abuses by big tech platforms. For now, Tor users are not numerous enough, or don&amp;rsquo;t have enough social capital to prevent big tech services from discriminating against them. In part this is because any privacy tool can be used for nefarious means, and they are often restricted as a security caution.&lt;/p&gt;
&lt;p&gt;When a privacy network is small, it becomes much easier for those with significant resources to either target specific people within it, or even de-anonymize the entire network. In an ideal world, enough people would use these tools to protect dissidents from retaliation, and law enforcement would still have the tools to go after violent criminals through other means without compromising lawful people&amp;rsquo;s privacy.&lt;/p&gt;
&lt;h2 id=&#34;useful-resources&#34;&gt;Useful Resources&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://digdeeper.club/&#34;&gt;DigDeeper&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://anonymousplanet.org/&#34;&gt;The Hitchhiker’s Guide to Online Anonymity&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://kycnot.me/&#34;&gt;kycnot.me&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://notabug.org/dfca/dfca&#34;&gt;Digital Feudalism Counter Action&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://duskos.org/&#34;&gt;Dusk OS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://prism-break.org/&#34;&gt;Prism Break&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://digitalfreedom.neocities.org/&#34;&gt;Digital Freedom&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://proton.me/blog/what-is-dark-web&#34;&gt;What is the dark web? The good and bad of the Internet’s most private corner&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.curtiswallen.com/pgp/&#34;&gt;PGP Done Right - For Beginners&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://tube.tchncs.de/c/privacy__tech_tips/videos&#34;&gt;Right to Privacy - Privacy and Tech Tips Videos&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://privacytoolslist.com/&#34;&gt;Privacy Tools List&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://ssd.eff.org/&#34;&gt;EFF Surveillance Self-Defense Privacy Guides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/HQXRURfrf8w&#34;&gt;31C3 - Tor Hidden Services and Deanonymisation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cjr.org/tow_center_reports/guide-to-osint-and-hostile-communities.php&#34;&gt;A Guide to Open Source Intelligence (OSINT)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://landchad.net/&#34;&gt;Landchad System Guides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://xmrpower.bearblog.dev/mirror-your-website-tor-i2p/&#34;&gt;Mirror your website onto the darknet&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.hyphanet.org&#34;&gt;Hyphanet&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Digital Autonomy and the Arts: Part 2</title>
		<link>https://libresolutions.network/videos/arts2/</link>
		<pubDate>Tue, 05 Sep 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/arts2/</guid>
		
		<image>https://libresolutions.network//media/images/arts-banner.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/arts-banner.webp" />
		<itunes:image href="https://libresolutions.network//media/images/arts-banner.webp" />
		<description>Featuring Tonika &amp; Liam Sturgess</description>
		<content:encoded>&lt;p&gt;Liam Sturgess and Visceral Adventure join Gabriel to discuss the arts and cyberspace.&lt;/p&gt;
&lt;p&gt;Watch Gabriel &amp;amp; Liam&amp;rsquo;s previous discussion on digital autonomy and the arts &lt;a href=&#34;https://peertube.libresolutions.network/w/4UrH5kTwMVtMsnuCdRmPei&#34;&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;You can follow Visceral Adventure on &lt;a href=&#34;https://visceraladventure.substack.com/&#34;&gt;Substack&lt;/a&gt;, &lt;a href=&#34;https://twitter.com/VisceralAdvntr&#34;&gt;Twitter&lt;/a&gt; &amp;amp; &lt;a href=&#34;https://rumble.com/user/VisceralAdventure&#34;&gt;Rumble&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Visit &lt;a href=&#34;https://www.liamsturgess.com&#34;&gt;liamsturgess.com&lt;/a&gt; to stay up to date with Liam&amp;rsquo;s work.
You can also follow him via &lt;a href=&#34;https://twitter.com/TheLiamSturgess&#34;&gt;Twitter&lt;/a&gt; or the Fediverse at &lt;a href=&#34;https://gigaohm.bio/@LiamSturgess&#34;&gt;@LiamSturgess@gigaohm.bio&lt;/a&gt;
Don&amp;rsquo;t forget to check out his series &lt;a href=&#34;https://rumble.com/c/liamsturgess&#34;&gt;Microjourneys&lt;/a&gt; on Rumble.
Which is also mirrored on &lt;a href=&#34;https://peertube.libresolutions.network/w/p/xiRDiR7qVjEyYTntpudyvP&#34;&gt;this instance&lt;/a&gt;&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Cybergeddon: ISP-level De-platforming</title>
		<link>https://libresolutions.network/articles/broken-internet/</link>
		<pubDate>Thu, 17 Aug 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/broken-internet/</guid>
		
		<image>https://libresolutions.network//media/tott-9-preview.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/tott-9-preview.webp" />
		<itunes:image href="https://libresolutions.network//media/tott-9-preview.webp" />
		<description>A slippery slope to the death of the Internet.</description>
		<content:encoded>&lt;p&gt;It is important to remember that when it comes to free expression online, no corporation is &lt;a href=&#34;https://consentfactory.org/2023/08/14/the-free-speech-twitter-psyop/&#34;&gt;coming to save you&lt;/a&gt;. For far too long, people have placed too much trust in corporate social media. They have certainly abused that trust, but as of recently a far more concerning trend has arisen: &lt;em&gt;parts of the Internet de-platforming itself&lt;/em&gt;.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;ipv6 prefix-list ipv6-prefix-filter-as400304&lt;br&gt;
seq 950 &lt;strong&gt;deny 2607:46c0::/32&lt;/strong&gt; le 48&lt;br&gt;
&lt;a href=&#34;https://archive.is/L7dD4&#34;&gt;Archive&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;It doesn&amp;rsquo;t look like much, this innocuous text reveals that &lt;em&gt;the Internet isn&amp;rsquo;t dying&amp;hellip; it&amp;rsquo;s being killed.&lt;/em&gt; It&amp;rsquo;s not so much the &lt;em&gt;what&lt;/em&gt; here that&amp;rsquo;s important, but &lt;strong&gt;the why&lt;/strong&gt; that matters a great deal here. For now, what&amp;rsquo;s important to understand is that the Internet is built very differently from how most people imagine it.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://libresolutions.network/media/diagrams/internet.webp&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/diagrams/internet.webp&#39; 
&gt;

&lt;/a&gt;



&lt;/div&gt;
&lt;p&gt;The internet isn&amp;rsquo;t a single homogeneous network, it&amp;rsquo;s a network of networks. Those networks need a protocol to negotiate a vast array of details, to successfully and efficiently move data around. In many ways, it&amp;rsquo;s somewhat of a &lt;a href=&#34;https://xkcd.com/2347/&#34;&gt;miracle&lt;/a&gt; it all works at all.&lt;/p&gt;
&lt;p&gt;Naturally, there are weak-points that get tested over time. In our age of incredibly high polarization, people may choose to take incredibly rash actions even if there are immensely harmful consequences to vital structures. In a way, I am conflicted to point this out, because if more mobs of people decided to selectively pressure ISPs to wage the culture war for them, it is effectively game-over for the Internet as a meaningful tool for free expression, cultural exchange, and the preservation of knowledge.&lt;/p&gt;
&lt;p&gt;Unfortunately, we do not have the luxury of wishing the cat back into the bag. This is a one-way trip into a world where this is a risk people need to properly account for. In recent times, we have seen just how motivated governments and corporations across he world are to secure total dominance over online communications and commerce, it would be a mistake to idly stand by while politicized mobs secure a veto over critical infrastructure.&lt;/p&gt;
&lt;h1 id=&#34;what-happened&#34;&gt;What happened&lt;/h1&gt;
&lt;ul&gt;
&lt;li&gt;Joshua Moon runs a controversial online forum Kiwi Farms, which is the target of extreme and escalating online censorship.&lt;/li&gt;
&lt;li&gt;Hurricane Electric has blocked network traffic from IPs associated owned by Joshua Moon, impacting IngocNet&amp;rsquo;s services in Washington.&lt;/li&gt;
&lt;li&gt;Washington has &lt;a href=&#34;https://app.leg.wa.gov/RCW/default.aspx?cite=19.385.020&#34;&gt;common carrier&lt;/a&gt; protections for communications online.&lt;br&gt;
It is up to their attorney general, to enforce those protections.&lt;/li&gt;
&lt;li&gt;IncogNet LLC has &lt;a href=&#34;https://twitter.com/IncogNetLLC/status/1685359845505957888&#34;&gt;filed a complaint&lt;/a&gt; to the washington attorney general against hurricane electric for de-platforming their IPs.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;If you&amp;rsquo;d like to hear the situation broken down by Joshua himself, you can listen to &lt;a href=&#34;https://www.heterodorx.com/podcast/episode-107-how-the-internet-lost-its-backbone-with-joshua-moon/&#34;&gt;this episode&lt;/a&gt; of the &lt;a href=&#34;https://www.heterodorx.com/&#34;&gt;Heterodorx&lt;/a&gt; podcast.&lt;/p&gt;
&lt;h2 id=&#34;technical-background&#34;&gt;Technical Background&lt;/h2&gt;
&lt;p&gt;Internet service providers (ISPs) have to connect to each other for this whole internet thing to work. One mechanism that helps with this is BGP (Border gateway protocol), which is how networks introduce themselves to each other. This connection between ISP networks is a fundamental unit of the Internet. Without it, you&amp;rsquo;d need to have a &lt;em&gt;direct, physical connection&lt;/em&gt; to every service you want to use.&lt;/p&gt;
&lt;p&gt;BGP is a big deal, despite being something very few people have to interact with directly. Causing problems with it made the Internet unusable for half of Canada &lt;a href=&#34;https://en.wikipedia.org/wiki/2022_Rogers_Communications_outage&#34;&gt;last year&lt;/a&gt;. It&amp;rsquo;s a trivial change to block a particular network, which is done to mitigate direct attacks on the network or criminal activity. The weaponization of this is an immense challenge for anyone who cares about a free and open internet.&lt;/p&gt;
&lt;p&gt;Not all ISPs are equal, anyone with the capability of applying pressure to critical components on &lt;a href=&#34;https://www.eff.org/deeplinks/2021/01/beyond-platforms-private-censorship-parler-and-stack&#34;&gt;&amp;ldquo;the stack&amp;rdquo;&lt;/a&gt; has the ability to have immense power over anyone&amp;rsquo;s ability to participate online.&lt;/p&gt;
&lt;p&gt;The only reason we&amp;rsquo;re hearing about this at all, is because of how dedicated Joshua Moon has been about keeping his website online. In the face of being de-platformed by multiple providers, many other projects would have merely given up. How many businesses or publication would persist after being de-platformed by ISPs and hosting providers all over the world?&lt;/p&gt;
&lt;p&gt;What makes this incident personally interesting to me is that this is a window into the bleeding-edge of censorship online. I doubt that the Internet itself is resilient to sustain politically motivated attacks at such a fundamental level. This incident forces all of us to consider how the world would be different if access to the Internet was only possible with permission and control of unaccountable public-private partnerships.&lt;/p&gt;
&lt;h2 id=&#34;why-this-matters&#34;&gt;Why this matters&lt;/h2&gt;
&lt;p&gt;As cited in &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-9/&#34;&gt;Tools of the Technocracy: Internet Shutdowns&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;In a deeply troubling response, after both terminations we saw a dramatic increase in authoritarian regimes attempting to have us terminate security services for human rights organizations — often citing the language from our own justification back to us.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://blog.cloudflare.com/cloudflares-abuse-policies-and-approach/&#34;&gt;Cloudflare blog&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Said succinctly, the slope is indeed &lt;em&gt;very slippery and very steep&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s difficult to overstate what this means for the future of the Internet. No site, service, or community can single-handedly withstand the forces at play here. The very same tactics used to shut down that forum, can and will be leveraged against anything. This means that even if the forum is successful at staying online, a strategy has been introduced that can be attempted at a different time, with a different pretext, on any target.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;In the United States, you have today created a law, the Telecommunications Reform Act, which repudiates your own Constitution and insults the dreams of Jefferson, Washington, Mill, Madison, DeToqueville, and Brandeis. These dreams must now be born anew in us.&lt;/p&gt;
&lt;p&gt;You are terrified of your own children, since they are natives in a world where you will always be immigrants. Because you fear them, you entrust your bureaucracies with the parental responsibilities you are too cowardly to confront yourselves. In our world, all the sentiments and expressions of humanity, from the debasing to the angelic, are parts of a seamless whole, the global conversation of bits. We cannot separate the air that chokes from the air upon which wings beat.&lt;/p&gt;
&lt;p&gt;In China, Germany, France, Russia, Singapore, Italy and the United States, you are trying to ward off the virus of liberty by erecting guard posts at the frontiers of Cyberspace.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://www.eff.org/cyberspace-independence&#34;&gt;A Declaration of the Independence of Cyberspace&lt;/a&gt;&lt;br&gt;
By John Perry Barlow&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2 id=&#34;what-you-can-do&#34;&gt;What you can do&lt;/h2&gt;
&lt;p&gt;Joshua Moon himself suggests that you:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Learn how to acquire &amp;amp; use Cryptocurrency if you&amp;rsquo;re interested in supporting those who are de-banked.&lt;/li&gt;
&lt;li&gt;Learn how to use &lt;a href=&#34;https://www.torproject.org/&#34;&gt;Tor&lt;/a&gt;, to access information that may be entirely removed from the &amp;ldquo;clearnet&amp;rdquo;.&lt;/li&gt;
&lt;li&gt;Support expanding &lt;a href=&#34;https://www.investopedia.com/terms/c/common-carrier.asp&#34;&gt;common carrier&lt;/a&gt; protections for speech online.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id=&#34;a-call-to-stand-up-for-individual-rights&#34;&gt;A call to stand up for individual rights&lt;/h2&gt;
&lt;p&gt;You don&amp;rsquo;t even have to like the forum to recognize that escalating top-down control over the Internet is a net-detriment for all our liberty. The feedback loop of people leveraging institutions to abuse their opponents only further escalates the cycle.&lt;/p&gt;
&lt;p&gt;You need to start deciding what measures are &amp;ldquo;too far&amp;rdquo; even for those you disagree with the most. It is critical that we as people in society strengthen the restraints on how institutions are able to interact with people. Given how fundamental the Internet is with commerce and people&amp;rsquo;s lives, it&amp;rsquo;s vital that we reassert people&amp;rsquo;s human liberties in cyberspace as well.&lt;/p&gt;
&lt;h2 id=&#34;non-solutions&#34;&gt;Non-Solutions&lt;/h2&gt;
&lt;h3 id=&#34;tor-alone&#34;&gt;Tor alone&lt;/h3&gt;
&lt;p&gt;Relegating free and open expression to a small minority of technologically savvy dissidents is all-but a win condition for tyrants. Tor is an incredibly useful tool, and it is critical that people understand how to use it and other privacy networks, but it is not a complete solution. Any single tool that can be used for dissent can itself become a target.&lt;/p&gt;
&lt;p&gt;While it&amp;rsquo;s one thing to access the Tor network, it&amp;rsquo;s a whole other challenge to attempt to hide that you&amp;rsquo;re using it. If we allow ISPs to be weaponized against their customers, and the Internet itself, there is very little that can be done to route around it.&lt;/p&gt;
&lt;h3 id=&#34;web3-fixes-this&#34;&gt;Web3 Fixes this!&lt;/h3&gt;
&lt;p&gt;Building on he previous section, we cannot out-engineer a culture that tolerates, much less demands censorship. Due to the very way the Internet works, this problem can&amp;rsquo;t be fixed with merely a different coat of paint on top. There are fundamental structural realities that higher level applications can&amp;rsquo;t solve.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/road2hell.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/blockchain/&#34;  &gt;&lt;h2&gt;The road to hell: misplaced optimism in the blockchain space&lt;/h2&gt;&lt;i&gt;&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;This is because the physical state of the network is downstream of real physical realities and economies of scale. It would be much easier to reaffirm individual rights, than to try to bet everything on engineering a perfect global network without compromise.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;how-to-normalize-institutional-abuse&#34;&gt;How to normalize institutional abuse&lt;/h2&gt;
&lt;p&gt;There is a pattern where further and further excesses are justified in the name of persecuting the worst of the worst, yet they manage to be generalized to all of society like the &lt;a href=&#34;https://brownstone.org/articles/the-dangerous-fantasy-of-zero-covid/&#34;&gt;Zero Covid Policy&lt;/a&gt; or the &lt;a href=&#34;https://www.corbettreport.com/alqaeda/&#34;&gt;War on Terror&lt;/a&gt;. It wasn&amp;rsquo;t long after Alex Jones was de-platformed that governments across the world were coordinating to &lt;a href=&#34;https://foundationforfreedomonline.com/dhs-video-series-to-target-peer-beliefs/&#34;&gt;control social media&lt;/a&gt; entirely.&lt;/p&gt;
&lt;h3 id=&#34;1-find-an-unsympathetic-target&#34;&gt;1. Find an &lt;em&gt;unsympathetic target&lt;/em&gt;&lt;/h3&gt;
&lt;p&gt;By selecting a target that&amp;rsquo;s difficult to defend, people will very often ask &amp;ldquo;&lt;em&gt;Is this the hill to die on&lt;/em&gt;?&amp;rdquo;. By procrastinating to defend people&amp;rsquo;s right to due process or from unreasonable sanctions, we enable further abuses. The target isn&amp;rsquo;t selected for their suitability towards the intended policy goal, but rather &lt;em&gt;because they are unsympathetic&lt;/em&gt;.&lt;/p&gt;
&lt;h3 id=&#34;2-target-them-with-a-dedicated-smear-campaign&#34;&gt;2. Target them with a dedicated smear campaign&lt;/h3&gt;
&lt;p&gt;I would caution you to not dismiss that you yourself may very well be such a target. None of us are without sin, and almost everyone can be &lt;em&gt;fit to be tied&lt;/em&gt; in our age of algorithmically enhanced outrage and polarization. It&amp;rsquo;s very easy to find a couple of points about anyone, that someone can find a non-trivial amount of people dislike.&lt;/p&gt;
&lt;p&gt;This is the real danger of our polarized times. People are unwilling to stand for other&amp;rsquo;s inalienable natural rights, and instead prefer to only stick out for their perceived allies in the culture wars. This means that nobody is truly above being tarred and feathered by a highly motivated group of activists.&lt;/p&gt;
&lt;p&gt;Note: &lt;em&gt;Nothing has to be fabricated. People are naturally quite different and there are going to be real and meaningful disagreements. It is our responsibility to ensure those disagreements are handled properly and fairly, rather than wage culture war with the justice in the balance.&lt;/em&gt;&lt;/p&gt;
&lt;h3 id=&#34;3-shut-down-or-shut-out-the-target-without-any-due-process-or-means-to-appeal-on-factual-grounds&#34;&gt;3. Shut down or shut out the target without any due process or means to appeal on factual grounds&lt;/h3&gt;
&lt;p&gt;Again, ironically it&amp;rsquo;s not really about the target, it&amp;rsquo;s about the power to be seized from an opportunity. There are all kinds of means to burden a target with fines, reputational harm, or even violence without providing a fair an impartial hearing. In fact, even a guilty target being convicted would be counter-productive, because the goal is to use the perceived injustice to justify further excesses.&lt;/p&gt;
&lt;h3 id=&#34;4-broaden-the-scope-of-targets&#34;&gt;4. Broaden the scope of targets&lt;/h3&gt;
&lt;p&gt;As the target is &lt;em&gt;removed from play&lt;/em&gt; it doesn&amp;rsquo;t matter anymore who is on what side anymore. You can now use that incident as a precedent justify the same action on unrelated targets. Instead of addressing matters on their merits, instead you can smear critics as being accomplices of the target, or just as profane. With the mechanism in place, people who gain from exploiting it will be motivated to keep the narrative in place, and to continue to silence those who speak out against it.&lt;/p&gt;
&lt;h2 id=&#34;the-road-to-serfdom&#34;&gt;The road to serfdom&lt;/h2&gt;
&lt;p&gt;Let&amp;rsquo;s pretend for a moment that we will fully intend to use this power for the benefit of all. Despite mainstream social media giants being unable to fully eliminate criminal activity of their networks, we&amp;rsquo;re going to deputize ISPs to police every interaction online.&lt;/p&gt;
&lt;p&gt;With means like online identity verification, criminals and deplorables alike will be able to be entirely purged from the Internet merely at the cost of an increasingly powerful bureaucracy monitoring, blocking, or altering people&amp;rsquo;s communications. The process itself becomes the problem. Instead of actually resolving the problem we have merely concentrated more power into a more consolidated structure that becomes ripe for abuse.&lt;/p&gt;
&lt;h3 id=&#34;additional-references&#34;&gt;Additional References&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://t.me/kiwifarms&#34;&gt;Kiwi Farms Telegram&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://kiwifarms.pl/threads/total-retard-war-the-internet-backbones-censor-the-internet.141231/#post-16610184&#34;&gt;Forum Post&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Digital Autonomy and the Arts</title>
		<link>https://libresolutions.network/videos/arts/</link>
		<pubDate>Thu, 20 Jul 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/arts/</guid>
		
		<image>https://libresolutions.network//media/images/liam-arts-banner.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/liam-arts-banner.webp" />
		<itunes:image href="https://libresolutions.network//media/images/liam-arts-banner.webp" />
		<description>Featuring Liam Sturgess</description>
		<content:encoded>&lt;p&gt;This conversation is a follow-up to a piece written last year&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Art is the expression of the human soul, with it’s value being largely in the eye of the beholder. Corporations and governments can imitate art, or mass produce it with financial advantages, but they can’t compete with genuine creativity borne from real passion and real experiences. Tyranny isn’t beautiful, and slavery isn’t inspiring. When given a choice, people will naturally choose the free and beautiful over the rigid and stagnant. As freedom loving people it is absolutely vital for us to encourage, support and fund ventures to provide people the opportunity to enjoy pro-human media and creative works.&lt;/p&gt;
&lt;p&gt;Artists are craving for a way for their work to be properly supported. Many artists are disillusioned by not being able to make it in large corporate spaces. If we truly desire a culture that protects freedom we must work to provide the space for artists to promote this culture. Working together we can support artists who care deeply about building a better world. This will create real cultural capital that can upend the systems that undermine our liberty. With truth on our side, there can be no limit to the heights of our imagination.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/artistic-banner.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/information-warfare-superweapons/&#34;  &gt;&lt;h2&gt;Information Warfare Super-weapons&lt;/h2&gt;&lt;i&gt;Change the culture with these super effective tricks. Social engineers HATE these!&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;Later in the conversation, we discussed how machine learning tools are changing the game for artists out there.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/abstract.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/collapse-of-the-intangible/&#34;  &gt;&lt;h2&gt;The Collapse of the Intangible&lt;/h2&gt;&lt;i&gt;Keeping your head above water in a tsunami of change&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h3 id=&#34;more-about-liam-sturgess&#34;&gt;More about Liam Sturgess&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://gigaohm.bio/@LiamSturgess&#34;&gt;@LiamSturgess@gigaohm.bio&lt;/a&gt; on the Fediverse!&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.liamsturgess.com/&#34;&gt;Webisite&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://liamsturgess.substack.com/&#34;&gt;Substack&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://liamsturgess.locals.com/&#34;&gt;Locals&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Escalating Cyberwar: Warlord Technology</title>
		<link>https://libresolutions.network/articles/warlord-technology/</link>
		<pubDate>Mon, 17 Jul 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/warlord-technology/</guid>
		
		<image>https://libresolutions.network//media/images/warlord-tech.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/warlord-tech.webp" />
		<itunes:image href="https://libresolutions.network//media/images/warlord-tech.webp" />
		<description>Understanding asymmetric systems.</description>
		<content:encoded>&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;You have been found guilty.&lt;/em&gt;&lt;br&gt;
&lt;em&gt;No trial was necessary, your device has testified against you.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;When one navigates corporate controlled cyberspace, the message couldn&amp;rsquo;t be more clear. Governments and tech giants negotiate the terms of total and utter digital feudalism while the people are herded into systems that are explicitly designed to control them. Even while it&amp;rsquo;s still possible, opting-out comes at a non-trivial cost. It is a cost that must be paid in one form or another, because refusing to do so has a grave price as well.&lt;/p&gt;
&lt;h2 id=&#34;understanding-warlord-technology&#34;&gt;Understanding Warlord Technology&lt;/h2&gt;
&lt;p&gt;It&amp;rsquo;s generally the case that powerful tools can be used for good or evil, but there are exceptions. Often things can be specialized for particular purposes, and those purposes can themselves be evil ends. On it&amp;rsquo;s face, facial recognition may seem like something that isn&amp;rsquo;t inherently bad, but things change a great deal when it&amp;rsquo;s combined with an &lt;a href=&#34;https://youtu.be/KOpCtUvruy0&#34;&gt;orchestra of social manipulation&lt;/a&gt; and control systems. Just as a bank account is useful to have, it&amp;rsquo;s a whole other can of worms once people start being &lt;a href=&#34;https://reclaimthenet.org/more-britons-raise-the-alarm-over-financial-deplatforming&#34;&gt;de-banked&lt;/a&gt; for political purposes.&lt;/p&gt;
&lt;p&gt;As such, there are many tools that would be entirely useless to a single person on their own, but are immensely useful for those who have large groups of people to manipulate. What makes these tools &lt;em&gt;asymmetric&lt;/em&gt; is that the advantages are only for the wielder, and disadvantages are imposed on the subjects. Centralized social media platforms are &lt;a href=&#34;https://libresolutions.network/articles/social-media/&#34;&gt;well-suited&lt;/a&gt; for this. Not only are these platforms surveilling and manipulating their users, they have the capacity to lock down content only to fellow captives. This means that a public figure limiting their voice to these platforms is only able to get their voice out if they&amp;rsquo;re allowed to. &lt;em&gt;Those of us who want to reach the public, and the &lt;strong&gt;public themselves&lt;/strong&gt;&lt;/em&gt; must do more to support independent platforms and protocols, or else we&amp;rsquo;ll all remain beholden to top-down information control systems.&lt;/p&gt;
&lt;p&gt;There is a well-earned reluctance from the public to adopt smart appliances, and other intrusive technology. When every device is monitored and controlled by corporations in the cloud, any feature of that device being &lt;a href=&#34;https://news.yahoo.com/remote-stealth-commands-tamper-temperatures-090308386.html?fr=sycsrp_catchall&#34;&gt;abused arbitrarily&lt;/a&gt; becomes an inevitability. Understanding this means that &lt;strong&gt;warlord technology&lt;/strong&gt; is any device or system that enables someone else to have power over one or many other people. What effectively makes this technology so dangerous is the fact that it&amp;rsquo;s simple to disguise the actual purpose. Tech giants offering free services in exchange for data-harvesting has successfully put many of the serious risks &lt;em&gt;out of sight and out of mind&lt;/em&gt;. As governments across the world become more repressive, these risks come into view well after they could be prevented. The opposite exists as well too, it&amp;rsquo;s possible for &lt;em&gt;emancipatory&lt;/em&gt; technology to be developed that&amp;rsquo;s useful to people generally, but fundamentally useless for anyone seeking power over others.&lt;/p&gt;
&lt;p&gt;The &lt;em&gt;Free and Open Web&lt;/em&gt; is an excellent example, independent and non-commercial websites managed by individuals using open protocols would have been a nightmare to properly index and seize control of. Because of this, people were nudged onto controlled platforms instead of self-publishing. Another example of asymmetric technology which benefits the people would be encryption and privacy tools. Those in power will always have the means and coordination to conceal their activities. Providing simple ways for users to protect their private information increases the costs of violating people&amp;rsquo;s rights exponentially, which is why these tools are often &lt;a href=&#34;https://element.io/blog/end-to-end-encryption-the-will-of-the-british-people/&#34;&gt;targeted by governments&lt;/a&gt; with &lt;a href=&#34;https://www.theregister.com/2023/05/09/india_messaging_apps_ban/&#34;&gt;any excuse they can find.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Of course, there is symmetric technology as well. Many general-purpose tools can be used for both great evil and good as well. I would argue truly asymmetric technologies are rare, or at least highly specialized. Almost everything has all kinds of potential uses that themselves can be used for benevolent or malicious choices, ultimately it&amp;rsquo;s downstream of the human condition. It is important to keep in mind however, that even the most symmetric of technology can be used by those with malevolent (or indifferent) intent for malicious ends. Just as a hammer can be used to build or for cruelty, what may seem like a reasonable exchange may end up being a terrible situation.&lt;/p&gt;
&lt;h2 id=&#34;cyberwar-on-civilians&#34;&gt;Cyberwar on Civilians&lt;/h2&gt;
&lt;p&gt;As noted in &lt;a href=&#34;https://libresolutions.network/articles/cyberwar/&#34;&gt;A non-Combattant&amp;rsquo;s Guide to Cyberwar&lt;/a&gt;, governments are increasingly treating your devices, connections, and even your mind as a national security target. Under the pretext of combating foreign funded misinformation, governments across the globe are working to secure total information dominance over their populations. It should go without saying that this itself is inherently anti-democratic, despite being done in the name of &lt;em&gt;protecting our democracy&lt;/em&gt;. Surveillance and censorship are serious problems, but very often the lede being buried is that it&amp;rsquo;s just as much about &lt;em&gt;manipulation&lt;/em&gt;.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/cyberwar.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/cyberwar/&#34;  &gt;&lt;h2&gt;A Non-Combattant&amp;#39;s Guide to Cyberwar&lt;/h2&gt;&lt;i&gt;Making sense of the chaos and the crossfire.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;Censorship and surveillance themselves are serious attacks on the rights and liberty on civilians, outright manipulation of the public is an even graver overreach with even more troubling implications. We can not take for granted the mistake it would be to allow these measures to continue unopposed.  Too many ignore the active role governments have taken in waging cyberwar on the public. While it&amp;rsquo;s intuitive to many that corporations have a profit-incentive to acquire and control as much data as possible, to others it&amp;rsquo;s inconceivable to many more that governments would violate their own laws to secure domestic or foreign policy objectives.&lt;br&gt;
Despite the first amendment in the united states being quite clear:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Congress shall make no law respecting&lt;/strong&gt; an establishment of religion, or prohibiting the free exercise thereof; &lt;strong&gt;or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;The United States has an entire information control complex that involved government departments explicitly &lt;a href=&#34;https://www.racket.news/p/twitter-files-thread-the-spies-who&#34;&gt;working with corporations&lt;/a&gt; to manipulate public discourse during the Covid Crisis. Even when the courts attempt to &lt;a href=&#34;https://www.nationalreview.com/news/federal-judge-blocks-biden-officials-from-coordinating-censorship-with-social-media-companies/&#34;&gt;restrict such overreach&lt;/a&gt; the largely compliant media will continue the campaign of normalizing censorship and information control, essentially advocating for the nullification of the people&amp;rsquo;s rights.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/lsn-banner.webp)&#34; &gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://alilybit.substack.com/p/the-silent-invasion&#34;  &gt;&lt;h2&gt;The Silent Invasion&lt;/h2&gt;&lt;i&gt;The Speculative Foundation of Surveillance Behind the Ongoing Privacy Erosion&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;All-encompassing surveillance is bad enough, using that information to manipulate and control the public is even worse, but far more terrible is to &lt;a href=&#34;https://www.telegraph.co.uk/technology/2020/11/15/governments-square-fight-big-tech-encryption/&#34;&gt;undermine people&amp;rsquo;s security&lt;/a&gt;. Governments across the world have made it explicitly clear that while you may nominally have the right to privacy and security, it disappears the moment it conflicts with policy objectives. Due to the power gained from limitless surveillance, you being a law-abiding citizen in good social standing means little. Free citizens across the world must find ways to reassert control and ownership over their governments, lest we all become subjects of tyrannical systems.&lt;/p&gt;
&lt;h2 id=&#34;digital-blockades&#34;&gt;Digital Blockades&lt;/h2&gt;
&lt;p&gt;The greatest mistake is to always presume internet blackouts are an all-or-nothing affair. The tragic truth is that the tools of suppression can be &lt;em&gt;incredibly precise&lt;/em&gt;. The public at large has been almost wholly ignorant of this, and this has enabled behavior that leaves them vulnerable. Many people are expecting a full-on &amp;ldquo;lights-out&amp;rdquo; internet blackout. In almost every case this is unnecessary, as people themselves are all too willing to use top-down controlled platforms, self-censor and ignore practical privacy risks. The biggest challenge is that something as simple as not &lt;a href=&#34;https://libredns.gr/&#34;&gt;encrypting your DNS queries&lt;/a&gt; by using the default, allows governments to lean on service providers to seize control.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/tott-9-preview.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-9&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #9 Internet Shutdowns&lt;/h2&gt;&lt;i&gt;Information control is the root of modern tyranny.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;It is almost cliche these days, that governments will do everything in their power to suppress genuinely useful information in a crisis when it plays to their advantage. It&amp;rsquo;s important not to be naive about corporations as well. They are every bit as capable of egregious abuses. Public-Private partnerships have worked to transform our &lt;em&gt;turn-key totalitarianism&lt;/em&gt; into an unending ratchet of tyranny. As economic, social, and political power concentrates, it can be harder and harder for truly independent infrastructure to operate in a neutral way, if not outright impossible. Over time, it can be too odious for even willing infrastructure providers to withstand the pressure to participate in censorship. No dissident or marginalized person can actually rely on a business or institution putting their needs ahead of the it&amp;rsquo;s existence. This means that as more people conform to information control, and are compliant with ever more restrictive technology, the harder it is for people at all levels of society to break free. This is especially true for those who are disadvantaged.&lt;/p&gt;
&lt;p&gt;Ultimately the more capable our devices are the more leverage they can potentially have over the public. We must be vigilant to not enable governments, corporations, or other malevolent entities to leverage them against us. Legislative restrictions are not sufficient to prevent abuse. Citizens must be well-educated on the risks, where possible devices &amp;amp; systems must be properly verifiable and secure, lastly there must be severe consequences for abuse. In the name of fighting &lt;a href=&#34;https://www.republicworld.com/world-news/europe/france-approves-law-to-remotely-eavesdrop-devices-of-suspected-terrorists-articleshow.html&#34;&gt;terrorism or other threats&lt;/a&gt; the French government is introducing powers to leverage every device a person has against them. Even if one agrees that this power is warranted in this specific circumstance, there is no guarantee that such powers won&amp;rsquo;t be &lt;a href=&#34;https://www.businessinsider.com/macron-france-social-media-phone-gps-camera-curb-protests-2023-7&#34;&gt;generalized over time&lt;/a&gt;. In fact, even very specific measures preventing such abuse have consistently been ignored by all kinds of governments under all kinds of pretexts.&lt;/p&gt;
&lt;h2 id=&#34;full-auto-tyranny&#34;&gt;Full-Auto Tyranny&lt;/h2&gt;
&lt;p&gt;We already live in a world where the state of cyberspace has profound impacts on how people behave outside of it. As it currently exists, the majority of cyberspace is dominated by Corporations, Governments, and other un-accountable entities. The dream of an &amp;ldquo;information super-highway&amp;rdquo; where people of all backgrounds can meaningfully create, learn and share together is in dire peril.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/hive-moderation.webp&#39; 
&gt;


&lt;p class=&#34;caption&#34;&gt;
    Hive Moderation is a real-time AI censorship tool. 
&lt;/p&gt;


&lt;/div&gt;
&lt;p&gt;&amp;ldquo;Moderation at scale&amp;rdquo; effectively means mass information control. Instead of merely ranching people onto platforms to serve them targeted ads, now the capabilities exist to immediately prevent inconvenient discourse, or even entirely shape discussion. Even if people are starting to wake up to 2010s era social media, hardly anyone is prepared for the impacts created by upcoming and state-of-the art systems of control. It is critical to not let the inefficiencies and short-comings of existing systems lure you into a false sense of security when it comes to future threats.&lt;/p&gt;
&lt;p&gt;Naturally, these excesses will be demanded on the terms of safety, and preventing crime. While there are real and severe dangers in cyberspace, it is important to note that this level of control over the people is entirely unprecedented. As these systems roll out, people will only barely have solace in their own mind, but hardly anywhere else.&lt;/p&gt;
&lt;h2 id=&#34;fertile-ground-for-resistance&#34;&gt;Fertile ground for resistance&lt;/h2&gt;
&lt;p&gt;First and foremost, we need to strengthen our commitment to each other&amp;rsquo;s inalienable human rights before nit-picking on particular technological choices.&lt;/p&gt;
&lt;p&gt;These implications have a very real impact on our daily lives. More and more &lt;a href=&#34;https://ottawabluesfest.zendesk.com/hc/en-us/articles/13089137560603-Onsite-Methods-of-Payment-CASHLESS&#34;&gt;events and services&lt;/a&gt; are going entirely &lt;em&gt;cashless&lt;/em&gt; which often requires people to use products and services with terrible privacy protections. You may have been able to opt-out of these systems yourself, but what can be done to protect others from them? What about people who are perfectly fine with trading a total online-enabled surveillance grid if it makes their life easier? What about those who genuinely lack the time and energy to devote to opting out? Even entire cities can fold to the pressure of conforming to these trends in the face of powerful incentives.&lt;/p&gt;
&lt;p&gt;Regardless of one&amp;rsquo;s chosen level of participation, it is absolutely vital that we get others to understand the risks. With that understanding it can be much easier to individually and collectively negotiate vital protections that need to be available, and encourage investment in new products and techniques. For now, it seems that the demand for tools and systems that don&amp;rsquo;t impact one&amp;rsquo;s privacy and freedom is far too low. We are all responsible for if not outright raising that demand, and communicating it effectively.&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s a shame that the benefits of free and open dialogue are only readily apparent when they&amp;rsquo;re gone. The capability for people across the world to freely exchange information near instantaneously is absolutely critical to people&amp;rsquo;s life and liberty. It is vital that humanity maintains this critical component in holding the powerful accountable. Allowing the massive power structures that exist to have a veto power over people&amp;rsquo;s communication is too large an advantage to passively permit.&lt;/p&gt;
&lt;p&gt;In times of inflamed tensions, social unrest, or even economic troubles, it can be very tempting for governments to &lt;em&gt;smooth things over&lt;/em&gt; by constraining people&amp;rsquo;s ability to learn, create and share with each other. In many cases this undermines the peoples own ability to adapt to changes, potentially being caught unaware of dangers the state failed to (or chose not to) communicate. These days, whenever a nation adopts a particularly egregious control measure, regardless of pretext or circumstances other nations aren&amp;rsquo;t far behind. While the assaults on people&amp;rsquo;s privacy and digital autonomy are top-down they are enabled or even welcomed by particular behaviors that we have a responsibility to stop, and prevent.&lt;/p&gt;
&lt;p&gt;The major challenge is that people from all walks of life need to be willing, able, and prepared to oppose abuse the situation arises. Like all deterrents to abuse, they have to be genuine and credible, or the people risk having their bluff called.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Out-thinking the Culture Wars with Gary Sharpe</title>
		<link>https://libresolutions.network/articles/qa1-gary-sharpe/</link>
		<pubDate>Fri, 14 Jul 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/qa1-gary-sharpe/</guid>
		
		<image>https://libresolutions.network//media/images/bulb.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/bulb.webp" />
		<itunes:image href="https://libresolutions.network//media/images/bulb.webp" />
		<description>A Q&amp;A about emotional intelligence in these trying times.</description>
		<content:encoded>&lt;p&gt;I really appreciate Gary Sharpe‘s perspective on the emotional side of what people face. He has a wealth of excellent advice and I was pleased to have the opportunity to do this Q&amp;amp;A.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://garysharpe.substack.com/&#34;&gt;Gary Sharpe&amp;rsquo;s Articles&lt;/a&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;h3 id=&#34;q--a&#34;&gt;Q &amp;amp; A&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;One of the threads I&amp;rsquo;m currently following is the Culture Wars, and how the public has been largely divided into a multitude of different ideologies that can often perceive each other as an existential danger. This itself seems to be a massive stressor that drives much of the strife people experience these days.&lt;br&gt;
From your perspective, what would be effective ways people can deescalate the cultural tensions without necessarily “giving up ground”?&lt;br&gt;
I ask this because, it&amp;rsquo;s starting to take more of my attention. I&amp;rsquo;ve been filtered into my own ideology, and I can certainly feel a limit to what kinds of people I can plausibly reach or even communicate with. Initially I had more hope that this would be resolved over time, but if anything it&amp;rsquo;s only gotten worse and worse.&lt;br&gt;
Appreciate your thoughts!&lt;/em&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Gary: &amp;ldquo;That’s a Big Question, and I wish I had the answer. Firstly, I agree with you that the Culture Wars are stressful for everyone. I also suspect that the powers-that-be are fomenting them on purpose, as part of classic divide-and-rule tactics.&lt;/p&gt;
&lt;p&gt;The basic problem is, when we are in a fearful, or stressed, state, which as you say the Culture War itself induces and maintains, our psychological and physiological states shift markedly from when we are in a calm, relaxed state, when we feel safe.&lt;/p&gt;
&lt;p&gt;In particular, from Dr Iain McGilchrist’s work, we know that we lose access to the right hemisphere of our brain&amp;rsquo;s way of attending to the world. In this state, we can be totally delusional, and very rigid in our black and white thinking, utterly believe our own lies and construct halls-of-mirrors against receiving new or challenging information.&lt;/p&gt;
&lt;p&gt;From Dr Stephen Porges’ work we know we also lose access to our social engagement system, including the loss of the ability to read other people, and become literally unable to tune in to other voices, and so we tend to see “others” from outside our tribe as dangerous threats.&lt;/p&gt;
&lt;p&gt;Indeed, recent advances in psychology show the brain is essentially a predicting organ, and when the reality of the world doesn&amp;rsquo;t match its predictions, it has to resolve the contradiction. It can do this in one of two ways: delude itself and ignore reality, or update itself and its predictions. In the stressed state, we tend to opt for the delusion, as new or countering information can induce a significant danger response in of itself: this threatens our own identity or world view, and shifts in these can be traumatic.&lt;/p&gt;
&lt;p&gt;So the pragmatic answer to your question is when people are already triggered, it is probably not worth the energy trying to connect or get through to them [with facts and figures] The “not giving up ground” part of the question is probably part of the answer: to be able to be together, but agree not to discuss religion/ideology or politics if this triggers each other! One of the issues, however, is how every topic of conversation has become political.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;*“Every topic becoming political” - sadly, that&amp;rsquo;s a big part of the problem. Language itself has become politicized and the decision to use/not use particular words is effectively signalling affiliation in many ways. &lt;em&gt;I think a lot of it comes down to trust. I really like &lt;a href=&#34;https://youtube.com/watch?v=38hI_E33vq4&#34;&gt;this video&lt;/a&gt; about a game called&lt;/em&gt; &lt;a href=&#34;https://ncase.me/trust/&#34;&gt;The Evolution of Trust&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;The simulation concludes that three things are required for the evolution of trust&lt;/em&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;em&gt;repeated interactions&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;possible win-wins&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;low miscommunication&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;em&gt;I&amp;rsquo;m not sure what can be done about the first two, but on the third item I have continuously worked to try to be clear as possible, with varying degrees of success.&lt;/em&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Gary: On the trust and win-win topic, have you come across the work of &lt;a href=&#34;https://youtube.com/watch?v=eF-E40pxxbI&#34;&gt;Liv Boeree&lt;/a&gt; she has been thinking about this and how to overcome the lose-lose forces of “Molloch”.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;em&gt;Many online communities that are pleasant to be a part of aren&amp;rsquo;t actually tolerant, but rather merely one of many echo-chambers of like-minded individuals.&lt;/em&gt;&lt;br&gt;
&lt;em&gt;In Corbett&amp;rsquo;s &lt;a href=&#34;https://www.corbettreport.com/the-media-matrix-full-documentary/&#34;&gt;Media Matrix documentary&lt;/a&gt; he cites that since the introduction of television, offline social interaction has been on the decline.&lt;/em&gt;&lt;br&gt;
&lt;em&gt;I think the biggest change in our era is that online interactions aren&amp;rsquo;t merely an additional layer on top of regular human-to-human interaction, can be an alternative, especially for those who lack friends &amp;amp; family.&lt;/em&gt;&lt;br&gt;
&lt;em&gt;Would you say that itself is the problem, or is it something that we could handle better?&lt;/em&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Gary: According to the work of Dr Stephen Porges, “real life” social interactions and social engagement is vital for humans to flourish. This is why putting someone into solitary isolation in prisons is the worse form of punishment, and considered a method of torture. It is also why loneliness is the biggest predictor of fast decline of conditions like Parkinson’s or dementia.&lt;/p&gt;
&lt;p&gt;Online social engagement can provide some of these needs, but can not replace it completely, because it is missing some important “nourishing” elements, such as body language and touch. This is why zoom calls can be exhausting, whereas positive social engagement in real life can be restorative, and energy giving.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;em&gt;I feel like this explains a great deal of why people are constantly kept in fear. There is much to be concerned about, but I think much of the fearmongering is to find ways to prevent people from seeing win-win scenarios. I spent much of 2020/2021 in fear, not of the virus, but what the state would/could do over it.&lt;br&gt;
While there was definitely serious overreach, and incredible harms done in the response I&amp;rsquo;m not sure being consumed by fear improved my ability to handle it. In your opinion, what are some good ways to handle rational fear that goes too far?&lt;/em&gt;&amp;rdquo;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Gary: I heard something which resonated with me on this just yesterday “fear is the worry that you are going to be less safe in the future than you are right now”. So the problem with being stuck in chronic fear is that we exile ourselves from even feeling safe in the now, even when there really is no imminent or proximate danger. Fear does keep us divided and distracted, and I agree this is being used on purpose by those who seek to control everything and everyone.&lt;/p&gt;
&lt;p&gt;On the fear that comes with “waking up” to what is really going on the world, I have seen a common arc, including in myself, similar to what you describe. At first, it is not only terrifying, but also going down the rabbit holes can be addictive. So we get very scared, but also keep ourselves in the fear by constantly staring into the abyss.&lt;/p&gt;
&lt;p&gt;Then we start to feel a need to do something about it, to become solution oriented, begin to focus on resistance and finding like minded people, and a sense safety in numbers. We then begin to pay less attention to the day-to-day minutiae of what the elites are up to and start building alternative systems.&lt;/p&gt;
&lt;p&gt;I have watched daily youtubers like Richard Vobes and Dr John Campbell going through these stages in real time. It might like the stages of grief, so it might actually be necessary to go through the fear stage, in order to get to the other side.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;em&gt;You&amp;rsquo;ve hit an important point! There really does seem to be an addictive component. This is often pathologized to dismiss people&amp;rsquo;s very real concerns, but I can&amp;rsquo;t help but wonder if that element serves a real purpose. In your mind, what do you think specifically makes it addictive?&lt;br&gt;
I&amp;rsquo;ve seen the mainstream argue it&amp;rsquo;s because it&amp;rsquo;s just selfish people who want to feel better than everyone else. In my experience this doesn&amp;rsquo;t match up to reality as many of the other people I&amp;rsquo;ve encountered on this journey are some of the least selfish I&amp;rsquo;ve met.&lt;br&gt;
I do think the fact that it&amp;rsquo;s even possible is a marvel to itself, it&amp;rsquo;s a testament to how useful a free and open web can be.&lt;/em&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Gary: When we are stressed or threatened, we go through a defence cascade of escalating responses. First a startle or orienting response, that takes us either back to calm, or to a fight-flight type response. If the flight-fight response isn&amp;rsquo;t successful at ameliorating the threat, we then escalate into a rigid type of freeze, or playing dead, response, and if that doesn&amp;rsquo;t work we end up fainting or in a floppy type of freeze response.&lt;/p&gt;
&lt;p&gt;Many of the threats that our nervous system perceives in the modern world are not ones we can fight or run away from. So a lot of people are stuck partially in a freeze response, with various levels of dysfunction. By putting ourselves into states of anger or functional fear, e.g. by focussing on an &amp;ldquo;enemy&amp;rdquo; that we can fight as &amp;ldquo;keyboard warriors&amp;rdquo;, we can temporarily bump ourselves out of the freeze response back into a fight-flight response, by generating internal dopamine and adrenaline.&lt;/p&gt;
&lt;p&gt;Being in fight-flight allows us to be temporarily more functional in the world, and while this is not a healthy state to be in long term either, it feels generally less unpleasant and uncomfortable than being in freeze, so it is preferable for a lot of people.&lt;/p&gt;
&lt;p&gt;Of course, like all addictions, using the Culture Wars or taking ourselves down the scary rabbit holes as our way of choice for getting the dopamine/adrenaline fix ends up needing more and more extreme stimulus for it to work and have the effect. Eventually we need to move out of the fear, into a more creative stage, becoming solution orientated and helping to build alternatives.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;em&gt;Thank you so much for this, I greatly appreciate it and the answers themselves.&lt;/em&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;If you haven’t read any of Gary’s writing, I’d highly recomment the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://garysharpe.substack.com/p/the-view-from-a-self-traumatizing&#34;&gt;The View From a Self-Traumatizing Society&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://garysharpe.substack.com/p/the-dopamine-adrenaline-connection&#34;&gt;The Dopamine-Adrenaline Connection&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://garysharpe.substack.com/p/how-to-avoid-a-hybrid-orwellian-huxleyian&#34;&gt;How to Avoid a Hybrid Orwellian-Huxleyian Dystopia&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Tools: the Good and the Bad</title>
		<link>https://libresolutions.network/articles/tools/</link>
		<pubDate>Tue, 27 Jun 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/tools/</guid>
		
		<image>https://libresolutions.network//media/images/tool-bench.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/tool-bench.webp" />
		<itunes:image href="https://libresolutions.network//media/images/tool-bench.webp" />
		<description>Understanding technological choices.</description>
		<content:encoded>&lt;blockquote&gt;
&lt;p&gt;If all you have is a hammer, suddenly every single thing starts to look like a nail.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Hardly and tool itself is wholly evil or entirely good. Not only are the &lt;em&gt;tools themselves&lt;/em&gt; important, how we use them matters quite a bit as well. This applies all the way from the entire software ecosystem, down to the hardware components themselves. The fundamental attributes of the tool will set the incentives for how they can be used, and how they are used creates incentives for how future tools will be made. This feedback loop can be used to concentrate power or to distribute it. This is precisely where your understanding is a prerequisite for making deliberate choices.&lt;/p&gt;
&lt;h3 id=&#34;concepts&#34;&gt;Concepts&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Autonomy&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Can I do what I want, on my own terms?&lt;/em&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Privacy&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Does using this, divulge information in unnecessary or unwanted ways?&lt;/em&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Efficiency&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Does it complete it&amp;rsquo;s function with minimal waste?&lt;/em&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Verifiability&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Is it possible to validate the condition and function(s) of it?&lt;/em&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Accessibility&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Is it reasonably useful to those with different needs and requirements?&lt;/em&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h1 id=&#34;examples&#34;&gt;Examples&lt;/h1&gt;
&lt;p&gt;In the past, I have been asked for a quick answer to explain if a particular technology or system is itself good or bad. It can be difficult to give a concise answer when there are often a couple of fine points that are worth taking the time to focus on. It has often been said that &lt;em&gt;the medium is the message&lt;/em&gt; and this much more the case when it comes to digital and online systems.&lt;/p&gt;
&lt;h2 id=&#34;qr-codes&#34;&gt;QR Codes&lt;/h2&gt;
&lt;p&gt;With the introduction of &lt;a href=&#34;https://www.campfire.wiki/doku.php?id=vaccine_passport&#34;&gt;vaccine passports&lt;/a&gt;, QR codes have soured on a lot of people. Gating access to venues or services behind the need for one to digitally identify themselves presented many serious risks to privacy and civil rights. Unfortunately, none of this required a QR code specifically. &lt;a href=&#34;https://blog.nortechcontrol.com/nfc-access-control&#34;&gt;NFC&lt;/a&gt; or RFID access cards could provide the exact same functionality. While QR codes were a highly-visible mechanism to enable automated segregation, there&amp;rsquo;s no guarantee that future systems of control will look the same.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/tools-qr.webp&#39; 
&gt;


&lt;p class=&#34;caption&#34;&gt;
    This article&amp;#39;s URL as a QR code 
&lt;/p&gt;


&lt;/div&gt;
&lt;p&gt;This is because QR codes are just one of many ways to transmit data over a short distance. Using a camera the device detects the pattern and then decodes it into the required data format. This can just be a bit of text, a website URL, or binary data. I don&amp;rsquo;t think there&amp;rsquo;s anything inherently harmful to QR codes being used on things like posters and business cards provided that they aren&amp;rsquo;t hiding data or using &lt;em&gt;tracking links&lt;/em&gt;.&lt;/p&gt;
&lt;h3 id=&#34;qr-codes-are-not-all-created-equal&#34;&gt;QR codes are not all created equal&lt;/h3&gt;
&lt;p&gt;Because anything can be encoded into a QR code, there are still some risks to be aware of. Just like you shouldn&amp;rsquo;t open strange links, you may not want to open every QR code you see. This is why some QR reader apps will display the decoded information so that you can decide if you want to open the link or not.&lt;/p&gt;
&lt;p&gt;Another problem is that you may not even be able to decode the QR code at all. If you have to present an app-generated QR code to interact with a system, you may not have any knowledge of what data is being used and shared.&lt;/p&gt;
&lt;h2 id=&#34;smartphones&#34;&gt;Smartphones&lt;/h2&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://libresolutions.network/media/diagrams/smartphone.webp&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/diagrams/smartphone.webp&#39; 
&gt;

&lt;/a&gt;



&lt;/div&gt;
&lt;blockquote&gt;
&lt;p&gt;The powers-that-be don’t want you to write your own stories, make your own movies, and draw your own art, even though everyone has, in their pockets, the technology to do all of the above, with a good wireless keyboard, a camera module, and a stylus.&lt;/p&gt;
&lt;p&gt;No, they want you to read their dumbed-down prolefeed, watch Netflix, Instagram your cat, your food, and your cat food, swipe through Pinterest a few times, get your daily fix, and then peacefully, complacently, obediently nod off on the couch. They don’t want people carrying around devices that center the user as a creator of content. Instead, they want you to do nothing but consume their approved messages.&lt;/p&gt;
&lt;p&gt;In short, for the vast majority of people, they’re trying to turn personal computers into television. They’re trying to drag us backwards, into a prior era, where the ruling class had a death grip on the narrative. This is a trend that must be resisted. Never give up your keyboards, ever.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://iceni.substack.com/p/spartacast-06&#34;&gt;Spartacast 06&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;If someone was limited to only using a smartphone they may be severely limited in what they&amp;rsquo;re able to accomplish. As you can see, the consequences of giving up a keyboard alone are immense. If that wasn&amp;rsquo;t bad enough, these devices tend to be vulnerable to malware exploited by all kinds of bad-actors. Smartphones are a high-value target because many people keep a treasure-trove of personal data. If that wasn&amp;rsquo;t bad enough often the &lt;a href=&#34;https://reclaimthenet.org/googles-private-coronavirus-tracking-app-data-leak&#34;&gt;manufacturers themselves&lt;/a&gt; will participate in undermining your privacy.&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;ve written in the past:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;It&amp;rsquo;s not the smartphone, but what was in it.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is nothing inherently mind-killing about a small, portable computer that uses a touch-screen interface. What truly forged the massive mind control apparatus was the things that came with it:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Real-time location tracking&lt;/li&gt;
&lt;li&gt;24/7 audio and video surveillance capabilities&lt;/li&gt;
&lt;li&gt;Corporate Social Media as &lt;em&gt;Digital information Control Systems&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://libresolutions.network/articles/information-control&#34;&gt;Conceptualizing Information Control&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;There are many ways that the useful parts of smartphones could be replicated in a simpler, &lt;a href=&#34;https://thenewleafjournal.com/the-ideal-phone-e-ink-and-qwerty/&#34;&gt;more focused device&lt;/a&gt;. Re-installing android without google play services can go a long way for many android devices, but in the long run it would be excellent if we could support independent manufacturers that create genuinely good devices.&lt;/p&gt;
&lt;h2 id=&#34;centralized-platforms&#34;&gt;Centralized Platforms&lt;/h2&gt;
&lt;p&gt;A tried-and-true business model is to run a platform that allows users to create valuable content. With a large audience to attract all kinds of writers, musicians, podcasters, or even video producers, the platform can double-dip acquiring data on the audience as well as the performers. Just as creators will be able to see stats for their content, the platform&amp;rsquo;s operators themselves will have all kinds of metrics and data on everyone.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/substack-stats.webp&#39; 
&gt;


&lt;p class=&#34;caption&#34;&gt;
    Substack readership stats 
&lt;/p&gt;


&lt;/div&gt;
&lt;p&gt;Creators on these platforms essentially trade some (or all) control over their content in exchange for an audience. No matter what method you use to disseminate your message, it&amp;rsquo;s critical that you maintain control over your work. For example, the Libre Solutions Network is written for the website first, then the content migrated to substack for additional reach. This means that if I ever lost access, or decided that staying on the platform wasn&amp;rsquo;t worthwhile, all the content would still exist.&lt;/p&gt;
&lt;p&gt;As a member of the audience, it&amp;rsquo;s critical that you help make it possible for creators to maintain their own independent presence. Simple habits like bookmarking and using an RSS reader can really make a huge difference in supporting an independent information landscape. At the very least it&amp;rsquo;s vital that you ensure that your attention isn&amp;rsquo;t entirely locked to a single or set of controlled platforms.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/learning-lessons.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/social-media&#34;  &gt;&lt;h2&gt;Social Media: Learning the right lessons&lt;/h2&gt;&lt;i&gt;Understanding information control&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h2 id=&#34;machine-learning&#34;&gt;Machine Learning&lt;/h2&gt;
&lt;p&gt;The most dangerous aspect of AI right now is that it&amp;rsquo;s being used as an excuse to build a regulatory environment that empowers the very same technocrats to have even more digital control over people. While machine learning tools are very effective force multipliers in particular situations, most of the so-called AI risks have already been done by people to people with tools that are already readily available. Humanity has never lacked the tools to totally and completely annihilate itself, additional powers and tools only represent a danger to the degree they &lt;em&gt;tip the scales&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;For example, while I currently choose not to automatically narrate all my posts with a cloned voice, it&amp;rsquo;s a viable option. I would definitely oppose any effort that seeks to keep such technology out of people&amp;rsquo;s hands, especially if there were offline-available tools that could be used without assistance from cloud services. Those who&amp;rsquo;s power relies on information being a controlled resource would love nothing more than to have a monopoly on extremely efficient content creation.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/big-data.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-2/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #2 Big Data &amp;amp; Artificial Intelligence&lt;/h2&gt;&lt;i&gt;What is all this data for anyways?&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;There are many efficient uses of machine learning that don&amp;rsquo;t automatically enable obscene privacy invasion. Distributing pre-trained models would be a great way to help people get more use out of low-power systems, potentially preventing a massive amount of waste. A prerequisite for better AI tools is a better way of building them. Instead of allowing big tech to hoover up all of everyone&amp;rsquo;s information, we need to work together to collaborate on important datasets with data we choose.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>A Non-Combattant&#39;s Guide to Cyberwar</title>
		<link>https://libresolutions.network/articles/cyberwar/</link>
		<pubDate>Fri, 16 Jun 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/cyberwar/</guid>
		
		<image>https://libresolutions.network//media/images/cyberwar.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/cyberwar.webp" />
		<itunes:image href="https://libresolutions.network//media/images/cyberwar.webp" />
		<description>Making sense of the chaos and the crossfire.</description>
		<content:encoded>&lt;p&gt;We live in interesting times. In addition to the many &lt;em&gt;boots-on-the-ground&lt;/em&gt; conflicts going on, cyberspace is a theatre of war with hardly any distinction between military and civilian targets. Nothing is &lt;em&gt;off-limits&lt;/em&gt; and combatants can be anything from creative individuals to well-funded &lt;em&gt;state level actors&lt;/em&gt; like governments and &lt;a href=&#34;https://www.hackread.com/microsoft-sued-stolen-dark-web-credentials/&#34;&gt;multi-national corporations&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;There&amp;rsquo;s no way to be perfectly out-of-the-way. Any significant cluster of data, storage, computing power, or bandwidth can become a strategic resource to be sought after. When it comes to hacks, many cybersecurity professionals will say that &lt;strong&gt;it&amp;rsquo;s a matter of when, not if.&lt;/strong&gt; This means that the goal of the technocratic empires to centrally control data on everyone&amp;hellip; everything&amp;hellip; everywhere, backfires when &lt;em&gt;resilience&lt;/em&gt; starts to become critically important.&lt;/p&gt;
&lt;h2 id=&#34;what-makes-you-a-target&#34;&gt;What makes you a target?&lt;/h2&gt;
&lt;p&gt;You may not be interested in cyberwar, but it has ways of being interested in you. For many governments, dissenting narratives are themselves considered a threat. The &lt;a href=&#34;https://www.corbettreport.com/are-you-prepared-for-the-infodemic/&#34;&gt;infodemic&lt;/a&gt; narrative allows funding intended for protecting critical infrastructure from hacks, to be used to &lt;a href=&#34;https://www.vice.com/en/article/dy33vx/night-fury-documents-detail-dhs-project-to-give-risk-scores-to-social-media-users&#34;&gt;classify citizens&lt;/a&gt; or &lt;a href=&#34;https://twitter.com/MikeBenzCyber/status/1633219240575610881#m&#34;&gt;censor your speech&lt;/a&gt;. If only it stopped there, law-enforcement and intelligence agencies often make use of &lt;a href=&#34;https://news.yahoo.com/canada-national-police-force-admits-110537329.html?fr=sycsrp_catchall&#34;&gt;malware themselves&lt;/a&gt; to invade people&amp;rsquo;s devices with dubious oversight.&lt;/p&gt;
&lt;p&gt;This is where your participation really matters. Propping up systems of control only raise the risk for yourself and others around you. It may not be a big deal when yet another company has a massive data breach, but it&amp;rsquo;s a whole other matter when it&amp;rsquo;s a treasure-trove of data the state has been collecting on everyone.&lt;/p&gt;
&lt;p&gt;I hope that this would encourage democracies worldwide to shift from control and domination to education and innovation. By treating citizens as &lt;em&gt;just another target&lt;/em&gt; you give up the most important strategic advantage: resilience.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;You cannot invade mainland United States. There would be a rifle behind each blade of grass.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;The best way to properly mitigate risk is to properly diffuse it. Avoiding systems that unnecessarily introduce risk would go a long way too. We don&amp;rsquo;t just need people to have computer skills, but we need to implement better tools and methods for many aspects of cyberspace. Allowing tyrants to seize power over cyberspace &lt;em&gt;for your safety&lt;/em&gt; merely replaces small solvable problems with a single massive one.&lt;/p&gt;
&lt;p&gt;With all this in mind, even as a non-combattant, it&amp;rsquo;s important to understand the battlefield and what you can do. There is a lot to understand even if you have no desire to ever hack anyone. Taking your own privacy, security and systems seriously can go a long way.&lt;/p&gt;
&lt;h1 id=&#34;cyberwarfare&#34;&gt;Cyberwarfare&lt;/h1&gt;
&lt;p&gt;Keeping digital systems safe from intrusion requires active vigilance. Whether it&amp;rsquo;s your social media accounts, company software, or critical infrastructure, a great deal of proactive work is required to prevent or mitigate problems. The challenge is that the defense has to get lucky every time, whereas the attackers only need to get lucky once.&lt;/p&gt;
&lt;p&gt;A serious problem is that various exploits can be &lt;em&gt;chained together&lt;/em&gt; allowing for more sophisticated attacks to take place. To complicate matters, &lt;em&gt;the Internet never forgets&lt;/em&gt;. Data that has been seized or leaked can be weaponized forever. This is why the top-down strategy of the state and corporations data-mining and manipulating the public is a terribly poor strategy for cyber resilience.&lt;/p&gt;
&lt;h2 id=&#34;social-engineering&#34;&gt;Social Engineering&lt;/h2&gt;
&lt;p&gt;We are all human after all. Ignorance is a problem, but so can an occasional act of carelessness. The point isn&amp;rsquo;t to beat yourself up over every mistake, but to take incidents seriously enough to learn from them before they can be a bigger problem.&lt;/p&gt;
&lt;p&gt;It has been often said &lt;em&gt;the people are the weakest link&lt;/em&gt;. If such an individual is known, it can sometimes be much easier to manipulate a person with access, rather than the system directly. This gets much worse when everyone is under constant surveillance by a variety of different entities. Suddenly, a one-off cloud account hack can be a springboard for other intrusions.&lt;/p&gt;
&lt;h3 id=&#34;phishing&#34;&gt;Phishing&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://www.phishing.org/what-is-phishing&#34;&gt;Phishing&lt;/a&gt; is worth it&amp;rsquo;s own post.&lt;br&gt;
There are many different ways it can be carried out:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;E-mail:&lt;/strong&gt; one kind of attack is an urgent email that requires you to immediately click a certain link. That link will then present a fake log-in form disguised as a legitimate site. This could be used to steal your credentials. If the site itself has a vulnerability, merely clicking the link itself could be enough to compromise your account.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Attachments&lt;/strong&gt; any file sent your way may be more than meets the eye. There are a variety of methods that allow a file that&amp;rsquo;s opened to either run as a virus, or send your data elsewhere.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;None of this is exclusive to e-mail&lt;/em&gt;.&lt;br&gt;
Messaging apps, and online communities can all enable the same problems.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/tott-4.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-4/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #4 Online Identity&lt;/h2&gt;&lt;i&gt;What is following you in your digital tracks?&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h3 id=&#34;impersonation&#34;&gt;Impersonation&lt;/h3&gt;
&lt;p&gt;Thanks to a variety of voice cloning tools, impersonation is a significant risk. There are already many scams where someone receives a call from someone who sounds like their loved one asking for urgent financial assistance. The biggest risk from impersonation is not just manipulation of your loved ones, but it also makes the risk of identity theft more potent.&lt;/p&gt;
&lt;h2 id=&#34;malware&#34;&gt;Malware&lt;/h2&gt;
&lt;p&gt;Malware is a bit of software that allows the attacker to either infiltrate or take control of particular systems. Sometimes it&amp;rsquo;s for mining cryptocurrency, stealing data, or more nefarious ends. Not only are cybercriminals making use of malware, but &lt;a href=&#34;https://www.corbettreport.com/beyond-pegasus-the-bigger-picture-of-israeli-cyber-spying/&#34;&gt;governments too&lt;/a&gt;.&lt;/p&gt;
&lt;h3 id=&#34;remote-execution&#34;&gt;Remote execution&lt;/h3&gt;
&lt;p&gt;Usually the first thing a sophisticated attacker wants over their target is the ability to execute a &lt;em&gt;payload&lt;/em&gt; on the target&amp;rsquo;s system. The payload is additional instructions or programs such as more malware.&lt;/p&gt;
&lt;h3 id=&#34;privilege-escalation&#34;&gt;Privilege escalation&lt;/h3&gt;
&lt;p&gt;It&amp;rsquo;s bad enough to have a computer virus on your system, but often these programs will have techniques to give themselves more access over the system. This can include things like acting as your computer&amp;rsquo;s administrator, or gaining access to control over services hosted on a server.&lt;/p&gt;
&lt;h3 id=&#34;botnets&#34;&gt;Botnets&lt;/h3&gt;
&lt;p&gt;When an attacker has control over many systems, they can be used as a &lt;em&gt;botnet&lt;/em&gt;. A massive swarm of infected systems can be used for &lt;a href=&#34;https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/&#34;&gt;DDOS attacks&lt;/a&gt; or merely act as remote storage and proxy for attackers. By proxying their attacks, attackers can quite effectively disguise their origin.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/lsn-banner.webp)&#34; &gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://hiddencomplexity.substack.com/p/from-espionage-to-warfare-cyber-war&#34;  &gt;&lt;h2&gt;From Espionage to Warfare - Cyber war grows&lt;/h2&gt;&lt;i&gt;Slow death of privacy&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h2 id=&#34;vulnerabilities&#34;&gt;Vulnerabilities&lt;/h2&gt;
&lt;p&gt;Believe it or not, machines aren&amp;rsquo;t perfect either! Software development is &lt;em&gt;complicated&lt;/em&gt; and computer engineering is even more so. From either simple mistakes or lack of forethought problems pile up over the course of development. From time and resource constraints hardly any product is perfect. Many large software projects will routinely release updates to fix vulnerabilities so updating is important.&lt;/p&gt;
&lt;h3 id=&#34;0-days&#34;&gt;0 days&lt;/h3&gt;
&lt;p&gt;&amp;ldquo;0 days&amp;rdquo; are a term for very valuable exploits that are presumed to be unknown to the developer/manufacturer at a given moment in time. This means that there&amp;rsquo;s likely not a security fix coming for some time. 0 days can be be minor or quite critical. A major bug in a browser could potentially be part of a 0day that gives a malicious website access to your system. The most important take-away about 0days is that while software may be secure when working as intended, there can be circumstances where it isn&amp;rsquo;t.&lt;/p&gt;
&lt;h3 id=&#34;supply-chain-attacks&#34;&gt;Supply-chain attacks&lt;/h3&gt;
&lt;p&gt;Especially in the cases where a vulnerability is introduced in production. Software is often built on other software called libraries, and hardware is generally built with components from other suppliers. This creates an opportunity for malicious actors to introduce problems in the creation of particular software or systems. Because many projects will often use the same components or libraries, this kind of attack can impact a wide variety of targets.&lt;/p&gt;
&lt;h3 id=&#34;backdoors&#34;&gt;Backdoors&lt;/h3&gt;
&lt;p&gt;More and more governments around the world are &lt;a href=&#34;https://libresolutions.network/articles/coordinated-attack/&#34;&gt;working to undermine&lt;/a&gt; end-to-end encryption and online privacy. Intrusions do not end at demanding access to everyone&amp;rsquo;s intimate conversations. Often governments and law-enforcement will ask for a vulnerability to be introduced to the &lt;a href=&#34;https://www.eff.org/deeplinks/2018/04/fbi-could-have-gotten-san-bernardino-shooters-iphone-leadership-didnt-say&#34;&gt;product itself.&lt;/a&gt; This is the worst-case-scenario because it&amp;rsquo;s a guarantee that such a valuable key would be discovered, stolen or abused.&lt;/p&gt;
&lt;h2 id=&#34;ransomware&#34;&gt;Ransomware&lt;/h2&gt;
&lt;p&gt;A particularly nasty kind of malware is &lt;em&gt;ransomware&lt;/em&gt;. The gambit is that the virus encrypts all the infected system&amp;rsquo;s files and &lt;a href=&#34;https://thehackernews.com/2023/06/lockbit-ransomware-extorts-91-million.html&#34;&gt;demands a payment in cryptocurrency.&lt;/a&gt; Not only is everything unaccessible, but often the software will overwrite &lt;em&gt;everything the system has access to&lt;/em&gt; potentially taking out entire enterprises. The &lt;em&gt;only&lt;/em&gt; protection from ransomware is regular offline backups. May be a good reason to start sharing copies of your critical backups with trusted friends or family. Otherwise, you may end up with a particularly painful, or expensive lesson.&lt;/p&gt;
&lt;h2 id=&#34;consequences&#34;&gt;Consequences&lt;/h2&gt;
&lt;p&gt;As geopolitical conflicts continue, and attackers gain more ground, I would say there has never been a time where it has been more important to take control of your information. Demanding analogue or offline ways of interacting with important institutions is a must.&lt;/p&gt;
&lt;p&gt;There is a significant push to digitize national currencies, and identity documents. One has to wonder if the escalation of state-funded cyber threats has less to do with strategic objectives, or rather creating a &lt;em&gt;pretext&lt;/em&gt; to force citizens to surrender more information and control to less-and-less accountable institutions.&lt;/p&gt;
&lt;p&gt;Governments and institutions are quickly rushing to orchestrate a top-down solution and handing over more influence to &lt;em&gt;public-private partnerships&lt;/em&gt;. The &amp;ldquo;stakeholders&amp;rdquo; for these partnerships won&amp;rsquo;t be representing your needs or your interests, but rather the influences over those entities.&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s very concerning to see soft-power projection taking control over people&amp;rsquo;s lives. In his show &lt;a href=&#34;https://rumble.com/c/liamsturgess&#34;&gt;MicroJourneys&lt;/a&gt; Liam Sturgess discusses how these public-private partnerships respond to these threats, and opens the door to discussing the implications.&lt;/p&gt;
&lt;p&gt;It is becoming hard to see where state power ends and corporate interests begin, and where they overlap. If the last few years is any indication, we can be sure that any additional power granted to these institutions inevitably leads to politicization, abuse, and weaponization. We are all responsible for how we enable governments, civil society organizations, and corporations to &lt;a href=&#34;https://www.corbettreport.com/bracing-for-cyber-911/&#34;&gt;undermine our freedom, rights, and security.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;There will never be any guarantee that centrally managed services can be safeguarded properly. The only way to protect information, and the people who&amp;rsquo;s safety depends on it, is not to record it at all. If it &lt;em&gt;must be recorded&lt;/em&gt; than measures need to be taken to ensure it is not widely-shared. Sovereign computing needs to be less of a buzzword and more of a foundation for how we build, maintain, and interact with digital systems.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Operation: Beehive</title>
		<link>https://libresolutions.network/operations/beehive/</link>
		<pubDate>Wed, 07 Jun 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/operations/beehive/</guid>
		
		<image>https://libresolutions.network//media/images/honeycomb.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/honeycomb.webp" />
		<itunes:image href="https://libresolutions.network//media/images/honeycomb.webp" />
		<description>A model for highly productive decentralized work.</description>
		<content:encoded>&lt;p&gt;Bottom-up, decentralized, and &lt;em&gt;permissionless&lt;/em&gt; strategies are at a premium. With the tools available to us, people from all walks of life are able to cooperate on incredible projects. Instead of relying on a tyrannical pharaoh&amp;rsquo;s vision for some great project, people can make their own public goods. We don&amp;rsquo;t &lt;em&gt;need&lt;/em&gt; to be bigger or more powerful than large institutions to do incredible things. In many cases, it merely takes some creativity and diligent work.&lt;/p&gt;
&lt;p&gt;There is much work to be done. Many important projects are unable to attain necessary funding or the volunteers to make it work. While it would be nice if we could merely come together and &lt;em&gt;bankroll&lt;/em&gt; these projects, in some cases it may be efficient to reorganize the work itself. By being better able to manage large projects to &lt;em&gt;parallelize&lt;/em&gt; work, we can gain efficiency in ways that are difficult to stop.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Many hands make light work.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Have you ever wanted to contribute to a project and been stuck trying to figure out how? Have there been times would you have just liked to &lt;em&gt;get started right away&lt;/em&gt; to get a feel for what&amp;rsquo;s involved? Often people don&amp;rsquo;t know where to start, which allows big tech platforms to herd people into controlled environments.&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s time to think like little worker bees. Some go out and gather &lt;em&gt;information&lt;/em&gt; for a project. Others, will take the information and &lt;em&gt;process&lt;/em&gt; it into reusable chunks. These chunks can be assembled to valuable works. With even moderate success, we&amp;rsquo;ll be overflowing with tasty honey. People vastly underestimate what could be accomplished if we merely found ways to properly &lt;em&gt;parallelize&lt;/em&gt; large tasks.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://youtu.be/qUYkRWGWntE&#34;&gt;Rebecca Miller-Webster gives an excellent talk about this&lt;/a&gt;.&lt;br&gt;
Remember! You don&amp;rsquo;t have to use GitHub to use git!&lt;/p&gt;
&lt;h2 id=&#34;the-worker-bee&#34;&gt;The worker bee&lt;/h2&gt;
&lt;p&gt;Are you ready to be a humble worker bee? With some consistent effort, you and other worker bees can start making delicious information &lt;em&gt;honey&lt;/em&gt;. Honey is sweet, there are different kinds of honey. The choice is yours, on what particular kinds you&amp;rsquo;re interested in making.&lt;/p&gt;
&lt;p&gt;Every good worker bee needs the ability to contribute to the hive. A beehive is a &lt;em&gt;git repository&lt;/em&gt; The repository stores all the information, metadata and history about the project. What&amp;rsquo;s phenomenal about this is that unlike actual beehives, in the case of a disaster you can pick up and start where another hive left off.&lt;/p&gt;
&lt;p&gt;You&amp;rsquo;re going to want to be familiar with &lt;a href=&#34;https://www.freecodecamp.org/news/git-and-github-for-beginners/&#34;&gt;how to use git&lt;/a&gt;. Git is an incredibly powerful tool that allows project changes to be managed from many sources. Imagine, that in the beehive (git repository) you and the other worker bees produce cells (commits) that the beekeeper decides to include in the hive.&lt;/p&gt;
&lt;p&gt;What&amp;rsquo;s excellent about using git is that you can still use many of the same tools you want to use to edit your files. There are also some excellent text editors that integrate git into them so that working with git can be almost effortless.&lt;/p&gt;
&lt;h3 id=&#34;principles&#34;&gt;Principles&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Division of labor&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Everyone has special talents, we should maximize people&amp;rsquo;s ability to contribute without hassle.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Efficiency&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;🐝 Beecome allergic to &lt;em&gt;re-inventing the wheel&lt;/em&gt;.
Wherever possible, avoid people having to do the same thing over again.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Robustness&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Work should always be in a usable state to avoid waste.&lt;br&gt;
Using &lt;a href=&#34;https://control.com/technical-articles/machine-readable-vs-human-readable-data/&#34;&gt;machine readable&lt;/a&gt; formats can help with that.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h3 id=&#34;goals&#34;&gt;Goals&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Decentralized projects&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Often times, there are multiple uses for the same information.&lt;br&gt;
Different groups may want to use it in slightly different ways.&lt;br&gt;
Public repositories allow this to be done without starting from scratch.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Friction-less participation&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Allowing work to begin without permission allows people to start without coordination.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Censorship resistance&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;With strategic use of these tools, critical projects can continue despite immense censorship and pressure.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;advantages&#34;&gt;Advantages&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Collaboration&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;By managing changes directly, you can eliminate a lot of the work involved with coordination. In a well-documented project, volunteers can help get other volunteers started.&lt;/p&gt;
&lt;p&gt;There is a wide range of possibilities for what kind of access control you want. You can have a small group of trusted participants, or allow the entire world to have access and have people approve changes.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Automated workflows&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;By using source files, and a deterministic process, you can have information transformed into a variety of formats automatically when changes are made. These formats could be websites, books, or other materials.&lt;/p&gt;
&lt;p&gt;You can see this in action in a presentation given to the &lt;a href=&#34;https://metaprepeducation.locals.com/post/4064502/introduction-to-git-with-gabriel&#34;&gt;MetaPrep Education&lt;/a&gt; community.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Version control&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Being able to revert to a previous project state is quite useful, especially in instances where you&amp;rsquo;d like to pick up where another project left off.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;h2 id=&#34;examples-of-beehive-projects&#34;&gt;Examples of Beehive projects&lt;/h2&gt;
&lt;p&gt;This is not a mere hypothetical, there are &lt;em&gt;real&lt;/em&gt; decentralized projects making use of this strategy already. While they&amp;rsquo;re largely focused on technology and privacy, the same model could quite easily be applied to many different areas in life. These projects are excellent resources themselves. What makes them incredibly powerful is that with a little bit of knowledge, anyone can contribute to improve the project.&lt;/p&gt;
&lt;h3 id=&#34;go-foss&#34;&gt;Go FOSS&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://gofoss.net/&#34;&gt;https://gofoss.net/&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;a href=&#34;https://gofoss.net/&#34;&gt;gofoss.net&lt;/a&gt; is a free and open source guide to online privacy, data ownership and durable technology. The project was launched in 2020 by a small team of volunteers, and is 100% non-profit – no ads, no tracking, no sponsored content, no affiliates.&lt;/p&gt;
&lt;p&gt;We deplore that many tech companies generate profits at the expense of user privacy. We are increasingly concerned about governments intruding into the private sphere of citizens. And we see an urgent need for action to lower the environmental impact of technology.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://gofoss.net/&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/gofoss.webp&#39; 
&gt;

&lt;/a&gt;



&lt;/div&gt;
&lt;h3 id=&#34;online-spyware-watchdog&#34;&gt;Online Spyware Watchdog&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://spyware.neocities.org/&#34;&gt;https://spyware.neocities.org/&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;The goal of this website is to classify spyware programs, so that users can be more aware that they are installing spyware.&lt;/p&gt;
&lt;p&gt;Many &amp;ldquo;everyday&amp;rdquo; applications are actually spyware. We take an expansive and strict stance on what constitutes spyware. We define spyware as anything that includes telemetry, phoning home, automatic updates or is listening in without the user&amp;rsquo;s knowledge or consent.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://spyware.neocities.org/&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/watchdog.webp&#39; 
&gt;

&lt;/a&gt;



&lt;/div&gt;
&lt;h3 id=&#34;prism-break&#34;&gt;PRISM BREAK&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://prism-break.org/en/&#34;&gt;https://prism-break.org/en/&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Help make mass surveillance of entire populations uneconomical! We all have a right to privacy, which you can exercise today by encrypting your communications and ending your reliance on proprietary services.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://prism-break.org/en/&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/prismbreak.webp&#39; 
&gt;

&lt;/a&gt;



&lt;/div&gt;
&lt;h3 id=&#34;switching-software&#34;&gt;Switching Software&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://switching.software/&#34;&gt;https://switching.software/&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;a href=&#34;https://switching.software/&#34;&gt;switching.software&lt;/a&gt; is a grassroots website, that is trying to let people know about ethical and easy-to-use alternatives to well-known websites, apps and other software.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://switching.software/&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/switchingsoftware.webp&#39; 
&gt;

&lt;/a&gt;



&lt;/div&gt;
&lt;h3 id=&#34;privacy-guides&#34;&gt;Privacy Guides&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://www.privacyguides.org/en/&#34;&gt;https://www.privacyguides.org/en/&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Privacy Guides is a socially motivated website that provides information for protecting your data security and privacy. Our mission is to inform the public about the value of digital privacy, and global government initiatives which aim to monitor your online activity. We are a non-profit collective operated entirely by volunteer team members and contributors. Our website is free of advertisements and not affiliated with any of the listed providers.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://www.privacyguides.org/en/&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/privacyguides.webp&#39; 
&gt;

&lt;/a&gt;



&lt;/div&gt;
&lt;h3 id=&#34;awesome--delightful-lists&#34;&gt;Awesome / Delightful Lists&lt;/h3&gt;
&lt;p&gt;Lists like these are excellent resources for finding curated and detailed information. These are very often more useful than search engines, which will very often point you to a few sponsored results.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/sindresorhus/awesome&#34;&gt;https://github.com/sindresorhus/awesome&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://codeberg.org/teaserbot-labs/delightful&#34;&gt;https://codeberg.org/teaserbot-labs/delightful&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Publishing your own lists and indexes is a very powerful thing indeed.
It can be as simple as a text file, or a fully-featured search-enabled site. No matter what, the content is able to stand on it&amp;rsquo;s own and can be freely shared.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;understanding-the-method&#34;&gt;Understanding the method&lt;/h2&gt;
&lt;p&gt;FreeCodeCamp.org has an excellent &lt;a href=&#34;https://youtu.be/RGOj5yH7evk&#34;&gt;Crash Course&lt;/a&gt; on git for beginners.&lt;/p&gt;
&lt;h3 id=&#34;example-filling-a-large-spreadsheet&#34;&gt;Example: Filling a large spreadsheet&lt;/h3&gt;
&lt;p&gt;Suppose you have a very large spreadsheet that has links to check for information, which then needs to be filled out into columns. With only a few rows, this can be quite manageable, but when there&amp;rsquo;s thousands it can become difficult for even a team of people.&lt;/p&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Link&lt;/th&gt;
          &lt;th&gt;Model #&lt;/th&gt;
          &lt;th&gt;Price&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;example.com/1&lt;/td&gt;
          &lt;td&gt;Type 1&lt;/td&gt;
          &lt;td&gt;$5,500&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;example.com/2&lt;/td&gt;
          &lt;td&gt;Type 2&lt;/td&gt;
          &lt;td&gt;$6,450&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;example.com/3&lt;/td&gt;
          &lt;td&gt;&lt;/td&gt;
          &lt;td&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&amp;hellip;&lt;/td&gt;
          &lt;td&gt;&lt;/td&gt;
          &lt;td&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;example.com/1230532&lt;/td&gt;
          &lt;td&gt;&lt;/td&gt;
          &lt;td&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&amp;hellip;&lt;/td&gt;
          &lt;td&gt;&lt;/td&gt;
          &lt;td&gt;&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Instead of trying to sync a massive spreadsheet with hundreds of volunteers, making coordination quite difficult, you decide to try to use &lt;code&gt;git&lt;/code&gt; to allow for parallel changes.&lt;/p&gt;
&lt;p&gt;The first step would be to turn the massive spreadsheet into a &lt;code&gt;.csv&lt;/code&gt; file, so that it can be edited in pure text, without worrying about which tools people are using. This allows your volunteers to contribute even if they don&amp;rsquo;t use the same software as you.&lt;br&gt;
It would look something like this:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;Link,Model #,Price
example.com/1,Type 1,5500
example.com/2,Type 2,6450
example.com/3
example.com/4
...
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;The goal here is to have volunteers submit their changes as quickly as possible in a way that&amp;rsquo;s easy to manage. So that there isn&amp;rsquo;t any duplication the project is hosted on a &lt;strong&gt;forge&lt;/strong&gt;. A forge is an online site that hosts git repositories. For simplicity, in this example we will use GitHub.&lt;/p&gt;
&lt;p&gt;The project maintainer creates a new &lt;strong&gt;git repository&lt;/strong&gt; on github, then adds the &lt;code&gt;.csv&lt;/code&gt; file. A simple procedure would be to encourage volunteers to start at a random item # to further avoid duplicate work. I&amp;rsquo;ll explain what a potential contributor would need to do in this instance.&lt;/p&gt;
&lt;h4 id=&#34;the-worker-bee-1&#34;&gt;The worker bee&lt;/h4&gt;
&lt;p&gt;Volunteers will &lt;code&gt;clone&lt;/code&gt; the repository. This allows them to download the &lt;code&gt;.csv&lt;/code&gt; file and all previous changes that have been approved. The volunteer can then start opening the links and adding the information to their &lt;code&gt;.csv&lt;/code&gt; file.&lt;br&gt;
For example:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;Link,Model #,Price
...
example.com/15,Type 15,7500
example.com/16,Type 16,3225
example.com/17,Type 17,4605
example.com/18,Type 18,8420
...
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;The advantage of using git here is that it &lt;em&gt;manages the changes&lt;/em&gt;. The volunteer can send this .csv directly to the project maintainer, or use the &lt;em&gt;pull request&lt;/em&gt; feature to ask the maintainer to incorporate their changes.&lt;/p&gt;
&lt;h3 id=&#34;alternatives&#34;&gt;Alternatives&lt;/h3&gt;
&lt;p&gt;The &lt;em&gt;vision&lt;/em&gt; behind operation beehive is decentralized permission-less work. This is not limited go tools like &lt;code&gt;git&lt;/code&gt;. In fact, any wiki with open registrations would work quite well as well. The important features are that you work in an open and deterministic way, that makes it easier for people to carry on.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Has the technocracy already assimilated you?</title>
		<link>https://libresolutions.network/articles/technocratic-assimilation/</link>
		<pubDate>Mon, 29 May 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/technocratic-assimilation/</guid>
		
		<image>https://libresolutions.network//media/images/dystopia.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/dystopia.webp" />
		<itunes:image href="https://libresolutions.network//media/images/dystopia.webp" />
		<description>Where does the balance of power lie within your life?</description>
		<content:encoded>&lt;p&gt;The technocracy is a managerialist top-down system of control with no accountability towards it&amp;rsquo;s subjects. From the perspective of the system&amp;rsquo;s owners, the subjects are at best livestock to be harvested and the worst is far too horrible to imagine. Such a cruel and deranged system seems quite alien to most people, despite often living it out in their own daily lives. Regardless of what disagreements divide people, far more are united under subservience to technological tyranny.&lt;/p&gt;
&lt;p&gt;But surely you&amp;rsquo;re immune to this? You&amp;rsquo;ve recoiled in horror at many recent developments, turning that disgust into productive action to work towards a better future right? Sadly, we know all-too-well that there&amp;rsquo;s always more work to be done. It&amp;rsquo;s a never-ending, thankless toil that merely begets more challenges and more frustration. It&amp;rsquo;s become quite clear to you that merely seeing through the lies alone is not enough to manifest change.&lt;/p&gt;
&lt;h2 id=&#34;technological-terror&#34;&gt;Technological Terror&lt;/h2&gt;
&lt;p&gt;The &amp;ldquo;&lt;em&gt;Internet of Things&lt;/em&gt;&amp;rdquo;, and cloud services all work well to centralize information and control into a small set of hands. With innumerable opportunities for abuse, these systems create dangers that can be quite difficult to identify once one has become a captive. Restrictions can often be &lt;em&gt;out of sight, and out of mind&lt;/em&gt;. &lt;em&gt;Convenience&lt;/em&gt; is often a derogatory term for pragmatic choices people are nudged into making.&lt;/p&gt;
&lt;h3 id=&#34;on-demand&#34;&gt;On-demand&lt;/h3&gt;
&lt;p&gt;With a couple of taps nearly anything can be at your door in a relatively short period of time. Instant gratification of all manner of pleasures is only restrained by your budget or appetite. Cheap pleasure erodes away people&amp;rsquo;s ability to appreciate joy in the simple things. While some things are now more accessible, many people fall into the trap of losing control of their own agency. What was once a convenient take-out treat can be a vulnerable person&amp;rsquo;s go-to-meal.&lt;/p&gt;
&lt;h3 id=&#34;data-serfdom&#34;&gt;Data serfdom&lt;/h3&gt;
&lt;p&gt;Many online services can help people start projects quickly. Those projects can be locked-in to formats that can be difficult to reproduce other places. Regaining control of your media and source files can be a massive challenge when one works entirely within online cloud services instead of programs running on their own machine.&lt;/p&gt;
&lt;h3 id=&#34;junkification&#34;&gt;Junkification&lt;/h3&gt;
&lt;p&gt;As bad as the software can be, often the hardware isn&amp;rsquo;t much better. Devices can constrain the user from installing or removing software, they can also take on surveillance directly. Despite much progress, the complexity of these devices often makes them too difficult or too expensive to pragmatically repair. When devices no longer receive security updates, it may not be safe to use them much longer anyways. &lt;em&gt;Planned obsolescence&lt;/em&gt; is just part of the picture, a variety of awful incentives can create unusable devices from the very beginning. This is especially true of devices that are reliant on online services.&lt;/p&gt;
&lt;h2 id=&#34;hacking-humans&#34;&gt;Hacking humans&lt;/h2&gt;
&lt;p&gt;Power in society has always been some combination of resources, force and influence. These factors create powerful incentives that have a massive impact on people&amp;rsquo;s behavior. The more extreme the power, the more overt it would become, sometimes formalizing into official structures. In some instances, people would consciously decide to act in defiance or opposition to such rule for a variety of reasons. In the information age, power doesn&amp;rsquo;t need to be so crude, it can disguise itself with all kinds of illusions.&lt;/p&gt;
&lt;p&gt;Information Asymmetry allows those with power to act in ways others may not even be able to predict. Censorship, surveillance, and propaganda are all powerful tools used to coerce people into a variety of losing bets. Over time, the distortions created by the powerful can fade into the background and become unthinkable to even notice.&lt;/p&gt;
&lt;h3 id=&#34;algorithmic-feeds&#34;&gt;Algorithmic Feeds&lt;/h3&gt;
&lt;p&gt;Being able to control what others see is a phenomenal power, having influence over it is quite a valuable currency. The advertizing industry built very sophisticated tools to monitor and manipulate people in precise ways. Far from being limited to mere novelty, these techniques were used to sell &lt;em&gt;ideas and emotions&lt;/em&gt;. Through advanced marketing tools people&amp;rsquo;s very minds became yet another natural resource to become polluted. Instead of the hazards being toxic chemicals, the ideal consumer was forged in an overwhelming foundry of fear.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Fear leads to anger&amp;hellip;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h4 id=&#34;impotent-outrage&#34;&gt;Impotent outrage&lt;/h4&gt;
&lt;p&gt;It is well understood that triggering people&amp;rsquo;s fight or flight response will get decisive action. Bathing the public in their insecurities became a very effective way to drive people to buy or promote things without thinking. These rash actions would inevitably create negative consequences, buyer&amp;rsquo;s remorse would be greeted with familiar temptations. As people&amp;rsquo;s relations with each other soured, the onset loneliness would drive people further and further into anger and sadness.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&amp;hellip;Anger leads to hate.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h4 id=&#34;radicalization&#34;&gt;Radicalization&lt;/h4&gt;
&lt;p&gt;As tempers flared, something needed to take the fall. The true (and often self-inflicted) causes of people&amp;rsquo;s suffering was far too difficult to face, instead people tore into each other. It&amp;rsquo;s far easier to get cheap satisfaction over another than to address one&amp;rsquo;s own problems. Perceived slights escalate into violent outbursts. With no shortage of justified rage, people lose sight of the humanity in each other.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&amp;hellip;and hate leads to suffering.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h4 id=&#34;tragedy&#34;&gt;Tragedy&lt;/h4&gt;
&lt;p&gt;It didn&amp;rsquo;t take much for people to eye-for-an-eye themselves into a very blind world. Not only can people not see what&amp;rsquo;s right before them, but they can hardly hear those around them either. Instead, people instantly react to the quickest impression they can form to a particular post, comment, or piece of media. Nobody feels heard, and all feel forgotten. The wounds from past battles accumulate as the war on all rages on.&lt;/p&gt;
&lt;p&gt;Those with any sense flee to what few alternatives existed, or retreated entirely. The digital nomads roaming cyberspace are scattered. They can see the fires from a distance, but they would often dissipate before getting close. Many were able to purchase peace at the price of solitude and isolation.&lt;/p&gt;
&lt;h2 id=&#34;checkup&#34;&gt;Checkup&lt;/h2&gt;
&lt;p&gt;Every &lt;em&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/em&gt; answer to the following questions is something that gives the technocracy leverage over you. Nobody is completely invulnerable. When engaging with others, it&amp;rsquo;s important to encourage each other to make positive change, rather than nit-pick various shortcomings. Flaws should be an opportunity to learn how to overcome challenges, rather than a cause for scorn.&lt;/p&gt;
&lt;h3 id=&#34;finance&#34;&gt;Finance&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Are the majority of your purchases made via credit card?&lt;/li&gt;
&lt;li&gt;Are you unable to get your essentials from locally owned enterprises.&lt;/li&gt;
&lt;li&gt;Would you willingly &amp;ldquo;sell out&amp;rdquo; for money or career advancement, regardless of the impacts on others?&lt;/li&gt;
&lt;li&gt;Are you living paycheck-to-paycheck?&lt;/li&gt;
&lt;li&gt;Do you feel pressure to &amp;ldquo;make-up&amp;rdquo; for lost time?&lt;/li&gt;
&lt;li&gt;Are your financial assets solely comprised of publicly-traded corporations and government bonds?&lt;/li&gt;
&lt;li&gt;Is your income derived from government funding?&lt;/li&gt;
&lt;li&gt;Are you constantly exposed to advertizing or sponsored promotions?&lt;/li&gt;
&lt;li&gt;Would you be unable to trade for essentials without currency?&lt;/li&gt;
&lt;li&gt;Are you inefficient with your time?&lt;/li&gt;
&lt;li&gt;Can you name 5 brands, but not 5 kinds of trees native to your area?&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;technology&#34;&gt;Technology&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Would you be unable to go a day without your smartphone, and still be productive?&lt;/li&gt;
&lt;li&gt;Does most of your computing take place using commercialized online services rather than offline programs?&lt;/li&gt;
&lt;li&gt;Does your operating system record data on you?&lt;/li&gt;
&lt;li&gt;Do you own a &amp;ldquo;Internet of Things&amp;rdquo; device like a smart TV or smart appliance?&lt;/li&gt;
&lt;li&gt;Are search engines your only means of finding specific information?&lt;/li&gt;
&lt;li&gt;If the Internet went down, could you still earn a living?&lt;/li&gt;
&lt;li&gt;Is a majority of your entertainment derived from online services?&lt;/li&gt;
&lt;li&gt;Would you be unable to do your regular errands without GPS or online-assisted navigation?&lt;/li&gt;
&lt;li&gt;Is your profession reliant on cloud services or other proprietary enterprise software?&lt;/li&gt;
&lt;li&gt;Would you be unable to teach a child math, art, or other skills without assistance of the Internet?&lt;/li&gt;
&lt;li&gt;Does your transportation require you to divulge personal information?&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;alright-alright-now-what&#34;&gt;Alright! Alright! Now what?&lt;/h2&gt;
&lt;p&gt;Before you despair too much, understand that this isn&amp;rsquo;t a single person&amp;rsquo;s journey. To varying degrees, we are all captivated by forces either entirely outside of our control, or simply the consequences of decisions we&amp;rsquo;ve made in the past. With few exceptions, almost nobody has managed to entirely wild themselves from the world. Perhaps this isn&amp;rsquo;t inherently a bad thing. Ideally, in a fair and just society people &lt;em&gt;would want to have a &lt;strong&gt;stake&lt;/strong&gt; in it&lt;/em&gt;.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Society grows great when people plant trees whose shade they shall never enjoy.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;No single person has the power to unilaterally transform it all, but every one of us has the capacity to redirect our focus, resources and spirit in a different direction. Have compassion for your own shortcomings as well as those of others. If we truly want to make a lasting improvement instead of merely pledging support to the same leaders in different uniforms, we&amp;rsquo;re going to need to &lt;em&gt;change the game itself&lt;/em&gt;. To do this, we&amp;rsquo;ll need to understand what we&amp;rsquo;re trying to navigate away from, which can help prevent us from forgetting what we&amp;rsquo;re working towards.&lt;/p&gt;
&lt;h3 id=&#34;rewilding-ourselves&#34;&gt;Rewilding ourselves&lt;/h3&gt;
&lt;p&gt;Society domesticates people. This isn&amp;rsquo;t inherently a bad thing, as trust grows people are naturally able to lower some defenses. The trouble comes when tyrants or opportunists decide to abuse that trust, rapidly diminishing it and harming those who haven&amp;rsquo;t yet raised their own defenses. Then those who are the most trusting are hurt the most, and those who are the most guarded can often endure.&lt;/p&gt;
&lt;p&gt;Becoming wild again doesn&amp;rsquo;t mean becoming aggressive or cruel, merely gradually rebuilding your individual and social boundaries that have been eroded over time. Empowering yourself to be stronger, more skilled, or efficient can go a long way to rebuilding that independence. Though it&amp;rsquo;s important to remember that we are social creatures, we need friends, allies, and family all the same.&lt;/p&gt;
&lt;p&gt;By making yourself wild from systems of control, you can help build independence from it that builds room for others to do the same. This is an entirely different path than merely reforming society as it exists. Instead you are taking as much control of your life as you can, and working to build something entirely different. Taking deliberate action to become wild is to embrace a world where every choice is your own.&lt;/p&gt;
&lt;p&gt;To do this, you&amp;rsquo;ll need to make a conscious decision to reject the world as it exists, and form a clear idea of how you want to live despite it. In some cases there may be a negotiation, in others there may be outright rejection. You will likely still face consequences for these actions, but ultimately you are taking them head on. A simple example is to reject a social credit score in advance. Knowing that one is being made gives you the opportunity to deliberately live in defiance of it.&lt;/p&gt;
&lt;h3 id=&#34;make-peace&#34;&gt;Make peace&lt;/h3&gt;
&lt;p&gt;The greatest weapon of all tyrants is fear. Fear is used to induce compliance and paralyze opposition. Regardless if your fear is of death, capture, or assimilation into some hivemind, your first act of resistance is to shed your fear of it. Living without fear is hard. It&amp;rsquo;s easy to underestimate the challenge during easy times, but when one is surrounded by panic it&amp;rsquo;s a different environment all-together.&lt;/p&gt;
&lt;p&gt;Every bit counts. The more at peace you are with yourself and your surroundings, the easier it is to make progress and support others. It&amp;rsquo;s natural to get caught off-balance once in a while, but it&amp;rsquo;s critical that you maintain focused on regaining your focus. We all need each other. Helping your allies in a difficult time can often mean a lot more than advancing against your opponents.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Raise your Shield</title>
		<link>https://libresolutions.network/articles/raise-your-shield/</link>
		<pubDate>Fri, 19 May 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/raise-your-shield/</guid>
		
		<image>https://libresolutions.network//media/images/platos-cave.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/platos-cave.webp" />
		<itunes:image href="https://libresolutions.network//media/images/platos-cave.webp" />
		<description>Guard and redirect your intentions</description>
		<content:encoded>&lt;p&gt;It&amp;rsquo;s a cliche nowadays to point out that society is fractured. The Culture Wars are no longer a side-show for the politically obsessed, instead they are front-and center in the spectacle, aggressively inciting the wider public to participate. Hate your family? Hate your community? Hate your country? Even worse, do you hate yourself? There is no shortage of (often quite valid) reasons to keep you in a prison of rage and despair.&lt;/p&gt;
&lt;h3 id=&#34;they-want-you-to-hate&#34;&gt;They want you to hate&lt;/h3&gt;
&lt;p&gt;It&amp;rsquo;s quite alluring bait. The trap is so well executed that people&amp;rsquo;s ability to truly humanize each other is effectively cut off by their own anger. This was no accident. It is quite a mistake to entirely dismiss the Culture Wars as a &lt;em&gt;mere distraction&lt;/em&gt;. Many people have lost much just trying to make sense of the chaos and suffered a lot in the crossfire. The terrifying truth is that we have the most influential powers in society actively working to undermine people&amp;rsquo;s ability to peacefully resolve conflict.&lt;/p&gt;
&lt;p&gt;This has disarmed us from being able to correct or prevent institutional abuses. By fracturing people into isolated pits of fury and sadness people are unable to build even enough trust to communicate. Think of those people you&amp;rsquo;re entirely unable to reason with, who benefits from your collective isolation? It&amp;rsquo;s hard to escape when everyone is either too worn out or too hurt to meaningfully reciprocate.&lt;/p&gt;
&lt;p&gt;Surely you&amp;rsquo;ve heard &amp;ldquo;&lt;em&gt;The only winning move is not to play&lt;/em&gt;&amp;rdquo;.&lt;br&gt;
That leads one to ask &amp;ldquo;What game is being played, exactly?&amp;rdquo;.&lt;br&gt;
In this piece, I&amp;rsquo;m going to try to lay out the game in it&amp;rsquo;s entirety as best as I can.&lt;/p&gt;
&lt;h2 id=&#34;the-game&#34;&gt;The Game&lt;/h2&gt;
&lt;p&gt;Life itself is a series of contests. Some are trivial like friendly competitive sports, others are all-encompassing horrors like wars. You don&amp;rsquo;t always get to choose what competitions you&amp;rsquo;re in, some even operate outside a person&amp;rsquo;s natural lifespan. A great variety of circumstances of your birth have profound impact on what games you&amp;rsquo;re a part of and which ones you can join or leave. No two people are entirely alike, (as a twin I would know) different people will very often play the same cards differently.&lt;/p&gt;
&lt;p&gt;Many games make many prizes, some for the good, others for ill. Depending on your goals, some prizes may be hugely significant others may be outright disastrous. Ignorance is not bliss in many cases, others will often leverage it to their benefit. With only so much time to think, choose, and act, things can really start to look &lt;em&gt;rigged&lt;/em&gt; from various points of view.&lt;/p&gt;
&lt;p&gt;Very few people have the means, power, or influence to make massive changes on their own, but the sum total capabilities of many people can&amp;rsquo;t be overstated. Being able to influence a great many connected, talented, and driven people is a phenomenal power for one to have. This is the real power that rulers wield. Whether taken by force, or voluntarily given, there is a hard limit on how much cooperation can be effectively leveraged towards goals. This is the raw basis for the &lt;em&gt;social contract&lt;/em&gt;. Eventually, the ruler or institution loses enough will to cooperate that people move to defect.&lt;/p&gt;
&lt;h3 id=&#34;keeping-score-currency&#34;&gt;Keeping score: Currency&lt;/h3&gt;
&lt;p&gt;It&amp;rsquo;s ironic to talk about the raw power of money these days. Odds are if you&amp;rsquo;re reading this you&amp;rsquo;re used to using a &lt;em&gt;fiat currency&lt;/em&gt; which is to say a currency backed by &amp;ldquo;faith and credit&amp;rdquo; of your government. This is not the same as saying it&amp;rsquo;s backed by nothing. Far from it, any currency is a de-facto measurement of the amount of raw power wielded by it&amp;rsquo;s participants. That power can be used for good or evil. Every person proportional to the currency they wield makes a real tangible impact on the use of that currency.&lt;/p&gt;
&lt;p&gt;Currency in a peaceful and productive civilization will be highly valuable, but there are other variables. The currency of a despotic and cruel system is &lt;em&gt;blood money&lt;/em&gt;. This is what makes the love of money the root of all evil: prioritizing currency above all else is an open and active endorsement of the naturally imperfect dominance hierarchy. The more vicious the society, the more cruelty required to maintain the currency.&lt;/p&gt;
&lt;p&gt;One of the vital aspects of currencies is that they act as a &lt;em&gt;means of communication&lt;/em&gt;. Prices send powerful signals to people in all stations of life. For some prices represent options, for others they represent permission. This is why nearly all discussion of the Culture Wars misses vital context. The Culture Wars are merely offshoots of an all-encompassing global class war that we were all born into.&lt;/p&gt;
&lt;p&gt;&amp;ldquo;&lt;em&gt;Money makes the world go round&lt;/em&gt;&amp;rdquo; as many say, but it&amp;rsquo;s far from the only factor. For many people once their basic needs are met they often consider different pursuits such as pleasure, knowledge, or power.&lt;/p&gt;
&lt;h3 id=&#34;the-rule-of-power&#34;&gt;The rule of power&lt;/h3&gt;
&lt;p&gt;Since currency is information, consider that money is the code that programs society. But what is the machine doing? Money communicates and coordinates power, but every civilization that uses money uses it for various purposes. Those purposes can be things like maintaining order, researching and building technologies, or fighting off competing civilizations. This is not merely done with money, but often with hard violence.&lt;/p&gt;
&lt;p&gt;Anarchists correctly point out that governments are inherently violent entities. This is because every government is a formalization of a very real and harsh power structure. This power structure effectively operates as a &lt;em&gt;protection racket&lt;/em&gt;, requiring some of your wealth or labor in exchange for keeping competitive systems at bay. Every idealist hopes that we can live without the need for brutal and violent governments, if any at all. The challenge is that any person or group powerful enough to compete with other states is nearly already one themselves.&lt;/p&gt;
&lt;p&gt;Rulers offer people a choice, exist within the established order or at least don&amp;rsquo;t interfere with it. Those choosing to negotiate with the existing order are &lt;strong&gt;reformers&lt;/strong&gt; and those who actively seek it&amp;rsquo;s demise are &lt;strong&gt;radicals&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Reformers will &lt;strong&gt;always&lt;/strong&gt; have to make compromises with the society as it is. They generally have a great deal to lose if the game changes too much. A good reformer will work to make the system more flexible and robust. All reforms come at a real price however, they cost those in power making serious concessions potentially at the expense of their own station. This means that whatever power spent, they are almost always insufficient to address the primary grievances that drive them.&lt;/p&gt;
&lt;p&gt;This is why every society will have a significant amount of varied radicals who focus on a kaleidoscope of interests. Radicals that are isolated and alone are fruitless. Societies over time have come up with many ways to either placate or contain radicals of all persuasions. Radicals can never and never will be united on consensus. Everyone can be fractured along lines of culture, religion, social class, among other things. This doesn&amp;rsquo;t mean things can&amp;rsquo;t change however, the moment radicals start to unite along widely shared &lt;strong&gt;red lines&lt;/strong&gt;, they have a real chance to upset the balance of power.&lt;/p&gt;
&lt;p&gt;A healthy society actually needs radicals. Every society will gradually assimilate reformers into being wholly ineffectual. In an advanced state, there will be no reformers at all, merely puppets instead. Eventually things become so apparent that radicals are able to build &lt;em&gt;coalitions&lt;/em&gt; that together represent enough power to either fundamentally change the hierarchy. This is one of the reasons it&amp;rsquo;s nearly impossible for societies to merely &amp;ldquo;turn back time&amp;rdquo; and go back to how things were, the conditions have been changed entirely.&lt;/p&gt;
&lt;p&gt;When a large coalition of radicals is in danger of truly flipping the table, society has a stabilizing mechanism: an open bid for reformers. It&amp;rsquo;s in the interests of those in power to provide the smallest concession that dismantles the coalition. This is why radicals have no use for a complicated consensus, it can be fractured far too easily. Only when an overwhelming amount of people get together and decide which few changes are &lt;em&gt;non-negotiable&lt;/em&gt; is when a fruitful coalition can form. That said, it is much easier said than done.&lt;/p&gt;
&lt;h3 id=&#34;power-corrupts-absolutely&#34;&gt;Power corrupts, absolutely&lt;/h3&gt;
&lt;p&gt;There have been many times throughout history where one despotic order was replaced with another one that was every bit as cruel. This is because as people accrue power, be it through influence, currency, or force it begets a terrible cost on one&amp;rsquo;s soul. The desire to rule over others to achieve one&amp;rsquo;s goals is a very powerful temptation.&lt;/p&gt;
&lt;p&gt;Very often &amp;lsquo;victory&amp;rsquo; can come at too high a toll. When the price of more change is more power, power often comes at the cost of real priorities. This creates a horrific spiral of needless destruction. Surely none of us want that right? How can we avoid the corruption of power while still advancing peace, liberty and prosperity?&lt;/p&gt;
&lt;p&gt;Is it even possible at all?&lt;/p&gt;
&lt;h2 id=&#34;becoming-incorruptible&#34;&gt;Becoming incorruptible&lt;/h2&gt;
&lt;p&gt;Becoming a saint is certainly no small task. Thankfully, you don&amp;rsquo;t need to succeed to make a meaningful impact. While it&amp;rsquo;s impossible to get by with no power, your goal is to fundamentally maximize your &lt;em&gt;efficiency with power&lt;/em&gt;. Being able to do more with less direct power gives you phenomenal options. By reducing your reliance on corrupt or tyrannical systems you will gradually become less beholden to their machinations. Eventually, you could get to the point where you&amp;rsquo;re able to support others to act in better ways. The less power you need yourself, the more you can share with others. Power efficiency isn&amp;rsquo;t a zero-sum game. Often helping others will significantly help you as well. This inevitably helps you form positive and healthy relations with others.&lt;/p&gt;
&lt;p&gt;Setting small tangible goals and working towards them can help you better understand your limits and faults. The only way to turn down the allure of vast power is to come to terms with what is &amp;rsquo;enough&amp;rsquo; for you. Coming clean to yourself about what your real goals can help you understand what you are, and are not willing to do to achieve them. Once enough people work towards making incremental changes to shift away from systems working against us, and make small movements towards better areas, we will all benefit in innumerable ways.&lt;/p&gt;
&lt;h3 id=&#34;team-up&#34;&gt;Team up&lt;/h3&gt;
&lt;p&gt;If not already, you are now on &lt;strong&gt;Team Humanity&lt;/strong&gt;. Your goal is to find ways to support others or otherwise decentralize power away from corrupt systems and people. Almost always you don&amp;rsquo;t need to take anything or anyone head on, instead focus your energy on building people up and other productive outlets like making things. &lt;strong&gt;Learning&lt;/strong&gt;, &lt;strong&gt;Creating&lt;/strong&gt; and &lt;strong&gt;Sharing&lt;/strong&gt; are the three pillars of the decentralized revolution. Instead of working to rally behind another despot in the waiting, you can help everyone get to a point where tyrants have no power at all.&lt;/p&gt;
&lt;p&gt;Teaching others, providing for their needs, or comforting them is what will truly make an impact. It sounds too good to be true, but every ruler needs an army. Odds are you don&amp;rsquo;t have a bigger army, so your only hope is that people together have the means and motivation to resist abuse of power. The more powerful the people are in every way, the less power individuals can accrue over others. This applies to all aspects of life; necessities like food and water, tools like technology and machines, as well as social needs like belonging and companionship. Team humanity needs to be where the cool and happy people are.&lt;/p&gt;
&lt;p&gt;Anything that you can do to provide for yourself and others is vitally important, but stop short of working to gain power &lt;em&gt;over others&lt;/em&gt;. Leadership is about setting an example and proving that things truly can be different. No state or laws can withstand the collective might of the people. You don&amp;rsquo;t need to be on the same page as them to trust them to act in their own interests, which is why leveling the playing field helps reduce defectors.&lt;/p&gt;
&lt;h3 id=&#34;be-the-change-you-want-to-see&#34;&gt;Be the change you want to see&lt;/h3&gt;
&lt;p&gt;With the powerful tools at our disposal today, we have not just the opportunity but the obligation to try to use them for the most noble uses we can muster. The device you&amp;rsquo;re reading this on is much more powerful than the systems that put a flag on the moon. Don&amp;rsquo;t underestimate what a couple of creative individuals can achieve if they truly dare to imagine a better future. Don&amp;rsquo;t give up on people, we all have our flaws and have made many mistakes. Take the time to reflect and collect yourself before engaging in petty fights. There is so much more to others than you think. The only thing worth fighting for is genuine love for yourself and others. Genuine self-respect is the bedrock to building a solid foundation of compassion and genuine joy with others.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>DDoS Attack on the Mind (with Operation Uplift)</title>
		<link>https://libresolutions.network/videos/operation-uplift/</link>
		<pubDate>Tue, 09 May 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/operation-uplift/</guid>
		
		<image>https://libresolutions.network//media/images/rounding-the-earth.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/rounding-the-earth.webp" />
		<itunes:image href="https://libresolutions.network//media/images/rounding-the-earth.webp" />
		<description></description>
		<content:encoded>&lt;p&gt;Introducing the &lt;a href=&#34;https://libresolutionsnetwork.substack.com/cp/120613391&#34;&gt;Operation Uplift Community&lt;/a&gt;
Watch on &lt;a href=&#34;https://roundingtheearth.com/ddos-attack-on-the-mind/&#34;&gt;Rounding The Earth&lt;/a&gt;&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>The Protocol Wars are Here</title>
		<link>https://libresolutions.network/articles/protocol-wars/</link>
		<pubDate>Mon, 08 May 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/protocol-wars/</guid>
		
		<image>https://libresolutions.network//media/images/datacenter-war.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/datacenter-war.webp" />
		<itunes:image href="https://libresolutions.network//media/images/datacenter-war.webp" />
		<description>What tools are best to reclaim our digital autonomy?</description>
		<content:encoded>&lt;h1 id=&#34;the-protocol-wars&#34;&gt;The Protocol Wars&lt;/h1&gt;
&lt;p&gt;Battle lines are being drawn. The stakes could never be higher, the very future of how we all interact online is in our hands. It was so simple when everyone was silo&amp;rsquo;d onto a few corporate controlled platforms. Now, there are new platforms that aren&amp;rsquo;t merely controlled by a single entity, they are &lt;em&gt;interoperable&lt;/em&gt; with each other, meaning that each system is composed of compatible units.&lt;/p&gt;
&lt;p&gt;Will one system entirely dominate the others? Will &amp;ldquo;super-nodes&amp;rdquo; grow to dominate the entire ecosystem, leaving us with big tech tyrants yet again? How will you ensure that communications networks aren&amp;rsquo;t used as tools to &lt;em&gt;shape&lt;/em&gt; the discussion, rather than support it?&lt;/p&gt;
&lt;h2 id=&#34;awaiting-the-peer-to-peer-utopia&#34;&gt;Awaiting the peer-to-peer utopia&lt;/h2&gt;
&lt;p&gt;Currently, we&amp;rsquo;re not quite able to jump straight to a private, secure and free-as-in-freedom peer to peer network. There are a variety of challenges in attempting to create a pure peer-to-peer ecosystem that get in the way. A peer-to-peer ecosystem that relies on participants using locked-down and controlled smartphones has limited usefulness. On the other hand, peer-to-peer file-sharing networks have maintained their robust existence as they are build on top of powerful machines with lots of bandwidth and storage.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/peer-to-peer.webp&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;We can&amp;rsquo;t escape the fact that hardware is a critically important part of the technological landscape. People&amp;rsquo;s own technical skill and the capabilities of their hardware have a profound impact on what possibilities can emerge. There are real trade-offs when trying to move away from a client-server model. This is because &lt;em&gt;servers are useful and efficient&lt;/em&gt;. Different participants may want more or less resources assigned to particular tasks, and using specialized hardware for the task goes a long way.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/board.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/hardware-matters&#34;  &gt;&lt;h2&gt;Principle: Hardware matters&lt;/h2&gt;&lt;i&gt;It is easy to underestimate the underlying structure of our digital world.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;There are also privacy risks when it comes to peer-to-peer connections. Some protocols still will require a server to set up connections between peers, and unless you&amp;rsquo;re using an anonymization network like Tor or I2P you&amp;rsquo;re divulging information about you to other peers. This is why there is still a long way to go before truly peer-to-peer systems will be used as the standard.&lt;/p&gt;
&lt;h2 id=&#34;the-server-to-server-paradigm&#34;&gt;The Server to Server paradigm.&lt;/h2&gt;
&lt;p&gt;This doesn&amp;rsquo;t mean we can&amp;rsquo;t meaningfully decentralize. It&amp;rsquo;s possible for people to run servers for themselves as well as others. The people using them gain most of the advantages of centralized systems, like being able to connect from thin-clients like smartphones.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/fedi-map.webp&#39; 
&gt;


&lt;p class=&#34;caption&#34;&gt;
    Distributed Fediverse Instances &lt;a target=&#39;_blank&#39; href=&#39;https://fediverse.observer/map&#39;&gt;Source&lt;/a&gt;
&lt;/p&gt;


&lt;/div&gt;
&lt;p&gt;You can then add real &lt;em&gt;interoperability&lt;/em&gt; by using an open protocol to allow the servers to act as servers for each other. With a Server-to-Server layer, these systems have the advantage of being parts of a larger whole. Often these systems are called &lt;em&gt;federated&lt;/em&gt; because they work as networks of communities.&lt;/p&gt;
&lt;p&gt;This allows new protocols and systems to scale as well as the Internet itself. Having a server-to-server mechanism allows for an incredible amount of flexibility. Maybe some servers respond to all the others, maybe some of them only respond to ones they know. Everyone could eventually be situated with their own preferences without impacting others, all while still having an interoperable means of connecting.&lt;/p&gt;
&lt;h3 id=&#34;bridges&#34;&gt;Bridges&lt;/h3&gt;
&lt;p&gt;Once there is an open server-to-server protocol in place, it&amp;rsquo;s easy for different systems to be bridged to each other. Either systems can adopt the same server-to-server protocol (federation) or they can translate from one protocol to another (bridging).&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/fedi-nostr-bridge.webp&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;Bridges have been used on &lt;a href=&#34;https://matrix.org/bridges/&#34;&gt;matrix&lt;/a&gt; to allow people to control all their chat applications from a single account. Any open protocol can be bridged to bring people together.It&amp;rsquo;s a powerful technique that means that no single protocol has to dominate, instead they can cooperate.&lt;/p&gt;
&lt;h2 id=&#34;trade-offs&#34;&gt;Trade-offs&lt;/h2&gt;
&lt;p&gt;There are large differences to using different ecosystems. People may prefer something that could be decentralized but is still quite controlled like Blue Sky, or they may want to build custom software to only use protocols in deliberate ways. It&amp;rsquo;s a wide spectrum, and some choices have bigger impacts than others.&lt;br&gt;
Things worth considering are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Is the protocol open and allows &lt;em&gt;permissionless&lt;/em&gt; participation?&lt;/li&gt;
&lt;li&gt;Does the protocol allow you to store information on your own machine, or one under your control?&lt;/li&gt;
&lt;li&gt;Is the software &lt;a href=&#34;https://www.fsf.org/about/what-is-free-software&#34;&gt;free&lt;/a&gt; from unwanted or harmful dependencies?&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;broadcast-systems&#34;&gt;Broadcast systems&lt;/h3&gt;
&lt;p&gt;If you&amp;rsquo;re trying to get information out into the world, privacy may not be the highest priority. You&amp;rsquo;ll still want to be secure, you won&amp;rsquo;t want to be credibly impersonated, but you may not need perfect anonymity or to encrypt messages. A simple &lt;a href=&#34;https://libresolutions.network/articles/best-website-for-you&#34;&gt;static website&lt;/a&gt; suits this purpose, but so does a profile on a well-run and popular social media service.&lt;/p&gt;
&lt;h2 id=&#34;fediverse&#34;&gt;Fediverse&lt;/h2&gt;
&lt;p&gt;The &lt;a href=&#34;https://libresolutions.network/tags/fediverse&#34;&gt;fediverse&lt;/a&gt; has the potential to be a truly meritocratic digital town square.&lt;br&gt;
There are many community-run or self-hosted servers that operate without algorithmic manipulation or ads. Each user either runs or joins an &lt;em&gt;instance&lt;/em&gt; that will host their content as it&amp;rsquo;s shared with others.&lt;/p&gt;
&lt;p&gt;Get started:  &lt;a href=&#34;https://jointhefedi.com/&#34;&gt;https://jointhefedi.com/&lt;/a&gt;&lt;br&gt;
Popular Servers: &lt;a href=&#34;https://soapbox.pub&#34;&gt;Soapbox&lt;/a&gt; or &lt;a href=&#34;https://joinmastodon.org/&#34;&gt;Mastodon&lt;/a&gt; and many &lt;a href=&#34;https://fediverse.info/explore/projects&#34;&gt;more&lt;/a&gt;..&lt;/p&gt;
&lt;h2 id=&#34;nostr&#34;&gt;Nostr&lt;/h2&gt;
&lt;p&gt;Nostr is a simple protocol with lots of new clients and features being built. It replaces the concept of a &amp;ldquo;home server&amp;rdquo; with many inter-changable relays. The primary advantage of this is that it prevents server administrators from being able to block people on behalf of other users. As long as two nostr users share a relay they are able to communicate. Some nostr communities have setup paid relays.&lt;/p&gt;
&lt;p&gt;Get started: &lt;a href=&#34;https://nostr.com/get-started&#34;&gt;https://nostr.com/get-started&lt;/a&gt;&lt;br&gt;
Project: &lt;a href=&#34;https://nostr.com/&#34;&gt;https://nostr.com/&lt;/a&gt;&lt;br&gt;
Popular Client: &lt;a href=&#34;https://iris.to&#34;&gt;https://iris.to&lt;/a&gt;&lt;br&gt;
Popular Relay Software: &lt;a href=&#34;https://github.com/Cameri/nostream&#34;&gt;nostream&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;private-systems&#34;&gt;Private Systems&lt;/h2&gt;
&lt;p&gt;When having private communications with friends/family or even co-workers it&amp;rsquo;s great to have systems away from prying eyes. It&amp;rsquo;s helpful to have a free and open protocol that people can communicate with you privately, that doesn&amp;rsquo;t rely on sharing infrastructure. End-to-end encyption helps protect users on different servers from prying-eyes.&lt;/p&gt;
&lt;h3 id=&#34;matrix&#34;&gt;Matrix&lt;/h3&gt;
&lt;p&gt;Matrix is an excellent chat protocol that supports large rooms as well as direct chats. As of now, &lt;a href=&#34;https://element.io/blog/drop-in-drop-out-chats-with-video-rooms-and-a-new-search-experience/&#34;&gt;video rooms&lt;/a&gt; are now in open beta.&lt;/p&gt;
&lt;p&gt;Get started: &lt;a href=&#34;https://matrix.org/docs/projects/try-matrix-now&#34;&gt;https://matrix.org/docs/projects/try-matrix-now&lt;/a&gt;&lt;br&gt;
Project: &lt;a href=&#34;https://matrix.org&#34;&gt;https://matrix.org&lt;/a&gt;&lt;br&gt;
Popular Client: &lt;a href=&#34;https://element.io&#34;&gt;https://element.io&lt;/a&gt;&lt;br&gt;
Popular Server: &lt;a href=&#34;https://matrix-org.github.io/synapse/latest/&#34;&gt;Synapse&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;xmpp&#34;&gt;XMPP&lt;/h3&gt;
&lt;p&gt;XMPP is another federated chat protocol. It&amp;rsquo;s fast and efficient and has been used for quite some time now.&lt;/p&gt;
&lt;p&gt;Get started: &lt;a href=&#34;https://xmpp.org/getting-started&#34;&gt;https://xmpp.org/getting-started&lt;/a&gt;&lt;br&gt;
Project: &lt;a href=&#34;https://xmpp.org&#34;&gt;https://xmpp.org&lt;/a&gt;&lt;br&gt;
Popular Client: &lt;a href=&#34;https://astral.ninja/&#34;&gt;https://astral.ninja/&lt;/a&gt;&lt;br&gt;
Popular Server: &lt;a href=&#34;https://prosody.im/&#34;&gt;Prosody&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;making-your-choice&#34;&gt;Making your choice&lt;/h2&gt;
&lt;p&gt;It&amp;rsquo;s up to you! It&amp;rsquo;s worth trying different things out to see what works well for others. Some may just stick with &lt;a href=&#34;https://signal.org/&#34;&gt;signal&lt;/a&gt; for convenience, others may use &lt;a href=&#34;https://delta.chat/&#34;&gt;delta chat&lt;/a&gt; because it can be used on top of e-mails people already have. Whatever you can do to take control of your own information and computing can go a long way.&lt;/p&gt;
&lt;p&gt;Check out this conversation I&amp;rsquo;ve had with Mathew Crawford on Rounding the Earth about how to think about different approaches to keeping your information safe.&lt;/p&gt;
&lt;p&gt;Whatever you do, it&amp;rsquo;s important to know why you&amp;rsquo;re choosing one system over another. It may be more effort, but a little change can go a long way when it comes to keeping your information out of the hands of adversaries. Once you have something that works well for you, it becomes easier to share those advantages with others.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Conceptualizing Information Control</title>
		<link>https://libresolutions.network/articles/information-control/</link>
		<pubDate>Sun, 23 Apr 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/information-control/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/information-control.mp3" />
			
		
		<image>https://libresolutions.network//media/images/information-control.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/information-control.webp" />
		<itunes:image href="https://libresolutions.network//media/images/information-control.webp" />
		<description>Truth is the first casualty of war</description>
		<content:encoded>&lt;p&gt;Knowledge is power. Control over knowledge is immense power. This power isn&amp;rsquo;t merely used to advance sciences and create new technologies, instead it&amp;rsquo;s often used to take control of other people. Almost everyone these days seems to believe they&amp;rsquo;re surrounded by brainwashed masses. What if there really is something to that? Who, or what, is actually doing the brainwashing?&lt;/p&gt;
&lt;p&gt;It is a mistake to assume that someone who is acting differently than you is always making those decisions from incorrect information. There are often times where different people will have wildly varying interpretations of the same information. Now, instead of using the same information, see how they react to subsets of the &lt;em&gt;same information&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;This doesn&amp;rsquo;t mean that everyone is always right, but rather that they can often be talking about different aspects of the &lt;em&gt;same problem&lt;/em&gt;. This has been a substantial driver of the &lt;em&gt;Culture Wars&lt;/em&gt; because different messaging is naturally going to resonate with different subsets of the population. To make things worse, problems and solutions are framed in terms of &amp;ldquo;&lt;em&gt;What nails can we hit with this hammer&lt;/em&gt;?&amp;rdquo; before considering other tools.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/information-asymmetry.webp&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;This is what has made &lt;em&gt;language&lt;/em&gt; a critical component in political competition. If we do not share goals, it is to my advantage that I ensure that you use &lt;em&gt;my framing&lt;/em&gt; to understand the world around you. Words themselves become skirmishes over the broad ideas they can represent. Splitting into dialects, different factions sound increasingly incomprehensible to each other. Cooperation becomes challenging, compromise becomes impossible. Even worse, people are no longer able to &lt;em&gt;negotiate boundaries&lt;/em&gt;. This all-but-ensures future conflict.&lt;/p&gt;
&lt;h3 id=&#34;motivated-reasoning&#34;&gt;Motivated reasoning&lt;/h3&gt;
&lt;p&gt;As this process advances, and people start to perceive that they are in some kind of existential competition, Culture Wars escalate. Suddenly, groups are less interested in finding workable common-ground, but instead every action is part of a greater conquest. Groups are now no longer devoted to cooperating in wider society, but instead fracturing out territory to secure their interests.&lt;/p&gt;
&lt;p&gt;There is a fair amount of evidence, that much of the present-day divisions have been &lt;em&gt;manufactured&lt;/em&gt; since the 2008 bail-outs and Occupy Wall St protests. I&amp;rsquo;m sympathetic to this interpretation, but it&amp;rsquo;s important not to lose sight that these manufactured divisions have real, &lt;em&gt;material consequences&lt;/em&gt;.&lt;/p&gt;
&lt;h3 id=&#34;hurt-people-hurt-people&#34;&gt;Hurt people hurt people&lt;/h3&gt;
&lt;p&gt;These consequences have, and if not addressed, will continue to escalate tensions. The biggest challenge is that people are not always likely to state their frustrations in the most constructive manner. Tragically, many will often aggressively take out those frustrations on those they can, rather than the actual causes of that frustration.&lt;/p&gt;
&lt;p&gt;How many wounds have been caused by the Covid Crisis? How many &lt;em&gt;real avenues&lt;/em&gt; have people had to even have their grievances acknowledged? Different people will have all kinds of unique and complicated scars from different challenges. It is no small task to merely bring clarity and understanding to what has happened, it&amp;rsquo;s an even greater one to conceptualize the long arc of it all.&lt;/p&gt;
&lt;h3 id=&#34;what-does-this-all-have-to-do-with-information-control&#34;&gt;What does this all have to do with information control?&lt;/h3&gt;
&lt;p&gt;Leveraging people&amp;rsquo;s unique perspective towards specific ends is how targeted advertising &lt;em&gt;works&lt;/em&gt;. The technocracy has had the tools and understanding of how to manipulate large groups of people, each one at a time, for well over a decade, if not significantly longer. Many rush to point to smartphones as the culprit. In fact, their rise in prominence is very coincident with the rise of many of the Culture Wars. I&amp;rsquo;ll present a different interpretation: &lt;strong&gt;It&amp;rsquo;s not the smartphone, but what was in it.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is nothing inherently mind-killing about a small, portable computer that uses a touch-screen interface. What truly forged the massive mind control apparatus was the things that came with it:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Real-time location tracking&lt;/li&gt;
&lt;li&gt;24/7 audio and video surveillance capabilities&lt;/li&gt;
&lt;li&gt;Corporate Social Media as &lt;em&gt;Digital information Control Systems&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Information Control Systems have been the cause of not only the Culture Wars, but many more problems as well. The smartphone era was what made these Information Control Systems go digital, but it was not the origin of information control.&lt;/p&gt;
&lt;p&gt;Surveillance is rarely merely about curiosity, rather it&amp;rsquo;s about gathering information to leverage control over situations. Massive dragnet surveillance of the population is one of the greatest acts of &lt;em&gt;Information Asymmetry&lt;/em&gt; in all of human history.&lt;/p&gt;
&lt;h1 id=&#34;information-asymmetry&#34;&gt;Information Asymmetry&lt;/h1&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;I know you are, but what am I?&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Spy craft of all kinds is highly reliant on information asymmetry. Being able to see even only marginally clearer through the fog of war is a massive advantage.&lt;br&gt;
There are three ways to gain and maintain your advantage :&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Become faster or more efficient at uncovering valuable information&lt;/li&gt;
&lt;li&gt;Sabotage other efforts by undermining them directly&lt;/li&gt;
&lt;li&gt;Selectively manipulate or destroy information not to your advantage&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This is where surveillance, censorship, propaganda, and all kinds of devious activities come into play. By being able to monitor you, while keeping things secret from you, powerful entities are able to maintain an immense advantage over you.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;By learning your emotional limits, it&amp;rsquo;s possible to learn how to manipulate you.&lt;/li&gt;
&lt;li&gt;By learning your habits, it&amp;rsquo;s possible to plan around them.&lt;/li&gt;
&lt;li&gt;By understanding who you are, it&amp;rsquo;s possible to target you specifically.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;It&amp;rsquo;s impossible to comprehend the scope of what information about you is available for mechanized manipulation. On the other hand, it&amp;rsquo;s vastly simpler for someone with control of that data to use it for nefarious ends. This vastly enhances psychological manipulation efforts and puts each person at the mercy of forces they can&amp;rsquo;t fully understand.&lt;/p&gt;
&lt;p&gt;It is the height of hubris to take your understanding of publicly available information to be the best understanding anyone can have. It is a guarantee that there are groups and lines of communication that you&amp;rsquo;re not aware of that have been more successful at gleaning a clear picture.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/ignorance.webp&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;This is why the stereotype of &amp;ldquo;the lone conspiracy theorist&amp;rdquo; is such delicious fodder for conspirators. There may simply not be enough information available to truly present a coherent case, even when there is one. With full understanding of your conspiracy, you can selectively reveal information to undermine even the best possible explanation. Even worse, it possible to discredit true accusations with slander and deflection.&lt;/p&gt;
&lt;p&gt;If an entity has a clear understanding of a situation or set of information that knowledge can be used to selectively manipulate disclosure.This is different than a merely incomplete picture that just happens to be lacking information. Without knowing the entire picture it can be very difficult to distinguish manipulated from incomplete information.&lt;/p&gt;
&lt;p&gt;This is why &lt;em&gt;limited hangouts&lt;/em&gt; are such a serious concern. While it&amp;rsquo;s possible that companies and institutions may be interested in true transparency, unless they&amp;rsquo;re willing to provide all the information as they have it, it&amp;rsquo;s still at best an incomplete picture. They may be obligated to omit information for legal reasons, or deliberately omit references to certain events to fundamentally alter people&amp;rsquo;s perception of the disclosure.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/info-theory.webp&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;Many times, the best that people have is an incomplete picture. People can quickly fall into the trap of grasping the first seemingly-coherent explanation that fits the data they have, without realizing that they may be missing all kinds of crucial information. While this may sound like the worst case scenario, it is far better than falling prey to a manipulated understanding presented by an adversary.&lt;/p&gt;
&lt;h2 id=&#34;digital-information-control-systems&#34;&gt;Digital Information Control Systems&lt;/h2&gt;
&lt;p&gt;I routinely call any centralized information sharing platform an &lt;em&gt;Information Control System&lt;/em&gt;. This is precisely because of the asymmetric information advantage given to those who run and operate the system over the people who participate in it. Rudimentary tools like &amp;ldquo;Trending&amp;rdquo; lists are such a minor fraction at what operators of these systems have at their disposal.&lt;/p&gt;
&lt;p&gt;For example, one could learn all kinds of things about you if they merely had access to your credit card&amp;rsquo;s purchase history. Just like if I read through every post you&amp;rsquo;ve ever made online. Any tool that isn&amp;rsquo;t explicitly avoiding collecting data, is inherently vulnerable to divulging such information.&lt;/p&gt;
&lt;p&gt;Surveillance is only half the story, &lt;em&gt;manipulation&lt;/em&gt; is the other side of the coin. In many cases outright censorship is too crude. It&amp;rsquo;s well observed that the majority of people like to rely on whatever main feed the system provides for them, and will make hardly any attempt to deviate from it. This means that the main feed on any application is &lt;em&gt;prime real estate&lt;/em&gt; for those who want to buy and sell your time and attention.&lt;/p&gt;
&lt;p&gt;Outside of mere commodification, anyone who has a monopoly over a large number of people&amp;rsquo;s attention in this way has the capability to do great harm to others. This is the true danger of information control systems, this is what makes civilian targets &amp;lsquo;fair game&amp;rsquo; in information war. You have likely heard that your mind is a battlefield, but what is the war over?&lt;/p&gt;
&lt;p&gt;The prize for information control is nothing short than all-out &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-11/&#34;&gt;dominance&lt;/a&gt;. Maintaining information control is an inherently aggressive stance. The people most interested in identifying where everyone spends all their attention, are the most likely to have nefarious motives for doing so.&lt;br&gt;
So you have three major choices:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Opt-out, and ignore the information landscape entirely&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;To the degree that you can, as there are always choices to be made.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Choose a side, and face the consequences&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;By joining the ranks of a cultural titan you are at the mercy of it, and your newfound enemies.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Democratize the information landscape as much as possible&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Instead, work to mitigate the ability of those to control others.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;predictive-programming&#34;&gt;Predictive Programming&lt;/h2&gt;
&lt;p&gt;I reject the common definition of predictive programming and present you with a different one:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;Using indoctrination to get the public to accept and act out an impossible concept.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;That&amp;rsquo;s it. No complicated whinging about karmic consequences or secret plans. The world is a stage, and predictive programming is all about teaching the public what role they need to play. What&amp;rsquo;s powerful about these impossible concepts, is that like any scam, &lt;em&gt;there&amp;rsquo;s always more&lt;/em&gt;. Always another try, another attempt at converting your hard-earned resources and attention into their profit.&lt;/p&gt;
&lt;h3 id=&#34;transitioning-to-renewables&#34;&gt;Transitioning to renewables&lt;/h3&gt;
&lt;p&gt;Fortunes have been made off of the delusion that it&amp;rsquo;s possible to transition the majority of human energy consumption to wind and solar energy. By leveraging the public&amp;rsquo;s ignorance of the true energy cost in running society, investors and consumers alike can be freely fleeced of resources in the name of making the impossible happen.&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s akin to hooking up two motors to a battery, and demonstrating that your &lt;em&gt;perpetual motion machine&lt;/em&gt; is a breakthrough that will revolutionize the energy industry. Sleek 3D rendered windmills and solar panels on bright grassy landscapes leave out the awkward details that get in the way of real-world application.&lt;/p&gt;
&lt;h3 id=&#34;pandemics&#34;&gt;Pandemics&lt;/h3&gt;
&lt;p&gt;Long before the Covid Crisis people were presented with many examples of a hyper-lethal and hyper-contagious virus that would necessitate extreme measures. People grew to accept the idea that an indeterminable emergency would require all kinds of extraordinary measures without any real rational explanation.&lt;/p&gt;
&lt;p&gt;I don&amp;rsquo;t believe it is possible for any contagion to meet these &lt;strong&gt;three conditions&lt;/strong&gt;:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;It must be sufficiently contagious, otherwise it wouldn&amp;rsquo;t be a problem&lt;/li&gt;
&lt;li&gt;It must be sufficiently severe and untreatable, otherwise it would be dealt with easily&lt;/li&gt;
&lt;li&gt;It must be successfully contained by measures taken during the Covid Crisis, otherwise there would be no point in trying in the first place.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;A virus that meets two of those criteria would still a serious problem, but would not require the suspension of constitutional rights and massive wealth transfer orchestrated during the Covid Crisis.&lt;/p&gt;
&lt;h3 id=&#34;ai-sentience&#34;&gt;AI Sentience&lt;/h3&gt;
&lt;p&gt;Currently, many people fall victim to many mass media depictions of machine minds capable of sentience. This is vastly detached from the current or even rationally projected state of machine learning. I&amp;rsquo;ll be the first to say that large AI models are very powerful and sophisticated tools, but they are not as magical as the hype would imply.&lt;/p&gt;
&lt;p&gt;Machine learning models are essentially massive tables of numbers. Training the model involves modifying the numbers to fit the desired outcome. This results in a &lt;em&gt;very useful table of numbers&lt;/em&gt;, but not a sentient one. Tragically, people are already anthropomorphizing these tools at the expense of real human interaction. I promise you, while large language models are quite interesting, they do not grow fond of you or even have a stake in your life.&lt;/p&gt;
&lt;p&gt;Fearing them is also the opposite mistake, very often it&amp;rsquo;s not the tools themselves that are evil, but rather the ends that people aim to use them for. It is critical that you invest in yourself as a human being, rather than live in terror that machine minds are out to destroy humanity. The terrible truth is that human beings are all too capable of that themselves, and they should be held responsible regardless of the methods they employ.&lt;/p&gt;
&lt;h2 id=&#34;overcoming-information-control&#34;&gt;Overcoming Information Control&lt;/h2&gt;
&lt;h3 id=&#34;discretion&#34;&gt;Discretion&lt;/h3&gt;
&lt;p&gt;Privacy and Security are important. It&amp;rsquo;s more important than ever to use tools that aren&amp;rsquo;t &lt;em&gt;proactively testifying against you&lt;/em&gt;. Software and hardware freedom are vitally important concepts these days that we should all do our part to promote.&lt;/p&gt;
&lt;p&gt;Opposing the use of mass surveillance by the state and corporations is also of utmost importance. Privacy and anonymity need to be normalized, and the consequences of abusing people&amp;rsquo;s private information need to become more severe.&lt;/p&gt;
&lt;h3 id=&#34;humility&#34;&gt;Humility&lt;/h3&gt;
&lt;p&gt;Don&amp;rsquo;t fool yourself into thinking you can or will know everything. Understand that you and everyone around you is only human and there are limits to your knowledge. Idolizing a specific person as &lt;em&gt;the expert on everything&lt;/em&gt;, even on a singular topic, is often a surefire way to be misled. With a healthy amount of distrust, you can build an understanding that isn&amp;rsquo;t reliant on completely outsourcing your cognition to others. It&amp;rsquo;s important to be courageous enough to question, but humble enough to question yourself too.&lt;/p&gt;
&lt;h3 id=&#34;persistence&#34;&gt;Persistence&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;Personal memory units were banned six years before the crash, after someone found out that a few rogue Interplanetary Holy Tech officers were routinely editing consciousness data blocks in the cloud, modifying public opinion against IHT guidelines. There was an upheaval, media pundits had a field day, and the court hearing was transmitted to every citizen’s brain. In the end, the IHT officers pleaded guilty and were sent to the Genetic Recycle Lab. Shortly after, the AI Head of the IHT gave an address in which they talked about the need to tighten memory data security. Evidently, the best algorithms have been consulted with, and they concluded that personal units had to be turned in. I considered doing as I was told—but something inside me rebelled. Perhaps it was the fact that I have always felt like I was different, or maybe it was an encoded message from my grandfather, a famous artist and dissident who disappeared into the Genetic Recycle Lab a hundred and fifty years ago. I chose to follow my gut—and wiggled my way out of compliance.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://tessa.substack.com/p/deprecating-free-will-a-future-we&#34;&gt;Deprecating Free Will: A Future We Don&amp;rsquo;t Have to Accept&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;By Tessa Lena&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h4 id=&#34;you-need-to-save-information&#34;&gt;You need to save information.&lt;/h4&gt;
&lt;p&gt;One of the primary goals of information control is suppressing information that can be used to support dissenting narratives. Taking notes, or preserving information, is a very simple and effective way to prevent that outcome. The more people can do do preserve information the further along we can be to truly &lt;em&gt;leveling the playing field&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;By extending your own and the public&amp;rsquo;s memory, you can safeguard yourself and others from mass manipulation. Nothing is new under the sun and old scams resurface with new sleek branding. Being able to point out the connections can make a critical difference at important times.&lt;/p&gt;
&lt;h3 id=&#34;cooperate&#34;&gt;Cooperate&lt;/h3&gt;
&lt;p&gt;Do what you can to meaningfully communicate with others. Take the time to be patient with those with different perspectives. Even if you don&amp;rsquo;t end up agreeing, there is very often lots of useful information to glean. Where possible, do your best to connect with others to understand them on a deeper level. Working with others allows you to accomplish more than you could on your own. By cooperating you can uncover things that may be impossible alone.&lt;/p&gt;
&lt;p&gt;Not only do you need to do this for &lt;em&gt;yourself&lt;/em&gt;, but you should want to pass down critical information to future generations, rather than just mere material wealth. Communicating across generations is one of the most important ways to ensure that people don&amp;rsquo;t keep falling into the same all-too-familiar traps. A straight-forward way to do this is to publish your own information and attempt to make it as resilient as possible.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Storing and Protecting Knowledge - Round Table with Mark Kulacz</title>
		<link>https://libresolutions.network/videos/rounding-the-earth-2/</link>
		<pubDate>Tue, 18 Apr 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/rounding-the-earth-2/</guid>
		
		<image>https://libresolutions.network//media/images/rounding-the-earth.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/rounding-the-earth.webp" />
		<itunes:image href="https://libresolutions.network//media/images/rounding-the-earth.webp" />
		<description>Another excellent chat with Rounding the Earth 🌎</description>
		<content:encoded>&lt;p&gt;Mirrored from: &lt;a href=&#34;https://rumble.com/v2iuqae-storing-and-protecting-knowledge-round-table-w-mark-kulacz-and-gabriel.html&#34;&gt;https://rumble.com/v2iuqae-storing-and-protecting-knowledge-round-table-w-mark-kulacz-and-gabriel.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Gabriel, Mark Kulacz, Liam Sturgess and Mathew Crawford discuss how to protect knowledge in an age of rampant censorship and manipulation.&lt;/p&gt;
&lt;p&gt;Show links:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://peertube.libresolutions.network/w/8JAkjYRxdwq3j1e1Df3NVc&#34;&gt;Previous Discussion&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://sites.google.com/a/housatonicits.com/home/&#34;&gt;houseatronic.live&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/DVEjmbMHUVo&#34;&gt;Let&amp;rsquo;s Talk America Ep1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://libresolutions.network/articles/best-website-for-you/&#34;&gt;The best website for a single person&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/wabarc/wayback&#34;&gt;Wayback tool&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.tiki-toki.com/&#34;&gt;Tiki Toki&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://roundingtheearth.substack.com/p/the-plandemonium-timeline-project&#34;&gt;The Plandemonium Timeline Project&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://graphcommons.com/graphs/b84c2616-9fa7-49f3-aa31-87d161127950&#34;&gt;Covid-19 Bio-defense Mafia&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://peertube.libresolutions.network/w/amsg2uM33HFxDCAVWAZvLe&#34;&gt;Tracking Links video&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://metaprepeducation.locals.com/&#34;&gt;MetaPrep Education Community&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://roundingtheearth.locals.com/&#34;&gt;Rounding the Earth locals&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.campfire.wiki/doku.php?id=start&#34;&gt;Campfire Wiki&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Follow Rounding The Earth on &lt;a href=&#34;https://roundingtheearth.substack.com/&#34;&gt;Substack&lt;/a&gt; or &lt;a href=&#34;https://roundingtheearth.locals.com&#34;&gt;locals&lt;/a&gt; and &lt;a href=&#34;https://roundingtheearth.com/feed&#34;&gt;RSS&lt;/a&gt;&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>The Coordinated Attack on Cyberspace</title>
		<link>https://libresolutions.network/articles/coordinated-attack/</link>
		<pubDate>Thu, 13 Apr 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/coordinated-attack/</guid>
		
		<image>https://libresolutions.network//media/images/global-networks.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/global-networks.webp" />
		<itunes:image href="https://libresolutions.network//media/images/global-networks.webp" />
		<description>The technocracy is grabbing new powers to control your digital life</description>
		<content:encoded>&lt;p&gt;For tyrants and dissidents alike, the Covid Crisis was a defining moment in the history of censorship. Top-down information control leapt out of the shadows into an overt campaign of propaganda, suppression and manipulation. One of the defining aspects of the crisis is that it exemplified an &lt;em&gt;arms race&lt;/em&gt; between those who want complete top-down control, and those who would dare to seek their own path.&lt;/p&gt;
&lt;p&gt;Despite the best efforts of Big Tech corporations, governments and NGOs, people who took a stand against creeping totalitarianism were able to meet, organize, and share information. Tenuous alliances were formed, dissidents from all walks of life made new allies, forging bonds with people they wouldn&amp;rsquo;t have otherwise known.&lt;/p&gt;
&lt;p&gt;From the Technocracy&amp;rsquo;s point of view: this is a colossal mistake that &lt;em&gt;must be corrected&lt;/em&gt;. The dual nature of the Internet as a tool to track people, as well as allow them to share information; is starting to become untenable to the technocracy.&lt;/p&gt;
&lt;p&gt;Of course, they could try &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-9/&#34;&gt;shutting down the Internet&lt;/a&gt;, and starting something completely different. Instead of going for something so rash, we are currently witnessing a massive legislative push to grab immense power over people&amp;rsquo;s digital lives.&lt;/p&gt;
&lt;p&gt;For now, the primary objectives are to take control of:&lt;/p&gt;
&lt;h3 id=&#34;ranking-algorithms&#34;&gt;Ranking algorithms&lt;/h3&gt;
&lt;p&gt;We have all witnessed the incredible power of a majority of people getting their information from a small set of highly curated sources. Previously in the domain of corporations, the technocracy aims to put algorithms in control of either governments, or &lt;em&gt;public&lt;/em&gt;-&lt;em&gt;private partnerships&lt;/em&gt;.&lt;/p&gt;
&lt;h3 id=&#34;personal-communications&#34;&gt;Personal communications&lt;/h3&gt;
&lt;p&gt;Without the hindrance of a state and corporate backed censorship board, people can speak freely with each other if they choose. People&amp;rsquo;s own personal networks are a viable channel for dissent. Unable to leverage interpersonal trust, the technocracy has to nudge people to self-censor to their closest contacts.&lt;/p&gt;
&lt;h3 id=&#34;anonymity&#34;&gt;Anonymity&lt;/h3&gt;
&lt;p&gt;The ability for people to submit information to the public record without retaliation only really works in the people&amp;rsquo;s favour. Requiring some form of &lt;a href=&#34;https://libresolutions.network/tags/digital-id/&#34;&gt;Digital ID&lt;/a&gt; to use services or access information is a vital requirement to taking control of cyberspace.&lt;/p&gt;
&lt;h3 id=&#34;information&#34;&gt;Information&lt;/h3&gt;
&lt;p&gt;&amp;ldquo;Cybersecurity&amp;rdquo; is far more broad than merely protecting against computer viruses and data breaches. The censorship industrial complex treats &lt;a href=&#34;https://www.corbettreport.com/are-you-prepared-for-the-infodemic/&#34;&gt;counter-narratives&lt;/a&gt; as security concerns.&lt;/p&gt;
&lt;h1 id=&#34;the-legislation&#34;&gt;The Legislation&lt;/h1&gt;
&lt;hr&gt;
&lt;h2 id=&#34;un-cybercrime-treaty&#34;&gt;UN Cybercrime Treaty&lt;/h2&gt;
&lt;p&gt;Link: &lt;a href=&#34;https://www.unodc.org/unodc/en/cybercrime/ad_hoc_committee/home&#34;&gt;https://www.unodc.org/unodc/en/cybercrime/ad_hoc_committee/home&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;Ad Hoc Committee to Elaborate a Comprehensive International Convention on Countering the Use of Information and Communications Technologies for Criminal Purposes&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;That&amp;rsquo;s quite a mouthful, isn&amp;rsquo;t it? The EFF has a &lt;a href=&#34;https://www.eff.org/deeplinks/2023/04/decoding-uncybercrime-treaty&#34;&gt;helpful breakdown&lt;/a&gt;. The cybercrime treaty includes:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Restrictions on Free speech&lt;/li&gt;
&lt;li&gt;Expanded surveillance&lt;/li&gt;
&lt;li&gt;Sharing your information with other governments&lt;/li&gt;
&lt;li&gt;Compelled assistance in reducing security&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://youtu.be/eDYVUe8dPtI&#34;&gt;Five ways the draft U.N. Cybercrime Treaty undermines your rights&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;united-states-restrict-act&#34;&gt;United States: Restrict Act&lt;/h2&gt;
&lt;p&gt;Link: &lt;a href=&#34;https://www.congress.gov/bill/118th-congress/senate-bill/686&#34;&gt;https://www.congress.gov/bill/118th-congress/senate-bill/686&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Erroneously known as the &amp;ldquo;&lt;em&gt;Tiktok ban&lt;/em&gt;&amp;rdquo; the restrict act has been called the &amp;ldquo;&lt;strong&gt;Patriot Act 2.0&lt;/strong&gt;&amp;rdquo;. It proposes steep penalties and harsh sanctions on anyone using, or supporting, digital infrastructure deemed a threat to national security.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://youtu.be/Hq-nNSyGH1U&#34;&gt;The RESTRICT Act Is a Threat to Digital Freedom&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;europe-chat-control&#34;&gt;Europe: Chat Control&lt;/h2&gt;
&lt;p&gt;Link: &lt;a href=&#34;https://www.europarl.europa.eu/RegData/docs_autres_institutions/commission_europeenne/com/2020/0568/COM_COM(2020)0568_EN.pdf&#34;&gt;https://www.europarl.europa.eu/RegData/docs_autres_institutions/commission_europeenne/com/2020/0568/COM_COM(2020)0568_EN.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The game-changer in the ChatControl proposal is &lt;em&gt;client-side scanning&lt;/em&gt;, entirely by-passing &lt;a href=&#34;https://community.qbix.com/t/the-coming-war-on-end-to-end-encryption/214&#34;&gt;end-to-end encryption&lt;/a&gt;. The stated objective is to&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://youtu.be/ViirnWnoreA&#34;&gt;#StopScanningMe: How to actually protect children online&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;canada&#34;&gt;Canada&lt;/h2&gt;
&lt;h3 id=&#34;c-11&#34;&gt;C-11&lt;/h3&gt;
&lt;p&gt;Link: &lt;a href=&#34;https://www.parl.ca/LegisInfo/en/bill/44-1/c-11&#34;&gt;https://www.parl.ca/LegisInfo/en/bill/44-1/c-11&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;In the name of &lt;em&gt;preserving Canadian content,&lt;/em&gt; C-11 aims to give more control to the CRTC. This is a broad overview of Canadian internet regulations. A highly contested part of the legislation is regulations on user content.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://youtu.be/3pvBflhiCYM&#34;&gt;What Is Canada&amp;rsquo;s Dystopian &amp;ldquo;Online Streaming Act&amp;rdquo;?&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;c-26&#34;&gt;C-26&lt;/h3&gt;
&lt;p&gt;Link: &lt;a href=&#34;https://www.parl.ca/LegisInfo/en/bill/44-1/c-26&#34;&gt;https://www.parl.ca/LegisInfo/en/bill/44-1/c-26&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;A great deal of commentary of C-26 includes the phrase &lt;em&gt;cybersecurity &lt;strong&gt;is national security&lt;/strong&gt;&lt;/em&gt;. This bill is Canada&amp;rsquo;s revamp of cybersecurity legislation.&lt;/p&gt;
&lt;p&gt;Learn more: &lt;a href=&#34;https://fournier.substack.com/p/digital-surveillance-in-canada-2023&#34;&gt;https://fournier.substack.com/p/digital-surveillance-in-canada-2023&lt;/a&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;The truth is that this is a coordinated campaign that goes beyond even the technological impacts. One of the biggest challenges is that governments are stepping in to resolve problems created by corporate digital systems. While in some cases it may seem necessary, these bills take a sledgehammer to civil rights in the name of fighting real problems.&lt;/p&gt;
&lt;p&gt;It is not enough to merely disengage and try to adapt to these excesses. People must work together to take control of their own computing, then enforce our natural rights.The best way to truly oppose this wave of totalitarianism is to take on the responsibility yourself of making changes in your life.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>The Twitter and Substack Divorce</title>
		<link>https://libresolutions.network/articles/substack-vs-twitter/</link>
		<pubDate>Sat, 08 Apr 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/substack-vs-twitter/</guid>
		
		<image>https://libresolutions.network//media/images/musk-v-substack.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/musk-v-substack.webp" />
		<itunes:image href="https://libresolutions.network//media/images/musk-v-substack.webp" />
		<description>Big Tech turf wars</description>
		<content:encoded>&lt;p&gt;When it comes to Twitter, Substack was on borrowed time. Musk has shown &lt;a href=&#34;https://techcrunch.com/2022/12/15/elon-musk-suspends-mastodon-twitter-account-over-elonjet-tracking/&#34;&gt;anti-competitive behavior&lt;/a&gt; in the past. In response to Substack announcing their &lt;a href=&#34;https://www.racket.news/p/the-craziest-friday-ever&#34;&gt;notes feature&lt;/a&gt;, it appears as though Musk has &lt;a href=&#34;https://tessa.substack.com/p/twitter-is-censoring-substack&#34;&gt;sanctioned Substack&lt;/a&gt; in it&amp;rsquo;s entirety. I appreciate that Substack has been a valuable platform for many who spoke out during the Covid Crisis. They provide a quick way of starting a newsletter and a valuable feature of allowing cross-pollination between communities through social features.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/learning-lessons.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/social-media&#34;  &gt;&lt;h2&gt;Social Media: Learning the right lessons&lt;/h2&gt;&lt;i&gt;Understanding information control&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;At the end of the day, Substack is still a &lt;a href=&#34;https://www.gnu.org/philosophy/who-does-that-server-really-serve.html.en&#34;&gt;Service as a Software Substitute&lt;/a&gt;. Like many other entities, the convenience of getting started quickly or seamlessly is exchanged for a loss in freedom. Many rush to accuse Musk of &amp;ldquo;building walls&amp;rdquo; around his platform, but is Substack really much different?&lt;/p&gt;
&lt;p&gt;Substack made a deliberate decision to allow embedded twitter tweets and youtube videos, but hasn&amp;rsquo;t included various competitors to those platforms. Both twitter and Youtube have centralized and decentralized competitors that could have also been included, yet there is no sign of embedded PeerTube or even Rumble videos any time soon.&lt;/p&gt;
&lt;p&gt;Twitter has retaliated against Substack the same way it attacked Mastodon, by labeling links to the platform as dangerous. This is and was a blatant case of profit-driven disinformation, yet neither Musk nor Twitter will face any sanctions for watering down the concept of such warnings. It&amp;rsquo;s an act of deliberately yelling &amp;ldquo;Fire!&amp;rdquo; in your theater when a specific performer goes onstage.&lt;/p&gt;
&lt;h1 id=&#34;substack-under-attack&#34;&gt;Substack under attack?&lt;/h1&gt;
&lt;p&gt;The other day, the ADL published a &lt;a href=&#34;https://www.adl.org/resources/blog/antisemitism-false-information-and-hate-speech-find-home-substack-0&#34;&gt;list of substacks&lt;/a&gt; that included Steve Kirsch and Robert Malone among what they consider the worst of the worst. Arguing that Substack has too lax moderation policies. Odds are, you could zero in on the most controversial members of any big platform and would find similarly deviant participants. What&amp;rsquo;s interesting to note is the lumping in of the most visible critics of how the Covid Crisis was mismanaged. In time, we will see how Substack responds to these accusations moving forward.&lt;/p&gt;
&lt;p&gt;To the degree the platform has allowed authentic investigation into questions that the powerful don&amp;rsquo;t want investigated, every platform is under attack. It does not necessarily be an all-or-nothing affair, it could be limited to a specific author, or specific post that gets too much attention. No matter what, Substack is going to have a difficult task of balancing the needs of it&amp;rsquo;s writers against the pressures put against it.&lt;/p&gt;
&lt;h2 id=&#34;preserving-the-good&#34;&gt;Preserving the good&lt;/h2&gt;
&lt;p&gt;Substack is an excellent community. It&amp;rsquo;s one of the many places I&amp;rsquo;ve recently encountered a wealth of free-thinkers that have deliberately put themselves out to challenge the madness during the Covid Crisis. For many, it&amp;rsquo;s been a great place to encounter other people to express frustration about lockdowns, mandates, and consequences of bad policies when people&amp;rsquo;s friends, representatives, or even relatives wouldn&amp;rsquo;t hear it.&lt;/p&gt;
&lt;p&gt;Many have interpreted the partial removal of mandates as the end of the push for top-down tyranny. Unfortunately this is far from the case, if anything very dangerous precedents have been set without hardly any correction. I would encourage any fellow authors, especially those who wrote during the early days to get involved in documenting it on the &lt;a href=&#34;https://www.campfire.wiki/doku.php?id=covid-19_vaccines:injuries&amp;amp;s%5B%5D=operationuplift&#34;&gt;Campfire Wiki&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;There is a lot of excellent and valuable pertinent information exclusively on Substack. I would hope that all of these authors have made sure they have at least a local copy of their work instead of exclusively relying on Substack to keep it online. At minimum, I’d recommend archiving your favorite articles with something like &lt;a href=&#34;https://archive.is/&#34;&gt;archive.is&lt;/a&gt; to be preserved long term.&lt;/p&gt;
&lt;h3 id=&#34;guerrilla-publishing&#34;&gt;Guerrilla publishing&lt;/h3&gt;
&lt;p&gt;When it comes to Substack authors specifically being censored by twitter, many of them are lucky to have their content also be mirrored by &lt;a href=&#34;https://truthtalk.uk/&#34;&gt;Truth Talk&lt;/a&gt;. Oddly enough I am one such author lucky enough to have them &lt;a href=&#34;https://truthtalk.uk/author/libre-solutions-network/&#34;&gt;mirroring my writing&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;In addition to me, others are also mirrored.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://truthtalk.uk/author/Tessa-Lena/&#34;&gt;Tessa Lena&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://truthtalk.uk/author/lily/&#34;&gt;Lily&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://truthtalk.uk/author/Karen-Hunt/&#34;&gt;Karen Hunt&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;I greatly appreciate being included, and this is a model that would scale quite well. If authors were interested, volunteers could create new &amp;ldquo;hubs&amp;rdquo; to mirror excellent content across the Internet and bypass the basic link blacklisting censorship. This has the advantage of disarming the programmed response by people who will disregard content if it&amp;rsquo;s from &amp;ldquo;tainted&amp;rdquo; sources. You&amp;rsquo;ll note this is why the establishment has changed gears to emphasizing that people should only listen to &amp;lsquo;&lt;em&gt;approved&lt;/em&gt;&amp;rsquo; sources.&lt;/p&gt;
&lt;h2 id=&#34;a-better-way&#34;&gt;A better way&lt;/h2&gt;
&lt;p&gt;That’s really only part of the battle, because ideally you want your information to be easily accessible. Mirroring your content to a backup blog (or documents on your own machine) can go a long way. No matter what, you don’t want to put all your writing/research/work at the mercy of a single platform you don’t control.&lt;/p&gt;
&lt;p&gt;No matter what your process is, consider keeping your writing on your own hardware &amp;amp; software. This means either your own word processor or notes application, or something more sophisticated. This will make it easier to publish and migrate to a variety of other formats. It is fortuitous that I have recently written a guide on getting started on self-publishing yourself with static site generators.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/website.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/best-website-for-you&#34;  &gt;&lt;h2&gt;The best website for a single person&lt;/h2&gt;&lt;i&gt;Add your voice to the free and open web&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;If you&amp;rsquo;re interested in a more open and decentralized alternative, publishing your own website goes a long way. Static site generators make it easy, but unfortunately you may miss the social aspect. If more and more people migrated to the &lt;a href=&#34;https://libresolutions.network/articles/call-to-action-join-the-fediverse/&#34;&gt;fediverse&lt;/a&gt;, much of the community aspect could be integrated without the same top-down control of centralized social media. If you&amp;rsquo;re interested in a fediverse-native blogging platform there is &lt;a href=&#34;https://writefreely.org/&#34;&gt;write freely&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;To reiterate, please make sure your work isn&amp;rsquo;t at the mercy of any single platform. We have seen that the technocracy is eager to constrain the people&amp;rsquo;s access to information, and to wield the devastating weapon of information control. Reach is a sincere challenge, we can all make our own content resilient, but ultimately people need to have an active desire to seek out alternative voices.&lt;/p&gt;
&lt;p&gt;This is why the first operation, &lt;a href=&#34;https://libresolutions.network/operations/chorus/&#34;&gt;Chorus&lt;/a&gt; emphasizes the importance of freedom of speech and expression. Those of us with any ability to get the word out do have a &lt;em&gt;responsibility&lt;/em&gt; to boost and promote independent authentic voices. This is a tremendous task, there is much that needs to be said and little room to get through the few avenues of getting information to the public.&lt;/p&gt;
&lt;p&gt;If you recognize that challenge, you&amp;rsquo;ll understand my excitement for what we can do to truly democratize information dissemination. Everyone can take action in their own lives to redirect their attention away from platforms and services intended to &lt;em&gt;monopolize their access to information&lt;/em&gt;.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Rounding The Earth Interview</title>
		<link>https://libresolutions.network/videos/rounding-the-earth/</link>
		<pubDate>Tue, 28 Mar 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/rounding-the-earth/</guid>
		
		<image>https://libresolutions.network//media/images/rounding-the-earth.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/rounding-the-earth.webp" />
		<itunes:image href="https://libresolutions.network//media/images/rounding-the-earth.webp" />
		<description></description>
		<content:encoded>&lt;h1 id=&#34;rounding-the-earth&#34;&gt;Rounding The Earth&lt;/h1&gt;
&lt;blockquote&gt;
&lt;p&gt;Gabriel of Libre Solutions Network joins Mathew Crawford and Liam Sturgess to introduce the RTE community to an ever-growing world of alternative platforms for social media, communication and more.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Watch on &lt;a href=&#34;https://rumble.com/v2f3mdm-big-tech-solutions-round-table-w-gabe-of-libre-solutions-network.html&#34;&gt;Rumble&lt;/a&gt;
Show notes on &lt;a href=&#34;https://roundingtheearth.com/big-tech-solutions-libre-solutions-network/&#34;&gt;Rounding The Earth&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Follow Rounding The Earth on &lt;a href=&#34;https://roundingtheearth.substack.com/&#34;&gt;Substack&lt;/a&gt; or &lt;a href=&#34;https://roundingtheearth.locals.com&#34;&gt;locals&lt;/a&gt; and &lt;a href=&#34;https://roundingtheearth.com/feed&#34;&gt;RSS&lt;/a&gt;&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>The best website for a single person</title>
		<link>https://libresolutions.network/articles/best-website-for-you/</link>
		<pubDate>Fri, 24 Mar 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/best-website-for-you/</guid>
		
		<image>https://libresolutions.network//media/images/website.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/website.webp" />
		<itunes:image href="https://libresolutions.network//media/images/website.webp" />
		<description>Add your voice to the free and open web</description>
		<content:encoded>&lt;p&gt;Every single person should have their own website. I don&amp;rsquo;t just mean that we should all rush out to buy a fancy firstname.com domain. Instead, that it would benefit us all, if more people would take an active role in building the &lt;a href=&#34;https://home.cern/news/opinion/computing/open-internet-and-free-web&#34;&gt;&lt;em&gt;free and open web&lt;/em&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;As I wrote in &lt;a href=&#34;https://gabe.rocks/tech/reclaiming-cyberspace/&#34;&gt;Reclaiming Territory in Cyberspace&lt;/a&gt;, there are three primary resources in cyberspace:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Storage&lt;/li&gt;
&lt;li&gt;Computing Power&lt;/li&gt;
&lt;li&gt;Bandwidth&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;We are all lucky, that websites are not at all demanding when it comes to these resources. The biggest concern is storage, with bandwidth being the next most important factor. You need the storage to hold all the files in your website, and the bandwidth to reach your audience. I believe there are many conditions today, that if we were willing, could enable us to truly take the web out of the hands of governments and corporations.  Does this sound too good to be true? Allow me to make my case.&lt;/p&gt;
&lt;h1 id=&#34;understanding-static-websites&#34;&gt;Understanding static websites&lt;/h1&gt;
&lt;p&gt;A &lt;em&gt;static&lt;/em&gt; website is one that&amp;rsquo;s merely a collection of properly formatted files. These files will include the HTML, JavaScript and CSS (the skeleton of the website), as well as any other multimedia content like images and video.&lt;/p&gt;
&lt;p&gt;Static websites can be &lt;a href=&#34;https://motherfuckingwebsite.com/&#34;&gt;quite simple&lt;/a&gt; or support a &lt;a href=&#34;https://libresolutions.network/tags/voiceover/&#34;&gt;wide range of multimedia&lt;/a&gt;. Either way, it&amp;rsquo;s best to think of a static website as a pamphlet or poster that you can easily update. Depending on your ideal audience, it can be better to work with a text and links only but informative website, or include beautiful images, video or animations. This will all depend primarily on where you intend to store the website (in the cloud, or on your machine?) and how much bandwidth you and your audience have access to.&lt;/p&gt;
&lt;p&gt;While I am generally a critic of leveraging cloud infrastructure, static sites are one of the major exceptions. Since a static website is like a poster, hosting it on the cloud is akin to putting it up on a commercial, but prominent bulletin board. An underappreciated feature of static websites is that they are inherently unhackable. Like a poster, it can be taken down or defaced, but you&amp;rsquo;re never going to suffer a data breach or have it infect your systems.&lt;/p&gt;
&lt;h2 id=&#34;static-site-generators&#34;&gt;Static Site Generators&lt;/h2&gt;
&lt;p&gt;What makes static websites more accessible than ever is &lt;em&gt;static site generators&lt;/em&gt;, these generators are designed to allow people to ignore the nitty-gritty aspect of web design, and just get to writing content. What really makes static site generators excellent is that they make the job of maintaining a large and complicated website relatively simple for a single person.&lt;/p&gt;
&lt;p&gt;The basic process of using any static site generator to build your website is like this:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Install whichever generator you choose&lt;/li&gt;
&lt;li&gt;Run the generator to build a new project folder&lt;/li&gt;
&lt;li&gt;Browse the Generator&amp;rsquo;s themes gallery, and import whichever theme suits you&lt;/li&gt;
&lt;li&gt;Use whatever editor(s) you like to modify, copy and create files into where they need to be&lt;/li&gt;
&lt;li&gt;Run the generator command to view changes in real time&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;em&gt;Pages are usually written in &lt;a href=&#34;https://www.markdownguide.org/basic-syntax/&#34;&gt;markdown&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;
&lt;h3 id=&#34;hugo&#34;&gt;Hugo&lt;/h3&gt;
&lt;p&gt;Site: &lt;a href=&#34;https://gohugo.io/&#34;&gt;https://gohugo.io/&lt;/a&gt;&lt;br&gt;
Themes: &lt;a href=&#34;https://themes.gohugo.io/&#34;&gt;https://themes.gohugo.io/&lt;/a&gt;&lt;br&gt;
Documentation: &lt;a href=&#34;https://gohugo.io/documentation/&#34;&gt;https://gohugo.io/documentation/&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;jekyll&#34;&gt;Jekyll&lt;/h3&gt;
&lt;p&gt;Site: &lt;a href=&#34;https://jekyllrb.com/&#34;&gt;https://jekyllrb.com/&lt;/a&gt;&lt;br&gt;
Themes: &lt;a href=&#34;https://jekyllrb.com/docs/themes/&#34;&gt;https://jekyllrb.com/docs/themes/&lt;/a&gt;&lt;br&gt;
Documentation: &lt;a href=&#34;https://jekyllrb.com/docs/&#34;&gt;https://jekyllrb.com/docs/&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;zola&#34;&gt;Zola&lt;/h3&gt;
&lt;p&gt;Site: &lt;a href=&#34;https://www.getzola.org/&#34;&gt;https://www.getzola.org/&lt;/a&gt;&lt;br&gt;
Themes: &lt;a href=&#34;https://www.getzola.org/themes/&#34;&gt;https://www.getzola.org/themes/&lt;/a&gt;&lt;br&gt;
Documentation: &lt;a href=&#34;https://www.getzola.org/documentation/&#34;&gt;https://www.getzola.org/documentation/&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;hexo&#34;&gt;Hexo&lt;/h3&gt;
&lt;p&gt;Site: &lt;a href=&#34;https://hexo.io/&#34;&gt;https://hexo.io/&lt;/a&gt;&lt;br&gt;
Themes: &lt;a href=&#34;https://hexo.io/themes/&#34;&gt;https://hexo.io/themes/&lt;/a&gt;&lt;br&gt;
Documentation: &lt;a href=&#34;https://hexo.io/docs/&#34;&gt;https://hexo.io/docs/&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;astro&#34;&gt;Astro&lt;/h3&gt;
&lt;p&gt;Site: &lt;a href=&#34;https://astro.build/&#34;&gt;https://astro.build/&lt;/a&gt;&lt;br&gt;
Themes: &lt;a href=&#34;https://astro.build/themes&#34;&gt;https://astro.build/themes&lt;/a&gt;&lt;br&gt;
Documentation: &lt;a href=&#34;https://docs.astro.build/en/tutorial/0-introduction/&#34;&gt;https://docs.astro.build/en/tutorial/0-introduction/&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;enhancement-themes&#34;&gt;Enhancement: Themes&lt;/h3&gt;
&lt;p&gt;Themes are important, they do a lot of really heavy lifting in the end-result of the generated site. Themes will outline what goes in the headers, footers, sidebars and the overall look of the site. Themes will also have control over some of the finer details like social media previews and RSS integration.&lt;/p&gt;
&lt;p&gt;This is what&amp;rsquo;s motivated me to build my two Hugo themes &lt;a href=&#34;https://code.gabe.rocks/gabriel/freedom&#34;&gt;Freedom&lt;/a&gt; and &lt;a href=&#34;https://code.gabe.rocks/gabriel/valor&#34;&gt;Valor&lt;/a&gt; from the ground up. They are very much a work in progress, but I appreciate having a fine degree of control. Odds are if you have very specific requirements, modifying an existing theme can also work for you.&lt;/p&gt;
&lt;h3 id=&#34;enhancement-widgets&#34;&gt;Enhancement: Widgets&lt;/h3&gt;
&lt;p&gt;Static sites are nice, but you want &lt;em&gt;MORE&lt;/em&gt;. If you want to add dynamic features like comments or real-time integrations, overhauling the theme can be overkill. Often you can create &lt;em&gt;shortcodes&lt;/em&gt;, that will give you the ability to include custom html/css/javascript that will work like a new widget with enhanced functionality.&lt;/p&gt;
&lt;p&gt;Some theme generators will also give you the ability to &lt;em&gt;override&lt;/em&gt; parts of the theme. For example, if you want to add icons to the navigation menu, you could copy the existing one into the designated overrides folder and add your icons there.&lt;/p&gt;
&lt;h3 id=&#34;enhancement-version-control&#34;&gt;Enhancement: Version control&lt;/h3&gt;
&lt;p&gt;Ouch! You&amp;rsquo;ve gotten hit by a &lt;a href=&#34;https://www.cisa.gov/stopransomware/ransomware-guide&#34;&gt;ransomware attack&lt;/a&gt;. All your files have been encrypted by a virus, and can&amp;rsquo;t be recovered unless you hand the hackers some Monero. Thankfully, you&amp;rsquo;ve been using a self-hosted version control system like &lt;a href=&#34;https://gitea.io/en-us/&#34;&gt;Gitea&lt;/a&gt;. So you can simply pull down the old version of the website and upload it again. Version control allows you to have a permanent record of changes made over time.&lt;/p&gt;
&lt;h4 id=&#34;teams&#34;&gt;Teams&lt;/h4&gt;
&lt;p&gt;Online version control is also very useful for collaboration. Instead of maintaining the static website alone, you can share access to the repository with others. Many online source control providers will often also include &lt;a href=&#34;https://docs.codeberg.org/codeberg-pages/pushing-output/&#34;&gt;integrated hosting&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;hosting&#34;&gt;Hosting&lt;/h2&gt;
&lt;p&gt;Static websites are &lt;em&gt;portable&lt;/em&gt; by nature. As long as the site structure is sound (use relative links) you can often put &lt;em&gt;mirrors&lt;/em&gt; in multiple locations. This is an excellent way to maintain a resilient presence, instead of relying on a single point of failure. Because static websites are often quite simple and small, multiple uploads of the same content aren&amp;rsquo;t always so arduous.&lt;/p&gt;
&lt;h3 id=&#34;online-source-control&#34;&gt;Online Source Control:&lt;/h3&gt;
&lt;p&gt;Want to get started quickly? &lt;a href=&#34;https://pages.github.com/&#34;&gt;Github Pages&lt;/a&gt; has an excellent overview on how to use &lt;a href=&#34;https://rogerdudler.github.io/git-guide/&#34;&gt;Git&lt;/a&gt; to push your static site to a repository and get running immediately.&lt;/p&gt;
&lt;p&gt;You can also use:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://docs.codeberg.org/codeberg-pages/pushing-output/&#34;&gt;Codeberg Pages&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://docs.gitlab.com/ee/user/project/pages/&#34;&gt;Gitlab Pages&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;own-your-own-domain&#34;&gt;Own your own domain&lt;/h2&gt;
&lt;p&gt;When you buy your &lt;em&gt;domain&lt;/em&gt;, which is your web address online, (e.g. &lt;a href=&#34;https://libresolutions.network&#34;&gt;https://libresolutions.network&lt;/a&gt;) you&amp;rsquo;re going to want to own the domain yourself. This means that you purchase your domain directly from a domain registrar. For an often modest yearly fee, you can secure a name on the regular internet. It&amp;rsquo;s important to have control over the dns records yourself, in case you feel the need to migrate or add additional services.&lt;/p&gt;
&lt;h3 id=&#34;managed-hosting&#34;&gt;Managed hosting&lt;/h3&gt;
&lt;p&gt;Often, domain registrars themselves will offer some form of &lt;em&gt;managed hosting&lt;/em&gt;. This means some tool like cPanel will be available to you to simply upload the files to the site directly.&lt;/p&gt;
&lt;h3 id=&#34;diy-hosting&#34;&gt;DIY Hosting&lt;/h3&gt;
&lt;p&gt;You can always run your own web server, although it will require more technical knowledge. Going DIY allows you to reduce as many intermediaries as possible.&lt;/p&gt;
&lt;h2 id=&#34;getting-on-the-dark-web&#34;&gt;Getting on the Dark Web&lt;/h2&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/tott-9-preview.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-9&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #9 Internet Shutdowns&lt;/h2&gt;&lt;i&gt;Information control is the root of modern tyranny.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;For those concerned about the increase in draconian control over the Internet, it can be helpful to mirror their content to one or many darknets, such as Tor or I2P. Even as a regular web user, I would highly recommend at least having the knowledge of how to visit websites on the darknet, for we do not know what kind of measures will be used in future crises.&lt;/p&gt;
&lt;h3 id=&#34;sneakernet&#34;&gt;Sneakernet&lt;/h3&gt;
&lt;p&gt;With a static website, you don&amp;rsquo;t have to worry about complicated things like databases and user accounts. This means you have the advantage of being able to mirror the entire content onto a physical, portable format that can be distributed in person. When paired with version control, it can become a very efficient means of securely distributing large amounts of critical data.&lt;/p&gt;
&lt;p&gt;Who knows? Maybe we can start supporting independent websites by purchasing archives in &lt;a href=&#34;https://newworldnextweek.com/products/corbett-report-2010-data-archive-usb-flash-drive&#34;&gt;a physical format!&lt;/a&gt;&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>The Collapse of the Intangible</title>
		<link>https://libresolutions.network/articles/collapse-of-the-intangible/</link>
		<pubDate>Tue, 21 Mar 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/collapse-of-the-intangible/</guid>
		
		<image>https://libresolutions.network//media/images/abstract.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/abstract.webp" />
		<itunes:image href="https://libresolutions.network//media/images/abstract.webp" />
		<description>Keeping your head above water in a tsunami of change</description>
		<content:encoded>&lt;p&gt;I&amp;rsquo;ve reflected on how the rapid pace of change has warped my perspective relative to those significantly older than me. Becoming curious how upcoming changes and trends will leave me out of step with new experiences.&lt;/p&gt;

&lt;video muted autoplay preload=&#34;none&#34;&gt;
    &lt;source src=&#39;https://libresolutions.network/media/video/mirror.mp4&#39;&gt;
&lt;/video&gt;

&lt;p&gt;Video: &lt;a href=&#34;https://youtu.be/-7mTJVyTR-w&#34;&gt;Yayoi Kusama Infinity Mirrors&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Advanced machine learning models have allowed people to hold a mirror up to the vastness of internet data. This is not just any mirror, but an &lt;a href=&#34;https://youtu.be/-7mTJVyTR-w&#34;&gt;&lt;em&gt;infinity mirror&lt;/em&gt;&lt;/a&gt;. This phenomenal infinity mirror transforms a mere slice of the human experience into a kaleidoscope of infinite possibilities. It&amp;rsquo;s the ultimate creative &lt;em&gt;force multiplier&lt;/em&gt;. This unleashing of creative force will inevitably be used to spread both joy and pain in incalculable ways. The game is changing.&lt;/p&gt;
&lt;h1 id=&#34;all-intangible-value-is-heading-to-zero&#34;&gt;All &lt;em&gt;intangible&lt;/em&gt; value is heading to zero&lt;/h1&gt;
&lt;p&gt;What does this really mean? All kinds of media (articles, photos, videos, etc.) will be entirely fungible. With the assistance of automated text generation tools, people have &lt;a href=&#34;https://www.scmp.com/tech/big-tech/article/3211051/chatgpt-written-books-are-flooding-amazon-people-turn-ai-quick-publishing&#34;&gt;rushed to flood&lt;/a&gt; existing niches of creativity. As these tools improve, more and more complex media will be often little more than a mere thought away.&lt;/p&gt;
&lt;p&gt;As copyright holders struggled to contain digital distribution, they&amp;rsquo;re no match for automated &lt;em&gt;regeneration&lt;/em&gt; of personalized derivatives. Any remix or rehash of old ideas is within the grasp of anyone with access to tools trained on them. Imitations, parody, outright frauds are all inevitably going to saturate any and every available context.&lt;/p&gt;
&lt;p&gt;This isn&amp;rsquo;t limited to content, impersonation is well within reach. You may receive a call from a familiar voice, only for it to be a scammer impersonating your relative. Video and voice deepfakes aren&amp;rsquo;t necessarily new, but it&amp;rsquo;s clear these things are going to be more within reach over time. This can have the effect of eroding trust in nearly any digital context. With very few (if any) ways to demonstrate authenticity, it will be impossible to validate frauds from genuine actors. Online spaces that were once giant profit-earning engines will dwindle into a mere ghost of the past.&lt;/p&gt;
&lt;h2 id=&#34;desperate-measures&#34;&gt;Desperate Measures&lt;/h2&gt;
&lt;p&gt;Governments, corporations and all the powers of the world will rush to keep this all under their control. The last thing they need is individuals having the power to rapidly and efficiently communicate ideas in a variety of ways. While people may be presently separated by differing experiences or ways of thinking, these tools have the ability to help people effectively &lt;em&gt;translate&lt;/em&gt; cultural messages.&lt;/p&gt;
&lt;p&gt;Imagine a trivial scenario. An activist finds a fantastic article that explains a vital concept in a useful way. They want to share with others, but can&amp;rsquo;t quite &lt;em&gt;express the idea&lt;/em&gt; for those coming from a different perspective. Now they have the power to use automated tools that may better understand the other&amp;rsquo;s context.&lt;/p&gt;
&lt;p&gt;All kinds of intangible differences between people evaporating would cause significant troubles for those who profit off those distinctions. Suddenly, almost anyone can be &lt;em&gt;brought up to speed&lt;/em&gt;, regardless of ideology.&lt;/p&gt;
&lt;p&gt;Actions taken to restrict or control machine learning algorithms aren&amp;rsquo;t likely to succeed. Without successfully robbing people of all general-purpose computing, there will always be mechanisms to circumvent interference. Amusingly enough, we&amp;rsquo;re already witnessing them being &lt;a href=&#34;https://arstechnica.com/information-technology/2023/03/you-can-now-run-a-gpt-3-level-ai-model-on-your-laptop-phone-and-raspberry-pi/&#34;&gt;redistributed to inexpensive machines&lt;/a&gt;. Like Prometheus gifting fire to mankind, it would seem that the very technology itself is prone to democratization.&lt;/p&gt;
&lt;h1 id=&#34;the-hard-limit-information&#34;&gt;The hard limit: Information&lt;/h1&gt;
&lt;p&gt;No matter how powerful these tools become, they have one unmovable obstacle; they can&amp;rsquo;t create information. Representing existing information in other ways is possible, but these tools can&amp;rsquo;t act on information that isn&amp;rsquo;t there.&lt;/p&gt;
&lt;p&gt;For example, generating articles or other short written content is quite trivial. With the ability to generate limitless words, you&amp;rsquo;re presented with a challenge: &lt;em&gt;What to say?&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Do you continue banging the same drum in a multitude of different ways?&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;There&amp;rsquo;s value in that. It&amp;rsquo;s a highly effective way to communicate fundamental concepts to different people.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Will you strive on your own to bring something genuinely unique, at your own pace?&lt;/em&gt;&lt;/p&gt;
&lt;h3 id=&#34;the-adventurer&#34;&gt;The adventurer&lt;/h3&gt;
&lt;p&gt;If you&amp;rsquo;re faced with the potentiality of people creating countless imitations of your original ideas, do you abandon your quest? Shut down and sit in the cave watching the shadows? Or do you leave the endless noise and forge a new path?&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s important not to fear the power of limitless creation. For those who wish to discover and create, it is an opportunity to be the very root of countless experiences. This is the best guarantee anyone can have that their accomplishments and insights will truly leave a mark on history.&lt;/p&gt;
&lt;p&gt;With all the tools of at your disposal, it&amp;rsquo;s critical to focus on &lt;em&gt;what should be said&lt;/em&gt; rather than merely what can be said. Understand that you&amp;rsquo;ll have no significant advantage following the crowd that wants to endlessly regenerate new iterations of popular or alluring experiences. Regardless of if you embrace media generation tools, or shun them entirely, steer your mind on how you can share joy, love and hope.&lt;/p&gt;
&lt;h1 id=&#34;rebuilding-balance&#34;&gt;Rebuilding balance&lt;/h1&gt;
&lt;p&gt;Almost everyone today has reservations about the drastic impact the Internet has had as it&amp;rsquo;s taken over our lives. The saturation of the intangible gives us an opportunity to &lt;em&gt;leave the immaterial to be immaterial&lt;/em&gt;. Leave the free and open web to become a space for sharing and learning from information, but not allowing it to become a parasocial replacement for living.&lt;/p&gt;
&lt;p&gt;It seems that we are at the beginning of an immense &lt;em&gt;fracturing&lt;/em&gt; of our way of life. While the intangible creations will continue to have dwindling value over time, becoming overly invested in them is a path to self-destruction. This may very-well be the &amp;ldquo;last call&amp;rdquo; to those who would like to escape the machinations that dominate the minds of the people.&lt;/p&gt;
&lt;p&gt;To truly be &lt;em&gt;ahead of the game&lt;/em&gt;, one needs to wholeheartedly embrace genuine tangible interactions with other people. While the Internet can be a fantastic and wondrous place, we should live for each other and not the machine. It&amp;rsquo;s never a bad time to lend someone some assistance, build something new, or even do something active.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Tools of the Technocracy: #11 Social Credit</title>
		<link>https://libresolutions.network/articles/tools-of-the-technocracy-11/</link>
		<pubDate>Sat, 04 Mar 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/tools-of-the-technocracy-11/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/tools-of-the-technocracy11.mp3" />
			
		
		<image>https://libresolutions.network//media/images/chains.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/chains.webp" />
		<itunes:image href="https://libresolutions.network//media/images/chains.webp" />
		<description>What&#39;s new is old.</description>
		<content:encoded>&lt;h1 id=&#34;tools-of-the-technocracy--11-social-credit&#34;&gt;&lt;a href=&#34;https://libresolutions.network/tags/tools-of-the-technocracy-series&#34;&gt;Tools of the Technocracy&lt;/a&gt;:  #11 Social Credit&lt;/h1&gt;
&lt;p&gt;I will remind you of the &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy/&#34;&gt;opening&lt;/a&gt; for this series:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;In the past, tyrants and dictators have had a hard limit on how far they could push people. From either logistical difficulties, fear of resistance, or liberation from other nations; these hard limits have been getting softer and softer as technology advances. Recent history has shown an ever-increasing centralization of power into a smaller and smaller set of control structures.&lt;/p&gt;
&lt;p&gt;&amp;hellip;&lt;/p&gt;
&lt;p&gt;The tyrants of the world are winning a massive arms race against the rest of humanity. We must not merely avoid these systems, rather every one of us is responsible for preventing them from being weaponized against the people.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;The covid crisis was a preemptive strike&lt;sup id=&#34;fnref:1&#34;&gt;&lt;a href=&#34;#fn:1&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;1&lt;/a&gt;&lt;/sup&gt; against those who would consider challenging perpetual top-down control. Using unjustified and arbitrary measures to put small enterprises out of business,&lt;sup id=&#34;fnref:2&#34;&gt;&lt;a href=&#34;#fn:2&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;2&lt;/a&gt;&lt;/sup&gt; putting many workers out of work. Sabotaging the education of millions of children.&lt;sup id=&#34;fnref:3&#34;&gt;&lt;a href=&#34;#fn:3&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;3&lt;/a&gt;&lt;/sup&gt; Separating families, and forcing the elderly to die alone.&lt;sup id=&#34;fnref:4&#34;&gt;&lt;a href=&#34;#fn:4&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;4&lt;/a&gt;&lt;/sup&gt; Deploying a barrage of fear and propaganda that many have hardly recovered from. The total human cost is incalculable, but the oligarchs made trillions.&lt;sup id=&#34;fnref:5&#34;&gt;&lt;a href=&#34;#fn:5&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;5&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;All that, was just in 2020.&lt;/p&gt;

&lt;p&gt;Odds are, if you&amp;rsquo;re reading this you&amp;rsquo;re very well aware of this. The problem is you have to understand the majority of people hardly understand it. This preemptive strike against the public was deliberate and calculated, the lack of serious mainstream accounting is all the proof anyone needs.&lt;sup id=&#34;fnref:6&#34;&gt;&lt;a href=&#34;#fn:6&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;6&lt;/a&gt;&lt;/sup&gt; The legacy  media is (at the time of writing) complicit in justifying the measures and downplaying the harms. Upper-middle class workers in the so-called &amp;rsquo;laptop class&amp;rsquo; were effectively bribed with generous work from home policies. While they had the time to investigate the wider issues around them, many chose not to &lt;em&gt;&amp;ldquo;rock the boat&amp;rdquo;&lt;/em&gt;.&lt;/p&gt;
&lt;h3 id=&#34;not-my-problem&#34;&gt;&amp;ldquo;&lt;em&gt;Not my problem&lt;/em&gt;&amp;rdquo;&lt;/h3&gt;
&lt;p&gt;Why don&amp;rsquo;t people &lt;em&gt;care&lt;/em&gt;? Anyone aware of this can just look around and see incredible amounts of devastation everywhere they look. Surely &lt;em&gt;everyone&lt;/em&gt; can&amp;rsquo;t be so blatantly ignorant? It&amp;rsquo;s true that many may genuinely struggle to make the connection, even if they can see it, but that doesn&amp;rsquo;t quite explain the overwhelming wave of apathy that meets these issues. People are vastly misinformed about their place in the world, and the diffusion of responsibility is pure paralysis for those who aren&amp;rsquo;t prepared to take responsibility.&lt;/p&gt;
&lt;p&gt;What does all this have to do with social credit systems?&lt;/p&gt;
&lt;h1 id=&#34;a-gentle-introduction-to-the-human-dominance-hierarchy&#34;&gt;A gentle introduction to the human dominance hierarchy&lt;/h1&gt;
&lt;p&gt;Tyranny and abuse weren&amp;rsquo;t invented in 2020. Much of what has happened, has already happened in similar ways or all kinds of variations. For as long as there have been humans, you can count on some of them to form groups to seize control over resources, territory, and other people. Everything from your local social group, to geopolitical alliances between nations is encompassed in this.&lt;/p&gt;
&lt;p&gt;There have been precious few exceptions and limitations. Historically, though a lot of blood, sweat and tears people were able to set limits on the abuses powers could get away with. Back in 13th century, through the Magna Carta; people managed to codify that even the king, the ruler and owner of everything, needed to have limits.&lt;sup id=&#34;fnref:7&#34;&gt;&lt;a href=&#34;#fn:7&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;7&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Whenever Legislators endeavor to take away and destroy the property of the people, or to reduce them to slavery under arbitrary power, they put themselves into a state of war with the people, who are thereupon absolved from any further obedience.&lt;/p&gt;
&lt;p&gt;John Locke&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;This is because at even the simplest level, a gang requires some degree of chosen (or coerced) participation. The decision-makers form a chain of compliance that must remain unbroken for orders to reach all the way to the lowest levels. This means that the &amp;ldquo;game&amp;rdquo; participants play has to account for every level of the system. As groups get larger, from villages and towns to globe-spanning empires, the &amp;lsquo;game&amp;rsquo; of raw domination would take on more abstractions and aspects of soft-power. Every aspect of human life is downstream of our collective behavior in this dominance hierarchy.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/programmable-currency.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/programmable-currency&#34;  &gt;&lt;h2&gt;Programmable currency&lt;/h2&gt;&lt;i&gt;What is it good for?&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;For example, some countries may emphasize great importance in education to develop competitive technologies to gain wealth. Others may merely use their military might to seize resources from other regions. The impacts of those differences will reverberate down to even the humble carpenter. Regardless if the country is a top-down command economy, or an entirely free market, the carpenter will find success or failure based on how compatible his products are with the power structure. In one he may have more success and status making tools, in the other he may do better making weapons.&lt;/p&gt;
&lt;p&gt;This all sounds rather bleak. Wouldn&amp;rsquo;t it be better if we had a good hierarchy, or none at all?&lt;/p&gt;
&lt;h3 id=&#34;the-story-of-i-am-good&#34;&gt;The story of &amp;ldquo;&lt;em&gt;I am good&lt;/em&gt;&amp;rdquo;&lt;/h3&gt;
&lt;p&gt;People can be sold a lie that&amp;rsquo;s merely a convenient pretext to participate in conquest or to mistreat others within society. Beyond lies, lots of true information can be leveraged in support of the dominant order. One can easily argue that opponents of it are misfits, freaks, or even deplorables, and that the system&amp;rsquo;s foreign enemies really aren&amp;rsquo;t any better.&lt;/p&gt;
&lt;p&gt;In fact, in many circumstances their own self-preservation instincts will fight their better senses to conform. Just as a baby knows it will die when unloved&lt;sup id=&#34;fnref:8&#34;&gt;&lt;a href=&#34;#fn:8&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;8&lt;/a&gt;&lt;/sup&gt;, every cell in your body understands what standing against the dominance hierarchy means. This places an overwhelming amount of stress on anyone who consciously exists outside or against it. For the story of &amp;ldquo;&lt;em&gt;I am good&lt;/em&gt;&amp;rdquo; to take hold of society, it doesn&amp;rsquo;t need to be particularly robust, it hinges on people&amp;rsquo;s natural impulses.&lt;/p&gt;
&lt;p&gt;As an individual, it can be difficult to understand how your actions can cause risk or harm to others. I am highly suspicious that the Social Justice movement was weaponized to get people to reflexively defend their position within the hierarchy. &amp;ldquo;&lt;em&gt;Check your privilege&lt;/em&gt;&amp;rdquo; was not only a rhetorical weapon used to silence others, but backs people into a corner of &lt;em&gt;system justification&lt;/em&gt;.&lt;sup id=&#34;fnref:9&#34;&gt;&lt;a href=&#34;#fn:9&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;9&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;This isn&amp;rsquo;t to say a good and fair dominance hierarchy &lt;em&gt;can&amp;rsquo;t exist&lt;/em&gt;. It&amp;rsquo;s just that it has to overcome the challenges posed by competing hierarchies that compete on raw force and efficiency. There are good people constantly working to level the playing field or address problems, we know meaningful change is possible. It just does require difficult things like compromise and consensus.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/high-places.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/high-places&#34;  &gt;&lt;h2&gt;Redefining &amp;#34;High Places&amp;#34;&lt;/h2&gt;&lt;i&gt;Lets re-balance power from the bottom-up&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;Things can be hard for those who recognize what&amp;rsquo;s gone wrong and want to fix it.&lt;/p&gt;
&lt;h3 id=&#34;radicals-vs-reformers&#34;&gt;Radicals vs Reformers&lt;/h3&gt;
&lt;p&gt;The only true revolution is the replacement of an existing dominance hierarchy with a different one. This is what radicals want, while reformers simply want to modify the structure of the existing one.&lt;/p&gt;
&lt;p&gt;Reformers want to make the dominance hierarchy more fair or efficient, ideally with sane and humane goals. They recognize the benefits of preserving what&amp;rsquo;s functional within the existing structures. Even the most effective reformers will struggle against various &lt;em&gt;inflexibilities&lt;/em&gt; of the system refusing to bend.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/snowjob.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/anatomy-of-a-psyop&#34;  &gt;&lt;h2&gt;Anatomy of a psyop&lt;/h2&gt;&lt;i&gt;Cognitive warfare in action&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;Radicals may or may not also want those things, but more principally want the dominance hierarchy &lt;em&gt;reorganized&lt;/em&gt;. For some games like monarchy, replacing the king could result in a dramatic shift. Radicals recognize that those with status and resources within the hierarchy are squandering them, and that they should be used in a different way. Radicals often struggle to build meaningful coalitions to support overthrowing the existing dominance hierarchy.&lt;/p&gt;
&lt;p&gt;In the context of many activist movements, among those who agree on many issues, the dividing line will be between radicals and reformers. The radicals will accuse the reformers of being propped-up by the existing power-structure. Then the reformers will retort that the radicals are sabotaging meaningful change with their resentment, arguing that keeping the power structure in place is a fair trade for meaningful change.&lt;/p&gt;
&lt;p&gt;One of the stronger adaptations a dominance hierarchy can have is &lt;em&gt;flexibility&lt;/em&gt;. A rigid system is too vulnerable to being outright overthrown by radicals. Instead of single-handedly orchestrating your machinations, it can be quite effective to open bid those actions to those you will reward handsomely. This is an excellent tactic to prevent defectors, because those interested in their own self-advancement will align themselves to your goals. Suddenly your vast conspiracy to dominate others is working as a decentralized network with plausible deniability, with the added bonus of components being entirely replaceable.&lt;/p&gt;
&lt;h1 id=&#34;social-credit&#34;&gt;Social credit&lt;/h1&gt;
&lt;p&gt;What fuels a social credit system is to reduce one&amp;rsquo;s participation in society to currency. Many would argue we&amp;rsquo;re already there, but the existence of public goods, like a free and open internet can go a long way to &lt;em&gt;level the playing field&lt;/em&gt;. Carbon allowances, CBDC&amp;rsquo;s, energy rationing, smart contracts are all things that can be used interchangeably to place restrictions on individuals for their conduct. What this changes is that room for those who don&amp;rsquo;t culturally, intellectually, or morally conform to society is all but eliminated. Suddenly, all of humanity is reduced to mere &lt;em&gt;cogs in the machine&lt;/em&gt; for some &amp;lsquo;greater purpose&amp;rsquo;.&lt;/p&gt;
&lt;p&gt;Maybe you&amp;rsquo;ve got a &amp;lsquo;greater purpose&amp;rsquo; in mind for such a system. I can promise you that it&amp;rsquo;s pure madness. The very imposition of such tools for total top-down control &lt;em&gt;themselves&lt;/em&gt; are incompatible with fundamental morality. For example, we have seen an incredible rise in censorship, yet hate remains and people aren&amp;rsquo;t noticeably any nicer online. I am highly skeptical that this would improve in different hands. Merely replacing one tyrant for another isn&amp;rsquo;t the answer here.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://youtu.be/rStL7niR7gs&#34;&gt;The Rules for Rulers - CGP Grey&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;the-game-of-power&#34;&gt;The game of power&lt;/h2&gt;
&lt;p&gt;A social credit system is an &lt;em&gt;implementation&lt;/em&gt; of the human dominance hierarchy. The system functions to incentivize individuals to conform to the decision-maker&amp;rsquo;s goals. Today, because people are rightly concerned with the dreams of the technocrats they remain arrogantly ignorant of the existing mechanisms of social control. Social conventions, institutions, and financial incentives are all downstream of the human dominance hierarchy. Instead of running through a digital ID and connected to a smart-contract fueled grid, it runs on people.&lt;/p&gt;
&lt;p&gt;People decide who is high status and low status. Every act, either reaffirms or denigrates the dominance hierarchy and has associated consequences. Money is merely currency. People&amp;rsquo;s entire lives are ruled by how they are treated by those around them. There are many non-financial actions that have immense impact on a person&amp;rsquo;s overall well-being. Reducing the sum-total effects of human social interactions to financial transactions is to explore a planet through a keyhole.&lt;/p&gt;
&lt;p&gt;The &amp;ldquo;Great Reset&amp;rdquo; and 4th industrial revolution &lt;em&gt;are in fact a revolution&lt;/em&gt;. This revolution is one that reduces the various &amp;lsquo;inefficiencies&amp;rsquo; in the human dominance hierarchy from the perspective of the technocrats. Instead of allowing people to evaluate their situation and use their mind to respond, the goal is to construct a system that dictates how they &lt;em&gt;should&lt;/em&gt; act.&lt;/p&gt;
&lt;h1 id=&#34;analog-to-digital&#34;&gt;Analog to digital&lt;/h1&gt;
&lt;p&gt;The advantage of going digital means that you replace an army of well paid upper to middle class managers with mere code that the rest of humanity is forced to live by. Effectively, the oligarch class has decided to &amp;ldquo;&lt;em&gt;cut out the middle man&lt;/em&gt;&amp;rdquo; between themselves and the workforce. By simplifying everyone&amp;rsquo;s vocation to a set of rigid standards that must be followed without question, nobody is safe from being replaced with a trivial software suite and an army of underpaid &amp;lsquo;gig workers&amp;rsquo;.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/skynet-workforce.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/skynet-workforce&#34;  &gt;&lt;h2&gt;The Rise of a SkyNet Workforce&lt;/h2&gt;&lt;i&gt;&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;Just as people communicate social signals, a digital social credit system will communicate praise or condemnation in a variety of ways. Instead of merely fining people or using the brutality of a criminal justice system, the technocracy can simply de-rank the individual and their associates. To some this may appear as more compassionate, but may end up having incalculable harms and distortions in the long run.&lt;/p&gt;
&lt;p&gt;Just as advertising algorithms have already learned how to influence and manipulate people, more and more machines can be deployed to manage human beings. Many organizations that currently exist would be made totally obsolete, for better or worse. There &lt;em&gt;are&lt;/em&gt; many efficiencies to further digitizing society, but there&amp;rsquo;s no real need to implement it in such a top-down manner.&lt;/p&gt;
&lt;h3 id=&#34;central-planing-works-but-all-effective-central-planners-are-evil&#34;&gt;Central planing works, but all effective central planners are evil&lt;/h3&gt;
&lt;p&gt;Robots are no exception. Tyrants in nations and the workforce are often poor performers unless they figure out ways to expend those around them as a resource for greater efficiency. Do you really expect the digital social credit system to place a high value on your individual well-being? I would already bet against it. In many countries, there are poor protections for fundamental rights. In addition to this, in the last few decades civil rights gains have only carved out additional niches of protection rather than protecting individuals as a whole. The &amp;ldquo;protected class&amp;rdquo; framework will likely not protect anyone when civil rights are entirely discarded on an individual level.&lt;/p&gt;
&lt;h3 id=&#34;population-management&#34;&gt;Population management&lt;/h3&gt;
&lt;p&gt;It really is impossible to overstate the danger of putting humanity&amp;rsquo;s fate into the hands of a few technocrats. Their malthusian desire to lower the population is something they&amp;rsquo;ve made abundantly clear. If only that was the worst of it, with existing technologies at their disposal, the capability exists to &lt;em&gt;alter&lt;/em&gt; what remains of humanity in fundamental ways. People haven&amp;rsquo;t been getting any healthier under their watch, and we would only watch the deterioration accelerate when given more control.&lt;/p&gt;
&lt;h3 id=&#34;fit-for-purpose&#34;&gt;Fit for purpose&lt;/h3&gt;
&lt;p&gt;The tools outlined in this series are very much the tip of the iceberg. It&amp;rsquo;s concerning to see so much information control ramp up exponentially in the last decade. In hindsight this was no accident. As things increasingly converge on more troubling outcomes, we can only become more aware of the urgency to oppose tyranny. It&amp;rsquo;s important not to underestimate &lt;em&gt;information asymmetry&lt;/em&gt;. The amount of publicly accessible information isn&amp;rsquo;t likely to encompass even most of the true threats and dangers. The impressive AI tools that are just reaching the public are mere children&amp;rsquo;s toys compared to what is likely already being used in the halls of power.&lt;/p&gt;
&lt;h2 id=&#34;the-human-element&#34;&gt;The human element&lt;/h2&gt;
&lt;p&gt;Imagine a giant picket line. The strike is over the future of humanity. People can either cross the picket line to work for those who want to enslave (and eventually destroy) humanity, being showered with fleeting opportunities and resources&amp;hellip; or to stand up for oneself and find new ways to build elsewhere. The tragically sad truth is that there is a near limitless supply of desperate scabs who would happily (even knowingly) trade all of our futures for some present sustenance or comfort. You may be angry at these people, even willing to attack them, but they are not the root cause. Much of the harm that has already been done has created much tragedy and many victims.&lt;/p&gt;
&lt;p&gt;This is why you can&amp;rsquo;t just &amp;ldquo;&lt;em&gt;outrun the next guy&lt;/em&gt;&amp;rdquo;, or earn enough to isolate yourself from what is currently in the works. If there&amp;rsquo;s one lesson I want you to learn from &lt;em&gt;Tools of the Technocracy&lt;/em&gt; it would be this: &lt;strong&gt;No one is safe, until this is stopped.&lt;/strong&gt; Nobody is rich enough, or connected enough to suddenly win a fight against tyrants who have planned this since before I was born. This is why all the heroes people line up to worship will always fail them. They couldn&amp;rsquo;t stop it even if they tried.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The people are the key&lt;/strong&gt;, but they&amp;rsquo;re not just fodder you can throw at the problem. Without a real plan, or at least some meaningful support you will run out of bodies by the time you figure out what&amp;rsquo;s hitting you. Many of the more intelligent commentators will point out that people need to connect with their communities, but for many that underestimates the very real decimation of social bonds that has already ocurred. Rebuilding society and culture is a momentous task, now people must figure out how to do it while under attack.&lt;/p&gt;
&lt;h1 id=&#34;solutions&#34;&gt;Solutions&lt;/h1&gt;
&lt;p&gt;I don&amp;rsquo;t have all the answers, just parts of the puzzle. I started writing this series in part because I myself was at a loss of what to do, and decided to focus on a narrow part of what I saw as the &lt;a href=&#34;https://twitter.com/denisrancourt/status/1630371348991074305&#34;&gt;overall problem.&lt;/a&gt; I wholeheartedly believe that to secure individual rights, and create a future worth passing on, &lt;em&gt;revolutionary change is necessary&lt;/em&gt;.&lt;/p&gt;
&lt;h2 id=&#34;for-radicals&#34;&gt;For Radicals&lt;/h2&gt;
&lt;p&gt;My advice, dear radical, is to never &lt;a href=&#34;https://gabe.rocks/thoughts/dont-turn-on-the-flock/&#34;&gt;turn on the people.&lt;/a&gt; More of them are on your side in numbers and ways you can&amp;rsquo;t fathom.&lt;/p&gt;
&lt;p&gt;There is a legal, decentralized, and incredibly powerful mechanism to disrupt the dominance hierarchy from the bottom-up. &lt;strong&gt;Charity&lt;/strong&gt;. We have already seen enough to know that large numbers of energetic and healthy people are what the technocrats fear the most. It is much easier (and more practical) to build up people than to single-handedly try to take town those with immense wealth and power.&lt;/p&gt;
&lt;p&gt;By simply working on effective ways to support others you can help provide people much-needed breathing room to build themselves up. While it&amp;rsquo;s important to start with necessities like food, energy &amp;amp; shelter, other under-appreciated things to provide would be education &amp;amp; training, social support, and recreation facilities.&lt;/p&gt;
&lt;p&gt;Recognize that there &lt;em&gt;are real reformers&lt;/em&gt;. Not everyone who agrees with you may be willing to go to the same lengths to achieve the same goal, this doesn&amp;rsquo;t mean you can&amp;rsquo;t cooperate or share ideas. Because reformers tend to work within the system rather than outside of it, they may have decent suggestions on how to secure resources for pressing concerns.&lt;/p&gt;
&lt;h2 id=&#34;for-reformers&#34;&gt;For reformers&lt;/h2&gt;
&lt;p&gt;Your task, reformer, is to sincerely take the time to understand the grievances of radicals. It is very difficult for those under the strain that is placed on them to properly articulate their concerns.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/cave.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/false-awakening&#34;  &gt;&lt;h2&gt;The False Awakening&lt;/h2&gt;&lt;i&gt;The changing of the guard is not the same as defeat of the guard&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;&amp;ldquo;&lt;strong&gt;Stop!&lt;/strong&gt;&amp;rdquo; is your friend. Reformers will face innumerable obstacles trying to implement any real change, but reducing further harms can go a long way. If a terrible idea is being discussed, work to prevent it. If it can&amp;rsquo;t be prevented work to delay it. If it can&amp;rsquo;t be delayed, work to reverse it. If it can&amp;rsquo;t be reversed ensure it can never happen again.&lt;/p&gt;
&lt;p&gt;Recognize the limits of the system, find opportunities to alleviate suffering despite it.&lt;/p&gt;
&lt;h2 id=&#34;for-us-all&#34;&gt;For us all&lt;/h2&gt;
&lt;p&gt;No matter who you are and what your outlook is. Reclaim the power of deciding who deserves your time, attention, and respect. Reevaluate the systems you use and organizations that get your time, money and work.&lt;/p&gt;
&lt;iframe src=&#39;https://tube.doctors4covidethics.org/videos/embed/bb448a75-a2f5-4cea-8067-cb08c8524010&#39; style=&#34;height:max-content;aspect-ratio: 16/9;min-height:460px;max-height:15rem;max-width:60rem;&#34; width=&#34;100%&#34; height=&#34;100%&#34;&gt;

&lt;/iframe&gt;
&lt;p&gt;If you want to learn more about how I think things can be turned around, take a look (or listen) to my 2030 backcasting.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/uni-campus.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/backcasting-2030&#34;  &gt;&lt;h2&gt;Backcasting 2030&lt;/h2&gt;&lt;i&gt;What made 2023 the pivotal year?&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;div class=&#34;footnotes&#34; role=&#34;doc-endnotes&#34;&gt;
&lt;hr&gt;
&lt;ol&gt;
&lt;li id=&#34;fn:1&#34;&gt;
&lt;p&gt;&lt;a href=&#34;https://denisrancourt.ca/entries.php?id=9&#34;&gt;https://denisrancourt.ca/entries.php?id=9&lt;/a&gt;&amp;#160;&lt;a href=&#34;#fnref:1&#34; class=&#34;footnote-backref&#34; role=&#34;doc-backlink&#34;&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id=&#34;fn:2&#34;&gt;
&lt;p&gt;&lt;a href=&#34;https://www.forbes.com/sites/christiankreznar/2020/09/16/small-businesses-are-closing-at-a-rapid-pace-with-restaurants-and-retailers-on-the-west-coast-among-the-hardest-hit/&#34;&gt;https://www.forbes.com/sites/christiankreznar/2020/09/16/small-businesses-are-closing-at-a-rapid-pace-with-restaurants-and-retailers-on-the-west-coast-among-the-hardest-hit/&lt;/a&gt;&amp;#160;&lt;a href=&#34;#fnref:2&#34; class=&#34;footnote-backref&#34; role=&#34;doc-backlink&#34;&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id=&#34;fn:3&#34;&gt;
&lt;p&gt;&lt;a href=&#34;https://www.macleans.ca/longforms/covid-19-pandemic-disrupted-schooling-impact/&#34;&gt;https://www.macleans.ca/longforms/covid-19-pandemic-disrupted-schooling-impact/&lt;/a&gt;&amp;#160;&lt;a href=&#34;#fnref:3&#34; class=&#34;footnote-backref&#34; role=&#34;doc-backlink&#34;&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id=&#34;fn:4&#34;&gt;
&lt;p&gt;&lt;a href=&#34;https://www.nytimes.com/2020/04/07/nyregion/dying-alone-coronavirus.html&#34;&gt;https://www.nytimes.com/2020/04/07/nyregion/dying-alone-coronavirus.html&lt;/a&gt;&amp;#160;&lt;a href=&#34;#fnref:4&#34; class=&#34;footnote-backref&#34; role=&#34;doc-backlink&#34;&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id=&#34;fn:5&#34;&gt;
&lt;p&gt;&lt;a href=&#34;https://inequality.org/great-divide/updates-billionaire-pandemic/&#34;&gt;https://inequality.org/great-divide/updates-billionaire-pandemic/&lt;/a&gt;&amp;#160;&lt;a href=&#34;#fnref:5&#34; class=&#34;footnote-backref&#34; role=&#34;doc-backlink&#34;&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id=&#34;fn:6&#34;&gt;
&lt;p&gt;&lt;a href=&#34;https://consentfactory.org/2022/12/18/the-year-of-the-gaslighter/&#34;&gt;https://consentfactory.org/2022/12/18/the-year-of-the-gaslighter/&lt;/a&gt;&amp;#160;&lt;a href=&#34;#fnref:6&#34; class=&#34;footnote-backref&#34; role=&#34;doc-backlink&#34;&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id=&#34;fn:7&#34;&gt;
&lt;p&gt;&lt;a href=&#34;https://chertseymuseum.org/magna_carta&#34;&gt;https://chertseymuseum.org/magna_carta&lt;/a&gt;&amp;#160;&lt;a href=&#34;#fnref:7&#34; class=&#34;footnote-backref&#34; role=&#34;doc-backlink&#34;&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id=&#34;fn:8&#34;&gt;
&lt;p&gt;&lt;a href=&#34;https://www.popsci.com/1950s-experiments-attachment-unethical/&#34;&gt;https://www.popsci.com/1950s-experiments-attachment-unethical/&lt;/a&gt;&amp;#160;&lt;a href=&#34;#fnref:8&#34; class=&#34;footnote-backref&#34; role=&#34;doc-backlink&#34;&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id=&#34;fn:9&#34;&gt;
&lt;p&gt;&lt;a href=&#34;https://unlimitedhangout.com/2022/11/investigative-reports/covid-19-mass-formation-or-mass-atrocity/#the-anatomy-of-atrocity&#34;&gt;https://unlimitedhangout.com/2022/11/investigative-reports/covid-19-mass-formation-or-mass-atrocity/#the-anatomy-of-atrocity&lt;/a&gt;&amp;#160;&lt;a href=&#34;#fnref:9&#34; class=&#34;footnote-backref&#34; role=&#34;doc-backlink&#34;&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Operation: Chorus</title>
		<link>https://libresolutions.network/operations/chorus/</link>
		<pubDate>Sun, 19 Feb 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/operations/chorus/</guid>
		
		<image>https://libresolutions.network//media/images/tavern.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/tavern.webp" />
		<itunes:image href="https://libresolutions.network//media/images/tavern.webp" />
		<description>Safeguarding free expression</description>
		<content:encoded>&lt;p&gt;&amp;ldquo;&lt;em&gt;omnes voces nostri&lt;/em&gt;&amp;rdquo;&lt;br&gt;
&amp;ldquo;&lt;em&gt;All our voices&lt;/em&gt;&amp;rdquo;&lt;/p&gt;
&lt;p&gt;Many problems in our time are caused by a severe power imbalance caused by &lt;em&gt;information hazards&lt;/em&gt;. Information hazards are created when people and even entire societies operate under false pretenses. We can not rely on any single body or organization to question the foundations of every aspect of society to find errors, instead individuals should be empowered to use their own knowledge, skill, and intuition to learn from the world around them. As those individuals learn and share insights with others, we can all make a better world together.&lt;/p&gt;
&lt;p&gt;Merely creating a hierarchy of those who are &amp;ldquo;qualified&amp;rdquo; to suppress so-called &amp;lsquo;misinformation&amp;rsquo; and &amp;lsquo;disinformation&amp;rsquo; simply uplifts a small few to a priestly class for an array of false gods. Instead, truth-seeking will always be an inherently decentralized process. People from all walks of life, and a variety of perspectives are all required for society to truly self-examine. Criminalizing expression only worsens problems, entrenched orthodoxies crystalize into terrible abuses. Censorship is only ever effective at protecting abusive hierarchies, and sowing resentment. Instead, people should be given the leeway to learn from themselves and those around them, and opportunities to correct mistakes.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;If you make peaceful revolution impossible, you make violent revolution &lt;em&gt;inevitable&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;John F. Kennedy&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;If society continues the trend of increasing censorship to resolve inconsistencies, people will continue to suffer without real representation. All this does is build enmity between those with the means to insulate themselves from abuses and those without.&lt;/p&gt;
&lt;h3 id=&#34;principles&#34;&gt;Principles:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Advocating for maximal free expression rights for all people is one of the best ways to sustain liberal values long term.&lt;/li&gt;
&lt;li&gt;Public institutions should uphold freedom of expression.&lt;/li&gt;
&lt;li&gt;Organizations should be held accountable for censorship, chilling effects and propaganda.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;h3 id=&#34;goals&#34;&gt;Goals:&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Promote expanding socially and legally acceptable free expression&lt;/li&gt;
&lt;li&gt;Enhance labor protections for workers and whistle blowers to speak freely&lt;/li&gt;
&lt;li&gt;Empower individuals to have difficult conversations&lt;/li&gt;
&lt;li&gt;Encourage the adoption of interoperable and &lt;em&gt;permissionless&lt;/em&gt; systems&lt;/li&gt;
&lt;li&gt;Lobbying local institutions to provide these systems as services to local residents&lt;/li&gt;
&lt;li&gt;Oppose legislation that empowers censorship or surveillance&lt;/li&gt;
&lt;li&gt;Remembering and supporting those who are silenced&lt;sup id=&#34;fnref:1&#34;&gt;&lt;a href=&#34;#fn:1&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;1&lt;/a&gt;&lt;/sup&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id=&#34;relevant-content&#34;&gt;Relevant content&lt;/h2&gt;

&lt;p&gt;See more relevant &lt;a href=&#34;https://libresolutions.network/tags/operation-chorus&#34;&gt;content&lt;/a&gt;.&lt;/p&gt;
&lt;div class=&#34;footnotes&#34; role=&#34;doc-endnotes&#34;&gt;
&lt;hr&gt;
&lt;ol&gt;
&lt;li id=&#34;fn:1&#34;&gt;
&lt;p&gt;&lt;a href=&#34;https://malwords.substack.com/p/remembering-the-victims-of-the-medias&#34;&gt;https://malwords.substack.com/p/remembering-the-victims-of-the-medias&lt;/a&gt;&amp;#160;&lt;a href=&#34;#fnref:1&#34; class=&#34;footnote-backref&#34; role=&#34;doc-backlink&#34;&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Backcasting 2030</title>
		<link>https://libresolutions.network/articles/backcasting-2030/</link>
		<pubDate>Tue, 07 Feb 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/backcasting-2030/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/backcasting-2030.mp3" />
			
		
		<image>https://libresolutions.network//media/images/uni-campus.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/uni-campus.webp" />
		<itunes:image href="https://libresolutions.network//media/images/uni-campus.webp" />
		<description>What made 2023 the pivotal year?</description>
		<content:encoded>&lt;h2 id=&#34;what-is-backcasting&#34;&gt;What is backcasting?&lt;/h2&gt;
&lt;p&gt;Backcasting is when you imagine a scenario for an ideal future and try to trace a path to there from today. Instead of simply being comforted by a future world as we would like it to be, the goal is to identify opportunities to take action immediately.  Backcasting is about discovering a &lt;em&gt;blueprint&lt;/em&gt; for that better future and investigating how it can be made into reality.
I will be using the scenario from the &lt;a href=&#34;https://home.solari.com/coming-tuesday-2030-backcasting-with-catherine-austin-fitts-solari-allies-and-solari-series-hosts/&#34;&gt;Solari Report&lt;/a&gt;:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;For our purposes, the year is 2030, and this is our “desirable future”: In 2030, freedom reigns planetwide, with the push for central control having failed miserably. Local currencies are flourishing, while lack of use slowly marginalizes the few CBDCs that were implemented. The World Economic Forum is bankrupt, and a depressed Klaus Schwab has retreated to his home in the Alps. Family and community prosperity is growing throughout the developed and emerging markets as economies decentralize—and as government enforcement, regulation, intervention, and taxation decrease. In short, there is much to celebrate.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;em&gt;How was this brought about?&lt;/em&gt;&lt;/p&gt;
&lt;h1 id=&#34;accountability&#34;&gt;Accountability&lt;/h1&gt;
&lt;p&gt;Change really begun with accountability. People taking responsibility for the systems they use and the incentives they bring about. By being more critical of our choices, it became easier to make deliberate decisions that grew to impact wider society.&lt;/p&gt;
&lt;h2 id=&#34;it-started-with-courageous-individuals&#34;&gt;It started with courageous individuals&lt;/h2&gt;
&lt;blockquote&gt;
&lt;p&gt;A hero ventures forth from the world of common day into a region of supernatural wonder: fabulous forces are there encountered and a decisive victory is won: the hero comes back from this mysterious adventure with the power to bestow boons on his fellow man.&lt;/p&gt;
&lt;p&gt;Joseph Campbell - A hero of a thousand faces&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Heroes aren&amp;rsquo;t the people who you see on the TV or those who get the big interviews. In this story, the heroes are those who recognized the great evil lurking and set out to challenge it head-on. People who quickly went to confront the darkness themselves so that they may spare others the horrors. They made mistakes, suffered losses and won small victories. Learning many things the entire way. When they returned from their journey they brought light and hope as the darkness faded away.&lt;/p&gt;
&lt;h2 id=&#34;simple-acts-of-heroism&#34;&gt;Simple acts of heroism&lt;/h2&gt;
&lt;p&gt;Not everyone started at the same point, some were born ready, others had preparations to make. As more people made progress, it became easier for others to catch up.&lt;/p&gt;
&lt;p&gt;The first and most courageous act one makes is continuing to love in a world of hardship. Injustice rightfully gives rise to great anger, but love must always be the animating force. Coming back from facing darkness requires a conscious decision to &lt;em&gt;choose life&lt;/em&gt;. Forging a strong commitment to embrace life, beauty and wonder to the fullest was when heroes were truly forged.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/campfire-night.webp&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;With so much anger and pain, nothing was safe from a deluge of dread and sadness. Many of the heroes fell in terrible ways trying to just stand still in the torrent of chaos. Some had support, others had preparations, but the few who endured managed to find some footing to steady themselves from the otherworldly brutality they had been exposed to. They never lost sight of those alongside them who weren&amp;rsquo;t so fortunate.&lt;/p&gt;
&lt;p&gt;Steadying themselves required powerful introspection and the ability to care for themselves. The heroes needed to build themselves up to be stronger than ever. Not in a selfish manner, but in a way that gave them the strength to carry on. Carrying on often meant accepting difficult differences with others. Other times, it meant shielding one&amp;rsquo;s mind from malevolent forces. Reducing energy spent on enraging culture war rivalries, and instead focusing on concrete goals for action. As the heroes made progress, unshackled from doubt and despair, things started to gain momentum. Fear shrunk away from being an ever-present oppressive force to becoming once again a distrusted stranger.&lt;/p&gt;
&lt;p&gt;As momentum grew, so too did a constant reorganization of priorities. So many different voices had unique insight into the road that lead us all astray. It took time to shift attention and refocus energies so people tended to take more care with those resources. Spending extra time to reflect to themselves, or to investigate their own concerns more deeply. This questioning of not only the world as it is, but of themselves and us all for what we are. With this insight, gradual but meaningful changes were made on a constant basis.&lt;/p&gt;
&lt;h2 id=&#34;the-work-of-legends&#34;&gt;The work of legends&lt;/h2&gt;
&lt;p&gt;It all started within reach. The massive tidal wave of change was built with individuals choosing to act on the world around them. Local movements grew and caught on quickly, learning from mistakes made along the way. What made the difference wasn&amp;rsquo;t brilliance, riches, or even luck. It was all built through tireless persistence of those who dared to dream of a better world.&lt;/p&gt;
&lt;p&gt;Hardly anyone could even attempt it all alone. Our heroes didn&amp;rsquo;t just need to be stronger, they needed allies, support and numbers. While many different groups had many fantastic victories, it was support that truly laid the foundation to our bright future. The victims of the old ways were innumerable, many of the heroes themselves haunted by the extent of the suffering they managed to witness. What made 2023 the pivotal year was the defensive victories.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/marketplace-night.webp&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;This required a solid fortification of people&amp;rsquo;s right to life, liberty and happiness. Support didn&amp;rsquo;t merely mean taking on the banner of other&amp;rsquo;s suffering, but meaningful actions to address the causes. Those who were injured were given care.Those who lost loved ones were given comfort. Those who&amp;rsquo;s careers were displaced by technocratic tyranny were found meaningful work. Those left behind were remembered. With real systems of support outside the technocratic state-controlled bureaucracies, people were able to take more risks to work for change without simply being burnt out and spent like fodder. Positive change was only possible when we stopped losing great freedom-fighters to the cold entropy of letting them fall.&lt;/p&gt;
&lt;p&gt;Gradually, community bonds started to heal as people began to share the abundance of each other. Neighborhoods became warm and welcoming as people made meaningful connections. These real bonds forged in staving off devastation, became wellsprings of joy. It was this joy that brought people to new heights they never imagined before. Major victories were starting to happen all over, as people would use that joy to fuel supporting others.&lt;/p&gt;
&lt;h2 id=&#34;liberating-the-tech-stack&#34;&gt;Liberating the tech stack&lt;/h2&gt;
&lt;p&gt;Brought together by the joy of life and living together, there was much that needed to change in the technological landscape. What was originally seen as inconvenient and arbitrary changes were eventually seen as natural and obvious. People individually and collectively renegotiated different ways of using, building, and sharing technology.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/platos-cave.webp&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;Big Tech social media was the first to go. People saw how it had been weaponized against them from the beginning. More and more grew distrustful of any top-down centralized service calling itself a &amp;ldquo;platform&amp;rdquo;. These systems of control were difficult to break free from, but the heroes were the first to fully disconnect their minds from the mass mind-control platforms.&lt;/p&gt;
&lt;p&gt;Increasingly aware of how Digital ID could be abused against the public, the people learned to make little use of anything that required an account for the purposes of collecting data on users. Instead of using apps from big tech stores, open and accessible web-based apps became more popular. As people became more familiar with experimenting with different options, lesser-known minimal protocols like &lt;a href=&#34;https://gemini.circumlunar.space/&#34;&gt;Gemini&lt;/a&gt; were given a chance to show us a different kind of web. The heroes were at the forefront of encouraging others to embrace open protocols instead of the latest popular platform running on big tech infrastructure.&lt;/p&gt;
&lt;p&gt;As people started regularly thinking about their software choices, and how they can impact their &lt;a href=&#34;https://fsf.org&#34;&gt;freedom&lt;/a&gt;, attention eventually moved to hardware. With a newfound appreciation for freedom, sovereignty, and privacy in the digital world, there were many things that needed to be done differently. Early on a great deal of attention was spent on &lt;a href=&#34;https://www.ifixit.com/Right-to-Repair&#34;&gt;right to repair&lt;/a&gt; ensuring that independent farmers weren&amp;rsquo;t beholden to technocratic abuse. Repairing old technologies was a fantastic way to reduce e-waste and give people opportunities to learn and experiment.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/board.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/hardware-matters&#34;  &gt;&lt;h2&gt;Principle: Hardware matters&lt;/h2&gt;&lt;i&gt;It is easy to underestimate the underlying structure of our digital world.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;There would be instances where devices designed for a corporate dystopia simply wouldn&amp;rsquo;t have much use anymore. There was lots of opportunity for innovation. &amp;ldquo;Nostalgic&amp;rdquo; things like physical keyboards, removable batteries, and single-purpose devices all made a comeback in a big way. Efficiency and true &lt;em&gt;elegance&lt;/em&gt; were real priorities.&lt;/p&gt;
&lt;h2 id=&#34;stewardship&#34;&gt;Stewardship&lt;/h2&gt;
&lt;p&gt;Oddly enough, some of the heroes were fairly technologically inclined themselves. Long-disillusioned with Big Tech and the way things had gone, they had many ideas on ways for the rest of us to break free. People would regularly be shocked and surprised at how many of these innovations had just been abandoned to the aether. Over time more and more individuals experimented with different tools and technologies to find what adapted well to their situations.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/uni-campus.webp&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;These heroes would begin to start community-run services. Instead of everyone needing to use e-mail from Big Tech providers, dependable and trustworthy individuals were able to run small operations for small groups of users and assist others with starting their own. Education and outreach were vitally important parts of recruiting more people to build and share. These community services were a nightmare for those who wanted easily indexed access to everyone&amp;rsquo;s private information. All kinds of different services were provided, some communities had more novel needs than others. If nothing else, there was now real local representation in cyberspace that people could rely on.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/fediverse.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/call-to-action-join-the-fediverse/&#34;  &gt;&lt;h2&gt;Call to Action: Join the Fediverse now!&lt;/h2&gt;&lt;i&gt;A simple, but very effective way to tip the scales in favor of free speech.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;Instead of using their skills to help large corporations harvest data, our technological stewards helped people take control over their own computing. Teaching them how to use Free and Open Source software to manipulate their own data gave people a real sense of digital autonomy. New projects would be created for building useful public datasets that don&amp;rsquo;t include people&amp;rsquo;s private information.&lt;/p&gt;
&lt;p&gt;As people&amp;rsquo;s digital independence was better safeguarded, it became even easier for people to protect their sovereignty in other domains. Instead of wasting massive amounts of human effort and energy moderating &amp;ldquo;&lt;em&gt;the one conversation&lt;/em&gt;&amp;rdquo;, people would participate in the places they felt had value. People were used to difficult and honest discussions and got better at resolving complicated disputes. Instead of people constantly calling for censorship, it was hardly ever considered. Egregious legislation worldwide was challenged and opposed. &lt;a href=&#34;https://mullvad.net/en/blog/2023/2/1/eu-chat-control-law-will-ban-open-source-operating-systems/&#34;&gt;ChatControl&lt;/a&gt; and other laws targeting digital freedoms received constant and serious criticism. Politicians could no longer justify these excesses as &amp;ldquo;&lt;em&gt;for the greater good&lt;/em&gt;&amp;rdquo; as people no longer believed them.&lt;/p&gt;
&lt;p&gt;Those of us who were technologically inclined, realized that our talents weren&amp;rsquo;t the only skills lacking. We understood that we needed all kinds of people with all kinds of skills. Instead of simply dragging people onto platforms we deem superior, we build the groundwork that open alternatives &amp;ldquo;&lt;em&gt;just work&lt;/em&gt;&amp;rdquo; for all of us. We work to empower those with different talents and build on their successes. This is my message to you, dear reader. No matter what your unique skill-set is, it definitely has a place in building this beautiful future.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>In defense of anonymity</title>
		<link>https://libresolutions.network/articles/anonymity/</link>
		<pubDate>Sun, 08 Jan 2023 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/anonymity/</guid>
		
		<image>https://libresolutions.network//media/images/anonymous-crowd.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/anonymous-crowd.webp" />
		<itunes:image href="https://libresolutions.network//media/images/anonymous-crowd.webp" />
		<description>Don&#39;t let the trolls bait you into turning on privacy</description>
		<content:encoded>&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;&amp;ldquo;If you give me six lines written by the hand of the most honest of men. I will find something in them which will hang him&amp;rdquo;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Cardinal Richelieu&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;In a time where so much data about people is being constantly harvested in increasingly invasive ways, there is a lot of material to work with. As I&amp;rsquo;m sure we have all seen, there innumerable ways in which people&amp;rsquo;s own beliefs, mistakes or decisions land them in serious trouble. Even in cases where the anger is justified, is it truly &lt;em&gt;justice&lt;/em&gt; to weaponize constant mass surveillance against everyone at all times?&lt;/p&gt;
&lt;p&gt;The internet &lt;em&gt;is a dangerous place&lt;/em&gt;. The more intertwined your life is with it the more leverage it has to impact you. Many people dash straight at this for the upsides, but are shocked and horrified once they discover that there are downsides as well. This is because whatever the Internet &lt;em&gt;really is&lt;/em&gt;, it has tremendous power.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/tott-4.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-4/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #4 Online Identity&lt;/h2&gt;&lt;i&gt;What is following you in your digital tracks?&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;This is not to say everyone &lt;em&gt;must&lt;/em&gt; be anonymous &lt;em&gt;at all times&lt;/em&gt;, but rather that people vastly underestimate the &lt;em&gt;consequences&lt;/em&gt; of undermining online privacy. Different people have &lt;em&gt;very different risks&lt;/em&gt; related to being forced to disclose even simple aspects of their identity. It is difficult to overstate how much our digital landscape acts as an extension of &lt;a href=&#34;https://report.foundationforfreedomonline.com/11-22-22.html&#34;&gt;state and corporate power&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;pseudonymity&#34;&gt;Pseudonymity&lt;/h2&gt;
&lt;p&gt;A common mistake people make is to assume that just because you&amp;rsquo;re not aware of a person&amp;rsquo;s real name, that they are actually anonymous. In many cases they&amp;rsquo;re simply using an alias to forge a found identity to build an online presence around.
Where possible, I&amp;rsquo;d recommend doing this.
There are many great tools for creating new identities from scratch:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;em&gt;Need a profile photo?&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://thispersondoesnotexist.com/&#34;&gt;This Person does not exist.&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;em&gt;What about all the little details?&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://datafakegenerator.com/generador.php&#34;&gt;DataFake Generator&lt;/a&gt; can help.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;em&gt;Are people too boring?&lt;/em&gt;
&lt;a href=&#34;https://thisxdoesnotexist.com/&#34;&gt;This X does not exist.&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Surely you&amp;rsquo;re wondering by now.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;But Gabriel! Are &lt;strong&gt;you&lt;/strong&gt; real?&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;em&gt;Yes, dear reader&lt;/em&gt;, I use my real name and face. When you listen to my voice-overs you are hearing my real voice. This is a conscious decision because far too often defenses of anonymity are dismissed merely because the arguments are made from an anonymous/pseudonymous speaker. I wholeheartedly wish to prove there are important reasons for anonymity, and that you don&amp;rsquo;t need to be anonymous to make that case.&lt;/p&gt;
&lt;p&gt;All-too-often &amp;lsquo;accountability&amp;rsquo; is something seen to only apply on the lower levels of the pecking order. If we are ever to live in a time with responsible leaders and trustworthy institutions people need to be given the opportunity to learn, and correct mistakes. Privacy, generally, evens the playing field.&lt;/p&gt;
&lt;h2 id=&#34;appealing-to-authority&#34;&gt;Appealing to Authority&lt;/h2&gt;
&lt;p&gt;A common mistake people make is to completely disregard information &lt;em&gt;from the fringes&lt;/em&gt;. This is what has allowed many to be blind-sided by many of the rapid changes in the last decade. Ideally, people would develop a habit of judging every idea by its own merits, instead of by its origins. Many hands make light work so it is efficient to decentralize ways of collecting, analyzing and sharing information. A highly underestimated problem is that those with prestige, credentials, or even a proven track record can lie. Often people with the right data share the wrong conclusions because of warped incentives. Ensuring that all people regardless of backgrounds can question leaders and experts is a fantastic way to keep them honest.&lt;/p&gt;
&lt;p&gt;It is a tragic shame that during the Covid Crisis, some of the best information came from a &lt;em&gt;decentralized gang of &amp;lsquo;misinformation&amp;rsquo; spreaders&lt;/em&gt;. Unlike the mainstream and credentialed sources, they consistently came up with the &lt;em&gt;wrong answers&lt;/em&gt;. The great irony is that while it is hard to verify information from &amp;rsquo;less credible&amp;rsquo; sources, they often have few incentives to lie and mislead. Many are simply those who feel it&amp;rsquo;s their only way to make a real impact. Because of this many anonymous and pseudonymous commentators have a real ability to &amp;ldquo;&lt;em&gt;cut through the crap&lt;/em&gt;&amp;rdquo;. In addition to this, not everyone with useful insights is in the position to handle vigilante retaliation from angry political opponents.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/intelligence.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/intelligence/&#34;  &gt;&lt;h2&gt;The failure of intelligence&lt;/h2&gt;&lt;i&gt;The current state of affairs is a warning that top-level intelligence is failing&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;There are times when you need someone (or an army) to shout &amp;ldquo;The emperor has no clothes!&amp;rdquo;. Nobody is perfect, and this isn&amp;rsquo;t made better when we get into groups. Governments and organizations of all sizes would do well to properly respond to bottom-up feedback to avoid catastrophic problems. Many organizations have critical &lt;a href=&#34;https://www.patientsafety.va.gov/professionals/stop-the-line.asp&#34;&gt;&lt;em&gt;&amp;ldquo;stop-the-line&amp;rdquo;&lt;/em&gt;&lt;/a&gt; processes designed to address critical safety issues. Over time large, organizations have gradually come to recognize that the greatest scandals are often seen as they develop, by the very people carrying out their duties. With &lt;a href=&#34;https://www.compliancequest.com/capa-corrective-and-preventive-action/&#34;&gt;real accountability&lt;/a&gt; and proper integration of internal feedback, great disasters can be averted.&lt;/p&gt;
&lt;h2 id=&#34;pseudonymous-figures-speak-truth-to-power&#34;&gt;Pseudonymous figures speak truth to power&lt;/h2&gt;
&lt;p&gt;Sometimes we are not so lucky to have critical feedback come from inside the house. Other times we are all reliant on those who have seen the problems up-close taking on the herculean effort of trying to get the word out despite the all-too familiar stubborn reactions of disbelief, denial and deflection. When the time for justice comes, these voices are critical for rebuking the familiar excuse: &lt;em&gt;&amp;ldquo;there was no way we could have known!&amp;rdquo;&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;You may be enlightened enough to listen to the truth wherever it comes from, but a great deal of people don&amp;rsquo;t. Often when people attempt to voice inconvenient truths they are first slandered as being entirely ignorant. Once it is shown the person &lt;em&gt;actually does&lt;/em&gt; know what they&amp;rsquo;re talking about, the very next accusation is that they are simply leveraging the problem for their own self-interest. (As if nobody could possibly have anything to gain from the status quo). Lastly, if all else fails, the personal attributes of the critic are use against them to discredit their case. Their age, social status, race, or any other details you can imagine can all be used to bludgeon down the truth.&lt;/p&gt;
&lt;p&gt;Instead of confusing matters with personal drama, an alternative approach people take is to leave their identity out of the discussion. Nobody has anything to gain by pressuring people like this to reveal any aspect of their identities. Ultimately, it doesn&amp;rsquo;t matter who they are. What matters is what they bring humanity as a whole by daring to investigate and speak out where others are afraid to. Those who have everything to gain from warped incentives or outright corruption would be pleased with any attempts to expose weaknesses.&lt;/p&gt;
&lt;p&gt;Here a few examples:&lt;/p&gt;
&lt;h3 id=&#34;doomberg&#34;&gt;Doomberg&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://doomberg.substack.com/&#34;&gt;Substack&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The little green chicken reminds us that: &lt;em&gt;&lt;strong&gt;Energy is life&lt;/strong&gt;&lt;/em&gt;. Warning of the dangers of counter-productive energy policies and various geopolitical risks. While their recent content is now premium-only, I will share some highlights from the past that aren&amp;rsquo;t paywalled:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://doomberg.substack.com/p/what-canada-means-for-crypto&#34;&gt;What Canada Means for Crypto&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://doomberg.substack.com/p/a-serious-proposal-on-us-energy&#34;&gt;A Serious Proposal on US Energy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://doomberg.substack.com/p/farmers-on-the-brink&#34;&gt;Farmers on the Brink&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;stormcloudsgathering&#34;&gt;StormCloudsGathering&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://t.me/StormCloudsGathering&#34;&gt;StormCloudsGathering&lt;/a&gt; has long been a vocal advocate for non-violent resistance to tyranny. A consistent promoter of a &amp;ldquo;common ground movement&amp;rdquo; where we put aside petty political divides and work towards our common stake in the future.&lt;/p&gt;
&lt;iframe src=&#39;https://youtube.com/embed/ydZEaZGsWTU&#39; style=&#34;height:max-content;aspect-ratio: 16/9;min-height:460px;max-height:15rem;max-width:60rem;&#34; width=&#34;100%&#34; height=&#34;100%&#34;&gt;

&lt;/iframe&gt;
&lt;h3 id=&#34;spartacus&#34;&gt;Spartacus&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://iceni.substack.com/&#34;&gt;Substack&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The &lt;a href=&#34;https://media2-production.mightynetworks.com/asset/32250065/OGSpartacus_v4_N3MC.pdf&#34;&gt;Spartacus Letter&lt;/a&gt; was distributed anonymously. It is a well-sourced compendium of corruption and abuse from the Covid Crisis.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;This message is too important to be silenced. Its tone is admittedly incendiary in places, but it was difficult for us not to get emotional about this, given the nature of the subject matter and what our investigation revealed.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3 id=&#34;jikkyleaks-substackcomvv&#34;&gt;Jikkyleaks 🐭substack.com/vv&lt;/h3&gt;
&lt;p&gt;How do you eat an elephant? One bite at a time.
Sometimes is helps to be a small little mouse (or an army of them).&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://twitter.com/jikkyleaks&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/jikky.webp&#39; 
&gt;

&lt;/a&gt;



&lt;/div&gt;
&lt;p&gt;Feel free to &lt;a href=&#34;mailto:contact@libresolutions.network?subject=RE:%20In%20Defense%20of%20anonymity%20suggestion&#34;&gt;suggest more inclusions&lt;/a&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;the--problem&#34;&gt;The &lt;em&gt;&amp;ldquo;anonymous cowardly troll demons&amp;rdquo;&lt;/em&gt; problem&lt;/h2&gt;
&lt;p&gt;A simple irony is that anonymous trolls are the perfect target to &lt;em&gt;false flag&lt;/em&gt;. There&amp;rsquo;s no complicated branding to imitate or re-create, just simply fly whatever feels relevant. Those who would like to make sure everyone is accountable to a &lt;a href=&#34;https://libresolutions.network/tags/technocracy&#34;&gt;digital social credit system&lt;/a&gt; are highly motivated to make sure people have a low opinion of people&amp;rsquo;s ability to speak anonymously.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://twitter.com/jordanbpeterson/status/1600329860638863360&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/peterson-troll-demons.webp&#39; 
&gt;

&lt;/a&gt;



&lt;/div&gt;
&lt;p&gt;It is undeniable that not all anonymous and pseudonymous actors are good. People &lt;em&gt;do&lt;/em&gt; need the tools to be able to filter out attacks. &lt;strong&gt;The problem begins when anonymous bad actors are used to justify attacks on privacy and anonymity&lt;/strong&gt;. If you&amp;rsquo;re at all concerned about &lt;a href=&#34;https://libresolutions.network/tags/digital-id&#34;&gt;digital ID&lt;/a&gt; you&amp;rsquo;re going to recognize cries for burdensome regulation and demands for authentication as part of that agenda.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/digital-id.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/digital-id/&#34;  &gt;&lt;h2&gt;Digital ID: The Basics&lt;/h2&gt;&lt;i&gt;What is it? What can you do about it?&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;This is all enabled by the &amp;ldquo;bait and switch&amp;rdquo; tactic of increasing control in the name of keeping people safe from harm. Notoriously used by governments, corporations have also been adopting it as an excuse as well. The only way to truly protect data is to never record it, which means that it&amp;rsquo;s &lt;em&gt;&lt;strong&gt;impossible to keep people safe&lt;/strong&gt; through invasive surveillance&lt;/em&gt;.&lt;/p&gt;
&lt;h2 id=&#34;individual-rights&#34;&gt;Individual Rights&lt;/h2&gt;
&lt;p&gt;In name of protecting vulnerable groups, more and more ground has been ceded to to-down control. In hindsight, this has done a very poor job at protecting those groups. Instead, tensions, resentment, and mistrust have all grown out of the further and further encroachment against individual liberty. There is great danger in gating access to information and vital services behind surveillance, which will inevitably grow into control.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/high-places.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/high-places&#34;  &gt;&lt;h2&gt;Redefining &amp;#34;High Places&amp;#34;&lt;/h2&gt;&lt;i&gt;Lets re-balance power from the bottom-up&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;The solution &lt;em&gt;isn&amp;rsquo;t&lt;/em&gt; to limit what individuals can do or freely express. Rather the proper way to address these situations is to enforce limits on what can be &lt;em&gt;done to people regardless of who they are&lt;/em&gt;. This is the only way to create a immovable &lt;a href=&#34;https://www.lesswrong.com/posts/Kbm6QnJv9dgWsPHQP/schelling-fences-on-slippery-slopes&#34;&gt;schelling fence&lt;/a&gt; against complete erasure. These simple limits are called &lt;strong&gt;rights.&lt;/strong&gt; Regardless of what particular &amp;lsquo;red lines&amp;rsquo; you believe should be drawn, we all need to at least agree on a couple of fundamental lines that must not be crossed&amp;hellip;quickly.&lt;/p&gt;
&lt;p&gt;Regardless of who the target is, are you comfortable with them:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Being unable to voice potentially life-saving information?&lt;/li&gt;
&lt;li&gt;Being unable to make a living ever again?&lt;/li&gt;
&lt;li&gt;Being cut off entirely from all human interaction or trade?&lt;/li&gt;
&lt;li&gt;Being subjected to arbitrary confiscation of assets or even children?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Even if you can imagine circumstances where these actions are justified, hopefully you&amp;rsquo;d at least want them proven to a high standard in a truly independent process. Make no mistake, people &lt;em&gt;do&lt;/em&gt; need protection from online mobs, but I would urge you to consider who or what benefits from their use. And also, what is there to lose from anonymous voices being silenced forever.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Social Media: Learning the right lessons</title>
		<link>https://libresolutions.network/articles/social-media/</link>
		<pubDate>Sun, 11 Dec 2022 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/social-media/</guid>
		
		<image>https://libresolutions.network//media/images/learning-lessons.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/learning-lessons.webp" />
		<itunes:image href="https://libresolutions.network//media/images/learning-lessons.webp" />
		<description>Understanding information control</description>
		<content:encoded>&lt;h2 id=&#34;what-went-wrong&#34;&gt;What went wrong&lt;/h2&gt;
&lt;p&gt;Corporate social media entities aren&amp;rsquo;t &lt;em&gt;&amp;ldquo;the public square&lt;/em&gt;&amp;rdquo; and they aren&amp;rsquo;t a safe way to stay in touch with family and friends. While they may masquerade as such, they are the furthest thing from being either of those. These are &lt;em&gt;&lt;strong&gt;information control systems&lt;/strong&gt;&lt;/em&gt;. One of the best things about the &lt;a href=&#34;https://www.dailymail.co.uk/news/article-11519177/Twitter-kept-secret-blacklist-accounts-topics-stop-trending.html&#34;&gt;#TwitterFiles&lt;/a&gt; is that for many people, it&amp;rsquo;s a window into what those operating these systems see. This is hardly a secret. In 2020 &lt;a href=&#34;https://www.thesocialdilemma.com/&#34;&gt;The Social Dilemma&lt;/a&gt; has great coverage on how social media corporations are built to manipulate their users. Ironically, a lot of its commentary on &amp;ldquo;fake news&amp;rdquo; already hasn&amp;rsquo;t aged very well. The documentary pathologizes those who didn&amp;rsquo;t fall in lockstep with the lockdown agenda. The first hour is still worth understanding.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://libresolutions.network/media/images/twitter-files.webp&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/twitter-files.webp&#39; 
&gt;

&lt;/a&gt;


&lt;p class=&#34;caption&#34;&gt;
    Twitter is only the tip of the iceberg 
&lt;/p&gt;


&lt;/div&gt;
&lt;p&gt;As governments and corporations fight over who gets to be the arbiter of truth, suppression and manipulation will continue to rise. The cost of this constant manipulation is hard to quantify, and most commentary treats it as a non-negotiable fixture of modern life. Control over everyone&amp;rsquo;s access to information, and ability to express themselves begets all kinds of problems. In mainstream coverage, a lot of the emphasis is focused on misinformation from users. Yet, they&amp;rsquo;re notably silent on &lt;a href=&#34;https://www.millennialmillie.com/post/shadow-gate-2-0-full-movie&#34;&gt;state and corporate driven disinformation&lt;/a&gt;.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/tott-4.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-4/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #4 Online Identity&lt;/h2&gt;&lt;i&gt;What is following you in your digital tracks?&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;As people&amp;rsquo;s access to information becomes more centralized and controlled, there&amp;rsquo;s a rising acknowledgement that so does the &lt;em&gt;responsibility&lt;/em&gt; over it. We are currently stuck between a tug-of-war between corporations and governments over control over the people&amp;rsquo;s access to information. This didn&amp;rsquo;t suddenly take place. Far from something these platforms were instantly tasked with; the preparations had been gradually taking place for years. Purportedly to stop the harms of , censorship gradually ramped up. Over the long run the public was conditioned to accept increasingly invasive censorship.&lt;/p&gt;
&lt;h3 id=&#34;twitter&#34;&gt;Twitter&lt;/h3&gt;
&lt;p&gt;The blue bird has been largely regarded as the &amp;ldquo;digital public square&amp;rdquo; for quite some time. Despite a minority of people using the platform, and an even smaller minority actually posting, Twitter has relied on the &lt;em&gt;perception&lt;/em&gt; of being the public square. Much of that illusion was propped up by a first-class presence of mainstream media, as well as the verification system. Prior to Musk&amp;rsquo;s takeover being verified on twitter was a form on status symbol on the platform. In addition to this, being verified allowed the user to ignore interactions from the &amp;ldquo;riff raff&amp;rdquo; of unverified users.&lt;/p&gt;
&lt;p&gt;Twitter has been as bad as any other big tech platform for censorship, datamining and algorithmic manipulation. The site has long been criticized for the short character count, making clear communication difficult.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&amp;hellip;Twitter has censored leaks about corruption in politics, crimes committed the Government and spy agencies, opinions that didn’t agree with the Western propaganda about the war in Ukraine. This is criminal. This is wrong. And this is what’s happening at all big tech companies.&lt;/p&gt;
&lt;p&gt;I like to tell @Jack
and all our fellow tech entrepreneurs… You have sold us out. You have betrayed us. You have destroyed our rights and democracy. You have turned the dream of what the Internet can do for humanity into a nightmare. Shame on you.&lt;/p&gt;
&lt;p&gt;Kim Dotcom on &lt;a href=&#34;https://twitter.com/KimDotcom/status/1601039458165350401&#34;&gt;Twitter&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;The &lt;a href=&#34;https://brownstone.org/articles/the-twitter-files-just-the-beginning/&#34;&gt;#TwitterFiles&lt;/a&gt; is a very important confirmation of what many have suspected for quite some time. It is easy to fall prey to the illusion that this was merely a failing of Twitter&amp;rsquo;s management at the time. In an age where governments and corporations will use any and all leverage they can against the people, &lt;a href=&#34;https://twitter.com/AvidHalaby/status/1602127460677844993&#34;&gt;anything that can be subverted will be&lt;/a&gt;. New management is likely to be little more than a fresh coat of paint on the same top-down information control machine.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/cave.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/false-awakening&#34;  &gt;&lt;h2&gt;The False Awakening&lt;/h2&gt;&lt;i&gt;The changing of the guard is not the same as defeat of the guard&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;&amp;ldquo;The bird is freed&amp;rdquo; Tweeted Elon Musk. The mainstream media is in full meltdown over the uncertainty of what &amp;ldquo;Twitter 2.0&amp;rdquo; will be. Whatever Elon&amp;rsquo;s plans for Twitter are; there aren&amp;rsquo;t enough assurances to those who are used to controlling the conversation.&lt;/p&gt;
&lt;h3 id=&#34;facebook-aka-lifelog&#34;&gt;Facebook AKA &amp;ldquo;Lifelog&amp;rdquo;&lt;/h3&gt;
&lt;p&gt;Twitter wasn&amp;rsquo;t the only platform outright &lt;a href=&#34;https://www.businessinsider.com/facebook-has-portal-government-officials-to-request-content-be-suppressed-2022-11&#34;&gt;puppeteered by government&lt;/a&gt;. Facebook certainly has dubious origins when it comes to government interference. It has been caught &lt;a href=&#34;https://www.bbc.com/news/technology-28051930&#34;&gt;running experiments on it&amp;rsquo;s users&lt;/a&gt; and vast &lt;a href=&#34;https://www.nbcnews.com/tech/social-media/mark-zuckerberg-leveraged-facebook-user-data-fight-rivals-help-friends-n994706&#34;&gt;misuse&lt;/a&gt; of user data.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Yes, Twitter censors people + has close ties to the National Security State.&lt;/p&gt;
&lt;p&gt;However, now people are not focusing on how SBF is about to get away with a billion dollar Ponzi or how the WHO is about to establish a global biosecurity authority, etc.
Whitney Webb on &lt;a href=&#34;https://twitter.com/_whitneywebb/status/1601222803134418944&#34;&gt;Twitter&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Speaking of FTX, it&amp;rsquo;s very concerning how many ties keep leading back to information control. &lt;a href=&#34;https://substack.com/profile/41123571-liam-sturgess&#34;&gt;Liam Sturgess&lt;/a&gt; has a great explanation of Facebook in his look into effective altruism. He brings up many of the things that the movie &amp;ldquo;The Social Network&amp;rdquo; has left out.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://rumble.com/v1yq43y-examining-effective-altruism-part-ii-rounding-the-news.html&#34;&gt;Examining Effective Altruism: Part II - Rounding the News&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;youtube&#34;&gt;YouTube&lt;/h3&gt;
&lt;p&gt;Far from being an &lt;em&gt;organic&lt;/em&gt; video sharing platform. YouTube is big business. It&amp;rsquo;s a game for the big players and there are rules to compete. What makes the platform unique is that it shares ad revenue with it&amp;rsquo;s creators. This means that YouTube has a spigot to encourage or discourage a wide variety of behaviors. All kinds of fantastic and hardly-controversial creators have been &amp;ldquo;demonetized&amp;rdquo;, effectively eliminating them from mainstream participation.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=vlxghmlGNoI&#34;&gt;Game Theory: The End of an Era&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Where big business takes the wheel, propaganda isn&amp;rsquo;t far behind. Those with power are able to use their wealth to mislead the public into accepting that which isn&amp;rsquo;t in their interest. Anti-human nihilism and guilt can be placed squarely on the masses to disarm themselves mentally.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=HjHMoNGqQTI&#34;&gt;How Kurzgesagt Cooks Propaganda For Billionaires&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Is it really still a mystery why so many positions that are &amp;ldquo;settled science™&amp;rdquo; all point in the same anti-human direction? Can we really blame &amp;ldquo;&lt;em&gt;those crazy kids&lt;/em&gt;&amp;rdquo; who have been raised (or radicalized) in hyper-reality manufactured entirely to destroy them?&lt;/p&gt;
&lt;h3 id=&#34;reddit&#34;&gt;Reddit&lt;/h3&gt;
&lt;p&gt;Reddit is a site that features walls of [deleted] and [removed] posts on every controversial topic and even some seemingly non-controversial ones. This is because Reddit is patrolled by legions of volunteer moderators. It&amp;rsquo;s no free-for-all because the moderators have a clear hierarchy which builds &lt;a href=&#34;https://www.protocol.com/reddit-powermods-war&#34;&gt;powermods&lt;/a&gt;. These powermods essentially control the content over the entire site. A notable powermod was &lt;a href=&#34;https://kirbysommers.substack.com/p/evidence-that-reddit-user-maxwellhill&#34;&gt;maxwellhill&lt;/a&gt;, who notably hasn&amp;rsquo;t posted since Ghislane Maxwell has been arrested.&lt;/p&gt;
&lt;p&gt;In addition to outright censorship, reddit is notorious for self-censorship because your posts are linked to a profile that earns &amp;ldquo;karma&amp;rdquo;. Not only will users be called out for old posts, but losing too much karma impacts your ability to participate in different subreddits.&lt;/p&gt;
&lt;h3 id=&#34;discordlinkedin-tiktok-tinder-and-others&#34;&gt;Discord,LinkedIn, Tiktok, Tinder, and others&lt;/h3&gt;
&lt;p&gt;Anywhere people&amp;rsquo;s access to others is gated behind an opaque centralized service, they are open to manipulation and abuse. It is high time that people recognize this and refuse to cooperate with it. People should be empowered to make their own decisions without being arbitrarily retaliated against. Those who seek the ability to control information will always have questionable judgement.&lt;/p&gt;
&lt;h2 id=&#34;the-trap&#34;&gt;The trap&lt;/h2&gt;
&lt;p&gt;A recurring theme in mainstream commentary on social media manipulation is that this is simply a problem that needs to be &lt;em&gt;managed&lt;/em&gt; by various non-profits and state actors. This presumes that such manipulation is tolerable in the first place. It is quite ironic that the &lt;a href=&#34;https://time.com/4793331/instagram-social-media-mental-health/&#34;&gt;very problem&lt;/a&gt; created by state and corporate influence is something the mainstream is pushing to be solved with more state and corporate control. If anything, they have &lt;em&gt;already shown&lt;/em&gt; a severe lack of trustworthiness with the tools that already exist.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/lsn-banner.webp)&#34; &gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://consentfactory.org/2022/12/10/swimming-with-sharks/&#34;  &gt;&lt;h2&gt;Swimming with sharks&lt;/h2&gt;&lt;i&gt;So, Elon Musk’s new free-speech Twitter appears to going extremely well...&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;It is highly dishonest to portray social media enterprises as rogue actors let loose by &amp;ldquo;laissez faire&amp;rdquo; free market profiteering. They&amp;rsquo;ve all had very close ties with governments and even intelligence agencies. Any and all harms permitted while three-letter-agencies had their &lt;a href=&#34;https://www.washingtonpost.com/news/business/wp/2018/04/24/yahoo-fined-35-million-for-failing-to-disclose-cyber-breach/&#34;&gt;hand up these companies&lt;/a&gt; is a problem of &lt;em&gt;prioritization&lt;/em&gt; not power.&lt;/p&gt;
&lt;p&gt;As the actions of Twitter before the Musk purchase have shown: &lt;em&gt;Trust and Safety&lt;/em&gt; isn&amp;rsquo;t about protecting the people. These institutions work as commissars within centralized services to thought-police in ways that would have been impossible not long ago. The terrifying reality is that the watchers are being watched by other watchers, competing for zeal to climb for status. The current political environment suffers in part by a self-organized conspiracy against the people. The people are effectively out manuevered, and in limited supply of options to protect themselves.&lt;/p&gt;
&lt;p&gt;Self-hosted and decentralized alternatives are foundational steps towards progress. The people taking action to adopt these platforms would go a long way to leveling the playing field. However, this is not the totality of the fight. It would be naive to believe that once the people walk away from information control systems, that those who profit off controlling the discussion would just pack it in and give up.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/tott-9-preview.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-9&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #9 Internet Shutdowns&lt;/h2&gt;&lt;i&gt;Information control is the root of modern tyranny.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;Many of the same mechanisms use to control and manipulate social media are &lt;a href=&#34;https://reclaimthenet.org/wordpress-considered-censoring-new-york-post&#34;&gt;just as applicable to service providers&lt;/a&gt;. Free speech exists as a widely shared cultural principle or not at all. Stronger safeguards need to &lt;a href=&#34;https://protectthestack.org/&#34;&gt;#Protect the Stack&lt;/a&gt; from being leveraged against the people. Service providers as well as financial services are all points of failure that can be weaponized to &lt;a href=&#34;https://www.givesendgo.com/bitchute&#34;&gt;eliminate competition&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;the-root-of-the-problem&#34;&gt;The root of the problem&lt;/h2&gt;
&lt;blockquote&gt;
&lt;p&gt;We can never know what &lt;em&gt;would have happened&lt;/em&gt;, Lucy. But what will happen is another matter entirely.&lt;/p&gt;
&lt;p&gt;Aslan - The Chronicles of Narnia&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;We have a saying here: &lt;em&gt;&amp;ldquo;We only have one &lt;strong&gt;timeline&lt;/strong&gt;&amp;rdquo;&lt;/em&gt;. In short, this means that the damage is done. There is no use to endlessly speculate about how history could have been altered if things had been done differently. Instead we should learn from the past for the purpose of building a better future, or at least avoiding past mistakes.&lt;/p&gt;
&lt;h3 id=&#34;the-mainstream&#34;&gt;The Mainstream&lt;/h3&gt;
&lt;p&gt;The mainstream media and platforms have effectively sold out their credibility. Trust in these institutions has justifiably been in decline for some time. In hindsight, it is easy to believe that the mainstream media has always been the top-down information control machine that exists today. It can be useful to keep in mind that different technologies and forms of media have their own trade-offs. In todays media landscape, &lt;em&gt;the medium is the message&lt;/em&gt; couldn&amp;rsquo;t be more obvious.&lt;/p&gt;
&lt;p&gt;Charitably, a single mainstream information  landscape has a purpose. There was a time where the technology to get messages out wasn&amp;rsquo;t as democratized as it is today. In addition to raw technological challenges, it is useful to have information dissemination enhanced with credibility and expertize.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://libresolutions.network/media/images/mainstream.webp&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/mainstream.webp&#39; 
&gt;

&lt;/a&gt;



&lt;/div&gt;
&lt;p&gt;Whether it&amp;rsquo;s fact-checkers, universities, or large corporate media outlets, they all suffer from a primary weakness that has inevitably lead to a loss of trust: &lt;strong&gt;rigidity&lt;/strong&gt;. This refined information propagation machine has to function in ways that undermine it&amp;rsquo;s ability to properly convey issues. Mass media is inherently limited by the very constrained attention span of it&amp;rsquo;s audience. This leaves hardly any room for nuance, or representing a broad spectrum of issues. These institutions fail to properly characterize, prioritize and report on nearly every pressing concern of the day. More and more, as the mainstream loses dominance, it will have to divert more and more attention to issues that inflate it&amp;rsquo;s self-importance.&lt;/p&gt;
&lt;p&gt;This means that anyone earnestly attempting to get people to understand any issue through this medium, is going to be restrained by the very same constraints. It&amp;rsquo;s easy to underestimate the challenge of communicating simple concepts to a broad audience.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Narrow&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Only a few topics can rise.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Brief&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No topic can be given much time for depth or self-reflection&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Dogmatic&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Authority is presumed, and hardly questioned if at all.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;With all these limitations one could easily be mislead to think there is no room for malice. This couldn&amp;rsquo;t be further from the truth. &lt;a href=&#34;https://www.corbettreport.com/media/&#34;&gt;The Media Matrix&lt;/a&gt; is a comprehensive history on this. If the mainstream media ever had a legitimate purpose, it has certainly transformed itself into part of a large growing &lt;em&gt;information control apparatus&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;During the Covid Crisis, instead of merely reporting on information as things developed; the mainstream media took an active role in &lt;em&gt;shaping the conversation&lt;/em&gt;. If anyone is to receive clemency for getting things wrong, it is certainly not those who ensured that people would. To many this was an outright shocking development. It was so shocking, that people often couldn&amp;rsquo;t accept that things were &lt;em&gt;this bad&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Surely, they will eventually report the truth as lies get discredited in time?&lt;/em&gt; That is a very cold comfort. Smothering the truth when lives are on the line isn&amp;rsquo;t erased by getting it right years after the fact if at all. it is important to realize this is &lt;a href=&#34;https://www.corbettreport.com/flashback-mediakills/&#34;&gt;far from the only time&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;getting-it-right&#34;&gt;Getting it right&lt;/h2&gt;
&lt;p&gt;The Covid Crisis laid bare the deadly effects of censorship before all to see. We are all responsible for learning from what &lt;a href=&#34;https://unlimitedhangout.com/2022/11/investigative-reports/covid-19-mass-formation-or-mass-atrocity/&#34;&gt;has happened&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Among other things, we should:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Grow our disgust for:
&lt;ul&gt;
&lt;li&gt;Thoughtless compliance&lt;/li&gt;
&lt;li&gt;Censorship&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Enhance our appreciation for:
&lt;ul&gt;
&lt;li&gt;Principled opposition&lt;/li&gt;
&lt;li&gt;Inalienable human rights&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/lsn-banner.webp)&#34; &gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/high-places&#34;  &gt;&lt;h2&gt;Redefining &amp;#34;high places&amp;#34;&lt;/h2&gt;&lt;i&gt;Lets re-balance power from the bottom-up&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h3 id=&#34;connecting-with-others&#34;&gt;Connecting with others&lt;/h3&gt;
&lt;p&gt;Instead of focusing on a &lt;em&gt;single public square&lt;/em&gt;, it is better that we nurture a symphony of vastly different spaces with different parameters and cultures. This way important information and insights can be properly elevated from a variety of sources, instead of being bottle-necked by a single mindset or culture. Achieving this requires a solid commitment to authentically liberal values and a much higher tolerance for differences than people have generally shown.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/fediverse.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/call-to-action-join-the-fediverse/&#34;  &gt;&lt;h2&gt;Call to Action: Join the Fediverse now!&lt;/h2&gt;&lt;i&gt;A simple, but very effective way to tip the scales in favor of free speech.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;If you&amp;rsquo;re still trapped on any of the big tech social media platforms please consider leaving. At the very least you&amp;rsquo;ll want to consider building a presence on more accessible &lt;em&gt;federated&lt;/em&gt; alternatives. In doing so you can help diversify people&amp;rsquo;s ability to express themselves and learn from others.&lt;/p&gt;
&lt;h3 id=&#34;live-not-by-lies&#34;&gt;Live not by lies&lt;/h3&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/live-not-by-lies.webp&#39; 
&gt;



&lt;/div&gt;
&lt;blockquote&gt;
&lt;p&gt;When the truth offends we lie and lie until we can no longer it is even there&amp;hellip;but it is still there&amp;hellip;
Every lie we tell incurs a debt to the truth.
Sooner or later that debt is paid.&lt;/p&gt;
&lt;p&gt;valery legasov&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;There&amp;rsquo;s never a bad time to &lt;a href=&#34;https://home.solari.com/coming-clean/&#34;&gt;come clean&lt;/a&gt;. Anything you can do to fix the little things in your live can build to meaningful change over time. While lies have real, devastating impact, there&amp;rsquo;s always something to be gained by making good on wrongs done.&lt;/p&gt;
&lt;h3 id=&#34;oppose-censorship&#34;&gt;Oppose censorship&lt;/h3&gt;
&lt;p&gt;One of the many ways we should honor the victims of the Covid Crisis is to work to make impossible the level of censorship and top down control that enabled the very crimes committed.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>The Rise of a SkyNet Workforce</title>
		<link>https://libresolutions.network/articles/skynet-workforce/</link>
		<pubDate>Wed, 16 Nov 2022 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/skynet-workforce/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/skynet-workforce.mp3" />
			
		
		<image>https://libresolutions.network//media/images/skynet-workforce2.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/skynet-workforce2.webp" />
		<itunes:image href="https://libresolutions.network//media/images/skynet-workforce2.webp" />
		<description>Employee of the Month: Terminator</description>
		<content:encoded>&lt;p&gt;Machine learning is starting to take over the economy the very way the Internet already has. A variety of newly available tools have caused a great deal of controversy in &lt;a href=&#34;https://www.washingtonpost.com/technology/2022/09/02/midjourney-artificial-intelligence-state-fair-colorado/&#34;&gt;art circles&lt;/a&gt; and &lt;a href=&#34;https://githubcopilotlitigation.com/&#34;&gt;free software communities.&lt;/a&gt;. These advancements in AI-powered tools are effectively game-changers in the domains they disrupt.&lt;/p&gt;
&lt;p&gt;Hailed by techno-utopians of all stripes, these advancements are huge part of driving the so-called &lt;a href=&#34;https://www.forbes.com/sites/bernardmarr/2016/04/05/why-everyone-must-get-ready-for-4th-industrial-revolution/?sh=1065627a3f90&#34;&gt;4th Industrial revolution&lt;/a&gt;. If we are not careful, we will run straight into the trap of allowing these tools to be weaponized against everyone. Understanding how these tools work on a basic level is important.&lt;/p&gt;

&lt;p&gt;You may have heard &lt;em&gt;&amp;ldquo;Data is the &lt;a href=&#34;https://www.thenewoil.org&#34;&gt;new oil&lt;/a&gt;&lt;/em&gt;&amp;rdquo;. That &amp;ldquo;oil&amp;rdquo; is fuel for massively powerful machine learning algorithms. No publicly (or easily) accessible data, media, or information is safe from the &amp;ldquo;data beast&amp;rdquo;. The data beast is hungry for any and all information, it doesn&amp;rsquo;t matter how trivial or private, it wants everything. The reason is because every addition of well-collected information is invaluable in building a wide array of powerful machine learning &lt;em&gt;models&lt;/em&gt;.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/big-data.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-2/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #2 Big Data &amp;amp; Artificial Intelligence&lt;/h2&gt;&lt;i&gt;What is all this data for anyways?&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h2 id=&#34;what-is-a-machine-learning-model&#34;&gt;What is a machine learning &amp;lsquo;model&amp;rsquo;?&lt;/h2&gt;
&lt;p&gt;A model is the sum-total of all insights a machine learning model &amp;ldquo;learns&amp;rdquo; while analyzing large amounts of data. The larger and more complicated the model the more sophisticated problems the model can be used to solve. For example, imagine you wanted to be an olympian athlete but hadn&amp;rsquo;t decided on a sport. An AI could use a model trained on data from every previous athlete, like their physical attributes, record, diet, and other things to give you a &amp;ldquo;life plan&amp;rdquo; it calculates is most likely to succeed.&lt;/p&gt;
&lt;p&gt;Models are &amp;ldquo;trained&amp;rdquo; by analyzing massive, well-categorized datasets. This means that the raw data itself often isn&amp;rsquo;t enough. It needs to be carefully curated into a highly detailed and correct set of information and it&amp;rsquo;s quite easy to fall short of that. Any and all deviations from reality will distort outputs from machine learning models. This gives rise to concerns about AI models treating people unfairly. Models trained on data we collect is effectively holding a mirror up to ourselves. Whatever small slice of reality we simplify and package to train on is how the model sees the world.&lt;/p&gt;
&lt;p&gt;The only way to solve that problem would be a highly invasive all-pervasive surveillance and control system that tracks nearly every atom in the area of concern. In addition to being highly impractical, it&amp;rsquo;s highly unlikely people would knowingly choose that kind of world. It&amp;rsquo;s what we unknowingly choose that is a problem however, what systems are we building by refusing to take an active role in shaping the future?&lt;/p&gt;
&lt;h2 id=&#34;employee-of-the-month-terminator&#34;&gt;Employee of the month: Terminator&lt;/h2&gt;
&lt;p&gt;A great deal of resources are invested in understanding how robots can &lt;a href=&#34;https://twitter.com/SiChunLam/status/1379556406123229185&#34;&gt;recognize&lt;/a&gt;, track and &lt;a href=&#34;https://fortune.com/2015/10/19/army-wifi-gun/&#34;&gt;destroy&lt;/a&gt; things.&lt;/p&gt;

&lt;a href=&#39;https://twitter.com/LeftSentThis/status/1536060869506834434&#39;&gt;

&lt;video muted autoplay preload=&#34;none&#34;&gt;
    &lt;source src=&#39;https://libresolutions.network/media/video/robot-feats.mp4&#39;&gt;
&lt;/video&gt;

&lt;/a&gt;

&lt;p&gt;That video is from a tweet saying:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Everything, and I mean EVERYTHING I see these robots doing, I am imagining a host of military grade weapons attached to them, how those technologies trickle down to the police, and ultimately who will be attacked by these robots.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;When it comes to the workforce, soldiers and police may be the most at risk of being automated away entirely. Such a shift could be used to eliminate any trace of accountability or &lt;a href=&#34;https://twitter.com/BanKillerRobots/status/1592570626547515392&#34;&gt;morality&lt;/a&gt; in such institutions.&lt;/p&gt;
&lt;h2 id=&#34;ai-has-learned-to-code&#34;&gt;AI has &amp;ldquo;learned to code&amp;rdquo;&lt;/h2&gt;
&lt;p&gt;This demo is quite impressive. The presenter is using Github copilot to build a simple program with spoken words instead of typing. It&amp;rsquo;s initially quite striking how much of a win this kind of technique is for making development more accessible. It is fair to be skeptical, many live tech demonstrations are often highly staged to smooth over many real-life issues. That said, this specific goal does not seem very far away.&lt;/p&gt;
&lt;video controls preload=&#34;metadata&#34;&gt;
    &lt;source src=&#39;https://libresolutions.network/media/video/skynet-workforce-copilot.mp4&#39;&gt;
&lt;/video&gt;
&lt;p&gt;Are software developers obsolete now? Likely not for a while, even using these tools requires some technical skill or understanding. It&amp;rsquo;s also a lot harder to make guarantees of safety or security for systems that aren&amp;rsquo;t carefully designed by humans. That&amp;rsquo;s not to say there may not be powerful analysis tools built from these models that could strengthen security.&lt;/p&gt;
&lt;h3 id=&#34;the-dark-side&#34;&gt;The Dark side&lt;/h3&gt;
&lt;p&gt;Github is what&amp;rsquo;s known as a code forge. A place for developers to host their code and collaborate on improving it. Different forges have different features but Github, owned by Microsoft is the largest and most popular. Developers often choose to distribute their code under various &lt;a href=&#34;https://www.gnu.org/licenses/license-list.en.html&#34;&gt;licenses&lt;/a&gt;. These licenses dictate the terms in how the code can be used in other software projects.&lt;/p&gt;
&lt;iframe src=&#39;https://youtube.com/embed/x1IVJ54bHO8&#39; style=&#34;height:max-content;aspect-ratio: 16/9;min-height:460px;max-height:15rem;max-width:60rem;&#34; width=&#34;100%&#34; height=&#34;100%&#34;&gt;

&lt;/iframe&gt;
&lt;p&gt;Code is just information. Nothing has stopped Github from training copilot with all the data on their platform, and potentially other publicly accessible repositories as well. It is arguable that Microsoft has violated the license of many of these projects, however when it comes to those who use copilot to make new projects it&amp;rsquo;s not clear at all.&lt;/p&gt;
&lt;h2 id=&#34;can-a-robot-create-a-beautiful-masterpiece&#34;&gt;Can a robot create a beautiful masterpiece?&lt;/h2&gt;
&lt;p&gt;Gearheads aren&amp;rsquo;t alone, creatives are now struggling with the same issues. DeviantArt, a large platform for sharing artistic works announced &lt;a href=&#34;https://www.deviantart.com/team/journal/Create-AI-Generated-Art-Fairly-with-DreamUp-933537821&#34;&gt;DreamUp&lt;/a&gt; which is their equivalent of tools like stable diffusion. Trained on a massive collection of categorized creative works, the model could be used to create entirely new works.&lt;/p&gt;
&lt;iframe src=&#39;https://youtube.com/embed/IGj_3OhMrAU&#39; style=&#34;height:max-content;aspect-ratio: 16/9;min-height:460px;max-height:15rem;max-width:60rem;&#34; width=&#34;100%&#34; height=&#34;100%&#34;&gt;

&lt;/iframe&gt;
&lt;p&gt;The artists raised some concerns about how this was done.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Did DeviantArt train their model with artists art without &lt;em&gt;explicit permission&lt;/em&gt;?&lt;/li&gt;
&lt;li&gt;How can artists opt-out of such data-mining?&lt;/li&gt;
&lt;li&gt;Will DeviantArt remove artists art from the model or dataset(s) if the artist did not wish for their works to be used for training AI.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;concerns&#34;&gt;Concerns&lt;/h2&gt;
&lt;p&gt;As you can see, these problems are highly generalizable. Sure it&amp;rsquo;s programmers and digital artists today, but how far away are authors, musicians, or even lawyers from being assimilated? It is tempting to nit-pick particular implementations and say that the flaws of today are an inherent fixtures of AI problem solving. This is naive, because it can be hard to predict what problems can be solved quickly and what problems will take ages.&lt;/p&gt;
&lt;h3 id=&#34;copyright--trademark-concerns&#34;&gt;Copyright &amp;amp; Trademark concerns&lt;/h3&gt;
&lt;p&gt;Is using publicly accessible content to train AIs a derivative work? Are models fair use? Even if one is fully within their rights to use an artists works to train a model, what about use of the artists name in the creation of new works? If someone trained a model on your voice and published songs of you singing, should you have any right to demand compensation or restrict how it&amp;rsquo;s used?&lt;/p&gt;
&lt;iframe src=&#39;https://youtube.com/embed/W5M-dvzpzSQ&#39; style=&#34;height:max-content;aspect-ratio: 16/9;min-height:460px;max-height:15rem;max-width:60rem;&#34; width=&#34;100%&#34; height=&#34;100%&#34;&gt;

&lt;/iframe&gt;
&lt;h3 id=&#34;asymmetric-advantages&#34;&gt;Asymmetric advantages&lt;/h3&gt;
&lt;p&gt;It is naturally impossible to know who is making models out of what data unless those entities chose to disclose that information. This means there is no way in knowing how much your data has been used to train models used to manipulate you. What recourse will you really have when violations take place in secret?&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/tott-4.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-4/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #4 Online Identity&lt;/h2&gt;&lt;i&gt;What is following you in your digital tracks?&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;Large platforms have many inherent advantages over smaller projects, even when there isn&amp;rsquo;t any malice or bad behavior. Amazon has been caught using their platform to &lt;a href=&#34;https://www.forbes.com/sites/retailwire/2022/10/17/controversy-persists-over-amazons-use-of-data-to-favor-its-knockoffs/?sh=1bb260d7f64e&#34;&gt;produce knock-offs of viable products&lt;/a&gt; from smaller sellers.&lt;/p&gt;
&lt;p&gt;Is machine learning too powerful &lt;a href=&#34;https://www.wearethemighty.com/mighty-history/catholic-church-banned-crossbow-warfare/&#34;&gt;not to use&lt;/a&gt;? In any competitive environment, can you really afford &lt;em&gt;not&lt;/em&gt; to use performance enhancing tools regardless of the ethical or legal considerations? How can people and organizations properly set conditions to &lt;strong&gt;not&lt;/strong&gt; incentivize massive fraud and privacy violations?&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/lsn-banner.webp)&#34; &gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://roundingtheearth.substack.com/i/78770620/this-is-the-story-about-how-machine-learning-drives-the-education-system-to-destroy-science&#34;  &gt;&lt;h2&gt;Machine Learning Into the Destruction of Science&lt;/h2&gt;&lt;i&gt;The Science Wars Part XII&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h3 id=&#34;workforce-displacement&#34;&gt;Workforce displacement&lt;/h3&gt;
&lt;p&gt;Since we&amp;rsquo;re already seeing problems in education, the wider workforce likely isn&amp;rsquo;t far behind. Just because your entire profession can&amp;rsquo;t be automated, that doesn&amp;rsquo;t mean that machine learning can&amp;rsquo;t simply be used to assimilate away the most viable parts of your business model. Even despite a so-called &lt;a href=&#34;https://www.marketwatch.com/story/a-u-s-labor-shortage-is-planting-the-seeds-for-lots-of-layoffs-heres-how-11667607221&#34;&gt;labor shortage&lt;/a&gt; workers are having a difficult time negotiating higher wages and better working conditions.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/construction-banner.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-3/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #3 Robots, IoT, Automation, Oh my!&lt;/h2&gt;&lt;i&gt;Transforming the world in ways seen and unseen&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;Cybernetics, novel biologics, and performance enhancing drugs can all be things people may feel forced to take on to compete in a rapidly changing work environment. While we are to be concerned with the consolidation of state power through &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-10&#34;&gt;CBDCs&lt;/a&gt;, we must also be vigilant against corporations using the very same &lt;a href=&#34;https://libresolutions.network/articles/programmable-currency&#34;&gt;mechanisms&lt;/a&gt; to control people. We do not have the luxury of passively allowing &amp;ldquo;futurists&amp;rdquo; to decide what they&amp;rsquo;re willing to have us all sacrifice for their own greater wealth. As this continues, the road ahead looks quite grim indeed. The following video is about a fictional setting in the game Warframe, it&amp;rsquo;s a warning worth heeding.&lt;/p&gt;
&lt;iframe src=&#39;https://youtube.com/embed/P6203Dne8T4&#39; style=&#34;height:max-content;aspect-ratio: 16/9;min-height:460px;max-height:15rem;max-width:60rem;&#34; width=&#34;100%&#34; height=&#34;100%&#34;&gt;

&lt;/iframe&gt;
&lt;h3 id=&#34;ethics-concerns&#34;&gt;Ethics concerns&lt;/h3&gt;
&lt;p&gt;When it comes to surveillance and aglorithmic manipulation much of the work takes place out of sight and out of mind. There are real questions of ownership, rights, and autonomy when it comes to how personal and private information is used. It&amp;rsquo;s important not to be defeatist on this point. Just because information &lt;em&gt;can&lt;/em&gt; be used in particular ways doesn&amp;rsquo;t mean we can&amp;rsquo;t recognize it as a crime. A great many terrible things are nearly impossible to stop, the solution isn&amp;rsquo;t to accept them but to create a proper framework for addressing them.&lt;/p&gt;
&lt;h2 id=&#34;the-bright-side&#34;&gt;The bright side&lt;/h2&gt;
&lt;p&gt;It&amp;rsquo;s not all bleak and terrible. There is good news in this story too. Just as these tools are powerful they can be used for good. At it&amp;rsquo;s core, machine learning is a useful way to extract actionable information from massive datasets. Creating large, accurate, ethically-sourced public datasets can create fascinating new possibilities.&lt;/p&gt;
&lt;h3 id=&#34;new-public-goods&#34;&gt;New public goods&lt;/h3&gt;
&lt;p&gt;Mozilla &lt;a href=&#34;https://commonvoice.mozilla.org/en/about&#34;&gt;Common Voice&lt;/a&gt; is a project where people collaborate on creating a massive, diverse, high quality voice dataset. This can be used to power useful models like &lt;a href=&#34;https://github.com/mozilla/TTS&#34;&gt;Text to Speech for all&lt;/a&gt; and &lt;a href=&#34;https://github.com/mozilla/DeepSpeech&#34;&gt;DeepSpeech&lt;/a&gt;. DeepSpeech can be used to create your own voice-controlled applications. This is a very cute demo of someone using stable diffusion to place an AR elephant in a tree. Despite it&amp;rsquo;s silliness, it does show how effective this technology can be in creating new and fascinating experiences.&lt;/p&gt;

&lt;a href=&#39;https://twitter.com/BjoernKarmann/status/1590648681169985537&#39;&gt;

&lt;video muted autoplay preload=&#34;none&#34;&gt;
    &lt;source src=&#39;https://libresolutions.network/media/video/ar-elephant.mp4&#39;&gt;
&lt;/video&gt;

&lt;/a&gt;

&lt;p&gt;Of course there are tons of medical advancements related to using machine learning to recognize patterns. These are fantastic for things like diagnosing issues from x-rays or other data. To reiterate, machine learning clearly isn&amp;rsquo;t evil, but rather the impetus to spy on everyone to dominate them absolutely is. There are responsible ways to collect, store and curate data and these need to be at least enforced but ideally supported.&lt;/p&gt;
&lt;h3 id=&#34;taking-action&#34;&gt;Taking action&lt;/h3&gt;
&lt;p&gt;Fundamentally we the people have to choose. Either between allowing our collective destiny to be dictated to us by those who have no regard for humanity, or to take on the great effort of &lt;a href=&#34;https://www.corbettreport.com/interview-1576-james-corbett-on-solutions-for-resisting-technocracy/&#34;&gt;wrestling control&lt;/a&gt; back into our own hands. As radical as this sounds, it doesn&amp;rsquo;t require a massive shift.&lt;/p&gt;
&lt;p&gt;It never been more urgent to stop contributing to tyrannical systems of control. If you&amp;rsquo;re involved in making top-down control into a reality, I urge you to reconsider the downsides of building a future you likely don&amp;rsquo;t want to live in. It is high time we not only step away from top-down control, but assist others doing so.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/lsn-banner.webp)&#34; &gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/high-places&#34;  &gt;&lt;h2&gt;Redefining &amp;#34;high places&amp;#34;&lt;/h2&gt;&lt;i&gt;Lets re-balance power from the bottom-up&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;On a higher level, it&amp;rsquo;s worth coming up with new standards and approaches to how information is collected, stored, and shared. Anything we can do to break away from the cloud goes a long way in mitigating the nefarious technocratic forces. Storing your own data instead really helps mitigate how it can be used against you.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>The False Awakening</title>
		<link>https://libresolutions.network/articles/false-awakening/</link>
		<pubDate>Mon, 31 Oct 2022 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/false-awakening/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/false-awakening.mp3" />
			
		
		<image>https://libresolutions.network//media/images/cave.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/cave.webp" />
		<itunes:image href="https://libresolutions.network//media/images/cave.webp" />
		<description>The changing of the guard is not the same as defeat of the guard</description>
		<content:encoded>&lt;p&gt;&lt;em&gt;The changing of the guard is not the same as defeat of the guard.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Twitter is under &lt;em&gt;new management&lt;/em&gt;. There is all kinds of excitement and despair over what this means for the future of free speech on that particular  information control system. Odds are, we can expect some noticeable changes on what is and is no longer allowed within the new paradigm. This should not be mistaken for an expansion of the people&amp;rsquo;s right to voice dissent. As priorities change, harmless admissions of past infractions are not evidence of reform.&lt;/p&gt;

&lt;p&gt;If nothing else, people must not be fooled into thinking this shift of policy is the answer to all the censorship and suppression of the past. This essentially presumes that we are presently aware of the full scope of past information control. It is highly likely that there are unknown taboos that still haven&amp;rsquo;t truly found a voice. When someone desperately waits for free speech to return to a top-down centralized service, they underestimate the problem.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/false-saviors.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/beware-false-saviors&#34;  &gt;&lt;h2&gt;Beware false saviors&lt;/h2&gt;&lt;i&gt;Putting faith into leaders is a road to disappointment. We all have to work together as individuals to make lasting change.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;Freedom of speech &lt;em&gt;is&lt;/em&gt; freedom from consequences. In the name of fighting hate and so-called misinformation people have ceded incredible ground to organizations to shape public discussion. By allowing voices to be suppressed in all kinds of situations, the protections for all kinds of essential and vital dissent are constantly eroded. It is tempting to attempt to find ways to engineer away censorship. This constantly underestimates the willingness of the public to participate in censorship by refusing to uphold protections that whistle-blowers and those with dire warnings have to rely on.&lt;/p&gt;
&lt;p&gt;The currently watered-down concept of freedom of speech is essentially the right to utter words alone, and face incredible sanctions for it. The public has long nurtured its tolerance for censorship to grow massively. People can be shocked and horrified by an opaque and arbitrary social credit system, but underestimate the sum effects of allowing censorship to flourish. This is to say that freedom of speech can only exist as a widely-shared culturally protected concept. This is first and foremost a social problem. People urgently need to reevaluate the mechanisms used to silence people and the costs we have paid for them.&lt;/p&gt;
&lt;p&gt;As acceptable discourse has shrunken into a vanishingly small clown show, people are predictably and understandably desperate for discussions where their concerns are properly heard. This impulse is being exploited by innumerable bad actors to trap people into micro-cults out of touch with everyone else. These micro-cults are as varied and diverse as any other consumer product. Over time, creating a false dichotomy between the blatantly absurd mainstream and a kaleidoscope of mind prisons.&lt;/p&gt;
&lt;h2 id=&#34;a-mind-prison-example-q&#34;&gt;A Mind Prison Example: Q&lt;/h2&gt;
&lt;p&gt;Many Q phrases are instant red flags. &amp;ldquo;White hats&amp;rdquo; which generally refer to the benevolent overlords in positions of power. They for some reasons must allow atrocities for the &amp;ldquo;greater good&amp;rdquo;, yet never actually make any real change. &amp;ldquo;The great awakening&amp;rdquo; which is this cult&amp;rsquo;s equivalent of any utopian fantasy&amp;rsquo;s great revolution. The Q cult has outgrown a small set of posts on an anonymous image board to a full-out megagrift empire.&lt;/p&gt;
&lt;p&gt;People stuck in the Q mind prison are fervent ideologues, they are quite often more invested in people&amp;rsquo;s opinion of Q than of any of the so-called &amp;ldquo;redpills&amp;rdquo; that have supposedly awoken them. Despite a phenomenal track-record of falsified predictions, many of them still circulate. Others are practically unfalsifiable. For example, claiming that all the politicians you don&amp;rsquo;t like have already been executed, but have merely been replaced with body-doubles to not alarm the public. By exploiting what people are starting to learn about many nefarious agendas in play, people are lured back into a safe containment. The &amp;ldquo;Quantum financial system&amp;rdquo; is simply a re-branding the evils people are starting to question. Other times, luring people with the idea that &lt;em&gt;they&lt;/em&gt; can somehow be at the top of the social credit system, it traps them into morally justifying the system. This insidious moral inversion is all pervasive in these mind prisons.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/snowjob.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/anatomy-of-a-psyop&#34;  &gt;&lt;h2&gt;Anatomy of a psyop&lt;/h2&gt;&lt;i&gt;Cognitive warfare in action&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;The most aggravating aspect of the Q situation, is that it is very often used as a justification for more top-down control of information. &lt;em&gt;&amp;ldquo;Behold all the silly nonsense the plebs can convince themselves of, surely we must protect them from such harmful influence?&amp;rdquo;&lt;/em&gt; say the technocrats and their chorus of compliant media. The sad truth is that the accusation on its face isn&amp;rsquo;t wrong, a great variety of people &lt;em&gt;do&lt;/em&gt; believe in a great variety of nonsense. The problem begins with assuming that &lt;em&gt;more top-down control&lt;/em&gt; is the answer and not the root cause of the issue. Only through honest, open debate with proper transparency can we avoid creating our own dark age.&lt;/p&gt;
&lt;h2 id=&#34;a-recognizable-pattern&#34;&gt;A recognizable pattern&lt;/h2&gt;
&lt;p&gt;This is all in no way limited to the Q mega-grift, which simply has some of the most recognizable branding. Regardless of your political or social beliefs there are almost always outright scams ready to take your money for comforting lies and entertainment. They generally follow a predictable format:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;They are in possession of magical cheat codes that they are eager to share with you, the wise critical thinker who sees through all the lies&lt;/li&gt;
&lt;li&gt;Thankfully, the answer is trivially simple and requires no real work on your part or upheaval of existing structures or systems&lt;/li&gt;
&lt;li&gt;It comes at a very low cost, but for some reason you&amp;rsquo;re still always an additional larger contribution away from the prize&lt;/li&gt;
&lt;li&gt;An inability to actually discuss or explain the merits of the primary worldview or issues&lt;/li&gt;
&lt;li&gt;A winning combination of shock, flattery, and shame to keep you in suspense&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;It is overly simplistic to think of the cost only in terms of money. Your time and attention are precious and should be something you optimize continuously to serve you and your loved ones. It is clear to me that our present environment wants nothing more than for us to fight each other over anything and everything. Taking the time to bring people together despite differing beliefs and values is likely one of the most challenging, yet vital tasks of our time. A good identifier for a mind prison is one that preaches you as a lone fighter against the ignorant masses. All kinds of people are doing fantastic work all the time, and we would do well to remember and take time to give credit.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/high-places.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/high-places&#34;  &gt;&lt;h2&gt;Redefining &amp;#34;High Places&amp;#34;&lt;/h2&gt;&lt;i&gt;Lets re-balance power from the bottom-up&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;This is one of the most nefarious aspects of these mind prisons. Instead of helping people build up and celebrate new heroes, these schemes essentially downplay any real urgency to confront the issues at all. The arrogant belief that the elites in society know best and that the &amp;ldquo;riff raff&amp;rdquo; can&amp;rsquo;t be trusted is it&amp;rsquo;s own mind prison. By embracing a limiting top-down view of society you blind yourself from truly making an attempt to understand human beings and what drives them. People vastly underestimate the advantages of bottom-up strategies and structures.&lt;/p&gt;
&lt;h2 id=&#34;beware-the-trap&#34;&gt;Beware the Trap&lt;/h2&gt;
&lt;p&gt;Being stuck in a mind prison is not only counter-productive, but it can be dangerous. You isolate yourself from people you need to stay connected with. People who don&amp;rsquo;t share your beliefs aren&amp;rsquo;t your enemies. Focusing on fighting the people around you is only going to make you unpopular and alone. It&amp;rsquo;s important to humanize yourself to others as well as you when you look in the mirror. Taking time to better understand your ideas can help you properly convey them to those who may not be receptive at first. Everyone needs a good friend more than they need another truth bomb.&lt;/p&gt;
&lt;p&gt;That said, do not let what allows you to forgive friends and family be manipulated into grating blanket &lt;a href=&#34;https://www.eugyppius.com/p/emily-oster-proposes-a-pandemic-amnesty&#34;&gt;amnesty&lt;/a&gt; to those who abused their power and authority. The Covid Crisis didn&amp;rsquo;t merely open up new wounds to tear apart society, it also revealed to many an unforgettably dark corruption that has taken near complete control. When it comes to many of the technocrats plans, people ask &amp;ldquo;Why now?&amp;rdquo; and the answer lies in the fact that much of our cultural rot is from a mask worn to hide terrible and unsustainable lies.&lt;/p&gt;
&lt;iframe src=&#39;https://youtube.com/embed/MIHC4NNScEI&#39; style=&#34;height:max-content;aspect-ratio: 16/9;min-height:460px;max-height:15rem;max-width:60rem;&#34; width=&#34;100%&#34; height=&#34;100%&#34;&gt;

&lt;/iframe&gt;
&lt;p&gt;I believe the technocracy is &lt;a href=&#34;https://www.fromrome.info/2022/01/14/how-skull-bones-plans-to-co-opt-world-wide-resistance-to-the-plandemic/&#34;&gt;desperate for a scapegoat&lt;/a&gt; and doesn&amp;rsquo;t particularly care who or what it is. By putting people into difficult situations, then slandering them in the media otherwise kind and dutiful people from all walks of life are made into monsters. As more and more divisions in society isolate people, the danger rises. We have seen how effectively the technocrats were able to use the covid crisis to inflame hatred, we would do well to do anything we can to prevent that from being utilized further. It would be all to easy for those in power to entirely avoid accountability if they maintain the ability to turn the public against a convenient scapegoat.&lt;/p&gt;
&lt;p&gt;This is the root of the false awakening. More and more people stumble into the all the lies, corruption, and contradictions of our established order. As these doubts, fears, and concerns pile up; so does friction and resistance. Those in power have an incredible incentive to manage this fragmentation by effectively isolating every fracture into it&amp;rsquo;s own bubble. We can expect the manufacture, marketing, and adoption of individualized mind prisons to be increased exponentially as those in power get more and more desperate. It&amp;rsquo;s not hard to see our current culture fractured into two inconsolable factions, if we&amp;rsquo;re not careful we will end up with everyone perfectly isolated in a terrible free-for-all.&lt;/p&gt;
&lt;p&gt;You being aware of a particular piece of truth isn&amp;rsquo;t the answer, what we need is &lt;em&gt;integration&lt;/em&gt;. Being authentically awake isn&amp;rsquo;t simply accepting a single redpill about some scandal or lie in society. It&amp;rsquo;s about being able to properly conceptualize the world as it is, rather than how others would like it to be, or even how you&amp;rsquo;d like it to be. This integration of understanding is what needs to be shared. We won&amp;rsquo;t all know everything about everything, but we need to cooperate on processes to properly investigate the truth, uncover corruption and make concrete, lasting change.&lt;/p&gt;
&lt;p&gt;Without actually integrating our understanding with how we work together, we run the risk of granting those in power and corrupt institutions total control over the future. Our future is already uncertain in so many ways, the only way to properly account for those risks is to bring them to the forefront of our mind and actions. Almost every institution in our lives is in need of complete and total reform that may be outright impossible in some instances. These institutions reflect the unacknowledged damage that has been inflicted on the public for a long time, that has gone neglected and forgotten. Rebuilding essential civic and social institutions will be an all-too-difficult task. We are all going to need as many people willing to come together and practice an unfamiliar amount of solidarity. This can only take place with excellent individuals working to reach out and authentically connect with those around them. I wish you the best of luck.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Tools of the Technocracy: #10 Central Bank Digital Currencies</title>
		<link>https://libresolutions.network/articles/tools-of-the-technocracy-10/</link>
		<pubDate>Fri, 14 Oct 2022 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/tools-of-the-technocracy-10/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/tools-of-the-technocracy10.mp3" />
			
		
		<image>https://libresolutions.network//media/images/cbdc-chains.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/cbdc-chains.webp" />
		<itunes:image href="https://libresolutions.network//media/images/cbdc-chains.webp" />
		<description> Late-stage financial repression</description>
		<content:encoded>&lt;h1 id=&#34;tools-of-the-technocracy-10-central-bank-digital-currencies&#34;&gt;&lt;a href=&#34;https://libresolutions.network/tags/tools-of-the-technocracy-series&#34;&gt;Tools of the Technocracy&lt;/a&gt;: #10 Central Bank Digital Currencies&lt;/h1&gt;
&lt;h3 id=&#34;what-is-money&#34;&gt;What is money?&lt;/h3&gt;
&lt;p&gt;This is a really humorous video that really gets at the core of this discussion.&lt;br&gt;
&lt;em&gt;&lt;strong&gt;Money is something we made up.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;a href=&#39;https://www.tiktok.com/@paigelayle/video/6902953819722861825&#39;&gt;

&lt;video muted autoplay preload=&#34;none&#34;&gt;
    &lt;source src=&#39;https://libresolutions.network/media/video/tott-10-inflation.mp4&#39;&gt;
&lt;/video&gt;

&lt;/a&gt;

&lt;p&gt;Her tiktok attracted a lot of people lecturing her on inflation, about how raising the money supply devalues the money. What those responses are missing is the key statement in the video.&lt;br&gt;
&amp;ldquo;&lt;em&gt;You let &lt;strong&gt;THIS happen!&lt;/strong&gt;&lt;/em&gt;&amp;rdquo; she exclaims holding up a plastic 5$ bill and plastic 50$ bill side-by side.&lt;/p&gt;

&lt;h3 id=&#34;what-exactly-did-we-let-happen&#34;&gt;What exactly did we &amp;ldquo;&lt;em&gt;let happen&lt;/em&gt;&amp;rdquo;?&lt;/h3&gt;
&lt;p&gt;A &lt;a href=&#34;https://www.kitco.com/news/2019-12-02/Nearly-one-third-of-Americans-believe-U-S-dollar-is-backed-by-gold-Genesis-Mining-s-survey.html&#34;&gt;third of Americans&lt;/a&gt; still believe the US dollar is backed by real, tangible value in the form of gold. This hasn&amp;rsquo;t been true for quite some time, and that is why our central bank currencies are also called &lt;em&gt;fiat currencies&lt;/em&gt;. It is almost a guarantee that you, the reader reader are paid, taxed, and earning income in a central bank currency known either as dollars, euros, or any other national currency. This has already had &lt;a href=&#34;https://wtfhappenedin1971.com/&#34;&gt;significant impact of society&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;what-is-a-central-bank&#34;&gt;What is a central bank?&lt;/h2&gt;
&lt;p&gt;A central bank is a &amp;ldquo;bank for banks&amp;rdquo;.&lt;br&gt;
&amp;ldquo;&lt;em&gt;Why would a bank need a bank?&amp;rdquo;&lt;/em&gt;&lt;br&gt;
Your deposits at a bank are a liability to that bank, they have legally needed &amp;ldquo;bank money* called &lt;em&gt;reserves&lt;/em&gt; to offset that liability on their balance sheet.&lt;/p&gt;
&lt;p&gt;John titus does a fantastic job explaining how this works, and has changed during the Covid Crisis.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://youtu.be/VYOEvurCVuk&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/images/tott-10/split-circuit.png&#39; 
&gt;

&lt;/a&gt;


&lt;p class=&#34;caption&#34;&gt;
    From &amp;#34;Larry &amp;amp; Carstens&amp;#39; Excellent Pandemic&amp;#34; by John Titus &lt;a target=&#39;_blank&#39; href=&#39;https://youtu.be/VYOEvurCVuk&#39;&gt;Source&lt;/a&gt;
&lt;/p&gt;


&lt;/div&gt;
&lt;p&gt;&lt;a href=&#34;https://www.corbettreport.com/federalreserve/&#34;&gt;Central banks are corporations&lt;/a&gt;, that lend money to governments and other banks. Central banking is effectively the death of free enterprise, not only do market participants have to out-compete vertical monopolies but also entities with the power to create and distribute money from nothing. This power effectively means that some participants experience lavish success in a simulated economy, while those outside the simulated economy must operate in the harshest of economic conditions. Before countries entirely adopt CBDCs en-masse, now is the perfect time to consider (if not the last time) if central banks are institutions that ought to be abolished entirely.&lt;/p&gt;
&lt;h2 id=&#34;digital-currencies&#34;&gt;Digital Currencies&lt;/h2&gt;
&lt;p&gt;In a sense, any digital form of national currency is &lt;em&gt;already a central bank digital currency.&lt;/em&gt; It is important to understand that while digital currencies are &lt;a href=&#34;https://libresolutions.network/tags/tools-of-the-technocracy-series&#34;&gt;tools of the technocracy&lt;/a&gt; so too are central banks &lt;em&gt;themselves&lt;/em&gt;. What central banks are after with digital currencies isn&amp;rsquo;t merely control. They have control already. Their concern is that their control is too crude, instead they would prefer precise options to micro-manage the economy down to individual transactions.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/tott-1.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-1/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy #1: Digital Currency&lt;/h2&gt;&lt;i&gt;How the digital financial complex works against you...and what you can do about it.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h3 id=&#34;payment-processors&#34;&gt;Payment processors&lt;/h3&gt;
&lt;p&gt;Online payment processors allow people to seamlessly transact. Most payment processors use central bank currencies because for most people they are the only currency they use. These payment processors have &lt;a href=&#34;https://reclaimthenet.org/paypal-fine-2500-intolerance-discriminatory/&#34;&gt;significant leverage over those reliant on them&lt;/a&gt;. As if monetary policy didn&amp;rsquo;t distort the economy enough, now payment processors are eager to show they can be proactive in surveilling, fining, and otherwise restricting their users. This is because they will be effectively competing with CBDCs in these areas.&lt;/p&gt;
&lt;h3 id=&#34;cryptocurrencies&#34;&gt;Cryptocurrencies&lt;/h3&gt;
&lt;p&gt;Satoshi made history when he created the first digital currency with no central issuing authority that couldn&amp;rsquo;t be counterfeit. This was no small feat. By using the power of raw computing power, Bitcoin is still the largest mover in the huge cryptocurrency space. Not all cryptocurrencies are decentralized. As computing power, or financial control ramp up, only time will tell how many truly decentralized projects will survive.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/road2hell.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/blockchain/&#34;  &gt;&lt;h2&gt;The road to hell: misplaced optimism in the blockchain space&lt;/h2&gt;&lt;i&gt;&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;The biggest challenge with cryptocurrency in our current age is that money is only part of our current troubles. We can all switch to a &amp;ldquo;silver bullet&amp;rdquo; system tomorrow and there would still be immense damage to be undone. Just as money is a construct we create, it is also entirely reliant on the rule of law. No money, no matter how secure or private can itself alone overthrow tyrants.&lt;/p&gt;
&lt;h2 id=&#34;what-is-a-cbdc-really&#34;&gt;What &lt;em&gt;is&lt;/em&gt; a CBDC &lt;em&gt;really&lt;/em&gt;?&lt;/h2&gt;
&lt;p&gt;The major threat that new CBDCs present is that they are highly likely to be streamlined with the following properties:&lt;/p&gt;
&lt;h3 id=&#34;programmable&#34;&gt;Programmable&lt;/h3&gt;
&lt;p&gt;In addition to having control of every transaction, programmable currencies allow participants to enter &lt;em&gt;new kinds of transactions&lt;/em&gt;. This could include all kinds of things, such as directly monetizing surveillance. Automated systems could be used to enhance these digital contracts.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/programmable-currency.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/programmable-currency&#34;  &gt;&lt;h2&gt;Programmable currency&lt;/h2&gt;&lt;i&gt;What is it good for?&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h3 id=&#34;interoperable&#34;&gt;Interoperable&lt;/h3&gt;
&lt;p&gt;As Mathew Crawford points out: &amp;ldquo;A networks value increases exponentially in relation to the number of its users&amp;rdquo; it wouldn&amp;rsquo;t make sense to limit total top-down financial control to a single jurisdiction. Eventually a global uni-system could be built on top without the participants having any power to prevent the change.&lt;/p&gt;
&lt;h3 id=&#34;so-what&#34;&gt;So what?&lt;/h3&gt;
&lt;p&gt;These things can enable an &lt;a href=&#34;https://iceni.substack.com/p/spartacast-05#details&#34;&gt;industrial revolution without people&lt;/a&gt;. The technocrats don&amp;rsquo;t just believe they&amp;rsquo;ve won in finance, but all of human history and evolution. They intend to transform all our countries into giant (but shrinking) open-air prisons.&lt;/p&gt;
&lt;h3 id=&#34;corporate-backed-digital-currencies&#34;&gt;Corporate-backed digital currencies&lt;/h3&gt;
&lt;p&gt;Odds are &lt;em&gt;essential workers&lt;/em&gt; will likely not be lucky enough to use the state-issued CBDC. Instead they may be restricted to using their companies &lt;strong&gt;Corporate-Backed Digital Currency&lt;/strong&gt;, a modern version of the &lt;a href=&#34;https://en.wikipedia.org/wiki/Company_store&#34;&gt;company store&lt;/a&gt;. These indentured servants would have no capacity to transact outside approved channels.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/servicification.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/servicification&#34;  &gt;&lt;h2&gt;Servicification&lt;/h2&gt;&lt;i&gt;One of the greatest threats to private property rights.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;It is critical not to simply be reflexively averse to a central bank digital currency, and naive to the threads presented by corporate backed digital currencies. Where convenient I recommend mentioning both in similar situations.&lt;/p&gt;
&lt;h2 id=&#34;concerns&#34;&gt;Concerns&lt;/h2&gt;
&lt;p&gt;Frustratingly, it doesn&amp;rsquo;t take much imagination to guess how these systems will be used. We have already seen mass de-platforming by financial institutions as a means of censorship. So many things that could be done with a CBDC have already been done on either as a whole, or with specific interventions.&lt;/p&gt;
&lt;p&gt;Other encroachments will be much more sinister and harder to predict. New functionality and advancements in technology will open up unimaginable possibilities. No single person would be capable of understanding it all, making anyone who attempts to sound mad to those who haven&amp;rsquo;t.&lt;/p&gt;
&lt;h3 id=&#34;surveillance&#34;&gt;Surveillance&lt;/h3&gt;
&lt;p&gt;Surveillance itself is enough of an invasion, regardless what it is being used for. People deserve the right to make mistakes, learn, and grow as people. It is troubling in an age where there is hardly any accountability for those at the top, the public is being targeted for any kind of micro-infraction. The only way to restore a free and fair society is to tilt the scales in the opposite direction.&lt;/p&gt;
&lt;h3 id=&#34;censorship&#34;&gt;Censorship&lt;/h3&gt;
&lt;p&gt;Programmable currencies are entirely able to dictate their use. No transaction is permanent, likely only the record of it is. This can be used to develop powerful feedback loops to entirely eliminate dissent.&lt;/p&gt;
&lt;h3 id=&#34;financial-repression&#34;&gt;Financial Repression&lt;/h3&gt;
&lt;p&gt;Reprisals for unapproved actions can be harsh and all-encompassing. Not only are you entirely vulnerable to the whims of the system, those around you will also face the same consequences for lending support.&lt;/p&gt;
&lt;h3 id=&#34;social-control&#34;&gt;Social control&lt;/h3&gt;
&lt;p&gt;Using financial control to manipulate the public is &lt;a href=&#34;https://www.federalreserve.gov/newsevents/pressreleases/other20220929a.htm&#34;&gt;already being tested&lt;/a&gt;.&lt;/p&gt;
&lt;h3 id=&#34;micro-management&#34;&gt;Micro-management&lt;/h3&gt;
&lt;p&gt;With additional forms of contracts punishments can be fine-tuned to elicit very specific responses. All kinds of virtual systems can be precisely configured to represent your deemed place in society.&lt;/p&gt;
&lt;h3 id=&#34;failure&#34;&gt;Failure&lt;/h3&gt;
&lt;p&gt;Central planning in any form is civilization&amp;rsquo;s equivalent of putting all your eggs in one basket&amp;hellip;over a cliff. It is a total failure mode of any human system and should be avoided at all costs. When these schemes inevitably go wrong, so much damage to lives, communities, and vital human capital is often unrecoverable.&lt;/p&gt;
&lt;p&gt;Or more importantly, &lt;em&gt;why the rush&lt;/em&gt;?&lt;/p&gt;
&lt;p&gt;There are a variety of factors that mean that the &lt;em&gt;powers that ought not to be&lt;/em&gt; might not really have time on their side when it comes to preparing alternative financial systems.&lt;/p&gt;
&lt;p&gt;John Titus can explain complicated financial concepts in a way that is remarkably accessible. He&amp;rsquo;s published many great videos addressing the bailouts and lack of criminal prosecution since the great financial crisis.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=VRV_1ECbasw&#34;&gt;Presenting America&amp;rsquo;s Real Coup d&amp;rsquo;Etat&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;geopolitics&#34;&gt;Geopolitics&lt;/h3&gt;
&lt;p&gt;As the world changes so do alliances and incentives. Many brilliant minds have suggested that the Covid Crisis could be a &lt;a href=&#34;https://denisrancourt.ca/videos.php?id=37&#34;&gt;painful diversion&lt;/a&gt; from an ongoing &lt;a href=&#34;https://rumble.com/v1lamwt-rte-raw-exploring-the-iatrogenocide-hypothesis.html&#34;&gt;geopolitical Struggle&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Regardless of the underlying reasons we can almost certainly expect future disruptions and difficulties. If nothing else please find ways to be more resilient yourself and take care of others.&lt;/p&gt;
&lt;h2 id=&#34;solutions&#34;&gt;Solutions&lt;/h2&gt;
&lt;h3 id=&#34;just-say-no-and-do-not-comply&#34;&gt;Just say &amp;ldquo;NO!&amp;rdquo; and Do not comply!&lt;/h3&gt;
&lt;p&gt;Tank your social credit score in advance! The most powerful tool the technocracy has to influence you is your own mind. Deliberately properly aligning the incentives yourself can go a long way.&lt;/p&gt;
&lt;p&gt;Authentic peaceful disobedience is priceless in these times. As aggrivating as things are it&amp;rsquo;s important to understand that it&amp;rsquo;s our duty to demonstrate that all peaceful options have been exhausted.&lt;/p&gt;
&lt;h3 id=&#34;hold-institutions-accountable&#34;&gt;Hold institutions accountable&lt;/h3&gt;
&lt;p&gt;We can not engineer nor evade our way around the fact that the rule of law is precious and needs to be restored. There is hardly any reason to start new laws and constitutions from scratch when we can&amp;rsquo;t even enforce existing ones. Greater transparency and accountability will pay dividends in all other aspects of working for freedom.&lt;/p&gt;
&lt;h3 id=&#34;sharing--charity&#34;&gt;Sharing &amp;amp; Charity&lt;/h3&gt;
&lt;p&gt;A great way to eliminate financial incentives is to provide what you can without financial strings. Cooperation is at a premium these days, so there is much to gain from sharing with others. Building a robust safety-net for those ejected from the social credit system is a pre-requisite for mass resistance.&lt;/p&gt;
&lt;h3 id=&#34;sound-money&#34;&gt;Sound money&lt;/h3&gt;
&lt;p&gt;I&amp;rsquo;m not particularly biased towards any asset or commodity, but I am highly skeptical of any solution that doesn&amp;rsquo;t re-ground society back to tangible value. Our manipulated currencies have corrupted even trivial incentives for so long that I doubt we can avoid facing those consequences. This is why it is all-the-more important that high-profile criminals be prosecuted for their ill-gotten-gains.&lt;/p&gt;
&lt;h3 id=&#34;time-banking&#34;&gt;Time banking&lt;/h3&gt;
&lt;p&gt;Anything that values human beings and their time more is a good thing. The technocracy has aimed to glamorize a future without other people. If we all have to embrace barter to resist tyranny, time banking is a very efficient model.&lt;/p&gt;
&lt;h3 id=&#34;local-digital-currencies-and-decentralized-cryptocurrencies&#34;&gt;Local digital currencies and decentralized cryptocurrencies&lt;/h3&gt;
&lt;p&gt;While any and all useful digital systems should be used for what they can, relying on a single global blockchain may be an inefficient option for regions that may face radically different circumstances. Building an online bank from the ground up is not a technically sophisticated task. Anyone capable of creating a dynamic website is capable of building a functional prototype. The main difficulties are around physical security and accountability for the assets.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Servicification</title>
		<link>https://libresolutions.network/articles/servicification/</link>
		<pubDate>Wed, 12 Oct 2022 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/servicification/</guid>
		
		<image>https://libresolutions.network//media/images/servicification.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/servicification.webp" />
		<itunes:image href="https://libresolutions.network//media/images/servicification.webp" />
		<description>One of the greatest threats to private property rights.</description>
		<content:encoded>&lt;p&gt;Today, so many online services confuse the concept of ownership.&lt;br&gt;
Ownership is not merely access to a product.
Ownership is about &lt;em&gt;rights&lt;/em&gt;, for both tangible and intangible property.&lt;br&gt;
What options do you have to use, enjoy, or transfer that property?&lt;br&gt;
What limits (if any) exist on those options.&lt;br&gt;
These rights are entirely dependent on either the rule of law, or on force.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;If Claus Schwab aims to deprive me of my property and my liberty, he needs to remember I have a gun.&lt;/p&gt;
&lt;p&gt;Rick Rule&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;The very reason the law exists, is so that people don&amp;rsquo;t have to resort to violent means to defend themselves. In an ideal world, people would clearly and efficiently negotiate outcomes. This requires acceptable and enforceable &lt;em&gt;boundaries&lt;/em&gt; to limit what actions can be taken against people. Otherwise the situation can rapidly devolve into &lt;em&gt;anarcho-tyranny.&lt;/em&gt; &lt;sup id=&#34;fnref:1&#34;&gt;&lt;a href=&#34;#fn:1&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;1&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;The &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy/&#34;&gt;tools of the technocracy&lt;/a&gt; aren&amp;rsquo;t always used to outright rob people. Quite often, they are instead used to &lt;em&gt;tip the scales&lt;/em&gt; in a way that coerces people into giving in to schemes that they otherwise wouldn&amp;rsquo;t. Convenience in exchange for surveillance is the most clear example, but there are other options. If not prevented by a vigilant populace, the state can force people to &lt;a href=&#34;https://reclaimthenet.org/canadian-government-has-allocated-105-3-million-to-world-economic-forum-digital-id-partnership/&#34;&gt;beta test&lt;/a&gt; additional surveillance and control.&lt;sup id=&#34;fnref:2&#34;&gt;&lt;a href=&#34;#fn:2&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;2&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;h1 id=&#34;servicification&#34;&gt;Servicification&lt;/h1&gt;
&lt;p&gt;Servicification is the replacement of concrete ownership with temporary access. Arguably there are some efficiency gains. Instead of fragile, disposable products providers would invest in products that are built to last. In addition to this, unused products could be accessible to be used by others. These benefits are more advantageous for the &lt;em&gt;owner&lt;/em&gt; of the property rather than the users. The only benefit the user gains is that it potentially gives people access to products that they would be otherwise unable to afford.&lt;/p&gt;
&lt;p&gt;A big problem is that in our current landscape, the users will likely be charged more than just currency. People may have to pay with their data in addition to currency. Even worse, by using these products may be entirely gated behind a social credit system armed with all-pervasive mass surveillance.&lt;/p&gt;
&lt;h3 id=&#34;virtual-goods&#34;&gt;Virtual goods&lt;/h3&gt;
&lt;p&gt;Music, videos, software, &amp;amp;  video games are all already quite accessible through online stores. &amp;ldquo;Owning&amp;rdquo; these &lt;em&gt;virtual products&lt;/em&gt; isn&amp;rsquo;t actual ownership, it&amp;rsquo;s merely purchasing a &lt;a href=&#34;https://www.nytimes.com/wirecutter/blog/you-dont-own-your-digital-movies/&#34;&gt;&lt;em&gt;temporary license&lt;/em&gt;&lt;/a&gt; to make use of them. Temporary as in, the service provider can decide to no longer give the user access. Or even when the service provider goes under, access becomes impossible.&lt;/p&gt;
&lt;p&gt;NFTs are an interesting attempt to solve that problem. If one stores entire digital goods on the blockchain, smart contracts could allow permanent &lt;sup id=&#34;fnref:3&#34;&gt;&lt;a href=&#34;#fn:3&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;3&lt;/a&gt;&lt;/sup&gt; and transferrable access. This arrangement requires there to be an incentive for the blockchain to be stored-long term, which may require a high and increasing token price.&lt;/p&gt;
&lt;h3 id=&#34;reality-alterations&#34;&gt;Reality alterations&lt;/h3&gt;
&lt;p&gt;Beyond digital goods, servicification can be used to regulate and manage physical assets and goods. With enough surveillance and automation, renting something or somewhere can be done without any human interaction. This is always a double-edged affair, when things are conveniently enabled without human interaction, they can also be &lt;em&gt;restricted&lt;/em&gt; without any human interaction or judgement.&lt;/p&gt;
&lt;video controls preload=&#34;metadata&#34;&gt;
    &lt;source src=&#39;https://libresolutions.network/media/video/wef-clothes-drm.mp4&#39;&gt;
&lt;/video&gt;
&lt;p&gt;Video source: &lt;a href=&#34;https://twitter.com/heliodown/status/1501550504677101570&#34;&gt;Twitter&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This is a new frontier for digital intrusion into people&amp;rsquo;s lives. While one may hope that they are exempt because they don&amp;rsquo;t own any smart devices, there are ways around this. People with less money can be presented with predatory arrangements where renting a place also requires them to opt-in to all kinds of surveillance and control, ensuring that privacy and autonomy is only limited to the very wealthy.&lt;/p&gt;
&lt;p&gt;It is important to note that these measures aren&amp;rsquo;t enhancements. In no way does adding internet access to a lock make it more secure. A digital token may &lt;em&gt;represent access&lt;/em&gt; but this is in no way the same thing as a key physically required to mechanically unlock a door.&lt;/p&gt;
&lt;h3 id=&#34;the-sharing-economy&#34;&gt;The &amp;ldquo;sharing economy&amp;rdquo;&lt;/h3&gt;
&lt;p&gt;Jobs aren&amp;rsquo;t safe either. Offshoring allowed the financial class to use human suffering as a competitive advantage against labor. Servicification allows an even further impoverishment of the citizens. By cutting up a single well-paid career into micro-tasks that are then farmed out to either underpaid workers with no bargaining power, or simply automated.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Consumerism in America has transferred billions and trillions of dollars of wealth to would-be financial despots who now want to monopolize all resources, all property, and collect rents from them from now until the end of time, all in the name of sustainability.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://iceni.substack.com/p/spartacast-05&#34;&gt;Spartacus&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;In the best of circumstances, this will have disastrous consequences for the workforce. This precariousness-by-default will eliminate the last vestiges of security people once took for granted. Taken to the extreme, it undermines the very social contract by turning the entire public into mercenaries.&lt;/p&gt;
&lt;h2 id=&#34;better-ways&#34;&gt;Better ways&lt;/h2&gt;
&lt;h3 id=&#34;entrepreneurship&#34;&gt;Entrepreneurship&lt;/h3&gt;
&lt;p&gt;The lockdowns during the Covid Crisis were an atrocious attack on small enterprises. If local economies are to ever thrive again this must be actively reversed. This is not something we have the luxury of simply hoping for. People need to actively work to reduce unfair barriers leveraged against local businesses. One of the things the technocrats fear the most is strong communities with economic self-determination. Making these changes may be difficult and expensive, but it is a whole lot more difficult and expensive to live in a society without an authentic local economy.&lt;/p&gt;
&lt;h3 id=&#34;libraries&#34;&gt;Libraries&lt;/h3&gt;
&lt;p&gt;Yes, most of the efficiency of servicification can be gained from your local library. Using a &lt;a href=&#34;https://en.wikipedia.org/wiki/Library_of_Things&#34;&gt;library of things&lt;/a&gt; &lt;sup id=&#34;fnref:4&#34;&gt;&lt;a href=&#34;#fn:4&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;4&lt;/a&gt;&lt;/sup&gt; allows people to get use out of items they may only need occasionally. There is no reason that the products being shared need to be owned by a multi-national corporation. By supporting and enhancing surveillance-free alternatives we can all benefit from modern efficiency without compromising the vulnerable.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/lsn-banner.webp)&#34; &gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://synergeticdesign.substack.com/p/the-future-will-be-community-based&#34;  &gt;&lt;h2&gt;The future will be community-based&lt;/h2&gt;&lt;i&gt;The need to belong is thwarting the globalist agenda.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;div class=&#34;footnotes&#34; role=&#34;doc-endnotes&#34;&gt;
&lt;hr&gt;
&lt;ol&gt;
&lt;li id=&#34;fn:1&#34;&gt;
&lt;p&gt;Anarcho-tyranny on &lt;a href=&#34;https://www.urbandictionary.com/define.php?term=anarcho-tyranny&#34;&gt;urban dictionary&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Anarcho-tyranny is a concept, where the state is argued to be more interested in controlling citizens so that they do not oppose the managerial class (tyranny) rather than controlling real criminals (causing anarchy). Laws are argued to be enforced only selectively, depending on what is perceived to be beneficial for the ruling elite.&lt;/p&gt;
&lt;/blockquote&gt;
&amp;#160;&lt;a href=&#34;#fnref:1&#34; class=&#34;footnote-backref&#34; role=&#34;doc-backlink&#34;&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/li&gt;
&lt;li id=&#34;fn:2&#34;&gt;
&lt;p&gt;Vaccine passports are a notable example.&amp;#160;&lt;a href=&#34;#fnref:2&#34; class=&#34;footnote-backref&#34; role=&#34;doc-backlink&#34;&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id=&#34;fn:3&#34;&gt;
&lt;p&gt;Well, as permanent as the blockchain running it anyways.&amp;#160;&lt;a href=&#34;#fnref:3&#34; class=&#34;footnote-backref&#34; role=&#34;doc-backlink&#34;&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id=&#34;fn:4&#34;&gt;
&lt;p&gt;Share a shovel, share a machine&amp;#160;&lt;a href=&#34;#fnref:4&#34; class=&#34;footnote-backref&#34; role=&#34;doc-backlink&#34;&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>The failure of intelligence</title>
		<link>https://libresolutions.network/articles/intelligence/</link>
		<pubDate>Sat, 08 Oct 2022 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/intelligence/</guid>
		
		<image>https://libresolutions.network//media/images/intelligence.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/intelligence.webp" />
		<itunes:image href="https://libresolutions.network//media/images/intelligence.webp" />
		<description>The current state of affairs is a warning that top-level intelligence is failing</description>
		<content:encoded>&lt;p&gt;In an ideal world, people would do their best to understand reality and share that understanding with others. Some call this journalism. This kind of journalism has been under attack for quite some time. The very reason that ideal world can&amp;rsquo;t exist is because being able to understand reality better than others, or to even conceal that reality from others gives one power. That power is sought by all kinds of people in all kinds of situations and it corrupts them. No amount of &lt;em&gt;&amp;ldquo;It&amp;rsquo;s for the greater good!&amp;rdquo;&lt;/em&gt; rationalization will comfort their souls, and deep down they know it.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;The very word “secrecy” is repugnant in a free and open society; and we are as a people inherently and historically opposed to secret societies, to secret oaths and to secret proceedings. We decided long ago that the dangers of excessive and unwarranted concealment of pertinent facts far outweighed the dangers which are cited to justify it. Even today, there is little value in opposing the threat of a closed society by imitating its arbitrary restrictions. Even today, there is little value in insuring the survival of our nation if our traditions do not survive with it. And &lt;strong&gt;there is very grave danger that an announced need for increased security will be seized upon by those anxious to expand its meaning to the very limits of official censorship and concealment.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;John F. Kennedy &lt;a href=&#34;https://voicesofdemocracy.umd.edu/john-f-kennedy-address-the-president-and-the-press-27-april-1961-speech-text/&#34;&gt;27 April 1961&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Secrets beget more secrets, and they blister with corruption. This deep corruption has taken root in almost all levels of society. One has to be ejected from it all to appreciate the full extent of it. People very ability to understand what lies before them is under attack on the most fundamental levels. More control, suppression and deceit are constantly required to maintain the illusion. These illusions are not mere phantoms, they require sacrifice. Greater and greater sacrifices are made just for more to be demanded.&lt;/p&gt;
&lt;p&gt;People are not blind to this. Every day in all their actions they make a conscious choice. &amp;ldquo;&lt;em&gt;Is this level of sacrifice enough to cover the secrets I maintain?&lt;/em&gt;&amp;rdquo; We are all tainted by the secrets we participate in. Every deviation from sharing the truth as we know it incurs unimaginable debts. There is only one act that can truly change things. It is a loving act of self-sacrifice. That act of self-sacrifice is to shout:&lt;/p&gt;
&lt;h2 id=&#34;enough&#34;&gt;Enough!&lt;/h2&gt;
&lt;p&gt;Enough with the lies, enough with the pretending, enough with the sacrifices. It takes a monumental act of courage to take on not only the secrecy, but also make yourself an enemy of those who still harbor them. This is no small feat. Telling the truth in an age of deceit is an immense risk in even the most trivial of examples. How do we as free people respond?&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Don&amp;rsquo;t underestimate the power of truth, there&amp;rsquo;s nothing more powerful. Now in order to speak what you might regard as the truth you have to &lt;strong&gt;let go of the outcome!&lt;/strong&gt; You have to think: &amp;ldquo;Alright I&amp;rsquo;m going to say what I think. Ignorant as I am, stupid as I am. I am going to state what I think as clearly as I can and I&amp;rsquo;m going to live with the consequences no matter what they are.&lt;/p&gt;
&lt;p&gt;Jordan Peterson at the &lt;a href=&#34;https://youtu.be/watch?v=HzZ9h7bM6QE&#34;&gt;Manning Conference 2017&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;As Peterson warns us, it is not safe to speak the truth. People have to do it anyways. You need to have the faith that the cost is worth it. Without that faith you will falter when you&amp;rsquo;re needed most. You may never know when that time comes, it is best to always be on guard. If nothing else, understand you&amp;rsquo;re not alone. There are many others who have taken up that challenge in the largest and smallest of ways.&lt;/p&gt;
&lt;h2 id=&#34;freeassange&#34;&gt;#FreeAssange&lt;/h2&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/lsn-banner.webp)&#34; &gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://twitter.com/johnpilger/status/1577372529169154073&#34;  &gt;&lt;h2&gt;John Pilger on Twitter🐦 &lt;/h2&gt;&lt;i&gt;Julian Assange is in prison, representing you yes, you. Why? Because eventually the violent, rapacious power that put him there will touch your life, perhaps worse than that...&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;By sacrificing Julian Assange for &lt;a href=&#34;https://web.archive.org/web/20120614232056/https://www.michaelmoore.com/words/mike-friends-blog/why-im-posting-bail-money&#34;&gt;these lies&lt;/a&gt;, what&amp;rsquo;s next? Who or what should we prepare to hoist onto the altar of public relations. Merely evading the wrath of those who benefit from secrecy is not enough. These injustices simply beget more injustices. In doing so we don&amp;rsquo;t just corrupt the public record, but our own moral understanding. Some may argue these methods are worthwhile, but it is indisputable they have a cost. That cost rises every day with every concession away from the truth.&lt;/p&gt;
&lt;p&gt;This is &lt;em&gt;the mechanism&lt;/em&gt; that is making all our lives more difficult. You can choose almost any contentious political issue, delve deep enough you find ultimately the troubles are the cost of maintaining some kind of secret. People have been mislead in so many ways. It is terrifyingly asinine to label a handful of alleged misconceptions &lt;em&gt;&amp;ldquo;disinformation&amp;rdquo;&lt;/em&gt; to take the blame for decades of deceit.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;When you try to equate yourself with Julian Assange you&amp;rsquo;re making a very dangerous gesture.&lt;/p&gt;
&lt;p&gt;John Bolton&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;We are well past dangerous. We have gambled with so many lives, for so long and for what? Deranged western leaders have sabotaged generations of human capital. Nobody is safe. No amount of acquiescence or displays of loyalty will protect anyone from a system of total corruption. Wealth won&amp;rsquo;t protect anyone either. Without the rule of law safety and wealth are both meaningless, unenforceable concepts.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;the-goal-is-justice-the-method-is-transparency&#34;&gt;&lt;em&gt;The goal is justice, the method is transparency&lt;/em&gt;&lt;/h2&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://johnpilger.com/videos/julian-assange-in-conversation-with-john-pilger&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/assange-interview.webp&#39; 
&gt;

&lt;/a&gt;



&lt;/div&gt;
&lt;p&gt;Our goal as free people in society shouldn&amp;rsquo;t simply be to be those &lt;em&gt;in-the-know&lt;/em&gt;. Being &amp;ldquo;awake&amp;rdquo; is a pitiful consolation when one idly watches the tides of tyranny crash forth. It is long past time to take action, but I&amp;rsquo;ll also call you to imagine. Imagine a world that isn&amp;rsquo;t constantly wasting time, energy, effort, and lives in the name of preserving secrecy. What could be gained by saving the immense cost of maintaining secrecy and lies?&lt;/p&gt;
&lt;p&gt;All around us we witness the unending failures of intelligence at the highest levels. What is all the censorship, surveillance, and narrative control for if it fails to bring forth truth? People struggle to agree on some of the most basic tenets of our reality. Instead of cooperating to build understanding we draw battle lines. Waging our culture wars, while criminals plunder our societies in the cover of ignorance and hatred.&lt;/p&gt;
&lt;p&gt;Whatever we currently call intelligence needs to give way for justice. Agencies, think-tanks, and individuals are all called to say &amp;ldquo;Enough!&amp;rdquo; and aim for restoring integrity. We can undo the damage done by lies, but we can use the truth to set us free of them.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Principle: Hardware matters</title>
		<link>https://libresolutions.network/articles/hardware-matters/</link>
		<pubDate>Wed, 05 Oct 2022 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/hardware-matters/</guid>
		
		<image>https://libresolutions.network//media/images/board.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/board.webp" />
		<itunes:image href="https://libresolutions.network//media/images/board.webp" />
		<description>It is easy to underestimate the underlying structure of our digital world.</description>
		<content:encoded>&lt;h2 id=&#34;back-to-basics&#34;&gt;Back to Basics&lt;/h2&gt;
&lt;p&gt;There are innumerable examples of average people being unable to explain how the modern conveniences of their life work. From creating food, energy,  and products to what it takes to make them accessible, nearly everyone is quite ignorant about these things. In an age of such rapid transformation it is quite understandable if not predictable. When it comes to technology, almost everything is quite obscured for a person who doesn&amp;rsquo;t take the time to look.&lt;/p&gt;
&lt;p&gt;This creates a great deal of confusion and friction when trying to truly decentralize power. In most cases, it’s not always necessary for someone to know details about every service and system they use. However, there are many advantages to being aware of some fundamental elements of digital systems that surround us. We as people working to safeguard and expand human liberty, must at least understand the basics of how things work.&lt;/p&gt;
&lt;h2 id=&#34;hardware&#34;&gt;Hardware&lt;/h2&gt;
&lt;p&gt;In their simplest form, computers use power to run computations on signals. They can use those signals to manipulate devices to do all kinds of things like run displays or store information. These devices can have ways to &lt;a href=&#34;https://www.coreysdigs.com/technology/welcome-to-the-surveillance-state-biometrics-data-collection-is-all-around-you/&#34;&gt;collect information&lt;/a&gt; and signals for the computer. With more sophisticated programming we can use these signals to create files and media, access the web, and enjoy a large variety of multimedia content. When it comes to any device you have, you&amp;rsquo;ll at least want to be aware of what it &lt;a href=&#34;https://reclaimthenet.org/tim-hortons-privacy-settlement/&#34;&gt;&lt;em&gt;can do&lt;/em&gt;.&lt;/a&gt;&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/lsn-banner.webp)&#34; &gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutionsnetwork.substack.com/p/reclaiming-cyberspace-1&#34;  &gt;&lt;h2&gt;Reclaiming territory in cyberspace: #1 Hardware basics&lt;/h2&gt;&lt;i&gt;Start your journey in building up your digital sovereignty.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h3 id=&#34;specialized-hardware&#34;&gt;Specialized hardware&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;One cpu = one vote&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://www.bitcoin.com/satoshi-archive/whitepaper&#34;&gt;Satoshi Nakamoto&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;One of the things that initially got me excited about &lt;a href=&#34;https://www.campfire.wiki/doku.php?id=bitcoin&#34;&gt;Bitcoin&lt;/a&gt; was that it created a market incentive for people to acquire more powerful computing. I had hoped that this would eventually decentralize computing power across society. That was quickly demolished when &lt;a href=&#34;https://cryptobriefing.com/cryptocurrency-mining-asic-centralization/&#34;&gt;specialized hardware&lt;/a&gt; was created uniquely for the purpose of mining Bitcoin. There are also specialized devices for &lt;a href=&#34;https://itsfoss.com/best-sbc-for-ai/&#34;&gt;machine learning&lt;/a&gt; and &lt;a href=&#34;https://www.ionos.com/digitalguide/server/security/what-is-fido2/&#34;&gt;authentication&lt;/a&gt;. using specialized hardware can do wonders for resource efficiency and simplifying problems.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/construction-banner.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-3/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #3 Robots, IoT, Automation, Oh my!&lt;/h2&gt;&lt;i&gt;Transforming the world in ways seen and unseen&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;Unfortunately that also means that general computing devices could end up being restricted from the people. If all kinds of functions are available through cloud providers and specialized products, bad actors could argue that general-purpose computing is too dangerous to be accessible to the masses. General purpose devices would likely consume more resources, and these &amp;ldquo;wasteful&amp;rdquo; devices could be restricted in the name of conserving energy.&lt;/p&gt;
&lt;iframe src=&#39;https://youtube.com/embed/IgF3OX8nT0w&#39; style=&#34;height:max-content;aspect-ratio: 16/9;min-height:460px;max-height:15rem;max-width:60rem;&#34; width=&#34;100%&#34; height=&#34;100%&#34;&gt;

&lt;/iframe&gt;
&lt;h2 id=&#34;what-happens-when-we-ignore-hardware&#34;&gt;What happens when we ignore hardware?&lt;/h2&gt;
&lt;p&gt;There&amp;rsquo;s no reason to guess because in many ways we already have. Smartphones are the perfect representation of what happens when we aren&amp;rsquo;t in control of our computing. People&amp;rsquo;s own devices and data can become &lt;a href=&#34;https://dt.gl/privacy-update-google-scans-private-photos-leading-to-false-accusations/&#34;&gt;weaponized against them&lt;/a&gt;.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/pi-vs-smartphone.webp&#39; 
&gt;



&lt;/div&gt;
&lt;h3 id=&#34;the-cloud&#34;&gt;The cloud&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;There is no cloud, there is only someone else&amp;rsquo;s computer&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;By putting all of your data on cloud services you have no idea where the data is actually stored and if it is truly protected. While the best way to protect data is to never record it, a great way is to only store it on your own devices. While many cloud providers boast stringent security, data breaches are an &lt;a href=&#34;https://haveibeenpwned.com/&#34;&gt;all-too-common occurrence.&lt;/a&gt; By keeping your data to yourself, it is safer because you&amp;rsquo;re likely to be less of a target than everyone&amp;rsquo;s cloud data combined.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/tott-4.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-4/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #4 Online Identity&lt;/h2&gt;&lt;i&gt;What is following you in your digital tracks?&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h3 id=&#34;serverless&#34;&gt;&amp;ldquo;Serverless&amp;rdquo;&lt;/h3&gt;
&lt;p&gt;Why use your own devices at all? Why not simply centralize all computing power and storage into one giant &lt;a href=&#34;https://en.wikipedia.org/wiki/Mainframe_computer&#34;&gt;big iron.&lt;/a&gt; Due to the economies of scale, it can be tempting to reap the efficiency gains of using massive supercomputers as a common good. While for some applications this may be quite viable, the name &amp;ldquo;serverless&amp;rdquo; is entirely misleading. All the computation and storage still needs to exist somewhere. Whoever, or whatever has control of that mainframe is effectively the master of the resource. Bad actors would be highly motivated to corrupt and manipulate that resource, undermining any efficiency gains from centralization.&lt;/p&gt;
&lt;p&gt;If you&amp;rsquo;re sincerely interested in running systems without servers at all, you may be interested in &lt;a href=&#34;https://github.com/amark/gun&#34;&gt;gun.js&lt;/a&gt;. Gun is a useful framework for building peer-to-peer persistent applications. These applications effectively store all the important data among the users.&lt;/p&gt;
&lt;h2 id=&#34;rebuilding&#34;&gt;Rebuilding&lt;/h2&gt;
&lt;p&gt;All three primary resources in cyberspace (Computing power, Storage, &amp;amp; bandwidth) are entirely reliant on hardware. This means if you&amp;rsquo;re hoping to democratize our online experience, you want to ensure those three (and the hardware that supports them) are as decentralized as possible. While it may be impossible to perfectly decentralize these things, incremental progress can yield exponential results.&lt;/p&gt;
&lt;h3 id=&#34;free-as-in-freedom-hardware&#34;&gt;Free (as in Freedom) hardware&lt;/h3&gt;
&lt;p&gt;It is a mistake to continue to buy hardware from large corporations with an incentive to sell you cloud services. You can&amp;rsquo;t reasonably expect that they will chose principles they don&amp;rsquo;t have over their bottom-line. Ideally your hardware would be entirely sourced from local, ethically built, businesses that respect your freedom. Unfortunately we are quite far away from that being the standard. It is our responsibility collectively to remove &lt;a href=&#34;https://2ndlook.news/2022/02/06/made-to-break-planned-obsolescence-and-the-right-to-repair/&#34;&gt;unnecessary barriers&lt;/a&gt; to making that a reality.&lt;/p&gt;
&lt;p&gt;The &lt;a href=&#34;https://fsf.org&#34;&gt;Free Software Foundation&lt;/a&gt; has a fantastic campaign called &lt;a href=&#34;https://ryf.fsf.org/&#34;&gt;&lt;em&gt;Respects your freedom&lt;/em&gt;&lt;/a&gt; or hardware that meets their &lt;a href=&#34;https://ryf.fsf.org/about&#34;&gt;certification&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;other-initiatives&#34;&gt;Other initiatives&lt;/h3&gt;
&lt;p&gt;Regardless of what we choose, it&amp;rsquo;s important that we get better at supporting hardware designers and manufacturers that support freedom.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://puri.sm/&#34;&gt;Purism&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://system76.com/&#34;&gt;System76&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://e.foundation/&#34;&gt;E Foundation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://pine64.com/&#34;&gt;Pine64&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://starlabs.systems/&#34;&gt;Star Labs systems&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Programmable currency</title>
		<link>https://libresolutions.network/articles/programmable-currency/</link>
		<pubDate>Sun, 25 Sep 2022 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/programmable-currency/</guid>
		
		<image>https://libresolutions.network//media/images/programmable-currency.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/programmable-currency.webp" />
		<itunes:image href="https://libresolutions.network//media/images/programmable-currency.webp" />
		<description>What is it good for?</description>
		<content:encoded>&lt;p&gt;With ordinary money like cash or coins, the holder decides what they want to do with it and what needs to be disclosed. &lt;em&gt;Programmable currency&lt;/em&gt; is an entirely different situation. In many ways, they aren&amp;rsquo;t much of a deviation from existing digital currency that can be tracked, blocked and controlled. The differences lie in scale, scope, and application. When someone has their &lt;a href=&#34;https://www.zerohedge.com/political/ottawa-city-councillor-demands-government-seize-7-million-raised-canadian-truckers&#34;&gt;donations seized&lt;/a&gt;, or &lt;a href=&#34;https://reclaimthenet.org/canadas-td-bank-freezes-1-1m-donated-to-freedom-convoy-protesters/&#34;&gt;their bank account frozen&lt;/a&gt;, there is an action that needs to make that happen. Someone has to recognize an event, then take action and make the change.&lt;/p&gt;
&lt;p&gt;With programmable currency &lt;em&gt;intervention can be the default&lt;/em&gt;. Instead of you being protected from interference, you are at the whims of the &lt;em&gt;rules of the game&lt;/em&gt;. Ideally, people would be able to choose the terms they&amp;rsquo;re beholden to. The challenge is that both state and corporate entities are more than able and willing to enforce one-sided terms onto the public.  There is much to say about the diabolical uses for programmable currency.&lt;/p&gt;
&lt;h2 id=&#34;what-is-it-good-for&#34;&gt;What is it good for?&lt;/h2&gt;
&lt;p&gt;Currency is a concept first and foremost. Instead of getting lost in the technical details of specific digital currencies, realize that programmable currency can be built on simple ideas. This piece, aims to help you understand how these systems work. Surely there&amp;rsquo;s more to programmable currency than pure evil? What can programmable currency be used for?&lt;/p&gt;
&lt;h3 id=&#34;smart-contacts&#34;&gt;Smart contacts&lt;/h3&gt;
&lt;p&gt;There are many situations where one may want some product or service, but isn&amp;rsquo;t too concerned about who or what provides it. With programmable currency one could automatically pay the first entity that delivers it. Even fully-centralized programmable money may provide the mechanism for ordinary people to setup these kinds of interactions.&lt;/p&gt;
&lt;p&gt;This has all kinds of other uses. With this, and a high degree of automation; one could run a nearly entirely automated business. When a customer places an order, the machines detect the transaction. The machines then can prepare the order, maybe even paying human laborers in the programmable currency to handle some of the trickier parts along the way.&lt;/p&gt;
&lt;h3 id=&#34;open-science&#34;&gt;Open Science&lt;/h3&gt;
&lt;p&gt;Kevin McKernan argues that the peer review system is broken. That its main flaw is the lack of a price signal for reviewers. Funded by the Dash project, Kevin published results and papers about sequencing cannabis plants. Through the course of the project a great deal of progress was made. He does focus more on the scientific elements of the project, but some elements are clear:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Science could be a lot more transparent&lt;/li&gt;
&lt;li&gt;The barrier to entry can be lowered significantly&lt;/li&gt;
&lt;li&gt;Participants can be better rewarded for their contributions&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://youtu.be/watch?v=iSZ3TynIczw&#34;&gt;Kevin McKernan - Texas Bitcoin Conference&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;alternative-financial-models&#34;&gt;Alternative financial models&lt;/h3&gt;
&lt;p&gt;Many proponents of programmable currency are fierce advocates of universal basic income (UBI). &lt;a href=&#34;https://cesium.app/en/&#34;&gt;Cesium&lt;/a&gt; is an attempt to make this a reality. Every day each participant in the web-of-trust is given a daily guaranteed dividend. The value of the currency is solely determined by the value offered by the participants. This currency isn&amp;rsquo;t designed for saving or investing, but purely as a way to provide grassroots liquidity.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://youtu.be/y1b7rppRkaI&#34;&gt;The libre currency without jargon&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;a-trivial-example&#34;&gt;A trivial example&lt;/h2&gt;
&lt;p&gt;If you&amp;rsquo;ve ever tried a variety of games for Android or iOS, this can illuminate things a great deal. Many smartphone games are outright designed to extract the most amount of money from the customer as regularly as possible. With all the state-of-the-art research on how to manipulate people, any centralized digital currency will definitely resemble the worst aspects of any popular mobile game.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://youtu.be/wUrBlQaDkfM&#34;&gt;How Gacha Games Trick Players into Spending Thousands&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;As a player of any mobile game you bring in two primary resources: your money and your time. Your goal is to effectively convert one or both of those resources into in-game experiences and rewards. These mobile games tend to have two in-game currencies: one that is purchased with time, another that is purchased with your money. If you understand those dynamics, you understand everything you need to about how programmable currency will be used against people.&lt;/p&gt;
&lt;p&gt;The game&amp;rsquo;s two currencies have many properties that are unique to programmable currencies:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;They are limited to specific uses&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In these games the currencies are not equal. &amp;ldquo;Money currency&amp;rdquo; will take you so much farther than the &amp;ldquo;time currency&amp;rsquo; and there is usually a very unfavorable ratio when exchanging these.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;May be explicitly manipulated by the issuer&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The player doesn&amp;rsquo;t have any control over the game&amp;rsquo;s infrastructure. Their only choice is to use the currencies as intended or work outside the system entirely.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Purchasing the currency locks you into the system&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There may be no way to recover value from the system. If the game itself is not one you enjoy, and you&amp;rsquo;re outside of the refund window, there may be no way to recover the value you put into the system. It may even be outright impossible.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h1 id=&#34;what-cant-programmable-currency-do&#34;&gt;What can&amp;rsquo;t programmable currency do?&lt;/h1&gt;
&lt;h3 id=&#34;eliminate-security-concerns&#34;&gt;Eliminate security concerns&lt;/h3&gt;
&lt;p&gt;There are &lt;a href=&#34;https://web3isgoinggreat.com/&#34;&gt;many examples&lt;/a&gt; of poorly designed Web3 projects getting hacked or having &lt;a href=&#34;https://www.zerohedge.com/crypto/ethereums-censorship-resistance-under-attack-recap-biggest-crypto-news-2nd-week-august&#34;&gt;funds sanctioned&lt;/a&gt;. These systems aren&amp;rsquo;t immune to all the same failings that existing digital infrastructure has. Like any other endeavor great care should be placed in ensuring the privacy, security and autonomy of participants. Just like with any other kind of app, convenience can come at a price.&lt;/p&gt;
&lt;h3 id=&#34;handle-trust&#34;&gt;Handle Trust&lt;/h3&gt;
&lt;p&gt;It is all-too-appealing for those of us interested in technology to believe in our hubris, that simply the right technological innovation will overcome human problems. It can&amp;rsquo;t be overstated that this mindset will always lead to mistakes. Tools are tools, whether they are wielded by us or the technocracy. &amp;ldquo;Trust-less&amp;rdquo; systems can&amp;rsquo;t bring health and wealth to a society of people who don&amp;rsquo;t respect each other.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/blockchain-banner.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/blockchain/&#34;  &gt;&lt;h2&gt;The road to hell: misplaced optimism in the blockchain space&lt;/h2&gt;&lt;i&gt;&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Redefining &#34;high places&#34;</title>
		<link>https://libresolutions.network/articles/high-places/</link>
		<pubDate>Wed, 21 Sep 2022 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/high-places/</guid>
		
		<image>https://libresolutions.network//media/images/high-places.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/high-places.webp" />
		<itunes:image href="https://libresolutions.network//media/images/high-places.webp" />
		<description>Lets re-balance power from the bottom-up</description>
		<content:encoded>&lt;p&gt;The technocracy is a terrifying, horrific and inhuman assault on our very being. People are under assault from all angles: financial, emotional, and intellectual. By keeping people alone and isolated, the technocracy can seem all-but-entirely unopposed. It is quite easy to fall into the trap of envying it&amp;rsquo;s power, or even wishing to share in the ill-gotten-gains. This trap is what can transform the most fervent freedom fighter into yet another foot-soldier for the machine.&lt;/p&gt;
&lt;h2 id=&#34;selling-out-for-shockingly-low-prices&#34;&gt;Selling out for shockingly low prices&lt;/h2&gt;
&lt;p&gt;Working for the technocracy is working for those who want to enslave you, and everyone around you. With previous regimes, one could argue there was an incentive to defect. People naturally feel drawn to securing their own legacies, even sadly at the expense of others. This however, doesn&amp;rsquo;t apply here. There is no pleasant future purchased in exchange for complying with this inhuman agenda. Whatever temporary creature comforts one enjoys for attacking humanity is a very small price in exchange for the consequences.&lt;/p&gt;
&lt;p&gt;&amp;ldquo;&lt;em&gt;What consequences?&lt;/em&gt;&amp;rdquo; Rizza Islam started his speech at &lt;a href=&#34;https://rumble.com/vuk6vk-rizza-islam-full-speech-defeat-the-mandates-dc.html&#34;&gt;Defeat the Mandates&lt;/a&gt; with a profound statement.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;This is the example of what you get&lt;/strong&gt; when you choose to attack all members of the human family.&lt;br&gt;
&lt;strong&gt;This is what you get&lt;/strong&gt; when you decide to go after a person&amp;rsquo;s child. &lt;br&gt;
&lt;strong&gt;This is what you get&lt;/strong&gt; when you choose to attack men, women, medical professionals, those with degrees, those without degrees, and those in-between.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;If there&amp;rsquo;s one thing we need to do above all else, it is to maintain and nurture our love for humanity in these dark times. This is a highly necessary call to unity. We do not have the luxury of being choosy with allies. You&amp;rsquo;re not going to agree with everyone in this fight. Odds are you may have severe disagreements or even unhealed wounds.&lt;/p&gt;
&lt;p&gt;In case anyone needs a reminder, governments all over the world used the pretext of a crisis to seize more power and control. Instead of using any of that power to help anyone, all major institutions enforced measures and decisions that &lt;a href=&#34;https://odysee.com/@MaajidNawaz:d/EP22-Radical:1&#34;&gt;consistently caused harm&lt;/a&gt; instead of preventing it. When presented with evidence of harm, these institutions responded with threats, gaslighting, and indifference. &lt;strong&gt;Regardless of what can be salvaged from these institutions, they have no authority, credibility, and legitimacy until the cause those issues is addressed.&lt;/strong&gt;&lt;/p&gt;
&lt;h1 id=&#34;redefining-high-places&#34;&gt;Redefining &amp;ldquo;high places&amp;rdquo;&lt;/h1&gt;
&lt;p&gt;This is not a call for attacking people in those institutions, wishing ill on them, or even replacing the institutions themselves. It is well past time to acknowledge what is, rather than what we would like to be.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;These institutions, as they exist, are working against people.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;These institutions, as they exist, are hopelessly corrupt.&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Thankfully the good doctor has a cure for this situation:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&amp;ldquo;&lt;em&gt;Turn away from evil, run towards good&lt;/em&gt;&amp;rdquo;&lt;/p&gt;
&lt;p&gt;Dr Vladimir Zelenko&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2 id=&#34;turn-away-from-evil&#34;&gt;Turn away from evil&lt;/h2&gt;
&lt;h3 id=&#34;stop-envying-their-wealth-and-prestige&#34;&gt;Stop envying their wealth and prestige&lt;/h3&gt;
&lt;p&gt;In many ways, this is the hardest and most critical. People are being placed into desperate situations and it is a very trying time for almost everyone. Any status gained from working within institutions responsible needs to be met with extreme scorn. While there may be people inside them that are kind and loving within their own circle, but nothing they say or do is to be met with praise. Achievements in service of evil are no achievements at all.&lt;/p&gt;
&lt;h3 id=&#34;stop-complying&#34;&gt;Stop complying&lt;/h3&gt;
&lt;p&gt;When given the choice to make a situation easier or harder for those working against humanity, why do them any favors? Anything people can do to create friction for those who desire total control works to help us all. Total control would be almost impossible if people actively chose to encourage indifference to err on the side of non-compliance.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/lsn-banner.webp)&#34; &gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://twitter.com/denisrancourt/status/1480314494370914305&#34;  &gt;&lt;h2&gt;Denis Rancourt on Twitter 🐦&lt;/h2&gt;&lt;i&gt;To all those who say &amp;#34;we need mass resistance&amp;#34;... I say &amp;#34;we need individual non-compliance&amp;#34;. Plus, that is something you actually control. Stop being a social theorist, and actually join the resistance.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h3 id=&#34;dont-take-them-seriously&#34;&gt;Don&amp;rsquo;t take them seriously&lt;/h3&gt;
&lt;p&gt;We live in a time of &lt;em&gt;aggressive absurdities&lt;/em&gt;. People are expected to live a lie to maintain the illusion of a functioning human society. These are dangerous times and mistaking propaganda for reality is a very expensive and life-threatening mistake. As much as possible, give no credence to what these institutions would have you believe. Instead, work with those who are continuously working to dig up the truth beneath the surface.&lt;/p&gt;
&lt;h2 id=&#34;run-towards-good&#34;&gt;Run towards good&lt;/h2&gt;
&lt;h3 id=&#34;value-and-nurture-what-has-been-taken-from-the-people&#34;&gt;Value and nurture what has been taken from the people&lt;/h3&gt;
&lt;p&gt;So many things have been ripped away from people, or even forgotten entirely. These are the things we should be maximizing in our lives:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Truth&lt;/li&gt;
&lt;li&gt;Health&lt;/li&gt;
&lt;li&gt;Trust&lt;/li&gt;
&lt;li&gt;Beauty&lt;/li&gt;
&lt;li&gt;Peace&lt;/li&gt;
&lt;li&gt;Autonomy&lt;/li&gt;
&lt;li&gt;Privacy&lt;/li&gt;
&lt;li&gt;Wisdom&lt;/li&gt;
&lt;li&gt;Freedom&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;How many of these things come from the technocracy? Will total top-down control with us at the helm bring these things to each other? Remember that it is impossible to win at that game, and it is good that what we want can be achieved through different means.&lt;/p&gt;
&lt;h3 id=&#34;support-others&#34;&gt;Support others&lt;/h3&gt;
&lt;p&gt;All of this is bigger than any of us. Nobody can take it all alone. Unity is our greatest strength.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;They want people isolated and alone? &lt;strong&gt;Work with others to bring people together.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;They want people fearful and in dread? &lt;strong&gt;Raise people&amp;rsquo;s spirits and give them hope.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;They want people angry and wrathful? &lt;strong&gt;Bring peace to difficult situations and settle disputes.&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;step-into-yourself&#34;&gt;Step into yourself&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;To err is human, to forgive is divine.&lt;/em&gt; Forgive yourself as well as others. Working for human freedom requires courage and otherworldly strength. Forging meaningful connections with others can help you truly recognize your own talents and strengths.&lt;/p&gt;
&lt;h2 id=&#34;you-have-friends-in-high-places&#34;&gt;You have friends in high places&lt;/h2&gt;
&lt;p&gt;What do you admire most?&lt;/p&gt;
&lt;p&gt;Is it large sums of money? Fame? Power? No?&lt;/p&gt;
&lt;p&gt;If you&amp;rsquo;re be willing to trade all of those things for a better world, I have good news for you.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;You are not alone.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;An incomplete list, in no particular order:&lt;/em&gt;&lt;/p&gt;
&lt;h4 id=&#34;dr-kulvinder-kaur-md&#34;&gt;Dr Kulvinder Kaur MD&lt;/h4&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/lsn-banner.webp)&#34; &gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://twitter.com/dockaurG/status/1329933660146053121#m&#34;  &gt;&lt;h2&gt;Kulvinder Kaur MD on Twitter 🐦&lt;/h2&gt;&lt;i&gt;If you are trying to make sense of this nightmare, pls start here. Beginning a Scientific Evidence-Based Humanitarian Response to Covid-19: can be applied globally based on GBD&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h4 id=&#34;dr-paul-merik&#34;&gt;Dr Paul Merik&lt;/h4&gt;
&lt;iframe src=&#39;https://youtube.com/embed/IMgjCDc0PeM&#39; style=&#34;height:max-content;aspect-ratio: 16/9;min-height:460px;max-height:15rem;max-width:60rem;&#34; width=&#34;100%&#34; height=&#34;100%&#34;&gt;

&lt;/iframe&gt;
&lt;h4 id=&#34;dr-christina-parks&#34;&gt;Dr Christina Parks&lt;/h4&gt;
&lt;iframe src=&#39;https://youtube.com/embed/8DOOZpGA_VI&#39; style=&#34;height:max-content;aspect-ratio: 16/9;min-height:460px;max-height:15rem;max-width:60rem;&#34; width=&#34;100%&#34; height=&#34;100%&#34;&gt;

&lt;/iframe&gt;
&lt;h4 id=&#34;dr-byram-bridle&#34;&gt;Dr Byram Bridle&lt;/h4&gt;
&lt;iframe src=&#39;https://rumble.com/embed/vr7vkn/?pub=10epb7&#39; style=&#34;height:max-content;aspect-ratio: 16/9;min-height:460px;max-height:15rem;max-width:60rem;&#34; width=&#34;100%&#34; height=&#34;100%&#34;&gt;

&lt;/iframe&gt;
&lt;h4 id=&#34;jessica-rose&#34;&gt;Jessica Rose&lt;/h4&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/lsn-banner.webp)&#34; &gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://jessica5b3.substack.com/p/i-have-no-words-for-how-elated-i&#34;  &gt;&lt;h2&gt;I have no words for how elated I am at my most recent experience in life.&lt;/h2&gt;&lt;i&gt;World Council for Health meeting in Vienna&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h4 id=&#34;meryl-nass&#34;&gt;Meryl Nass&lt;/h4&gt;
&lt;iframe src=&#39;https://youtube.com/embed/uKtU3lxjVa4&#39; style=&#34;height:max-content;aspect-ratio: 16/9;min-height:460px;max-height:15rem;max-width:60rem;&#34; width=&#34;100%&#34; height=&#34;100%&#34;&gt;

&lt;/iframe&gt;
&lt;h4 id=&#34;catherine-austin-fitts&#34;&gt;Catherine Austin Fitts&lt;/h4&gt;
&lt;iframe src=&#39;https://youtube.com/embed/m0YW81RA26I&#39; style=&#34;height:max-content;aspect-ratio: 16/9;min-height:460px;max-height:15rem;max-width:60rem;&#34; width=&#34;100%&#34; height=&#34;100%&#34;&gt;

&lt;/iframe&gt;
&lt;h4 id=&#34;spartacus&#34;&gt;Spartacus&lt;/h4&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/lsn-banner.webp)&#34; &gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://iceni.substack.com/p/coming-soon&#34;  &gt;&lt;h2&gt;ICENI - Institute for Coronavirus Emergence Nonprofit Intelligence&lt;/h2&gt;&lt;i&gt;We are a loose confederation of independent COVID-19 researchers who have collected and analyzed large reams of data on the virus, its nature, its origins, and the ongoing political scandals surrounding the government response.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h4 id=&#34;stormcloudsgathering&#34;&gt;Stormcloudsgathering&lt;/h4&gt;
&lt;iframe src=&#39;https://youtube.com/embed/d-NmvDzUsdM&#39; style=&#34;height:max-content;aspect-ratio: 16/9;min-height:460px;max-height:15rem;max-width:60rem;&#34; width=&#34;100%&#34; height=&#34;100%&#34;&gt;

&lt;/iframe&gt;
&lt;h3 id=&#34;the-freedom-convoy&#34;&gt;The Freedom Convoy&lt;/h3&gt;
&lt;p&gt;There were tons of people who organized, supported, and participated in the Canadian Freedom Convoy. Every single one of those great people are cheering you on.&lt;/p&gt;
&lt;iframe src=&#39;https://youtube.com/embed/4NEFLvA39wQ&#39; style=&#34;height:max-content;aspect-ratio: 16/9;min-height:460px;max-height:15rem;max-width:60rem;&#34; width=&#34;100%&#34; height=&#34;100%&#34;&gt;

&lt;/iframe&gt;
&lt;h3 id=&#34;and-many-many-others&#34;&gt;and many, many others:&lt;/h3&gt;
&lt;p&gt;Beyond the &lt;a href=&#34;https://www.campfire.wiki/doku.php?id=people_speaking_out_against_the_narrative&#34;&gt;pillars of courage&lt;/a&gt; that are recognizable to anyone, there are many more people who have put in many tireless hours for the good of all. This is the time for all of us to reject tyranny however we can.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Those searching for, and sharing the truth&lt;/li&gt;
&lt;li&gt;Those working to comfort those in need&lt;/li&gt;
&lt;li&gt;Those who’ve donated their skills and expertise to uncover corruption&lt;/li&gt;
&lt;/ul&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Tools of the Technocracy: #9 Internet Shutdowns</title>
		<link>https://libresolutions.network/articles/tools-of-the-technocracy-9/</link>
		<pubDate>Sat, 03 Sep 2022 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/tools-of-the-technocracy-9/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/tools-of-the-technocracy9.mp3" />
			
		
		<image>https://libresolutions.network//media/tott-9-preview.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/tott-9-preview.webp" />
		<itunes:image href="https://libresolutions.network//media/tott-9-preview.webp" />
		<description>Information control is the root of modern tyranny.</description>
		<content:encoded>&lt;h1 id=&#34;tools-of-the-technocracy-9-internet-shutdowns&#34;&gt;&lt;a href=&#34;https://libresolutions.network/tags/tools-of-the-technocracy-series&#34;&gt;Tools of the Technocracy&lt;/a&gt;: #9 Internet Shutdowns&lt;/h1&gt;
&lt;p&gt;The &lt;em&gt;free and open web&lt;/em&gt; is an idea. It&amp;rsquo;s the idea that humanity can share a distributed (or entirely decentralized) information repository for free expression and open dialogue. So many great things would be outright impossible without the world&amp;rsquo;s &lt;em&gt;information superhighway&lt;/em&gt;. The threats to a free and open web are legion, governments, corporations, and other malevolent entities are eager to control your access to information.&lt;/p&gt;

&lt;p&gt;In the age of widespread tolerance for censorship, the term &lt;em&gt;&amp;ldquo;net neutrality&amp;rdquo;&lt;/em&gt; is entirely forgotten. This is an important reminder that censorship is very much as &lt;a href=&#34;https://youtube.com/watch?v=wtt2aSV8wdw&#34;&gt;social phenomenon&lt;/a&gt; as well as a technological threat. Controlling information is always about controlling people. Given complete control over what information one&amp;rsquo;s subjects have access to, that entity is their ruler regardless of the law.&lt;/p&gt;
&lt;h2 id=&#34;why-shut-down-the-internet&#34;&gt;Why Shut Down The Internet?&lt;/h2&gt;
&lt;p&gt;The internet can be a phenomenal equalizer; people have access to immense amounts of human knowledge and expression. Despite all the aspects of our digital world being leveraged against people, the Internet has many properties that are beneficial to humanity at large.
It&amp;rsquo;s censorship resistant, and good valuable information can be relatively permanent.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;The internet interprets censorship as damage, and routes around it.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;I really like that quote, but I feel it misses the mark. &lt;em&gt;&lt;strong&gt;People&lt;/strong&gt;&lt;/em&gt; interpret censorship as an attack on their right to freedom of thought, and those people work to route around it. This is a nightmare for technocrats and tyrants of all walks of life. Professionals, academics, and bureaucrats don&amp;rsquo;t fear the public being able to use the Internet to learn their skills and replace them. Instead, what they truly fear is the public being able to use the Internet to expose them as &lt;em&gt;&lt;strong&gt;frauds&lt;/strong&gt;&lt;/em&gt;. Censorship is an attack on all people by attacking their very ability to learn, create and share.&lt;/p&gt;
&lt;p&gt;The danger of internet shutdowns, in whole or in part, is the fundamental undermining of the people&amp;rsquo;s ability to peacefully find alternatives to serious problems. It is true that the Internet is used to surveil, control, and manipulate people. Those activities could very easily be deployed by these forces on their own separate networks &amp;amp; infrastructure, it just happens to be fairly convenient to use what is here already.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;whole-internet-shutdowns&#34;&gt;Whole Internet Shutdowns&lt;/h2&gt;
&lt;p&gt;Internet shutdowns are already a well-established phenomenon. Regardless of justification, whole internet shutdowns have drastic consequences on the people and represent an overt attack on their civil rights. By denying people&amp;rsquo;s ability to access information, and their ability to be heard by the rest of the world; you enable the worst actors to commit their crimes in the cover of darkness.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;India leads total shutdowns globally. In 2021, the world’s largest democracy shut off its internet 106 times – more than the rest of the world combined. Hardest-hit was the conflict-ridden region of Jammu and Kashmir, which was subject to 85 shutdowns under the guise of containing separatist violence. The blackouts shut down Zoom classes for students, stopped doctors from communicating with their remote patients and crippled the banking system, causing mortgage holders to default on their loans. Apple crops rotted before they could be sold and businesses were paralyzed.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://www.theguardian.com/technology/2022/aug/29/flicking-the-kill-switch-governments-embrace-internet-shutdowns-as-a-form-of-control&#34;&gt;https://www.theguardian.com/technology/2022/aug/29/flicking-the-kill-switch-governments-embrace-internet-shutdowns-as-a-form-of-control&lt;/a&gt;
&lt;a href=&#34;https://twitter.com/jrotermund/status/1564158516327333889&#34;&gt;https://twitter.com/jrotermund/status/1564158516327333889&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Such a drastic measure is (outside of accident &amp;amp; sabotage) never taken lightly. Any trivial excuse for initiating one is almost certainly a lie. A government may blame a foreign adversary, but one has to ask: &amp;ldquo;Qui bono?&amp;rdquo;. Who really benefits from cutting off a nations public access to information, and to be heard from the wider world?&lt;/p&gt;
&lt;h2 id=&#34;partial-internet-shutdowns&#34;&gt;Partial Internet Shutdowns&lt;/h2&gt;
&lt;p&gt;While a whole internet shutdown could be localized in a small area, another option is altering the infrastructure to monitor, alter, or deny access to specific kinds of traffic. It is possible for unencrypted (or recognizable patterns) traffic can be filtered, throttled, or monitored. This means that specific kinds of services, like e-mails or uploads can be disrupted entirely.&lt;/p&gt;
&lt;h3 id=&#34;great-firewalls&#34;&gt;Great Firewalls&lt;/h3&gt;
&lt;p&gt;When an entity has control of some parts of the Internet infrastructure there are all kinds of techniques that can be used to block access to sites and specific kinds of services. These &amp;ldquo;great firewalls&amp;rdquo; can also be used to block connections entirely from or to the outside world. From a strategic perspective, blocking isn&amp;rsquo;t the only option, surveillance is an incredibly powerful tool for hunting down dissidents.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/tott-5.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-5#cloudflare&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #5 Networks&lt;/h2&gt;&lt;i&gt;Much of the digital infrastructure in place today is built to structurally enable tyranny.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;The little padlock on your browser means the site is secure right? &lt;strong&gt;No.&lt;/strong&gt; The only thing that little padlock says is that you have a direct encrypted connection to &lt;strong&gt;a server&lt;/strong&gt;. Without inspecting the certificate itself and verifying with others you can&amp;rsquo;t always be sure you&amp;rsquo;re connected to &lt;strong&gt;the correct server&lt;/strong&gt;.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://web.archive.org/web/20150724070237/https://www.privacyinternational.org/sites/default/files/PAKISTAN%20REPORT%20HIGH%20RES%2020150721_0.pdf&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/tott-9-dpi.webp&#39; 
&gt;

&lt;/a&gt;



&lt;/div&gt;
&lt;p&gt;This technology drastically reduces the amount and kinds of services you can trust. These insidious techniques can make it seem almost impossible to use the Internet securely and privately. Solutions exist, but one has to responsibly manage their expectations when it comes to trade-offs. It&amp;rsquo;s essentially an open secret that the Internet was developed for the purpose of being an all-encompassing surveillance grid. If humanity wants to maintain the information superhighway as a public good, we are all going to have to learn to be nimble and change our behavior to reform cyberspace.&lt;/p&gt;
&lt;h2 id=&#34;targeted-attacks&#34;&gt;Targeted Attacks&lt;/h2&gt;
&lt;p&gt;A broad internet shutdown is a desperate move. Strategically, it&amp;rsquo;s much more efficient to eliminate sources (and disseminators) of information that you want to restrict. This is exactly why the public at large must constantly be told why censorship has to continue. If people understood the true cost of censorship, no self-respecting person would tolerate it.&lt;/p&gt;
&lt;h3 id=&#34;cyberattacks&#34;&gt;Cyberattacks&lt;/h3&gt;
&lt;p&gt;Sufficiently motivated adversaries with enough resources can make keeping a service online very difficult. Just as we are all mortal no service is fully attack-proof. The cost to fight a cyberattack is almost always significantly more than the cost to initiate it.&lt;/p&gt;
&lt;h3 id=&#34;denial-of-infrastructure&#34;&gt;Denial Of Infrastructure&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;In a deeply troubling response, after both terminations we saw a dramatic increase in authoritarian regimes attempting to have us terminate security services for human rights organizations — often citing the language from our own justification back to us.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://blog.cloudflare.com/cloudflares-abuse-policies-and-approach/&#34;&gt;Cloudflare blog&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;In ideal circumstances such restriction would be impossible. However, as long as the three primary resources of cyberspace (storage, computing power, bandwidth) are subject to the economies of scale; there will always be powerful incentives to rely on certain entities one-way-or-another.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://stonetoss.com/comic/build-big/&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/tott-9-stonetoss.webp&#39; 
&gt;

&lt;/a&gt;



&lt;/div&gt;
&lt;h3 id=&#34;attacking-the-people&#34;&gt;Attacking The People&lt;/h3&gt;
&lt;p&gt;The people running any kind of site or service are just humans like you and me. They are mortal. Not only that, but they are vulnerable to smear campaigns, threats, and bribes.&lt;/p&gt;
&lt;h2 id=&#34;the-infodemic&#34;&gt;&lt;a href=&#34;https://www.corbettreport.com/are-you-prepared-for-the-infodemic/&#34;&gt;The Infodemic&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;There is a high demand for people rationalizing censorship. Technocrats, tyrants, and social engineers of all kinds are all willing to pay handsomely for (or even fight for) the ability to control people&amp;rsquo;s minds. In today&amp;rsquo;s day and age, it&amp;rsquo;s completely laughable to believe that any of that power will be devoted at all for the people&amp;rsquo;s benefit.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Are there limitless &lt;a href=&#34;https://youtu.be/watch?v=YWdD206eSv0&#34;&gt;lies on the Internet?&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Absolutely.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Are there mobs of angry people willing to do all manner of cruel things to others on the Internet?&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;No doubt.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Are there groups of people disproportionately targeted by all kinds of online abuse and manipulation?&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Yes, 100%.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Is anyone, any group of people, or institution so entirely noble and wise that they can wield the power to control information justly?&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Nope. Not now, and likely &lt;a href=&#34;https://infogalactic.com/info/P_versus_NP_problem&#34;&gt;not ever.&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;h3 id=&#34;why&#34;&gt;Why?&lt;/h3&gt;
&lt;p&gt;This is a reasonable question to ask. It&amp;rsquo;s easy to imagine society can decide what forms of expression are most cruel, most egregious, most harmful and only limit sanctions on that. The unfortunate truth is that even if that is the case today, there is never a guarantee that it will remain that way. The &amp;ldquo;&lt;em&gt;slippery slope fallacy&lt;/em&gt;&amp;rdquo; can&amp;rsquo;t be applied to events driven by exponential growth and decay. When abuses of power aren&amp;rsquo;t swiftly and harshly punished, future abuses aren&amp;rsquo;t just welcomed; they are &lt;em&gt;&lt;strong&gt;incentivized&lt;/strong&gt;&lt;/em&gt;.&lt;/p&gt;
&lt;h3 id=&#34;misinformation-disinformation-malinformation&#34;&gt;Misinformation, Disinformation, Malinformation&lt;/h3&gt;
&lt;p&gt;These terms are thrown around so casually these days, attributed to so many things that it is hard to see them as anything other than thought-terminating-cliches.&lt;br&gt;
Apparently they are supposed to mean:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Misinformation&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Information that isn&amp;rsquo;t true but the people sharing it &lt;strong&gt;believe it is true&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Disinformation&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Information that isn&amp;rsquo;t true, even though the people spreading it &lt;strong&gt;know it&amp;rsquo;s false&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Malinformation&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Information that &lt;strong&gt;is actually true&lt;/strong&gt;, but has &amp;ldquo;&lt;em&gt;undesirable effects&lt;/em&gt;&amp;rdquo;&lt;/em&gt; (such as loss of trust in institutions, bank runs, scandals)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Ironically these terms themselves are actually quite dangerous ideas. They presume not just the desirability of information control, but also the outright moral necessity of it. That alone would be bad enough, but having seen how these labels are applied over the last two years. They are hardly used fairly at all. These terms are little more than smears by a desperate press that&amp;rsquo;s losing trust faster than they can say &amp;ldquo;&lt;em&gt;Streisand effect!&lt;/em&gt;&amp;rdquo;.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://blog.cloudflare.com/kiwifarms-blocked/&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/tott-9-cfb.webp&#39; 
&gt;

&lt;/a&gt;



&lt;/div&gt;
&lt;h3 id=&#34;harassment&#34;&gt;Harassment&lt;/h3&gt;
&lt;p&gt;Human beings have a great capacity to hurt each other. The internet, like any other tool greatly enhances this. When someone doesn&amp;rsquo;t take absolute care to be anonymous there is little-to-nothing they can do to protect themselves from the ire of an irate mob, especially a well-financed and motivated one. This makes many people want to rush to suppress any hostile expression. It backfires all the time. Societal rifts need to be healed, not torn further and further apart.&lt;/p&gt;
&lt;p&gt;Facebook can&amp;rsquo;t handle all the hate and abuse from people on their own platform, with the state-of-the art tools. While there may be financial incentives for Facebook to fan the flames, they fail to completely eliminate all kinds of criminal activities from their services. It is highly likely that suppressing all anger and hate is an impossible task.&lt;/p&gt;
&lt;p&gt;This doesn&amp;rsquo;t mean that the hate has to continue to burn. Selectively suppressing anger and hate just fosters resentment and escalates the hate. Instead, empowering people to peacefully negotiate, separate themselves from, or simply accept differences in society can help. Raising tensions only serves to benefit those who have bad intentions or ulterior motives.&lt;/p&gt;
&lt;h3 id=&#34;automated-extremism&#34;&gt;Automated Extremism&lt;/h3&gt;
&lt;p&gt;We are not just dealing with small groups of malevolent people. Automated tools exist to flood people with all kinds of inflammatory material. Simply lashing out at the people who are confused and angry is blaming the victims. Yes, they often beget more victims. Which builds a cycle of eye-for-an-eye&amp;rsquo;ing each other for a very blind world.&lt;/p&gt;
&lt;p&gt;For those that are sincerely worried about extremism, or people indoctrinated with nonsense, remember that those people don&amp;rsquo;t exist in a vacuum. It is well understood that suppression doesn&amp;rsquo;t actually reduce those problems. We have seen over and over that all it does is inflame anger and drive people further underground. Exiling those people and demeaning their concerns is incredibly counter-productive.&lt;/p&gt;
&lt;p&gt;The only reason to take the suppression approach is if there is some part of the associated discourse that you want to keep buried forever. If that&amp;rsquo;s the case I&amp;rsquo;m highly suspicious of your motives.&lt;/p&gt;
&lt;p&gt;What can be done bout the anger and hate?&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://merylnass.substack.com/p/how-to-conceptualize-and-fight-back&#34;&gt;&lt;strong&gt;You are the solution!&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;If you&amp;rsquo;re reading this, you&amp;rsquo;re already a curious and thoughtful person. This is the key to diffusing the conflicts in society. While we all have ways we can improve ourselves to be more charitable and understanding with others, you have to take time to be more outspoken to humanize those who are being attacked. Tessa Lena has a &lt;a href=&#34;https://rumble.com/embed/v1b5giz&#34;&gt;fantastic presentation&lt;/a&gt; on this.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;solutions-for-censorship-resistance&#34;&gt;Solutions for censorship resistance&lt;/h2&gt;
&lt;h3 id=&#34;build-big&#34;&gt;Build Big&lt;/h3&gt;
&lt;p&gt;Nobody can tackle the full threat of internet shutdowns alone. It can be difficult to get people interested in collaborating until it happens. That said, everyone is going to wish that in a moment of an internet shutdown there is a flood of volunteers rushing to help get people back online immediately.&lt;/p&gt;
&lt;p&gt;Democratization of internet infrastructure is vital. High-bandwidth long-range communications aren&amp;rsquo;t easy to build, but many of these challenged can be overcome with dedicated and talented people being supported.&lt;/p&gt;
&lt;p&gt;What&amp;rsquo;s more powerful than too big to fail? &lt;strong&gt;Too small to shut down.&lt;/strong&gt;&lt;br&gt;
Power and control should be as distributed as possible. Instead of relying on heroes to have all the answers we all need to work on solutions that can scale beyond our self-interest and political division.&lt;/p&gt;
&lt;h3 id=&#34;useful-projects&#34;&gt;Useful Projects&lt;/h3&gt;
&lt;p&gt;These all require some degree of technical knowledge, but are highly worth exploring.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://meshtastic.org&#34;&gt;Meshtastic&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://yggdrasil-network.github.io/&#34;&gt;Yggdrasil&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://intranet.tildeverse.org/&#34;&gt;TildeNet&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Digital ID: The basics</title>
		<link>https://libresolutions.network/articles/digital-id/</link>
		<pubDate>Fri, 02 Sep 2022 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/digital-id/</guid>
		
		<image>https://libresolutions.network//media/digital-id.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/digital-id.webp" />
		<itunes:image href="https://libresolutions.network//media/digital-id.webp" />
		<description>What is it? What can you do about it?</description>
		<content:encoded>&lt;h2 id=&#34;101-what-is-digital-id&#34;&gt;101: What is Digital ID?&lt;/h2&gt;
&lt;p&gt;The rise of technocratic control has justifiably motivated people into taking action and resist the foundational &lt;a href=&#34;https://libresolutions.network/tags/tools-of-the-technocracy-series/&#34;&gt;tools of the technocracy&lt;/a&gt;. Many of these tools are well positioned to leverage any form of digital ID against you. What forms can Digital ID take?&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/ronin19217435/status/1563300304006684673&#34;&gt;A biometric implant&lt;/a&gt;?&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://reclaimthenet.org/canada-faces-call-to-scrap-vaccine-passport-app/&#34;&gt;A smartphone app&lt;/a&gt;?&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/backtolife_2023/status/1564488781624901632&#34;&gt;Your face&lt;/a&gt;?&lt;/li&gt;
&lt;li&gt;A microchip in your passport?&lt;/li&gt;
&lt;/ul&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/ca-passport-chip.webp&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;Any and all of these can be used in such a system. There isn&amp;rsquo;t a specific need to use exclusively and only those. Mass surveillance (online and outside) can make anonymity entirely difficult to outright impossible. This has incredible implications for all kinds of interactions; instead of you getting to choose who (or what) you identify yourself to, you are automatically identified to the system and quite possibly everyone else around you.&lt;/p&gt;
&lt;h3 id=&#34;identification&#34;&gt;Identification&lt;/h3&gt;
&lt;p&gt;&amp;ldquo;&lt;em&gt;Who cares if people know who you are?&lt;/em&gt;&amp;rdquo; you may ask. If only it were that simple.&lt;br&gt;
While your identity may not be shared with everyone around you, the system will know. Then &lt;strong&gt;almost anything and everything&lt;/strong&gt; can be used against you.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;That article you read three years ago?&lt;/li&gt;
&lt;li&gt;Someone you&amp;rsquo;re associated with?&lt;/li&gt;
&lt;li&gt;Religious or political views?&lt;/li&gt;
&lt;/ul&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/tott-4.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-4/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #4 Online Identity&lt;/h2&gt;&lt;i&gt;What is following you in your digital tracks?&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;This information has already been &lt;a href=&#34;https://thecountersignal.com/pakistani-government-threatens-to-block-digital-ids-to-shut-down-access-to-bank-accounts/&#34;&gt;used against people&lt;/a&gt;. It is impossible to predict what information will be leveraged and how. Once the system is in force it is highly unlikely there will be any transparency or recourse when it is abused. We have &lt;a href=&#34;https://reclaimthenet.org/mark-zuckerberg-joe-rogan-fbi-hunter-biden/&#34;&gt;already seen&lt;/a&gt; how big tech social media and other organizations are eager to &lt;a href=&#34;https://reclaimthenet.org/farm-credit-canada-bank-freedom-convoy/&#34;&gt;misuse information&lt;/a&gt;, how much more likely is it to be abused by an even less &lt;a href=&#34;https://www.oval.media/en/mrglobal-2/&#34;&gt;accountable entity&lt;/a&gt;?&lt;/p&gt;
&lt;h3 id=&#34;surveillance&#34;&gt;Surveillance&lt;/h3&gt;
&lt;p&gt;The feedback loop driving further data collection is very strong. The more data you have about people the more power you have over them. Even if you&amp;rsquo;re as careful as possible; your fellow citizens, businesses and services, or even institutions can all be pressured or bribed into divulging information about you.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/tott-7.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-7/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #7 Smart Cities&lt;/h2&gt;&lt;i&gt;Smart cities are marketed as if they are for the convenience of its residents, but this couldn’t be further from the truth.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;Even when services and organizations aren&amp;rsquo;t proactively concerned with what your activities are, they could be using convenient systems that simply collect information in the background.&lt;/p&gt;
&lt;h3 id=&#34;devices&#34;&gt;Devices&lt;/h3&gt;
&lt;p&gt;&amp;ldquo;Smart&amp;rdquo; devices, implants, computers, can all be used to represent you. All that matters is that the system can uniquely identify you. Even if the devices themselves aren&amp;rsquo;t proactively being used against you, software and services you use can often pick up the slack.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/construction-banner.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-3/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #3 Robots, IoT, Automation, Oh my!&lt;/h2&gt;&lt;i&gt;Transforming the world in ways seen and unseen&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;

&lt;video muted autoplay preload=&#34;none&#34;&gt;
    &lt;source src=&#39;https://libresolutions.network/media/ar-card.mp4&#39;&gt;
&lt;/video&gt;

&lt;h3 id=&#34;data-sovereignty&#34;&gt;Data sovereignty&lt;/h3&gt;
&lt;p&gt;Digital ID begins with data. While you can avoid using devices that disclose that data, it&amp;rsquo;s much harder to prevent state and corporate entities from collecting and sharing the data they have on you. That&amp;rsquo;s the trouble. Data &lt;strong&gt;about you&lt;/strong&gt; isn&amp;rsquo;t the same as &lt;strong&gt;your&lt;/strong&gt; data.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/road2hell.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/blockchain/&#34;  &gt;&lt;h2&gt;The road to hell: misplaced optimism in the blockchain space&lt;/h2&gt;&lt;i&gt;&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;The only data you can call &amp;ldquo;your data&amp;rdquo; is data that is stored on systems you control. Data about you is near impossible for you to entirely quantify. Surely, if we made sure that everything was stored on a blockchain it would be better! At least more transparent?&lt;/p&gt;
&lt;h3 id=&#34;governance&#34;&gt;Governance&lt;/h3&gt;
&lt;p&gt;The &lt;a href=&#34;https://chrgj.org/wp-content/uploads/2022/06/Report_Paving-a-Digital-Road-to-Hell.pdf&#34;&gt;threats&lt;/a&gt; inherent to a mass surveillance and control grid are not solved by changing who&amp;rsquo;s running it, or what technology it is stored on. With such a system, the people running it are not immune to the all-too-human problem of being corrupted by power. Putting this system it&amp;rsquo;s own artificial intelligence to determine how it should be run is no better.&lt;/p&gt;
&lt;p&gt;Due to the very nature of this kind of control, there is no reason for it to be fair, consistent or even logical. By placing everyone&amp;rsquo;s destiny inside a centralized control grid you introduce &lt;a href=&#34;https://www.lesswrong.com/tag/paperclip-maximizer&#34;&gt;catastrophic failure modes&lt;/a&gt;. The failure of every utopian fantasy, of every totalitarian regime, is thinking &amp;ldquo;&lt;em&gt;this time we have all the information we need to decide everything&lt;/em&gt;&amp;rdquo;.&lt;/p&gt;
&lt;p&gt;As we have seen, the very process of collecting every minute detail of everything is itself an inhuman endeavor, and an absurd waste of resources. Fear and distrust has turned people against each other to clamor for a false savior to attack their enemies. Don&amp;rsquo;t make the mistake of betting against humanity. While human beings have a horrifying capacity for evil, people from all walks of life are capable of great feats of mercy and justice.&lt;/p&gt;
&lt;h2 id=&#34;solutions&#34;&gt;Solutions&lt;/h2&gt;
&lt;p&gt;Don&amp;rsquo;t fall prey to despair. The propaganda that leads you to believe that these systems of control are inevitable is just that. They can all be dismantled simply and quickly with enough will and effort.&lt;/p&gt;
&lt;h3 id=&#34;data-economics&#34;&gt;Data economics&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Data needs to become a liability&lt;/strong&gt; instead of an asset. There needs to be serious criminal consequences for misuse of data, and civil liabilities for leaking data about people. If organizations became liable for information they collect, you can imagine how quickly they would start to prioritize the privacy of their patrons and staff.&lt;/p&gt;
&lt;h3 id=&#34;embrace-the-analog&#34;&gt;Embrace the analog&lt;/h3&gt;
&lt;p&gt;There are all kinds of things that people can do to take back the future and have fun doing it!&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Cash &amp;amp; Coin&lt;/li&gt;
&lt;li&gt;Physical Records&lt;/li&gt;
&lt;li&gt;Non-digital entertainment
&lt;ul&gt;
&lt;li&gt;Books&lt;/li&gt;
&lt;li&gt;Board games&lt;/li&gt;
&lt;li&gt;Live music&lt;/li&gt;
&lt;li&gt;Sports&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Community gatherings
&lt;ul&gt;
&lt;li&gt;Barbecues&lt;/li&gt;
&lt;li&gt;Dances&lt;/li&gt;
&lt;li&gt;Competitions&lt;/li&gt;
&lt;li&gt;Workshops&lt;/li&gt;
&lt;li&gt;Worship&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;There is a reason most democracies have codified the right to freely assemble and the right to pursue happiness. Our society becoming more advanced and connected should only enhance our ability to do these things not take away from them.&lt;/p&gt;
&lt;h3 id=&#34;support-humanity&#34;&gt;Support humanity&lt;/h3&gt;
&lt;p&gt;This agenda thrives on insecurity and desperation. If you were ever waiting for a good time to give to those in need&amp;hellip;now is a fantastic time to give to those who need it most. Food banks and shelters have a direct impact on people in your community and can make great use of what you can give.&lt;/p&gt;
&lt;h2 id=&#34;warn-people&#34;&gt;Warn people!&lt;/h2&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://globalcitizensunited.substack.com/p/digital-id-flyer&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/digital-id-poster.webp&#39; 
&gt;

&lt;/a&gt;



&lt;/div&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Tools of the Technocracy: #8 Transhumanism</title>
		<link>https://libresolutions.network/articles/tools-of-the-technocracy-8/</link>
		<pubDate>Mon, 29 Aug 2022 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/tools-of-the-technocracy-8/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/tools-of-the-technocracy8.mp3" />
			
		
		<image>https://libresolutions.network//media/tott-8.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/tott-8.webp" />
		<itunes:image href="https://libresolutions.network//media/tott-8.webp" />
		<description>How close are the technocrats to modifying you? Too close.</description>
		<content:encoded>&lt;h1 id=&#34;tools-of-the-technocracy--8-transhumanism&#34;&gt;&lt;a href=&#34;https://libresolutions.network/tags/tools-of-the-technocracy-series&#34;&gt;Tools of the Technocracy&lt;/a&gt;:  #8 Transhumanism&lt;/h1&gt;
&lt;p&gt;None of the &lt;a href=&#34;https://libresolutions.network/tags/tools-of-the-technocracy-series/&#34;&gt;tools of the technocracy&lt;/a&gt; are better marketed than the concept of &lt;em&gt;transhumanism&lt;/em&gt;. To some it brings to mind techno-utopian ideas like advanced cybernetics and augmented reality, to outright hubris like defeating death. That&amp;rsquo;s not really where the dark side even begins. It gets ghoulish fast when one realizes the potential impacts to healthcare, propaganda, and human health as we know it.&lt;/p&gt;

&lt;p&gt;Criticism of novel technologies is it&amp;rsquo;s own trope. Most people aren&amp;rsquo;t necessarily concerned about the &lt;a href=&#34;https://archive.org/details/IndustrialSocietyAndItsFuture-TheUnabombersManifesto&#34;&gt;existence of new technologies&lt;/a&gt;, but rather how those new developments are allowed to shape and impact our lives. It&amp;rsquo;s easy to see why more useful, durable, and accessible prosthetics would be seen as a nearly universally good thing, just as mind-control chips programmed by the technocracy would be seen as universally bad.&lt;/p&gt;
&lt;p&gt;The sanitized term is &lt;a href=&#34;https://horizons.gc.ca/en/2020/02/11/exploring-biodigital-convergence/&#34;&gt;digital convergence&lt;/a&gt;. &amp;ldquo;&lt;em&gt;What happens when biology and digital technology merge?&lt;/em&gt;&amp;rdquo;&lt;br&gt;
Note the certainty, &lt;strong&gt;when&lt;/strong&gt; biology and technology merge not &lt;strong&gt;if&lt;/strong&gt;. This is because even some of the most trivial technologies can have profound impacts on society. For example smartphones and social media have changed people as well as the media landscape in big ways.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;humanity-is-already-being-altered&#34;&gt;Humanity is already being altered&lt;/h2&gt;
&lt;p&gt;Our modern societies have witnessed drastic changes in people&amp;rsquo;s physiology in a relatively short period of time. When a class of technocrats have complete control, advanced gene-editing technology is overdoing it. Just like plants and animals, humanity can modify these things with selective pressures and breeding. Giving technocrats top-down control of society, provides them absolute power to do the same to the public. Eugenics is in many ways the same technocratic formula ( collect data on everything, make modifications, shape the future) applied to biology.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://youtu.be/watch?v=Uo-kSxHNSDQ&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/tott-8-changes.webp&#39; 
&gt;

&lt;/a&gt;



&lt;/div&gt;
&lt;p&gt;This creates the potential for a terrifying crisis. With the technology that is already within reach, a society that doesn&amp;rsquo;t recognize individual rights will inevitably transform people&amp;rsquo;s bodies into a &lt;a href=&#34;https://libresolutions.network/articles/blockchain&#34;&gt;tokenized commodity&lt;/a&gt;. By denying people ownership of their own bodies, all other trespasses are a mere formality. Mandating euthanasia, modification, or use/denial of reproductive means will be all in play. This is the fundamental problem; not about which technologies are good or bad, but entirely about how to preserve our rights and autonomy.&lt;/p&gt;
&lt;iframe src=&#39;https://youtube.com/embed/fJGPM94iKKQ&#39; style=&#34;height:max-content;aspect-ratio: 16/9;min-height:460px;max-height:15rem;max-width:60rem;&#34; width=&#34;100%&#34; height=&#34;100%&#34;&gt;

&lt;/iframe&gt;
&lt;hr&gt;
&lt;h2 id=&#34;what-are-the-technocrats-after&#34;&gt;What are the technocrats after?&lt;/h2&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/lsn-banner.webp)&#34; &gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://iceni.substack.com/p/covid-19-deep-dive-part-viii-transhumanism&#34;  &gt;&lt;h2&gt;COVID-19 Deep Dive Part VIII: Transhumanism&lt;/h2&gt;&lt;i&gt;The concept of human enhancement goes hand-in-hand with technocracy&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h3 id=&#34;complete-domination-over-humanity&#34;&gt;Complete domination over humanity&lt;/h3&gt;
&lt;p&gt;The tools of the technocracy are essentially all the pieces the technocrats want on the board to &amp;lsquo;checkmate&amp;rsquo; humanity. Once the people are locked into being &lt;a href=&#34;https://www.coreysdigs.com/global/dig-it-with-special-guest-cathrine-austin-fitts/&#34;&gt;&lt;em&gt;collateralized&lt;/em&gt; by the system&lt;/a&gt;, the technocrats can make use of the public for all kinds of twisted and monstrous experiments.&lt;/p&gt;
&lt;h3 id=&#34;immortality&#34;&gt;Immortality&lt;/h3&gt;
&lt;p&gt;Why rule if you can&amp;rsquo;t rule forever? The desire to seize complete control overlaps perfectly with a lack of willingness to give it up. Acceptance of death is a vital part of coming to terms with your life. Over and over those who live in fear of death, often die without having lived.&lt;br&gt;
Even if you envy the ability to live forever, would you really want to live forever on the technocracy&amp;rsquo;s terms?&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/lsn-banner.webp)&#34; &gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://jessicar.substack.com/p/i-once-dreamed-of-being-cybernetically&#34;  &gt;&lt;h2&gt;I once dreamed of being cybernetically-enhanced&lt;/h2&gt;&lt;i&gt;NOT ANYMORE... a personal thank you from me to the responsible unintelligencia&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h3 id=&#34;beyond-bodies&#34;&gt;Beyond bodies&lt;/h3&gt;
&lt;p&gt;Living forever in the same human body just doesn&amp;rsquo;t suit the technocrats. Even after all kinds of fancy augmentations, fanciful ideas like uploading your consciousness to exist as a program for the end of time gain traction.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;how-the-technocrats-plan-to-achieve-it&#34;&gt;How the technocrats plan to achieve it&lt;/h2&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/lsn-banner.webp)&#34; &gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://alilybit.substack.com/p/the-internet-of-bodies-the-wefs-proposal&#34;  &gt;&lt;h2&gt;The &amp;#39;Internet of Bodies&amp;#39; — The WEF’s Proposal to Control Human Behavior Through Authoritarian Surveillance&lt;/h2&gt;&lt;i&gt;The central theme of the Great Reset agenda is the manipulation of human nature to advance globalist corporate-state power-merging and the erosion of individual rights and liberties-oriented policies.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h3 id=&#34;narrative-control&#34;&gt;Narrative Control&lt;/h3&gt;
&lt;p&gt;It can&amp;rsquo;t be understated how much the tools of the technocracy build each other up. More centralization and control makes it easier to further centralize and control things. Propaganda will look like a crude instrument once the technocracy has electrodes directly connected to people&amp;rsquo;s brains.&lt;/p&gt;
&lt;h3 id=&#34;health-control&#34;&gt;Health control&lt;/h3&gt;
&lt;p&gt;Turning people against their own bodies is the fundamental transhumanist goal. Anything that makes people look weak and sick compared to the pristine cybernetic products will work to their favor. Getting the public to be confused about what protects and what harms their health is a very powerful means of achieving this.&lt;/p&gt;
&lt;iframe src=&#39;https://youtube.com/embed/AZq7FdkugXQ&#39; style=&#34;height:max-content;aspect-ratio: 16/9;min-height:460px;max-height:15rem;max-width:60rem;&#34; width=&#34;100%&#34; height=&#34;100%&#34;&gt;

&lt;/iframe&gt;
&lt;p&gt;When people&amp;rsquo;s lives, bodies and minds are all just data-points on a dashboard it&amp;rsquo;s very easy to argue in favor of monstrous policies and practices. In the name of doing &amp;ldquo;&lt;em&gt;what&amp;rsquo;s best for the patient&lt;/em&gt;&amp;rdquo; medical staff can be made to serve the system rather than the patients.&lt;/p&gt;
&lt;h3 id=&#34;technological-integration&#34;&gt;Technological integration&lt;/h3&gt;
&lt;p&gt;What are all the gadgets for anyways? People are going to need additional sensors on them so they can be bombarded with all kinds of numbers to track about themselves. Those numbers could be used to do more than just make better health decisions, but also pushing new products.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/construction-banner.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-3/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #3 Robots, IoT, Automation, Oh my!&lt;/h2&gt;&lt;i&gt;Transforming the world in ways seen and unseen&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;hr&gt;
&lt;h2 id=&#34;the-faustian-bargain&#34;&gt;The Faustian Bargain&lt;/h2&gt;
&lt;p&gt;It is important not to be distracted by the sci-fi utopianism to be lured into a false-sense of security about the downright ghoulish downsides of this technology, and especially this technology in the technocrats hands. It is important to keep in mind that these systems can be very easily used for evil and horrific things.&lt;/p&gt;
&lt;h3 id=&#34;downgrades&#34;&gt;Downgrades&lt;/h3&gt;
&lt;p&gt;Instead of an implant, chip or system that augments your ability to do things, it&amp;rsquo;s often much simpler to make these systems prevent certain things. Crude mechanisms to create pain in a person when they behave in ways the system doesn&amp;rsquo;t like is a very trivial mechanism that would have powerful results in conditioning a person.&lt;/p&gt;
&lt;h3 id=&#34;rights&#34;&gt;Rights&lt;/h3&gt;
&lt;p&gt;The transhumanist agenda creates a great deal of civil rights troubles. As technological systems are allowed to invade our minds and our bodies we put the liberty of all humanity at risk.&lt;/p&gt;
&lt;h4 id=&#34;1-privacy&#34;&gt;1. Privacy&lt;/h4&gt;
&lt;p&gt;The most obvious concern is privacy; if these devices are monitoring all kinds of activity in and around your body, who has access to that information?&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/big-data.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-2/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #2 Big Data &amp;amp; Artificial Intelligence&lt;/h2&gt;&lt;i&gt;What is all this data for anyways?&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h4 id=&#34;2-economic-pressures&#34;&gt;2. Economic pressures&lt;/h4&gt;
&lt;p&gt;If only it was as simple as just disconnecting from these systems. In some situations cybernetic augments may be seen as a necessary requirement for certain jobs. This creates a powerful incentive against people who wish to keep their bodies unmodified, or would rather avoid specific modifications.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/tott-1.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-1/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy #1: Digital Currency&lt;/h2&gt;&lt;i&gt;How the digital financial complex works against you...and what you can do about it.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h4 id=&#34;3-censorship-and-manipulation&#34;&gt;3. Censorship and manipulation&lt;/h4&gt;
&lt;p&gt;Many &amp;lsquo;upgrades&amp;rsquo; go beyond what you can perceive. All kinds of imperceptible actions will be able to manipulate people far better than social media and advertising can. Instead of relying on symbolism and experiences to produce certain thoughts and feelings, the technocrats will aim to make you experience the desired inputs directly.&lt;br&gt;
Even if they can&amp;rsquo;t force people to forget things yet, they&amp;rsquo;ll be forced to act as if they have.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;solutions&#34;&gt;Solutions&lt;/h2&gt;
&lt;h3 id=&#34;take-control-of-your-health&#34;&gt;Take control of your health&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Understand your body, get to know your habits.&lt;/li&gt;
&lt;li&gt;Find trustworthy people to help you build up your health, and avoid the things that damage you.&lt;/li&gt;
&lt;li&gt;Get active, play and enjoy being a human being!&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;dont-let-them-define-human&#34;&gt;Don&amp;rsquo;t let them define human&lt;/h3&gt;
&lt;p&gt;While it is true that you are more than just the sum total of your parts, it&amp;rsquo;s best not to give the technocrats complete domain to define what we as human beings are, and what we are not. We as people should support each other&amp;rsquo;s dignity regardless of what chosen or refused modifications are made.&lt;/p&gt;
&lt;blockquote&gt;
&lt;h3 id=&#34;corbett-technocracy-is-insane-anti-human-and-it-will-fail&#34;&gt;Corbett: Technocracy Is Insane, Anti-Human And It WILL Fail&lt;/h3&gt;
&lt;p&gt;&amp;ldquo;But on a more relatable level, we already know intuitively that the anti-human, synthetic systems that the technocrats are trying to put in place are a pipe dream. Does anyone other than the most deluded technocrat believe that humanity can really abandon the natural world and adopt a food system completely dependent on synthetic, lab-grown “meat,” genetically modified “plants” and poisonous chemicals? Or that sentient AI chatbots are going to be running society as soon as the Google engineers let them out? Or that an economy built on social credit and CBDCs can really function? Of course not. Even the people who are pulling the technocrats’ strings know this isn’t workable in the long run.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://www.technocracy.news/corbett-technocracy-is-insane-anti-human-and-it-will-fail/&#34;&gt;Technocracy News&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3 id=&#34;free-as-in-freedom-hardware-and-software&#34;&gt;Free &lt;a href=&#34;https://fsf.org&#34;&gt;(as in Freedom)&lt;/a&gt; Hardware and software&lt;/h3&gt;
&lt;p&gt;These technological systems need transparency and consent. People should never be forced or pressured to integrate technology into their body ever. This line must never be crossed or we risk falling into outright techno-totalitarianism. If people choose to integrate technology into themselves they should have the full rights to repair, modify and use it however they see fit.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Simple Tips: Tracking Links</title>
		<link>https://libresolutions.network/videos/tracking-links/</link>
		<pubDate>Tue, 23 Aug 2022 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/videos/tracking-links/</guid>
		
		<image>https://libresolutions.network//media/images/tracking-links.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/tracking-links.webp" />
		<itunes:image href="https://libresolutions.network//media/images/tracking-links.webp" />
		<description>Tracking links and what you can do about them</description>
		<content:encoded>&lt;p&gt;You can &lt;strong&gt;clean your links&lt;/strong&gt; by removing extra parameters or making sure to only send perma-linked content to people.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Tools of the Technocracy: #7 Smart Cities</title>
		<link>https://libresolutions.network/articles/tools-of-the-technocracy-7/</link>
		<pubDate>Thu, 18 Aug 2022 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/tools-of-the-technocracy-7/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/tools-of-the-technocracy7.mp3" />
			
		
		<image>https://libresolutions.network//media/images/smart-megacity.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/smart-megacity.webp" />
		<itunes:image href="https://libresolutions.network//media/images/smart-megacity.webp" />
		<description>Smart cities are marketed as if they are for the convenience of its residents, but this couldn’t be further from the truth.</description>
		<content:encoded>&lt;h1 id=&#34;tools-of-the-technocracy-7-smart-cities&#34;&gt;&lt;a href=&#34;https://libresolutions.network/tags/tools-of-the-technocracy-series&#34;&gt;Tools of the Technocracy&lt;/a&gt;: #7 Smart Cities&lt;/h1&gt;
&lt;h2 id=&#34;what-is-a-smart-city&#34;&gt;What is a smart city?&lt;/h2&gt;
&lt;p&gt;Just like the &amp;lsquo;smart&amp;rsquo; in smart devices is really just code for surveillance. A &amp;lsquo;smart&amp;rsquo; city is really just a surveillance &amp;amp; control city. In essence, the smart city is the ultimate application of all the &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy/&#34;&gt;&lt;em&gt;tools of the technocracy&lt;/em&gt;&lt;/a&gt; against it&amp;rsquo;s captives. Even the tone of their marketing gives off how much disdain they have for human beings.&lt;/p&gt;

&lt;p&gt;&lt;a href=&#34;https://iceni.substack.com/subscribe&#34;&gt;ICENI Bulletins&lt;/a&gt; outlines the primary attributes of a smart city.&lt;/p&gt;
&lt;blockquote&gt;
&lt;h2 id=&#34;attributes-of-a-future-smart-city&#34;&gt;Attributes of a Future Smart City&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;It must be a planned community&lt;/strong&gt;, laid out for high efficiency and short transit times. Practically everything one would need would be within walking distance of one’s apartment.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;For many workers, telecommuting via the metaverse would replace physical commutes. One’s home would also be one’s workplace. Therefore, office space would be replaced with residential space, and practically everything along one’s commute - &lt;strong&gt;convenience stores, clothing shops, laundromats, coffeehouses, restaurants, et cetera - would be eliminated.&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Physical services and many commercial areas would largely be &lt;strong&gt;replaced with on-demand and delivery services&lt;/strong&gt;, including robo-delivery by drones or other unmanned vehicles.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Everything would be tightly regulated, with people’s utilization of services, consumption of goods, criminal activity, and other &lt;strong&gt;behaviors monitored by constant, all-encompassing surveillance&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;This same surveillance system would be used to automatically dispatch emergency services, as required, by detecting ongoing crimes, medical emergencies, and fires, using all manner of networked sensors.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Networked sensors would also be used to determine electricity and natural gas usage, among other metrics of consumption and waste.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://iceni.substack.com/p/covid-19-deep-dive-part-vii-smart&#34;&gt;COVID-19 Deep Dive Part VII: Smart Cities and Neo-Malthusianism&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2 id=&#34;so-in-short&#34;&gt;So in short&amp;hellip;&lt;/h2&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://thefreethoughtproject.com/&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/smart-city.webp&#39; 
&gt;

&lt;/a&gt;



&lt;/div&gt;
&lt;hr&gt;
&lt;h2 id=&#34;why&#34;&gt;Why?&lt;/h2&gt;
&lt;p&gt;One of the most underestimated factors of the technocracy is the massive arms-race between the people and the technocrats. If people understood how essential the liberty they have left to their survival is they would have guarded it much more carefully during the &lt;a href=&#34;https://www.campfire.wiki/doku.php?id=covid-19_pandemic&#34;&gt;Covid Crisis&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Data alone isn&amp;rsquo;t that valuable, it&amp;rsquo;s the ability to leverage it for power and control that has fueled the constant eradication of privacy in people&amp;rsquo;s lives. In many ways people choose to trade their privacy for convenience, but there are powerful incentives tipping the scales.&lt;/p&gt;
&lt;p&gt;Smart cities are marketed as if they are for the convenience of its residents, but this couldn&amp;rsquo;t be further from the truth. Smart cities are built for efficiently monitoring and controlling all aspects of people&amp;rsquo;s lives. There are massive challenges in trying to monitor and control every minute detail in life.&lt;/p&gt;
&lt;h3 id=&#34;there-are-only-two-ways-to-solve-that-problem&#34;&gt;There are only two ways to solve that problem:&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Build up more computing power, storage &amp;amp; bandwidth incurring greater energy, resource, and management costs.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;&amp;lsquo;Simplify&amp;rsquo;&lt;/em&gt; the problem by limiting people&amp;rsquo;s freedom.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;There are limits to how far you can go with #1. Management of more and more complexity can become an impossibility. Energy is also likely to be &lt;a href=&#34;https://peakprosperity.com/courses/crashcourse/&#34;&gt;highly constrained&lt;/a&gt; for the near future. You only need a convenient pretext to get the public under your control to go along with #2.&lt;/p&gt;
&lt;h3 id=&#34;what-does-2-look-like-in-practice&#34;&gt;What does #2 look like in practice?&lt;/h3&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/big-data.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-2/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #2 Big Data &amp;amp; Artificial Intelligence&lt;/h2&gt;&lt;i&gt;What is all this data for anyways?&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;If you don&amp;rsquo;t have the computation to store and calculate everyone attending social events, visiting family, and otherwise moving about?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Just stop them from moving around!&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Can&amp;rsquo;t easily build the infrastructure to listen to everyone, everywhere, all the time?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Simply force them onto digital platforms you control!&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/construction-banner.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-3/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #3 Robots, IoT, Automation, Oh my!&lt;/h2&gt;&lt;i&gt;Transforming the world in ways seen and unseen&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Don&amp;rsquo;t want things like human understanding, mercy or charity dulling your harsh enforcement mechanisms?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Simply use machines to carry out the orders!&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Tired of administrators being held accountable for decisions that impact people?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Deflect to the automatic system and claim it is for the greater good!&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;There are all kinds of &lt;em&gt;&amp;lsquo;optimizations&amp;rsquo;&lt;/em&gt; you can do when you decide to grab complete top-down control, and develop robust mechanisms to silence and discredit any dissent. This is why smart cities will resemble all the worst aspects of &lt;a href=&#34;https://en.wikipedia.org/wiki/Company_town&#34;&gt;company towns&lt;/a&gt;.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;its-already-started&#34;&gt;It&amp;rsquo;s already started.&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;&amp;ldquo;Noah was a conspiracy theorist when it started to rain&amp;rdquo;&lt;/em&gt;&lt;br&gt;
Dr Zelenko&lt;/p&gt;
&lt;p&gt;An easy mistake to make when thinking about the tools of the technocracy, is to only recognize them in their most extreme and visible forms. Systems are gradually introduced and built on to construct what could be seen as impossible. While someday you may see drones enforcing edicts on street-corners, it&amp;rsquo;s a mistake to think that because there aren&amp;rsquo;t outright visible features, that the system isn&amp;rsquo;t already being built.&lt;/p&gt;
&lt;p&gt;For cryptocurrency the 2010s were a decade of optimism and hope. The 2020s are where we get to see the real &amp;lsquo;double-edged&amp;rsquo; aspects of these systems. Blockchain technology is efficient at administration and storing information. As you can see, &lt;a href=&#34;https://helium.com&#34;&gt;helium&lt;/a&gt; is being used to roll-out IoT infrastructure.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://explorer.helium.com/iot&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/tott-7-helium.webp&#39; 
&gt;

&lt;/a&gt;



&lt;/div&gt;
&lt;p&gt;There are many good uses for such a project, sadly, in our troubled times no tool is above &lt;a href=&#34;https://reclaimthenet.org/treasury-sanction-tornado-cash-privacy-first-amendment/&#34;&gt;political interference&lt;/a&gt;. There is a storm of attacks on anything resembling independent, censorship resistant communication/financial networks, even if they aren&amp;rsquo;t secure as they seem. It is important not to become overconfident or have too much faith in an individual product.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/road2hell.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/blockchain/&#34;  &gt;&lt;h2&gt;The road to hell: misplaced optimism in the blockchain space&lt;/h2&gt;&lt;i&gt;&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;hr&gt;
&lt;h2 id=&#34;digital-id&#34;&gt;Digital ID&lt;/h2&gt;
&lt;p&gt;As far as a smart city is concerned, &lt;em&gt;you aren&amp;rsquo;t human&lt;/em&gt;. You don&amp;rsquo;t have rights. You can&amp;rsquo;t own property. Your activities aren&amp;rsquo;t limited in terms of money, but rather &lt;em&gt;permission&lt;/em&gt;. All your activities are &lt;a href=&#34;https://scribe.rip/world-economic-forum/welcome-to-2030-i-own-nothing-have-no-privacy-and-life-has-never-been-better-ee2eed62f710&#34;&gt;constantly monitored&lt;/a&gt; and the system has the capability to intervene at any time.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/tott-1.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-1/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy #1: Digital Currency&lt;/h2&gt;&lt;i&gt;How the digital financial complex works against you...and what you can do about it.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;To the smart city administration, you happen to be an animal that carries around a tool that represents you in the system. If carrying the tool is too burdensome it can be implanted.&lt;br&gt;
Yes, the smartphone works as a digital ID. Your phone number and/or IMEI is enough to uniquely identify you in all kinds of situations.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/tott-4.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-4/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #4 Online Identity&lt;/h2&gt;&lt;i&gt;What is following you in your digital tracks?&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;hr&gt;
&lt;h2 id=&#34;solutions&#34;&gt;Solutions&lt;/h2&gt;
&lt;h3 id=&#34;boycott-digital-id&#34;&gt;Boycott Digital ID&lt;/h3&gt;
&lt;p&gt;Reducing your dependence on surveillance devices is important. It is equally important to prevent people from being &lt;a href=&#34;https://reclaimthenet.org/doctor-is-fined-for-refusing-to-use-canadas-vaccine-passport/&#34;&gt;forced into using them&lt;/a&gt;. The more people locked into these systems, the less they are able to accept your refusal to participate.&lt;/p&gt;
&lt;p&gt;In any and all circumstances it is best to refuse to divulge personally identifying information, especially with institutions and services you don&amp;rsquo;t trust.&lt;br&gt;
This includes (but is not limited to):&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Full name&lt;/li&gt;
&lt;li&gt;Location data &amp;amp; home address&lt;/li&gt;
&lt;li&gt;Phone Number&lt;/li&gt;
&lt;li&gt;E-mail address&lt;/li&gt;
&lt;li&gt;Credit card details&lt;/li&gt;
&lt;li&gt;Government ID&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Vitally important is to support the great local organizations working to protect freedoms in your area. The &lt;a href=&#34;https://donations.solari.com/take-action-crowdfund/&#34;&gt;Take Action Crowdfund&lt;/a&gt; is a fantastic resource for finding initiatives to support.&lt;/p&gt;
&lt;h3 id=&#34;get-involved&#34;&gt;Get involved&lt;/h3&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/lsn-banner.webp)&#34; &gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://www.technologyreview.com/2022/06/29/1054005/toronto-kill-the-smart-city/&#34;  &gt;&lt;h2&gt;Toronto wants to kill the smart city forever&lt;/h2&gt;&lt;i&gt;The city wants to get right what Sidewalk Labs got so wrong.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;blockquote&gt;
&lt;p&gt;By May 2020, Sidewalk had pulled the plug, citing “the unprecedented economic uncertainty brought on by the covid-19 pandemic.” But that economic uncertainty came at the &lt;strong&gt;tail end of years of public controversy&lt;/strong&gt; over its $900 million vision for a data-rich city within the city.&lt;/p&gt;
&lt;p&gt;It’s hardly unusual for citizens to get up in arms about new development, and utopias fail for all sorts of reasons. But the opposition to Sidewalk’s vision for Toronto wasn’t about things like architectural preservation or the height, density, and style of the proposed buildings—the usual fodder for public outcry. The project’s tech-first approach antagonized many; &lt;strong&gt;its seeming lack of seriousness about the privacy concerns of Torontonians was likely the main cause of its demise.&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Almost everything the technocrats want to force on people are impossible without the compliance of the public. Do not fall for the trap of believing these changes are inevitable. We can all work to shape the world we want, and the most important part is getting connected and engaged in your community. It&amp;rsquo;s important to build and maintain systems and infrastructure that strengthens communities.&lt;/p&gt;
&lt;h3 id=&#34;work-to-prevent-an-all-digital-financial-system&#34;&gt;Work to prevent an all-digital financial system.&lt;/h3&gt;
&lt;p&gt;Catherine Austin Fitts &lt;a href=&#34;https://solari.com&#34;&gt;(Solari.com)&lt;/a&gt; and Children&amp;rsquo;s Health Defense have a fantastic series &lt;a href=&#34;https://live.childrenshealthdefense.org/shows/financial-rebellion&#34;&gt;Financial Rebellion&lt;/a&gt; that regularly discusses strategies to prevent total top-down control of the financial system. One of these strategies is &lt;a href=&#34;https://home.solari.com/cash-friday&#34;&gt;#CashEveryday&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;independent-long-range-communications&#34;&gt;Independent long-range communications&lt;/h3&gt;
&lt;p&gt;Establishing &amp;lsquo;off-grid&amp;rsquo; communication networks to bypass censorship will be a dire necessity once the capability exists to completely segregate locations from the Internet. As technology improves, so does the ability to counteract censorship.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>The road to hell: misplaced optimism in the blockchain space</title>
		<link>https://libresolutions.network/articles/blockchain/</link>
		<pubDate>Thu, 04 Aug 2022 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/blockchain/</guid>
		
		<image>https://libresolutions.network//media/images/blockchain-banner.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/blockchain-banner.webp" />
		<itunes:image href="https://libresolutions.network//media/images/blockchain-banner.webp" />
		<description></description>
		<content:encoded>&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/road2hell.webp&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;I didn&amp;rsquo;t want to believe James Corbett at the time, but he warned us in 2018.&lt;br&gt;
&lt;a href=&#34;https://www.corbettreport.com/bitcoinpsyop/&#34;&gt;The bitcoin psyop&lt;/a&gt; outlines the differences between central-bank digital currencies (CBDCs) &amp;amp; public permission-less blockchains. He also rightly outlines how smart contracts themselves could become &lt;a href=&#34;https://libresolutions.network/tools-of-the-technocracy-series/&#34;&gt;tools of the technocracy&lt;/a&gt;.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/tott-1.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-1/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy #1: Digital Currency&lt;/h2&gt;&lt;i&gt;How the digital financial complex works against you...and what you can do about it.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;This article isn&amp;rsquo;t intended to denounce every blockchain based system. Public blockchains can be used to create fantastic public goods. It&amp;rsquo;s still important to understand how they can be used for evil. There is a great deal of inherent danger in how they can be used to create digital prisons around us.&lt;/p&gt;
&lt;h2 id=&#34;yes-bitcoin-too&#34;&gt;Yes, Bitcoin too.&lt;/h2&gt;
&lt;p&gt;Bitcoin is the linchpin of the entire cryptocurrency ecosystem. Its disruption or disappearance would cause near-existential risks for the rest of the blockchain space. While it is the most successful public blockchain to date, Bitcoin is not without it&amp;rsquo;s problems. The most significant challenge is scaling it to support more transactions. There are sophisticated systems layered on top of Bitcoin that attempt to solve this, but in many ways it starts to look like just building the tower of babel higher and higher.&lt;/p&gt;
&lt;p&gt;The most significant difference between Bitcoin and other blockchain based systems is the &lt;em&gt;consensus algorithms&lt;/em&gt; they use. If you simplify these systems down to a game, the consensus algorithm is essentially the rules of the game. Every round the participants compete to validate a block.&lt;br&gt;
The two main consensus algorithms are &lt;em&gt;Proof of Work&lt;/em&gt; (PoW) or &lt;em&gt;Proof of Stake&lt;/em&gt; (PoS):&lt;/p&gt;
&lt;h3 id=&#34;proof-of-work&#34;&gt;Proof of Work&lt;/h3&gt;
&lt;p&gt;Using an arms race of computing power to &amp;ldquo;mine&amp;rdquo; a block, this competition creates hard physical restraints on hostile entities ability to manipulate the outcome. This is the solution what makes the idea of counterfeiting Bitcoin a near impossibility.&lt;/p&gt;
&lt;h3 id=&#34;proof-of-stake&#34;&gt;Proof of Stake&lt;/h3&gt;
&lt;p&gt;Instead of &amp;lsquo;wasting&amp;rsquo; so much energy you could ask participants of the game to &amp;ldquo;lock up&amp;rdquo; some tokens to proceed to the next round. This complicates matters significantly. How should initial tokens be distributed?&lt;/p&gt;
&lt;p&gt;At first glance, both of these consensus algorithms have significant trade-offs depending on the system you want to build. There are other varieties and hybrids but it&amp;rsquo;s important to understand that the rules of the game are only the starting point. While Bitcoin&amp;rsquo;s PoW mechanism seems &amp;ldquo;fair&amp;rdquo; in hindsight, many are growing concerned about the concentration of mining power.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;what-blockchains-do-well&#34;&gt;What blockchains do well&lt;/h2&gt;
&lt;h3 id=&#34;storing-information&#34;&gt;Storing information&lt;/h3&gt;
&lt;p&gt;Naturally you&amp;rsquo;d want to fill the blockchain blocks with something. Blockchains are fantastic for permanent records. Regardless of the consensus mechanism blockchains are effectively auctions for permanent storage. If the value of the token goes too low, the participants may leave for a more profitable game.&lt;/p&gt;
&lt;h3 id=&#34;bootstrapping-systems&#34;&gt;Bootstrapping systems&lt;/h3&gt;
&lt;p&gt;As long as cryptocurrency has value, systems can automatically transfer that value. This means that certain kind of bounty or reward systems are able to distribute that value within desired parameters. By defining a set of behavior we want and creating a market for a token that pays for that behavior, very complicated changes can be made quickly.&lt;/p&gt;
&lt;h2 id=&#34;what-they-cant-do&#34;&gt;What they can&amp;rsquo;t do&lt;/h2&gt;
&lt;h3 id=&#34;create&#34;&gt;Create&lt;/h3&gt;
&lt;p&gt;Blockchains don&amp;rsquo;t create or build anything, they simply administrate activities. This means that if you&amp;rsquo;re using a blockchain based system to use more storage than exists on your device, that storage has to be maintained by another party to keep the system functioning.&lt;/p&gt;
&lt;h3 id=&#34;solve-human-problems&#34;&gt;Solve human problems&lt;/h3&gt;
&lt;p&gt;Using blockchain to enforce social credit scores will be a tantalizing option for the technocracy, refusing to adopt digital ID is a pre-requisite for stopping this. It&amp;rsquo;s dangerous to pretend that this can be entirely escaped by simply adopting a new technology.&lt;/p&gt;
&lt;p&gt;Despite what some may hope, these systems operate within human society not outside it. This means that many pre-existing problems (corruption, poverty, ect) are not automatically solved by adopting blockchain based technology. Tyranny is very much a human problem, one that can&amp;rsquo;t be simply prevented by escaping to yet another controlled virtual world.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;problems&#34;&gt;Problems&lt;/h2&gt;
&lt;h3 id=&#34;blockchain--decentralization&#34;&gt;Blockchain != decentralization&lt;/h3&gt;
&lt;p&gt;Because of the apparent success of decentralized blockchain systems there is a &amp;ldquo;cargo cult&amp;rdquo; mentality applied to blockchain-based solutions to various problems. This creates a very dangerous blind-spot. Just like any other useful tool blockchains can be used to useful purposes and malevolent ones. Many projects can very easily incorporate some benefits and harms in the same system.&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s important to keep in mind that any blockchain based system runs on top of the existing physical reality. Imbalances in the primary resources of cyberspace (storage, bandwidth &amp;amp; computing power) still manifest in important ways. Simply transferring data &amp;amp; computation from &amp;ldquo;the cloud&amp;rdquo; to &amp;ldquo;the blockchain&amp;rdquo; doesn&amp;rsquo;t inherently provide any additional protection or benefits. There is an illusion that blockchains are inherently run by more trustworthy actors, but that is far from a guarantee.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/lsn-banner.webp)&#34; &gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://www.bitchute.com/video/4GT3RKbwxDZh/&#34;  &gt;&lt;h2&gt;Can Bitcoin Circumvent Economic Tyranny?&lt;/h2&gt;&lt;i&gt;Dr. Joseph Mercola hosted a phenomenal discussion between finance guru Catherine Austin Fitts and Aleksandar Svetski, editor of Bitcoin Times magazine, to talk about the breakdown of our economy and potential solutions.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h3 id=&#34;oversimplifying-security--privacy&#34;&gt;Oversimplifying security &amp;amp; privacy&lt;/h3&gt;
&lt;p&gt;By giving users wallet software as a substitute for accounts on centralized services, people can in-theory gain some additional control over their data. These systems can even encrypt the users data so that the provider(s) have little-or-no access. This can be a significant improvement from the client-server model where the service operator has access to all the data in the system. While these are real possibilities, it is a mistake to assume a system operates this way simply because it uses a blockchain.&lt;/p&gt;
&lt;p&gt;There&amp;rsquo;s a saying in the cryptocurrency community. &lt;em&gt;&amp;ldquo;Not your keys, not your coins&amp;rdquo;&lt;/em&gt;&lt;br&gt;
This applies to any privacy or security guarantees made by a blockchain based system. For most people, having someone hack into their e-mail or facebook would be a big problem, but at least the damage can be limited. If people integrate their entire online identity with a wallet, gaining control to that wallet is full-on digital identity theft.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://youtu.be/watch?v=y4GB_NDU43Q&#34;&gt;Single Point of Failure: The (Fictional) Day Google Forgot To Check Passwords&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Throwing data onto the blockchain (even when encrypted) violates the first rule of keeping data safe: The best way to protect data is never to record it.&lt;/p&gt;
&lt;h3 id=&#34;nfts&#34;&gt;NFTs&lt;/h3&gt;
&lt;p&gt;This article could only go so long without including the word &amp;ldquo;scam&amp;rdquo;. NFTs are effectively a mechanism to turn anything (property, jobs, or even you!) into a virtual commodity.&lt;/p&gt;
&lt;p&gt;Instead of merely being overpriced novelties, in the hands of copyright owners NFTs could become the fuel for powerful &lt;em&gt;information control&lt;/em&gt; systems. It&amp;rsquo;s hard to overstate the dystopian potential of tokenizing ideas.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/seriouslynft/status/1555183150707445760#m&#34;&gt;Information land-grabs&lt;/a&gt; are one thing, but &lt;em&gt;permission&lt;/em&gt; can also be tokenized. Instead of activities having a price the system can simply hand out vouchers and only allow the select few to use them.&lt;/p&gt;
&lt;h3 id=&#34;net3&#34;&gt;Net3&lt;/h3&gt;
&lt;p&gt;The current state of the Internet is too useful to humanity. All the current censorship and control is a mere atom compared to the ton of power the technocracy wants to have. The very foundation of the Internet has to be destroyed and rebuilt for them to achieve their aims.&lt;/p&gt;
&lt;p&gt;Web3 replaces separate, compartmentalized accounts with a &amp;ldquo;wallet&amp;rdquo; that holds the keys to your identity. Instead of signing in with a chosen username and password you are signing in with a universal and distinct identity. While current iterations allow for relatively anonymous use, it is a &lt;a href=&#34;https://twitter.com/Nicolas_Sassoon/status/1508242641447649285&#34;&gt;mistake to assume&lt;/a&gt; this will always be the case.&lt;/p&gt;
&lt;p&gt;The web3 wallet operates eerily similarly to how a digital ID would operate online. I would be so bold as to suggest that the web3 space exists to beta-test such initiatives. While the vaccine passports were introduced to beta-test the physical and enforcement side, web3 is effectively the online prototype.&lt;/p&gt;
&lt;p&gt;Call it &amp;ldquo;&lt;strong&gt;net3&lt;/strong&gt;&amp;rdquo; because instead of an interconnected web they are building a net to trap us all into specific systems of control.&lt;/p&gt;
&lt;h3 id=&#34;automation&#34;&gt;Automation&lt;/h3&gt;
&lt;p&gt;Throw robots in the mix and you&amp;rsquo;ve got the capability of building an entirely inhuman system.Instead of a person being responsible for decisions the blame can be placed on the amorphous &amp;ldquo;system&amp;rdquo;. Removing the human element can&amp;rsquo;t improve outcomes in situations where responsibility is paramount.&lt;/p&gt;
&lt;iframe src=&#39;https://youtube.com/embed/AIk94MJS_Sc&#39; style=&#34;height:max-content;aspect-ratio: 16/9;min-height:460px;max-height:15rem;max-width:60rem;&#34; width=&#34;100%&#34; height=&#34;100%&#34;&gt;

&lt;/iframe&gt;
&lt;hr&gt;
&lt;h2 id=&#34;doing-it-right&#34;&gt;Doing it right&lt;/h2&gt;
&lt;p&gt;One of the largest problems with tokenized solutions is that their participants are financially pressured into pushing other people onto the platform. Many crucial downsides may be omitted by those evangelizing their particular solution. If there&amp;rsquo;s one thing you should leave this remembering it&amp;rsquo;s: &lt;em&gt;Data in your control is much better than data in any blockchain&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;Surely there&amp;rsquo;s a better way? How can we truly work for actual decentralization without embracing technological terror?  Some important concepts have been (re)introduced to people through the blockchain ecosystem:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Self-hosting&lt;/li&gt;
&lt;li&gt;Peer-to-peer connections&lt;/li&gt;
&lt;li&gt;Encryption &amp;amp; Key management&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Many of these things are doable without tokenizing and storing every interaction. It&amp;rsquo;s best not to throw all of these things into one basket, and use them intelligently where they work best.&lt;/p&gt;
&lt;h3 id=&#34;new-ways-to-log-in&#34;&gt;New ways to log in&lt;/h3&gt;
&lt;p&gt;When trying to reduce the amount of sign-ins or eliminate passwords entirely there are interesting options that don&amp;rsquo;t require a cryptocurrency wallet. &lt;a href=&#34;https://indieauth.com/&#34;&gt;IndieAuth&lt;/a&gt; looks quite promising. It uses your own website to link to already existing systems to authenticate yourself.&lt;/p&gt;
&lt;p&gt;Hate passwords all together? &lt;a href=&#34;https://webauthn.guide/&#34;&gt;Webauthn&lt;/a&gt; is an interesting proposal to do that. It uses hardware authenticators to generate separate identities for every service. This allows password-less login backed by strong encryption.&lt;/p&gt;
&lt;h3 id=&#34;federation&#34;&gt;Federation&lt;/h3&gt;
&lt;p&gt;Both &lt;a href=&#34;https://fediverse.info&#34;&gt;ActivityPub&lt;/a&gt; and &lt;a href=&#34;https://matrix.org&#34;&gt;Matrix&lt;/a&gt; use interoperable servers to connect communities together. You can run these servers yourself and have all the benefits of a fully-decentralized ecosystem without your data leaving your control. This is why &lt;a href=&#34;https://joinpeertube.org/&#34;&gt;PeerTube&lt;/a&gt; will likely be much more successful than any blockchain-based video-hosting service.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/fediverse.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/call-to-action-join-the-fediverse/&#34;  &gt;&lt;h2&gt;Call to Action: Join the Fediverse now!&lt;/h2&gt;&lt;i&gt;A simple, but very effective way to tip the scales in favor of free speech.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Is the Internet safe for children?</title>
		<link>https://libresolutions.network/articles/think-of-the-children/</link>
		<pubDate>Sat, 23 Jul 2022 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/think-of-the-children/</guid>
		
		<image>https://libresolutions.network//media/think-of-the-children.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/think-of-the-children.webp" />
		<itunes:image href="https://libresolutions.network//media/think-of-the-children.webp" />
		<description>Surveillance, manipulation and online predators are threats we all face. How can we keep children safe?</description>
		<content:encoded>&lt;h2 id=&#34;nope&#34;&gt;Nope.&lt;/h2&gt;
&lt;p&gt;Just as playing in traffic isn&amp;rsquo;t safe for children, all people need to be properly mentally, and emotionally equipped to navigate the chaotic environment of the Internet. Sometimes it&amp;rsquo;s market forces, other times it&amp;rsquo;s algorithms, but nearly everywhere there are pitfalls designed to rob people of all ages their time, attention, and resources.&lt;/p&gt;
&lt;p&gt;Gaming gets a lot of flak for doing this to children, but it&amp;rsquo;s far from the only place. Social media likes, boosts, and shares are effectively points keeping score in larger social games. The greatest challenge of protecting children online is realizing that their mind is as much at stake as their body and safety is.&lt;/p&gt;
&lt;h3 id=&#34;visualizing-the-problem&#34;&gt;Visualizing the problem&lt;/h3&gt;
&lt;p&gt;Imagine the Internet is a massive, sprawling city. There are some amazing, safe, and well maintained places. There are also some dangerous places infested with notorious gangs. Not only that, but there are places that range from everywhere in between. Most people would understandably plan to steer clear of the more dreadful places, but people underestimate the barriers to entry (and residence) in the nicer places.&lt;/p&gt;
&lt;h2 id=&#34;risks&#34;&gt;Risks&lt;/h2&gt;
&lt;h3 id=&#34;surveillance&#34;&gt;Surveillance&lt;/h3&gt;
&lt;p&gt;Many online services make it exceedingly easy to just give away more and more information. Many platforms attempt to mitigate it but the problem is systemic. There are a number of &lt;a href=&#34;https://neal.fun/dark-patterns&#34;&gt;dark patterns&lt;/a&gt; used to gate access to information or content behind accounts, personal details, or other information. It’s not always clear what is optional and what is required.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/tott-4.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-4&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #4 Online Identity&lt;/h2&gt;&lt;i&gt;What is following you in your digital tracks?&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;Constant surveillance of all people is a significant problem. We won&amp;rsquo;t know the true costs of putting children at the mercy of machine learning algorithms for a long time.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/iot.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/eye-on-thee/&#34;  &gt;&lt;h2&gt;IoT: The &amp;#39;Eye-on-Thee&amp;#39;&lt;/h2&gt;&lt;i&gt;A fantastic real-world example of how simple, inexpensive devices can be used for evil.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h3 id=&#34;mental-health&#34;&gt;Mental health&lt;/h3&gt;
&lt;p&gt;Online spaces don’t exist in a vacuum, they’re a part of our human society. As things become challenging and confusing in life there is an incredible draw to retreat to online spaces that feel cozier than the rest of the world. &lt;br&gt;
Leading to all kinds of problems:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Sleep deprivation&lt;/li&gt;
&lt;li&gt;Depression&lt;/li&gt;
&lt;li&gt;Over-eating&lt;/li&gt;
&lt;li&gt;Escapism&lt;/li&gt;
&lt;li&gt;Political extremism / radicalization&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Sounds a lot like a millennial doesn’t it? Many of us are internet-addicted for a variety of reasons.
Many of these problems aren’t new, and likely won’t be going away anytime soon. Some appear to have gotten &lt;a href=&#34;https://gummibear737.substack.com/p/the-lgbtq-pandemic-and-mental-health&#34;&gt;much worse.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;One of the things that has gotten a lot worse is algorithms, in the early days feeds had only the crudest metrics to judge engagement. Now AI has an immensely accurate picture of how to manipulate people into all kinds of behaviors.&lt;/p&gt;
&lt;h3 id=&#34;market-forces&#34;&gt;Market forces&lt;/h3&gt;
&lt;p&gt;The advertising industrial complex comes for every marketable group. It does not care if you&amp;rsquo;re a wealthy person with tons of time on your hands, or a child who&amp;rsquo;s stolen their parents credit card. It&amp;rsquo;s a powerful machine designed to do whatever it takes to separate money from the fools and wise alike.&lt;/p&gt;
&lt;p&gt;These systems effectively work to build addictions in people. The system really doesn&amp;rsquo;t care what kind of addiction it is: &lt;a href=&#34;https://twitter.com/SteamFocus/status/1421063456409726983&#34;&gt;gaming, gambling&lt;/a&gt;, porn, food, ect. It only cares about how it can turn that addiction into regular and increasing business. You can call these systems evil (and I&amp;rsquo;d agree) but the important thing to realize is that they&amp;rsquo;re entirely indifferent to the suffering they create.&lt;/p&gt;
&lt;h3 id=&#34;institutions&#34;&gt;Institutions&lt;/h3&gt;
&lt;p&gt;Schools have been &lt;a href=&#34;https://twitter.com/CodaStory/status/1324080978969722882&#34;&gt;guilty of rolling out surveillance technology&lt;/a&gt; to use on children. During the covid crisis many schools closed their doors, with &lt;a href=&#34;https://childrenshealthdefense.org/defender/pandemic-school-closings-harmed-children/&#34;&gt;predictably disastrous consequences for children&lt;/a&gt;. Remote learning was a golden opportunity for centralization and control as the tools presented to the schools were loaded with privacy problems.&lt;/p&gt;
&lt;p&gt;Large institutions are often given deals on software packages that have business model in surveillance. EdTech is a big industry and a non-trivial part of it is data collection. In many ways these tools are not really tools but glorified cages. While your child will seem knowledgeable in using these products, they could be like a fish-out-of-water when having to learn how to accomplish the same tasks without them.&lt;/p&gt;
&lt;p&gt;A significant challenge is that trying to bring change or accountability to these institutions is &lt;a href=&#34;https://abigailshrier.substack.com/p/when-the-state-comes-for-your-kids&#34;&gt;nearly impossible to do alone&lt;/a&gt;. It is in your own interest to ensure that not only your own children, but also the children in your community aren&amp;rsquo;t beholden to technocratic control.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/lsn-banner.webp)&#34; &gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://reclaimthenet.org/wef-rational-reasons-microchip-children/&#34;  &gt;&lt;h2&gt;World Economic Forum website suggests there are &amp;#39;rational&amp;#39; reasons to microchip your child&lt;/h2&gt;&lt;i&gt;The article suggests there are ways to &amp;#39;ethically make these amazing technologies a part of our lives.&amp;#39;&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h3 id=&#34;peer-pressure&#34;&gt;Peer pressure&lt;/h3&gt;
&lt;p&gt;If any of the above were bad enough, unfortunately you have to be concerned about your child&amp;rsquo;s peers. It&amp;rsquo;s hard to feel included when you&amp;rsquo;re not in the latest devices and systems. It can be hard to balance your child&amp;rsquo;s desire to interact with their friends against the harms caused by these platforms.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;the-wrong-answer-censorship-control-and-centralization&#34;&gt;The wrong answer: Censorship, Control, and Centralization&lt;/h2&gt;
&lt;p&gt;Governments around the world are converging on &amp;lsquo;solutions&amp;rsquo; to these problems that all inch us closer towards technocratic totalitarianism. The problem with most of these methods is that they aren&amp;rsquo;t even useful in the extreme circumstances where someone will try to justify them.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Censorship&lt;/strong&gt; harms children&amp;rsquo;s ability to learn and process information.&lt;/li&gt;
&lt;li&gt;Greater &lt;strong&gt;control&lt;/strong&gt; over people&amp;rsquo;s digital lives teaches them learned helplessness, effectively robbing them of the opportunity to learn to take control themselves.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Centralization&lt;/strong&gt; harms everyone&amp;rsquo;s ability to solve problems, and build resilience.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;One of the greatest things protecting all people online is relative anonymity.&lt;br&gt;
Anonymity allows people to interact with sources of information without necessarily having to divulge any information about themselves. From bullying, online predators, and financial scams there is more and more propaganda trying to convince people that anonymity must be eliminated. This is the absolute worst solution, in every instance it&amp;rsquo;s been tried it has failed to successfully safeguard the vulnerable. Elimination of anonymity only serves to feed data-collectors and empower those who seek control over others.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;solutions&#34;&gt;Solutions&lt;/h2&gt;
&lt;h3 id=&#34;real-life-activities&#34;&gt;Real life activities&lt;/h3&gt;
&lt;p&gt;What children need most in the world is engaged parents who proactively work to enhance their freedom, opportunities, and well-being. Unfortunately this isn&amp;rsquo;t always easy, but it gets easier when you get others involved with you.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Host community dances&lt;/li&gt;
&lt;li&gt;Teach and learn skills together&lt;/li&gt;
&lt;li&gt;Get involved in community sports&lt;/li&gt;
&lt;li&gt;Be where the fun and joy can be found&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Instead of children lurking online to escape the world, ensure that there are real opportunities for them to learn, create, play, and share with people in their community.&lt;br&gt;
Taking time to build a strong family bond is one of the most important things you can do to keep your children safe. Being approachable allows them to warn you of dangers that may not be on your radar.&lt;/p&gt;
&lt;h3 id=&#34;ground-rules&#34;&gt;Ground rules&lt;/h3&gt;
&lt;p&gt;There are a handful activities you would want to restrict until your child has shown an appropriate level of responsibility. Like many other rules there are ways around them, but the point is to steer them away from sliding into a trap.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Smart devices&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If nothing else the more your entire family can avoid &amp;lsquo;smart&amp;rsquo; devices the better.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Screen time&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The internet is a useful tool, disallowing it entirely is likely not the best strategy. Outside of practicing specific skills, long stretches of screen time will do most people very little benefit and non-trivial harm.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Online purchases&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The easier it is for your children to make purchases the easier it is for algorithms to rob them with scams and manipulation.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Online Games and communities&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Take the time to investigate certain games and online communities to make a reasonable judgement on a case-by-case basis.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h3 id=&#34;build-their-technical-understanding&#34;&gt;Build their technical understanding&lt;/h3&gt;
&lt;p&gt;Preventing technology from monitoring or manipulating your children doesn&amp;rsquo;t mean they have to be ignorant. There are many age-appropriate ways to learn how to build or modify simple electronics and write basic programs.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://arduino.cc&#34;&gt;Arduino&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://scratch.mit.edu&#34;&gt;Scratch&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;What you will want to do is protect them and their information from data-driven services.&lt;br&gt;
Ensure your children know not to share identifying or sensitive information:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Real names&lt;/li&gt;
&lt;li&gt;Location information
&lt;ul&gt;
&lt;li&gt;Residence&lt;/li&gt;
&lt;li&gt;School&lt;/li&gt;
&lt;li&gt;Nearby activities&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Photos (only share the best memes!)&lt;/li&gt;
&lt;li&gt;Any kind of financial details&lt;/li&gt;
&lt;li&gt;Contact information&lt;/li&gt;
&lt;/ul&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/4-data-breach.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/4-account-security-best-practices/&#34;  &gt;&lt;h2&gt;Account security best practices&lt;/h2&gt;&lt;i&gt;How to make sure every service you use is as secure and as private as possible.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;It can be useful to create fake identities (make it fun!) for them to use on various platforms so you can make sure the accounts don’t have it. Anything you can use your own accounts for the better, such as purchases and subscriptions.&lt;/p&gt;
&lt;h3 id=&#34;adapt-your-childs-education&#34;&gt;Adapt your child&amp;rsquo;s education&lt;/h3&gt;
&lt;p&gt;The current system is setup to teach people helplessness and dependence.
It is important to everyone, especially at young ages to understand that they do have the capacity to build their own independence. Find resources that have &lt;a href=&#34;https://tuttletwins.com&#34;&gt;higher goals&lt;/a&gt; than teaching children to be cogs in a machine.&lt;/p&gt;
&lt;p&gt;Watch &lt;a href=&#34;https://live.childrenshealthdefense.org/shows/financial-rebellion/te8DFdQZny&#34;&gt;Corey Lynn&amp;rsquo;s appearance&lt;/a&gt; on CHD TV&amp;rsquo;s show: Financial Rebellion&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Anatomy of a psyop</title>
		<link>https://libresolutions.network/articles/anatomy-of-a-psyop/</link>
		<pubDate>Sun, 17 Jul 2022 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/anatomy-of-a-psyop/</guid>
		
		<image>https://libresolutions.network//media/images/brain-pain.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/brain-pain.webp" />
		<itunes:image href="https://libresolutions.network//media/images/brain-pain.webp" />
		<description>Cognitive warfare in action</description>
		<content:encoded>&lt;p&gt;A shadowy figure appears out of nowhere and tells you:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;They understand your problems&lt;/li&gt;
&lt;li&gt;It’s worse than you think&lt;/li&gt;
&lt;li&gt;They have a really simple solution they just need you to hand over your private information (or large sums of cash) to make all your worries go away&lt;/li&gt;
&lt;li&gt;The solution doesn’t require any real work on your part&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;It’s a scam.&lt;/p&gt;
&lt;p&gt;Blatant scam artists and social engineers both heavily rely on affirming your biases. The scammer will say things that are either well known to be true, or strongly believed by subsets of the population. As someone aware of the threats totalitarian control presents, you are a prime target for social engineers. Anything that they can do to give you either a false sense of security or a harmless outlet for frustration, makes it harder for you to fight back.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://libresolutions.network/articles/chewtoys&#34;&gt;Chewtoys: The Alchemy of mastering mass anger&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Now that the public has a higher level of awareness about the top-down control grid, there is a race to ensure that the public isn&amp;rsquo;t actively focused on rebuilding their own sovereignty. Sovereignty always requires work. Paying a protection racket doesn’t liberate you, it only allows you to rent some temporary safety. Having reliable, trustworthy, and accurate information is one of the most important steps in taking control in your own life. Information can be seen as a form of capital that can be enhanced with tools and skills.&lt;/p&gt;
&lt;p&gt;That’s all very difficult and complicated right? In today’s fast-paced and complex world, surely there is a simply and easy solution? What if I just take a moment to listen to what this shadowy figure has to say.&lt;/p&gt;
&lt;h2 id=&#34;snow-job&#34;&gt;Snow job&lt;/h2&gt;
&lt;blockquote&gt;
&lt;p&gt;An effort to deceive, overwhelm, or persuade with insincere talk, &lt;strong&gt;especially flattery.&lt;/strong&gt;
Urban dictionary&lt;/p&gt;
&lt;/blockquote&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/snowjob.webp&#39; 
&gt;



&lt;/div&gt;
&lt;blockquote&gt;
&lt;p&gt;Don’t worry about your social media habits!&lt;/p&gt;
&lt;p&gt;Don’t worry about the technocratic control system!&lt;/p&gt;
&lt;p&gt;We have a way to get you into the elite class!&lt;/p&gt;
&lt;p&gt;It’s simple all you have to do is join our telegram server and share with your friends.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Are you starting to doubt? These guys can’t be fake, take a look at their ‘leet’ &lt;em&gt;hacker skillz&lt;/em&gt;!&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/snowjob2.webp&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;…Except that on firefox, all you have to do is add view-source: before the address and you are immediately aware that this is a normal Wordpress site.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/snowjob3.webp&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;When releasing sensitive and critical information to all of humanity there’s a few basic things you want to get right:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Reduce points of failure as much as possible:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Publish only a simple set of pages written without extra scripts or plug-ins&lt;/li&gt;
&lt;li&gt;Avoid any third-party publishing platforms&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Make the content as resilient and censorship resistant as possible:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Where’s the TOR hidden service?&lt;/li&gt;
&lt;li&gt;Why isn’t the information backed up on IPFS or even available as a torrent?&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Don’t have any “official” communications from big tech platforms such as Youtube / Twitter / Facebook and, yes, Telegram.&lt;/p&gt;
&lt;p&gt;Why?&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;At best, you’ll waste time getting banned over and over again&lt;/li&gt;
&lt;li&gt;These platforms have the capability of limiting whatever reach you may potentially have.&lt;/li&gt;
&lt;li&gt;You’re giving away information to these platforms that can be inevitably tracked back to you.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;That’s just the bare-minimum basics before you get focused on the more complicated things like:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Where do you host your server?&lt;/li&gt;
&lt;li&gt;What communication methods do you and your team use?&lt;/li&gt;
&lt;li&gt;What are your backups? Can everything be seized in a single day?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/OculumLabs/status/1548752813337055234&#34;&gt;But they&amp;rsquo;re getting hacked!&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;They’re not special, almost any website of a certain size will get this kind of attention. Bots are constantly looking for vulnerable systems to exploit to use for their own ends. Exploiting a completely open system is something that is trivial to automate.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/false-saviors.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/beware-false-savior&#34;  &gt;&lt;h2&gt;Beware the false saviors&lt;/h2&gt;&lt;i&gt;Putting faith into leaders is a road to disappointment. We all have to work together as individuals to make lasting change.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;Who knows? That might be the kind of problem they have when they can’t even setup their WIX website without having an ad banner.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/snowjob4.webp&#39; 
&gt;



&lt;/div&gt;
&lt;h3 id=&#34;what-do-they-want&#34;&gt;What do they want?&lt;/h3&gt;
&lt;p&gt;Your time and attention are precious resources. Anyone and anything that can soak it up by offering you an easy road to freedom doesn’t have your best interests in mind. A far more nefarious goal would be to slander people with real concerns about digital IDs and the surveillance economy as simply deluded by this straw-man.&lt;/p&gt;
&lt;p&gt;The most disgusting aspect of this performance is that it rides on people’s greed to passively accept a top-down slavery system. “Oh, it’s as bad as you think it is but worse, but it will only be the &lt;em&gt;good people&lt;/em&gt; in the elite class now,” is a disgusting attitude to take. Power without accountability is corrosive on morality. A social credit caste system with the “good people” on the top will inevitably devolve into a nightmare with evil people on the top.&lt;/p&gt;
&lt;p&gt;Social credit systems are real, and not just in China. The massive wealth divide does effectively create different classes of people. The “system” they’re warning you about is already in place on a basic level. Promising to “wipe your slate clean” in exchange for promoting them on social media is not the ideal solution even if it worked.&lt;/p&gt;
&lt;p&gt;Sovereignty is power. All power is expensive to maintain. The price of liberty is eternal vigilance and proactive action. None of us will be able to simply purchase freedom. The freedom of your fellow human beings, even when you disagree, is your greatest asset. We must work to restore integrity and accountability in all aspects of our lives, not chasing quick-and-easy scams pretending to be solutions.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>IoT: The &#34;Eye-on-Thee&#34;</title>
		<link>https://libresolutions.network/articles/eye-on-thee/</link>
		<pubDate>Tue, 12 Jul 2022 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/eye-on-thee/</guid>
		
		<image>https://libresolutions.network//media/images/iot-banner.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/iot-banner.webp" />
		<itunes:image href="https://libresolutions.network//media/images/iot-banner.webp" />
		<description>A fantastic real-world example of how simple, inexpensive devices can be used for evil.</description>
		<content:encoded>&lt;p&gt;The &lt;em&gt;Internet of things&lt;/em&gt; (IoT) is not so much an agenda, but a consequence of cheap, ubiquitous technology. Much of the engineering, investment, and application has gone directly into making devices better at gathering information. This information is then fed to &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-2/&#34;&gt;machine learning algorithms&lt;/a&gt; to further &amp;ldquo;optimize&amp;rdquo; society.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/iot.webp&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;This constant data-collection is not benign. There &lt;em&gt;is&lt;/em&gt; an agenda to constantly push the boundaries of centralization and control. Most of the opportunities provided by the &lt;em&gt;internet of things&lt;/em&gt; are asymmetrically advantageous to the &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy&#34;&gt;&lt;em&gt;technocracy&lt;/em&gt;&lt;/a&gt;. All the systems of surveillance and control will be deployed foremost against the public. This doesn&amp;rsquo;t mean however, that other people won&amp;rsquo;t be able to leverage those systems to cause people harm. While the technocracy has a minor incentive to reduce the power other gains from these tools, it is essentially a &lt;a href=&#34;https://www.economicshelp.org/micro-economic-essays/marketfailure/negative-externality&#34;&gt;negative externality&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;example-airtags&#34;&gt;Example: AirTags&lt;/h2&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/airtag.webp&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;Airtags, are simple wireless devices made by apple to help people find their lost things. What makes airtags miraculous is that they don&amp;rsquo;t require complicated GPS technology, but instead rely on nearby devices and networks to report it&amp;rsquo;s location. Simplifying in this way allows the devices to stay in operation for a very long time.&lt;/p&gt;
&lt;h3 id=&#34;the-process-is-simple&#34;&gt;The process is simple:&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Add the tag to your account&lt;/li&gt;
&lt;li&gt;Give it a useful label&lt;/li&gt;
&lt;li&gt;Leave it on or with what (or who) you want to track.&lt;/li&gt;
&lt;li&gt;Watch it go on your &amp;ldquo;find my device&amp;rdquo; app.&lt;/li&gt;
&lt;/ol&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/google-location-history.webp&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;It is worth noting, that this is not the first way to get a hold of someone&amp;rsquo;s daily routine. Android devices maintain a location history that keeps tabs on you in real time. In the past one would only need to have access to your google account to watch your every move. I highly recommend turning off location history, I can&amp;rsquo;t think of a single benefit of keeping it on. Unfortunately it is important to keep in mind that turning these features off does not prevent them from being used by the corporations that run them.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://www.rebelnews.com/airtag_tracking_people_at_disney&#34;&gt;They just found out that they were being tracked by AirTags, and didn’t know how it got planted on them.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Apple has introduced features to make it harder for stalkers to track people without their consent with these devices. Notably the device will transparently inform nearby apple devices that it is in range of them. This is a step in the right direction, however it is almost impossible to completely eliminate the privacy risks of such a device. Understand that devices such as this can become a whole lot smaller in the future, and much easier to conceal.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://youtu.be/watch?v=dNZDBGeBj6s&#34;&gt;AirTag Anti-Stalking Features Revealed!&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This creates a great deal of problems for all kinds of people. Counteracting these measures requires proactive vigilance, despite requiring very little effort on the person using the tracker. As these devices improve so will this asymmetric advantage. Not only that, but the technocracy will then be able to leverage this enormous power in even more egregious ways. The line gets blurry when &lt;a href=&#34;https://www.knzr.com/cop-jailed-for-on-exs&#34;&gt;agents of the technocracy&lt;/a&gt; use that power against people in their personal lives.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/TweeetLorraine/status/1537405658919800835&#34;&gt;Woman Allegedly Used Apple AirTag to Track and Kill Her Boyfriend&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;It is important not to understate the dangers. All surveillance, be it targeted or blanket is a serious risk to individuals of all walks of life. The more information collected on people, and the more sophisticated the tools to use that information, the more danger people are in. This should be a rallying cry to all to force large institutions to have proper accountability and leadership. The rising corruption and totalitarianism is a force that will ensure all these tools are used to the detriment of humanity.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Tools of the Technocracy: #6 Virtual Reality</title>
		<link>https://libresolutions.network/articles/tools-of-the-technocracy-6/</link>
		<pubDate>Sat, 30 Apr 2022 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/tools-of-the-technocracy-6/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/tools-of-the-technocracy6.mp3" />
			
		
		<image>https://libresolutions.network//media/tott-6.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/tott-6.webp" />
		<itunes:image href="https://libresolutions.network//media/tott-6.webp" />
		<description>Seeing is believing, and the capability to leverage your own senses against you only gets more extreme over time.</description>
		<content:encoded>&lt;h1 id=&#34;tools-of-the-technocracy-6-virtual-reality&#34;&gt;&lt;a href=&#34;https://libresolutions.network/tags/tools-of-the-technocracy-series&#34;&gt;Tools of the Technocracy&lt;/a&gt;: #6 Virtual Reality&lt;/h1&gt;
&lt;blockquote&gt;
&lt;p&gt;What is reality?&lt;/p&gt;
&lt;p&gt;Is it what you can touch?&lt;/p&gt;
&lt;p&gt;What you can feel?&lt;/p&gt;
&lt;p&gt;What you see?&lt;/p&gt;
&lt;/blockquote&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/lying-eyes.webp&#39; 
&gt;



&lt;/div&gt;
&lt;h2 id=&#34;how-much-do-your-thoughts-and-past-experiences-shape-those-things&#34;&gt;How much do your thoughts and past experiences shape those things?&lt;/h2&gt;
&lt;h2 id=&#34;psyops&#34;&gt;Psyops&lt;/h2&gt;
&lt;p&gt;As of 2020, Most forms of mind control were constructed through incentive structures:&lt;/p&gt;
&lt;p&gt;Social media algorithms incentivize specific kinds of engagement to maximize people’s reprogramming of each other. Strong financial incentives are used to shape interactions and transform entire sectors of society in various ways. Mainstream media still shapes a powerful impression of the state of reality for a significant amount of people, creating top-down cultural incentives. Academia isn’t safe either, despite all the criticism placed on the public over trading autonomy, independence &amp;amp; integrity for convenience&amp;hellip;all kinds of institutions are far more egregiously guilty of the same offense. Ironically, due to the slow rate of change in organizations; they are often trapped into choosing the simplest changes, rather than the more important ones. Over time this creates a tidal-wave of institutional change that costs significantly more energy, resources, and career credit to oppose than to ride. This often pushes institutions to adopt technology and solutions that work against people, rather than for them.&lt;/p&gt;

&lt;p&gt;A massive game-changer for the technocracy will be the ability to build powerful behavior modification systems (mind control) that take advantage of your own senses. Cognitive warfare is waged by &lt;a href=&#34;https://twitter.com/SaranghaeyOppaa/status/1226035679945097216&#34;&gt;exploiting vulnerabilities in our minds&lt;/a&gt;. Overcoming these effects is much more challenging than simply recognizing incentives and working around them when possible. When it comes to perception control, every drop of prevention is worth an ocean of cure. Because we’re only at the beginning of witnessing these techniques, we can only speculate on the extent of the dangers. As always, it will be of utmost importance to guard your mental, emotional, and even spiritual state in the face of these challenges.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/construction-banner.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-3/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #3 Robots, IoT, Automation, Oh my!&lt;/h2&gt;&lt;i&gt;Transforming the world in ways seen and unseen&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h2 id=&#34;technological-terror&#34;&gt;Technological terror&lt;/h2&gt;
&lt;p&gt;When most people think of virtual reality they think of high-resolution displays presenting a 3D environment for people to explore and interact with &lt;a href=&#34;https://twitter.com/Alientrap/status/1157399869717471232&#34;&gt;complex controllers&lt;/a&gt;. Tactile improvements to people’s ability to really feel what’s in these environments are only getting better and better. The only thing slowing this down seems to be people getting motion sick from playing for more than short periods of time. As more improvements are made and more problems get addressed this will become the frontier of multi-media content. Suddenly, instead of learning things in purely abstract ways, people will be able to learn all kinds of things by doing it. With truly endless possibilities this means that VR will also be the state-of-the-art delivery mechanism for propaganda.&lt;/p&gt;
&lt;p&gt;For now, when a tragedy or circumstance is exploited to drive people’s emotions; the technocracy has a couple of ways to convey the situation. As this technology develops and becomes more ubiquitous, the technocracy will be able to have people experience these events directly, in a completely crafted scenario. The lines between propaganda, entertainment, learning, and all kinds of things will be blurred even more than they are already. Virtual reality will be the information war battleground of the future, but as it stands it won’t be a battle but outright mind-slaughter. Unless people’s ability to create and distribute these experiences is democratized, large institutions will enjoy a massive advantage in controlling content. This is a significant challenge because of the significant start-up costs.&lt;/p&gt;
&lt;h2 id=&#34;body-snatchers&#34;&gt;Body snatchers&lt;/h2&gt;
&lt;p&gt;The campaign doesn’t end there however; virtual reality technology won’t end with nicer displays, controls, and tactile feedback. As cybernetics improve, there will be powerful incentives to have these systems send and &lt;a href=&#34;https://twitter.com/BlackrockNeuro_/status/1492900664527273992&#34;&gt;receive direct signals&lt;/a&gt; to your body. This would allow these devices to save incredible amounts of energy and provide a level of immersion that is currently impossible. This shift from presenting stimuli to create signals in your brain, to sending those signals directly to your brain will exponentially increase the power and influence of those &lt;a href=&#34;https://twitter.com/Resist_05/status/1534440661419986946&#34;&gt;who have control&lt;/a&gt; of these systems.&lt;/p&gt;
&lt;p&gt;Surely this technology wouldn’t be forced on people right? It will stay purely in the realm of entertainment and all you’ll have to do is turn off the VR TV right? This is sadly not the case. As long as our society still yields to top-down control, almost every institution will have powerful incentives to adopt these tools. &lt;a href=&#34;https://twitter.com/Soitwouldbe/status/1530929365382483972&#34;&gt;Training and education&lt;/a&gt; will likely be the first place to majorly adopt these systems because of how powerful an information transfer tool they are. It will also enhance automation efforts. In a society driven by these technologies, your rights to bodily autonomy will be seen as an outdated inefficiency that gets in the way of powerful societal “innovation”. Big data and machine learning has a massive role to play in this space. Many of these devices will be used to get more data from people to learn how to further manipulate them.&lt;/p&gt;
&lt;p&gt;The competitive advantages and economies of scale could make these problems nearly impossible to uproot. It is absolutely critical to do all we can to prevent these systems from driving all our lives in the way that the Internet does already. Digital currencies are a very powerful system for bootstrapping new technologies, and it is no longer inconceivable that people will be bribed into transforming their body into a test-bed for novel technology. It is of utmost importance that we work to protect bodily autonomy in an environment where people will be even more motivated to set it all aside. We as a society have already gravely crossed red lines that never should have been crossed.&lt;/p&gt;
&lt;h2 id=&#34;solutions&#34;&gt;Solutions&lt;/h2&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/ephesians6.webp&#39; 

 alt=&#39;Ephesians 6:12&#39;
&gt;



&lt;/div&gt;
&lt;h3 id=&#34;take-action&#34;&gt;Take action&lt;/h3&gt;
&lt;p&gt;Pushing back against centralization and control takes a great deal of active focus to start. Once you’ve regained some of your own independence and liberty you can then help bring it to others. The crux of these issues is not necessarily the technologies themselves. Instead, it’s our cultural acceptance for top-down control of so many aspects of our lives. Bringing awareness of these issues, and what we should prioritize to safeguard ourselves can go a long way.&lt;/p&gt;
&lt;h3 id=&#34;learn-create--share&#34;&gt;Learn, Create &amp;amp; Share&lt;/h3&gt;
&lt;p&gt;The primary advantage the technocracy has is a monopoly on people’s perception of reality. A very effective way to turn the tide in the information war is to share art, beauty, and stories that bring people hope, and a desire for change. Anything you can create to bring more independence and freedom into their lives is worth making. Try to have appreciation for the great works people have created. Try to appeal to people’s better selves, instead of cynically just trying to win with snark.&lt;/p&gt;
&lt;h3 id=&#34;support-open-software-and-hardware&#34;&gt;Support open software and hardware&lt;/h3&gt;
&lt;p&gt;Many of these systems aren’t going away. Being able to liberate people from these systems may require a significant amount of technical skill and tooling. There is a great deal of potential in prosthetics and assistive technology. We can avert many of dangers by promoting software and hardware freedom. There is a treasure-trove of opportunity when we realign our focus to support and prioritize ways to enhance each other’s lives.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Tools of the Technocracy: #5 Networks</title>
		<link>https://libresolutions.network/articles/tools-of-the-technocracy-5/</link>
		<pubDate>Wed, 27 Apr 2022 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/tools-of-the-technocracy-5/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/tools-of-the-technocracy5.mp3" />
			
		
		<image>https://libresolutions.network//media/tott-5.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/tott-5.webp" />
		<itunes:image href="https://libresolutions.network//media/tott-5.webp" />
		<description>Much of the digital infrastructure in place today is built to structurally enable tyranny.</description>
		<content:encoded>&lt;h1 id=&#34;tools-of-the-technocracy-5-networks&#34;&gt;&lt;a href=&#34;https://libresolutions.network/tags/tools-of-the-technocracy-series&#34;&gt;Tools of the Technocracy&lt;/a&gt;: #5 Networks&lt;/h1&gt;
&lt;p&gt;Networks are the infrastructure used to bridge the physical world and online systems. They can enable people from all over the world to communicate with each other, which sadly has the downside of technocrats having the capability of monitoring and controlling people’s communications.&lt;/p&gt;
&lt;h3 id=&#34;networks-have-precious-resources-that-enable-their-utility&#34;&gt;Networks have precious resources that enable their utility:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Latency&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;How quickly can a signal reach it’s destination&lt;/em&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Range&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;How far can a signal go&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Bandwidth&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;How much information can a signal carry&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Encryption&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Prevents people from snooping on signals&lt;/p&gt;
&lt;p&gt;These resources are critical in delivering content. One of the largest challenges to decentralization is the economies of scale. This means that “the system” has advantages to completely eliminate any competition. Centralized and privacy invading options will always be more efficient and convenient than other options. It is important to manage your expectations accordingly.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id=&#34;cloudflare&#34;&gt;Cloudflare&lt;/h2&gt;
&lt;blockquote&gt;
&lt;p&gt;Cloudflare is the world&amp;rsquo;s largest MITM [Man in the middle] proxy(reverse proxy).
Cloudflare owns more than 80% of CDN market share and the number of cloudflare users are growing each day. They have expanded their network to more than 100 countries. Cloudflare serves more web traffic than Twitter, Amazon, Apple, Instagram, Bing &amp;amp; Wikipedia combined. &amp;gt; Cloudflare is offering free plan and many people are using it instead of configuring their servers properly. They traded privacy over convenience.
Source: &lt;a href=&#34;http://crimeflare.eu.org&#34;&gt;http://crimeflare.eu.org&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Almost every large website and service is using Cloudflare, this means that any encryption between you and the website and service is effectively broken at that point. While your connections will be protected until they reach Cloudflare’s servers, after that point it is entirely down to trust. It is naive to think that Cloudflare isn’t forced to &lt;a href=&#34;https://archive.ph/Wgxnq&#34;&gt;monitor the massive trove of data&lt;/a&gt; it can collect on people’s online activity. A VPN may protect your IP but it won’t be able to secure the data sent to these services.&lt;/p&gt;
&lt;p&gt;What services get out of using Cloudflare is DDOS protection. Distributed Denial of Service attacks are when a massive amount of bandwidth is used to take down your service. This is essentially a protection racket where any site worth targeting has to spend resources to protect against these kind of attacks. It is possible that many of these attacks are being initiated by actors who would rather sites stay behind Cloudflare or similar services.&lt;/p&gt;
&lt;h2 id=&#34;vpns&#34;&gt;VPNs&lt;/h2&gt;
&lt;p&gt;Virtual Private Networks are often seen as the solution to all online privacy issues. This is people being mislead by slick advertising. VPNs are very useful for accessing content that is blocked in specific regions or protecting your IP from being known by online services. There are many ways users using a VPN can have their IP leaked so it is essential to make sure you are using your VPN properly.&lt;/p&gt;
&lt;p&gt;Your internet service provider (ISP) may not be trustworthy so you may want to use a VPN, it is important to realize that by using a VPN you are effectively transferring the risk of your ISP logging, tracking, censoring your information to that VPN provider. Like ISPs VPNs are businesses and it is foolish to assume they will put your needs as an individual or customer before the interests of their business.&lt;/p&gt;
&lt;h2 id=&#34;wireless-networks&#34;&gt;Wireless Networks&lt;/h2&gt;
&lt;p&gt;The largest challenge of wireless networks is that there will be many of them outside your control.
Ubiquitous surveillance provided by devices all around you isn’t something you can easily mitigate. Ignorance isn’t bliss however, you are still vulnerable to these systems.&lt;/p&gt;
&lt;h2 id=&#34;wi-fi&#34;&gt;Wi-Fi&lt;/h2&gt;

&lt;video muted autoplay preload=&#34;none&#34;&gt;
    &lt;source src=&#39;media/wifi-sonar.webm&#39;&gt;
&lt;/video&gt;

&lt;p&gt;Wireless networks are difficult to secure, especially from a motivated adversary. Even your own wireless router is likely &lt;a href=&#34;https://youtu.be/watch?v=URkD_TbiE8I&#34;&gt;outright selling your data&lt;/a&gt;. Activities done over wireless networks are much easier to intercept than ones over wired connections.&lt;/p&gt;
&lt;p&gt;If this wasn’t bad enough, wireless devices can be used as sonar to track everyone in a given space. Given that these devices are continuously listening this can provide a &lt;a href=&#34;https://youtube.com/watch?v=IRELLH86Edo&#34;&gt;very complete picture&lt;/a&gt; of people’s day-to-day lives.&lt;/p&gt;
&lt;h2 id=&#34;mobile-data-lte--5g&#34;&gt;Mobile data (LTE / 5G)&lt;/h2&gt;
&lt;p&gt;Much has been speculated about the health risks due 5G / Wi-Fi, while harms from EMF may be worth investigating in specific circumstances they are outside the scope of this article. Even in instances where the technology itself is harmless it can often coincide with other weaponized technology.&lt;/p&gt;
&lt;p&gt;What is clear is that introducing more and more cheap, accessible bandwidth to more devices exponentially increases the capabilities of those who want to track and control.
5G will be very useful for relaying huge amounts of data including ultra-high resolution video from all kinds of angles.&lt;/p&gt;
&lt;h2 id=&#34;lorawan&#34;&gt;LoRaWAN&lt;/h2&gt;
&lt;p&gt;For some applications, a full internet connection is overkill. LoRa devices can send small signals over a very long range. This can be a very efficient way of relaying data from sensors. There is already a cryptocurrency launched to bootstrap a &lt;a href=&#34;https://www.helium.com/solutions&#34;&gt;worldwide surveillance grid&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;iot--automation&#34;&gt;IoT &amp;amp; Automation&lt;/h2&gt;
&lt;p&gt;The more accessible connectivity is for devices the more these devices can encroach on the physical world. These applications can become cheaper and more common, discreet, and invasive. As networks expand, techniques that were impossible before become viable opportunities.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/construction-banner.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-3/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #3 Robots, IoT, Automation, Oh my!&lt;/h2&gt;&lt;i&gt;Transforming the world in ways seen and unseen&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h2 id=&#34;big-data&#34;&gt;Big Data&lt;/h2&gt;
&lt;p&gt;Any information, no matter how trivial can be collected and analyzed to gain power over others. Those in control of the data collection systems will have massive advantages over those who don’t. Machine learning can be used to make these systems much more efficient at collecting specific kinds of data based on raw details.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/big-data.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-2/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #2 Big Data &amp;amp; Artificial Intelligence&lt;/h2&gt;&lt;i&gt;What is all this data for anyways?&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;hr&gt;
&lt;h2 id=&#34;solutions&#34;&gt;Solutions&lt;/h2&gt;
&lt;h3 id=&#34;tor&#34;&gt;Tor&lt;/h3&gt;
&lt;p&gt;Like the Internet, The &lt;a href=&#34;https://www.torproject.org/&#34;&gt;Onion Router&lt;/a&gt; (Tor) has origins as a military project.
It has two very useful features for reclaiming your digital freedom:&lt;/p&gt;
&lt;h3 id=&#34;anonymity&#34;&gt;Anonymity&lt;/h3&gt;
&lt;p&gt;As far as online services are concerned, Tor users generally appear the same. When one uses the Tor browser they have the same fingerprint as all other users to make them harder to individually identify. As well your connection is then routed to the Internet through “exit relays” such as the &lt;a href=&#34;https://snowflake.torproject.org/&#34;&gt;Snowflake extension&lt;/a&gt;.&lt;/p&gt;
&lt;h3 id=&#34;hidden-services&#34;&gt;Hidden services&lt;/h3&gt;
&lt;p&gt;Hidden services are services that are accessible entirely within the Tor network. This means that they do not use “exit relays” and instead are only routed within Tor. The advantage of this is that you can be very sure that you are having a secure connection directly to the intended recipient, with all of the security guarantees of the Tor network.&lt;/p&gt;
&lt;p&gt;Having your website or service available as a hidden service has some significant advantages:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Protection from Man-in-the-middle attacks&lt;/li&gt;
&lt;li&gt;Your service can still be accessible if your domain is taken from you&lt;/li&gt;
&lt;li&gt;Hidden services can be served from mobile connections&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;There are other “darkweb” protocols such as I2P.&lt;/p&gt;
&lt;h3 id=&#34;community-networks&#34;&gt;Community networks&lt;/h3&gt;
&lt;p&gt;Meshnets are a useful way to democratize connectivity. There doesn’t need to be a one-size-fits-all approach some options will work better in different places. You could also run your own services behind VPNs run by your community instead of commercial enterprises. Investing in a truly independent community network is a significant challenge but can yield incredible rewards.&lt;/p&gt;
&lt;h3 id=&#34;faraday-is-your-friend&#34;&gt;Faraday is your Friend&lt;/h3&gt;
&lt;p&gt;Having a &lt;a href=&#34;https://youtu.be/watch?v=EozJr-vdHm8&#34;&gt;faraday bag&lt;/a&gt; can help keep your phone from reporting your location while you travel with it. Given the potential these devices have against you, it can be wise to create secure locations in your home or business that don’t allow signals in or out. This won’t prevent devices from listening and recording, but if you place them in a soundproof location that can help.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Beware the false saviors </title>
		<link>https://libresolutions.network/articles/beware-false-saviors/</link>
		<pubDate>Sat, 16 Apr 2022 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/beware-false-saviors/</guid>
		
		<image>https://libresolutions.network//media/false-saviors.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/false-saviors.webp" />
		<itunes:image href="https://libresolutions.network//media/false-saviors.webp" />
		<description>Putting faith into leaders is a road to disappointment. We all have to work together as individuals to make lasting change.</description>
		<content:encoded>&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/false-saviors.webp&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;There is a great deal of buzz about &lt;a href=&#34;https://reclaimthenet.org/twitter-poison-pill-elon-musk/&#34;&gt;Elon Musk’s face-off against twitter&lt;/a&gt;.
While it is impressive to see Elon specifically raise free speech issues against Big Tech, it is unlikely that even radical changes to twitter would actually create meaningful change. Sadly many people allow figureheads to lure themselves into a state of complacency. By buying into the idea of a fantastical leader to rally behind people can fall into the trap of thinking that change is sudden, and requires no work on their part.&lt;/p&gt;
&lt;p&gt;Many of the problems we face didn’t start with Twitter and won’t end with Twitter either.&lt;/p&gt;
&lt;p&gt;Twitter is a big system, big systems have a great deal of momentum. This momentum grows or shrinks in response to incentives. As anyone can see, Twitter has been run as a loss leader to sell centralized information control. Any system that has a monopoly on people’s access to information will inevitably become a valuable target for malevolent entities to corrupt and control.&lt;/p&gt;
&lt;p&gt;Getting excited and distracted by large figureheads (politicians, celebrities, ect) inevitably leads to disappointment when a single person is unable to make massive changes that are out-of-step with the way people are acting in their daily lives. By investing in promoting and cheering for these leaders we can lose sight of the simple changes we need to make. Every individual has a vital role in changing the culture and incentive structure. Don’t think about needing the perfect leader, think about how their job can be made easier by encouraging those around you to make changes themselves.
Big Tech didn’t simply gain control over everyone’s lives overnight, it happened gradually, bit-by-bit over time with each concession by each person. Everyone is responsible for reversing the power that the Tools of the Technocracy have taken over the people. These are systems that collectively we have financed, built, and maintained&amp;hellip;thankfully they can be dismantled together.&lt;/p&gt;
&lt;h2 id=&#34;what-can-we-do&#34;&gt;What can we do?&lt;/h2&gt;
&lt;p&gt;What can we do?&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;GET MOTIVATED!&lt;/p&gt;
&lt;p&gt;There is so much we can accomplish by working together, so many new things can be created if we have a will to break free from centralized control.
Being willing to invest time, energy, and resources into building things is a vital aspect of changing anything.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Diversify your information sources&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Don’t depend on any specific site/app for all your news or information&lt;/li&gt;
&lt;li&gt;Bookmark (CTRL-D) useful or informative sites so you can visit them again without being tracked by search engines&lt;/li&gt;
&lt;li&gt;Not every issue or topic is new, you can often find very valuable information published in books, there is a treasure trove of useful information in the past. Don’t limit your knowledge to what is relevant in your feeds.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Fight back against the centralized control system.&lt;/p&gt;
&lt;p&gt;There is a fantastic series on Financial Rebellion hosted by Children’s Health Defense.
It is a great starting point on how to create friction against centralized control systems.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Read the Tools of the Technocracy Series if you haven’t already. In each article I include solutions to undermining top-down information control.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;a href=&#34;https://libresolutions.network/tags/tools-of-the-technocracy-series&#34;&gt;Tools of The Technocracy&lt;/a&gt;&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Tools of the Technocracy: #4 Online Identity</title>
		<link>https://libresolutions.network/articles/tools-of-the-technocracy-4/</link>
		<pubDate>Tue, 22 Mar 2022 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/tools-of-the-technocracy-4/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/tools-of-the-technocracy4.mp3" />
			
		
		<image>https://libresolutions.network//media/tott-4.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/tott-4.webp" />
		<itunes:image href="https://libresolutions.network//media/tott-4.webp" />
		<description>What is following you in your digital tracks?</description>
		<content:encoded>&lt;h1 id=&#34;tools-of-the-technocracy-4-online-identity&#34;&gt;&lt;a href=&#34;https://libresolutions.network/tags/tools-of-the-technocracy-series&#34;&gt;Tools of the Technocracy&lt;/a&gt;: #4 Online Identity&lt;/h1&gt;
&lt;p&gt;There are some good reasons to attach your identity to online interactions, there are just as many (if not more) good reasons not to. It is important to understand how your actions ripple across the Internet and wider data-landscape. One of the greatest challenges in keeping your data secure is the fact that the Internet almost never forgets. It’s so difficult to be aware of all the data-points that have built over time.&lt;/p&gt;

&lt;p&gt;Even if you are a very open and public person, it is vital that you are in control of what data about you is collected, stored, and analyzed. Instead of having systems actively probing you for any and all data they can seize, it is better to understand and use systems that give you the control to only disclose what you want to share.&lt;/p&gt;
&lt;h2 id=&#34;concerns&#34;&gt;Concerns&lt;/h2&gt;
&lt;h3 id=&#34;conformity&#34;&gt;Conformity&lt;/h3&gt;
&lt;p&gt;Social media has been largely what closes the loop between you staring into the data abyss, and the data staring back at you. By learning peoples’ interests, likes and dislikes the algorithms are able to put that information to use to manipulate them. The most dangerous part about social media is the capability to leverage your self-image against you. With even relatively simple techniques (such as suppressing the visibility of a particular post) these systems can manipulate how your social circle reacts to specific information.&lt;/p&gt;
&lt;p&gt;Facebook is really old news when it comes to data-mining people. Tiktok is the state-of-the art, in &lt;a href=&#34;https://youtube.com/watch?v=nfczi2cI6Cs&#34;&gt;learning from people&lt;/a&gt;. Tiktok has advantages that older social media platforms don’t. It’s purely mobile focused, which means the app has access to all kinds of data from your mobile phone. This includes cameras, microphones, location data, and even how you’re holding the device while scrolling. It would be foolish to assume we can imagine all the ways advanced algorithms can be used to study and manipulate people. How many people would even consider &lt;a href=&#34;https://www.forbes.com/sites/kashmirhill/2014/07/10/facebook-experiments-on-users/&#34;&gt;facebook was up to this in 2011-2013?&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;echo-chambers&#34;&gt;Echo chambers&lt;/h3&gt;
&lt;p&gt;This conformity, is the foundation for a fractal of echo-chambers, all becoming isolated from the larger whole. Echo-chambers create divisions within society that eventually make cross-communication almost impossible. By &lt;a href=&#34;https://youtu.be/watch?v=DwCEAdeFXEM&#34;&gt;entrenching people into their sub-groups&lt;/a&gt; and turning them against each other, everyone is effectively silenced. This is an under-estimated effect of chilling effects.&lt;/p&gt;
&lt;p&gt;I believe it is naive to operate under the assumption that these echo-chambers are a purely organic phenomenon. Manipulating the human mind is a massive, and well funded academic venture. The power gained from destroying people’s ability to collectively search for the truth is immense.&lt;/p&gt;
&lt;p&gt;If covert censorship wasn’t bad enough, there is a vast array of censorship and suppression tools available. The more information the system has about you the more it has at it’s disposal to use against you and ideals you may support. The ever-increasing cries of “fighting misinformation” and “combating hate” are used as a pretext to justify further centralized information control.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://torproject.org&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/tott-4-tor.webp&#39; 
&gt;

&lt;/a&gt;



&lt;/div&gt;
&lt;h3 id=&#34;personification&#34;&gt;Personification&lt;/h3&gt;
&lt;p&gt;Now back at you, all these tools are specifically aimed at identifying, storing, and analyzing your every action in the hopes to get leverage over you and others. Very subtle and innocuous information can be correlated with other data to make unthinkable associations.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;They will shut it &lt;a href=&#34;https://www.coreysdigs.com/technology/can-bitcoin-circumvent-economic-tyranny/&#34;&gt;(Bitcoin)&lt;/a&gt; down not by controlling the technology, but by controlling the people.&lt;/p&gt;
&lt;p&gt;Catherine Austin Fitts&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;You can leave behind a banned account, even evade region locks with a VPN, but it’s not easy to get a new identity and almost impossible to erase your online footprint. The more online systems demand people turn over their identities online, the more people are vulnerable to all kinds of threats. Dissidents can be marked for life with no recourse. Naturally these people will be restricted from the digital financial complex.&lt;/p&gt;
&lt;h3 id=&#34;stalking&#34;&gt;Stalking&lt;/h3&gt;
&lt;p&gt;Not only are exposed people vulnerable to retaliation from the state, but in an increasingly polarized environment people will be vulnerable to retaliation from anyone who has access to their information. As the dehumanization of the opposition continues, people won’t draw the line at harming innocents if they are led to believe the situation is dire enough. No transgression will be too small to justify retaliation. How many times have we seen people respond to someone losing their job over past comments with “Freedom of speech isn’t freedom from consequences”?&lt;/p&gt;
&lt;p&gt;This is a clarion call for abusers and petty tyrants. The very reason the rule of law and the presumption of innocence are important is because the spillover damage from vigilante justice is unending. In our modern enlightened age we certainly have managed to forget basic problems that have been with us since the dawn of civilization.&lt;/p&gt;
&lt;h3 id=&#34;children&#34;&gt;Children&lt;/h3&gt;
&lt;p&gt;As someone who spent time exploring the Internet from a young age, I can certainly admit to being unable to comprehend the dangers at the time. As grown-ups today believe that their parents were clueless about technology, the exponential growth, escalation, and evolution of online threats have left current and future parents woefully outmatched. Children won’t simply be at the mercy of their own potential actions, but the actions of relatives and even friends.&lt;/p&gt;
&lt;p&gt;As a parent it is your responsibility to make sure that they are prepared to face these dangers, but also that your information is not making that more difficult. Safeguarding them from all the new and tantalizing services is going to be a very difficult challenge. This is an area that needs more research.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/think-of-the-children.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/think-of-the-children/&#34;  &gt;&lt;h2&gt;Is the Internet safe for children?&lt;/h2&gt;&lt;i&gt;Surveillance, manipulation and online predators are threats we all face. How can we keep children safe?&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h3 id=&#34;bots--manipulation&#34;&gt;Bots &amp;amp; manipulation&lt;/h3&gt;
&lt;p&gt;Humans are outnumbered! In many circumstances there is little reason to believe that the person you are talking to online is even human. This is an incredible problem when empathy is already severely lacking in online discourse. As bots get better and better at convincingly imitating people, people will feel more and more overwhelmed which will contribute to some simply choosing not to bother speaking at all.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://archive.today/SL7Mm&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/tott-4-bots.webp&#39; 

 alt=&#39;Humans are outnumbered!&#39;
&gt;

&lt;/a&gt;



&lt;/div&gt;
&lt;p&gt;Botting social networks isn’t necessarily a zero-sum game. Some platforms are easier for smaller actors to influence, it is a critical mistake to assume all bots are from a single interested party rather than a group of varying (sometimes overlapping or conflicting) agendas.&lt;/p&gt;
&lt;h3 id=&#34;anti-anonymitity&#34;&gt;Anti-anonymitity&lt;/h3&gt;
&lt;p&gt;Anonymity gets a bad wrap in online discussions. Far too many people consider it “cowardice” to speak out without having your name, reputation, and future at stake. This is not a compassionate or reasonable stance to have in an age with so many asymmetric power imbalances. It is a very convenient way for those perfectly within established orthodoxy to throw stones from their glass towers. The most vital way to undermine centralized information control is to prevent knowledge from being &lt;a href=&#34;https://twitter.com/torproject/status/1469358942211829761&#34;&gt;judged by it’s origin&lt;/a&gt;. A fantastic way to achieve this is publishing information, data or communications anonymously.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/anonymous-crowd.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/anonymity&#34;  &gt;&lt;h2&gt;In defense of anonymity&lt;/h2&gt;&lt;i&gt;Don&amp;#39;t let the trolls bait you into turning on privacy&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h2 id=&#34;your-online-tracks&#34;&gt;Your online tracks&lt;/h2&gt;
&lt;h3 id=&#34;personal-devices&#34;&gt;Personal devices&lt;/h3&gt;
&lt;p&gt;Every device you come into contact with has the capability to be turned against you. Smartphones are some of the worst. Devices with microphones can record your every word and expression. Cameras can track your expression. Worst of all is location data, which gets more and more precise as technology improves. All this is simply assuming the device is working as intended, phishing attacks can be used to gain even more intimate access to your information or otherwise do you harm.&lt;/p&gt;
&lt;h3 id=&#34;big-tech-social-media&#34;&gt;Big Tech Social Media&lt;/h3&gt;
&lt;p&gt;Many people complain of social media “holding their real-life contacts hostage”.
It is very important that you aren’t gating social interaction with you behind data-mining social services. This does require a fair bit of effort and a willingness to compromise.
Social media becoming the “town square” wasn’t an inevitable development, it was a necessary step in the encroachment of digital systems dominating our entire lives. You may have a right to remain silent under your laws, but unfortunately your data &lt;a href=&#34;https://web.archive.org/web/20220708061004/https://www.theguardian.com/world/2022/jul/07/canada-police-spyware-admission-surveillance-experts&#34;&gt;doesn&amp;rsquo;t make use of it&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The technocracy’s vision of what social media is and should be is evil. Until we can migrate people to services that put people in charge of their data, it is best to avoid putting any significant importance on social media under the control of corporations &amp;amp; government influence.&lt;/p&gt;
&lt;h3 id=&#34;online-services&#34;&gt;Online services&lt;/h3&gt;
&lt;p&gt;There is no way of knowing for sure an online service you use isn’t simply sharing data with big tech in the first place. Even if they adamantly refuse to share or sell data that all evaporates when the company is sold. Services can be hacked and the only way to protect sensitive data is to never record or share it. Understand that everything you share with any particular online service can eventually be used against you.&lt;/p&gt;
&lt;h3 id=&#34;digital-id&#34;&gt;Digital ID&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/greg_scott84/status/1505695001166041092&#34;&gt;Digital ID&lt;/a&gt; is the crown jewel of technocratic totalitarianism. Like any other deal-with-the-devil scenario it will be attached to many luxuries and conveniences… at least at the start. Take any of the problems in this article and make them 10x worse. There will never be any guarantee that digital ID systems will be any more secure than systems that came before it. The terms of the digital ID program may appear to be favorable at the beginning, but once locked in… the terms will be altered and your only recourse will be to pray the terms aren’t altered further.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/digital-id.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/digital-id/&#34;  &gt;&lt;h2&gt;Digital ID: The Basics&lt;/h2&gt;&lt;i&gt;What is it? What can you do about it?&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;It is impossible to overstate the importance of preventing, resisting, and outlawing the implementation of digital identification. Merely avoiding it yourself will be no protection, as those entrapped in the system will be weaponized against you. The weaponization of people who have fallen prey to centralized information control is a mere taste of what is to come when people are locked into a digital gulag.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;solutions&#34;&gt;Solutions&lt;/h2&gt;
&lt;h3 id=&#34;connect-with-people-in-real-life&#34;&gt;Connect with people in real life&lt;/h3&gt;
&lt;p&gt;Be the person to provide the authentic, uncensored human experience with those you care about. The fight to maintain human liberty is bigger than any one of us. Bring joy outside of online experiences and focus on the people around you.&lt;/p&gt;
&lt;h3 id=&#34;provide-people-with-a-more-secure-form-of-communication&#34;&gt;Provide people with a more secure form of communication&lt;/h3&gt;
&lt;p&gt;By having multiple good options for people to try you don’t have to try to force everyone onto a single app/system. Some great options are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Delta Chat&lt;/li&gt;
&lt;li&gt;Session&lt;/li&gt;
&lt;li&gt;Element&lt;/li&gt;
&lt;li&gt;Signal&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;improve-your-account-data-and-security&#34;&gt;Improve your account data and security.&lt;/h3&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/4-data-breach.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/4-account-security-best-practices/&#34;  &gt;&lt;h2&gt;Account security best practices&lt;/h2&gt;&lt;i&gt;How to make sure every service you use is as secure and as private as possible.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h3 id=&#34;federated-social-media&#34;&gt;Federated social media&lt;/h3&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/fediverse.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/call-to-action-join-the-fediverse/&#34;  &gt;&lt;h2&gt;Call to Action: Join the Fediverse now!&lt;/h2&gt;&lt;i&gt;A simple, but very effective way to tip the scales in favor of free speech.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h3 id=&#34;self-hosting&#34;&gt;Self-hosting&lt;/h3&gt;
&lt;p&gt;Want to be entirely on your own terms? Running your own website is a way to have complete control while still being able to maintain a presence. These two sites have great guides for getting started.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://landchad.net&#34;&gt;https://landchad.net&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://learn.sadgrl.online&#34;&gt;https://learn.sadgrl.online&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/tott-5.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-5/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #5 Networks&lt;/h2&gt;&lt;i&gt;Much of the digital infrastructure in place today is built to structurally enable tyranny.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Information Warfare Super-weapons</title>
		<link>https://libresolutions.network/articles/information-warfare-superweapons/</link>
		<pubDate>Sun, 13 Mar 2022 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/information-warfare-superweapons/</guid>
		
		<image>https://libresolutions.network//media/images/artistic-banner.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/artistic-banner.webp" />
		<itunes:image href="https://libresolutions.network//media/images/artistic-banner.webp" />
		<description>Change the culture with these super effective tricks. Social engineers HATE these!</description>
		<content:encoded>&lt;h2 id=&#34;memes&#34;&gt;Memes&lt;/h2&gt;
&lt;p&gt;Memes are very often under-appreciated due to being simple or not taking themselves seriously. They are powerful tools to bring new insights to discussion. Social engineers target memes due to their incredible impact in spreading ideas. Many of the threats to liberty aren’t always actions of tyrants but rather the apathy or ignorance of the public. If we are to preserve liberty we need to greatly magnify our efforts to promote liberty as a cultural value rather than simply a personal asset The effectiveness of memes comes from their simplicity and the potential to evoke strong emotions. The most valuable part of a good meme is the ability to “compress” lots of information into a consider sharable medium.&lt;/p&gt;
&lt;p&gt;The problem is that people are ensnared in a culture that doesn’t properly value liberty or their rights. Corporations and governments work hard to curate online spaces to shape culture in their favor. This has had disastrous social consequences and devastating effects on people’s mental health. We must not only focus on undoing this demoralization but also on preventing it from taking hold ever again. People must not only learn the tools to protect themselves, but they must also learn to value things that are good and beautiful. The most effective way to rebuild a freedom-loving culture is to properly invest in providing a strong foundation for that culture to flourish. How does one build this foundation?&lt;/p&gt;
&lt;h2 id=&#34;art&#34;&gt;Art&lt;/h2&gt;
&lt;p&gt;Art is the expression of the human soul, with it’s value being largely in the eye of the beholder. Corporations and governments can imitate art, or mass produce it with financial advantages, but they can’t compete with genuine creativity borne from real passion and real experiences. Tyranny isn’t beautiful, and slavery isn’t inspiring. When given a choice, people will naturally choose the free and beautiful over the rigid and stagnant. As freedom loving people it is absolutely vital for us to encourage, support and fund ventures to provide people the opportunity to enjoy pro-human media and creative works.&lt;/p&gt;
&lt;iframe src=&#39;https://youtube.com/embed/dNt4NIQ7FTA&#39; style=&#34;height:max-content;aspect-ratio: 16/9;min-height:460px;max-height:15rem;max-width:60rem;&#34; width=&#34;100%&#34; height=&#34;100%&#34;&gt;

&lt;/iframe&gt;
&lt;p&gt;Artists are craving for a way for their work to be properly supported. Many artists are disillusioned by not being able to make it in large corporate spaces. If we truly desire a culture that protects freedom we must work to provide the space for artists to promote this culture. Working together we can support artists who care deeply about building a better world. This will create real cultural capital that can upend the systems that undermine our liberty. With truth on our side, there can be no limit to the heights of our imagination.&lt;/p&gt;
&lt;p&gt;I am no artist, but this piece is a call to people who value freedom to commit to supporting independent artists and building a true appreciation for their works. It is impossible to overstate the potential to change the global conversation against those who hate humanity when we sustain methods of lasting cultural change. There are so many ways to express what has gone wrong in the last two years. There are stories that need to be told, tragedies that cry out to be mourned, and victories that must be shared.&lt;/p&gt;
&lt;p&gt;Starting small&lt;/p&gt;
&lt;p&gt;In the long term, it would be ideal to create formal spaces and institutions with these goals in mind, but as individuals there is still a great deal we can do:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;With an appreciation that you need beauty in your life, hire artists to paint, sculpt, or even draw pieces for decoration in your home or office. These can be fantastic conversation pieces.&lt;/li&gt;
&lt;li&gt;Connect with local musicians, get people together to enjoy their music.&lt;/li&gt;
&lt;li&gt;Host events to give them an opportunity to promote themselves.&lt;/li&gt;
&lt;li&gt;Hire artists to create content for your website or social media profiles. Very often they can create better memes than what many of us can do with simple skills.&lt;/li&gt;
&lt;li&gt;Prominently feature like-minded talent in projects you undertake.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;do-it-yourself&#34;&gt;Do it yourself!&lt;/h2&gt;
&lt;p&gt;Can you draw, sing, dance, sculpt, paint, draw, carve, or create in other ways?
Now is a great time to shine, you can stand out by promoting hope, freedom and compassion.
I would be more than happy to feature you on my website! Do you have your own website? You might find Interverse interesting!&lt;/p&gt;
&lt;p&gt;I also recommend joining the Fediverse:&lt;/p&gt;
&lt;h2 id=&#34;great-foss-tools&#34;&gt;Great FOSS Tools&lt;/h2&gt;
&lt;p&gt;There are a lot of fantastic Free &amp;amp; Open Source tools that are very useful for creating content.
My hope is that one of these tools will help spark inspiration in what you can achieve or support someone in achieving.
I would highly recommend donating to the development of these tools because they have made creating content much more accessible.&lt;/p&gt;
&lt;h2 id=&#34;inkscape&#34;&gt;Inkscape&lt;/h2&gt;
&lt;iframe src=&#39;https://peertube.linuxrocks.online/videos/embed/52813370-8f92-4fd3-9324-890fa6c4c7cc&#39; style=&#34;height:max-content;aspect-ratio: 16/9;min-height:460px;max-height:15rem;max-width:60rem;&#34; width=&#34;100%&#34; height=&#34;100%&#34;&gt;

&lt;/iframe&gt;
&lt;p&gt;&lt;a href=&#34;https://inkscape.org/&#34;&gt;https://inkscape.org/&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Whether you are an illustrator, designer, web designer or just someone who needs to create some vector imagery, Inkscape is for you!&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Inkscape is fantastic for vector graphics, which are awesome at all sizes!
It’s a fantastic tool for making posters, logos and even full-size banners!&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://inkscape.org/support-us/&#34;&gt;Support&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;krita&#34;&gt;Krita&lt;/h2&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/krita.gif&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;&lt;a href=&#34;https://krita.org/en/&#34;&gt;https://krita.org/en/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;A digital painting program.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Krita is a professional FREE and open source painting program. It is made by artists that want to see affordable art tools for everyone.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;concept art&lt;/li&gt;
&lt;li&gt;texture and matte painters&lt;/li&gt;
&lt;li&gt;illustrations and comic&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;p&gt;Demo Video: &lt;a href=&#34;https://youtu.be/fga5f3ixmVo&#34;&gt;Krita 5 is HERE! Go for it!&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://fund.krita.org/&#34;&gt;Support&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;darktable&#34;&gt;Darktable&lt;/h2&gt;
&lt;p&gt;&lt;a href=&#34;https://www.darktable.org/&#34;&gt;https://www.darktable.org/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Photography software&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Darktable is an open source photography workflow application and raw developer. A virtual lighttable and darkroom for photographers. It manages your digital negatives in a database, lets you view them through a zoomable lighttable and enables you to develop raw images and enhance them.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2 id=&#34;lmms&#34;&gt;LMMS&lt;/h2&gt;
&lt;p&gt;&lt;a href=&#34;https://lmms.io/&#34;&gt;https://lmms.io/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Music production&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Let&amp;rsquo;s make music with a free, cross-platform tool for your computer.
Produce music with your computer by creating melodies and beats, synthesizing and mixing sounds, arranging samples and much more.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a href=&#34;https://lmms.io/get-involved&#34;&gt;Support&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;synfig&#34;&gt;Synfig&lt;/h2&gt;
&lt;p&gt;&lt;a href=&#34;https://www.synfig.org/&#34;&gt;https://www.synfig.org/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2d animation&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Synfig Studio is a free and open-source 2D animation software, designed as powerful industrial-strength solution for creating film-quality animation using a vector and bitmap artwork. It eliminates the need to create animation frame-by frame, allowing you to produce 2D animation of a higher quality with fewer people and resources.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a href=&#34;https://www.synfig.org/donate/&#34;&gt;Support&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;blender&#34;&gt;Blender&lt;/h2&gt;
&lt;iframe src=&#39;https://video.blender.org/videos/embed/a69d68a5-a0e0-4a80-9d66-49f093c97aaf&#39; style=&#34;height:max-content;aspect-ratio: 16/9;min-height:460px;max-height:15rem;max-width:60rem;&#34; width=&#34;100%&#34; height=&#34;100%&#34;&gt;

&lt;/iframe&gt;
&lt;p&gt;&lt;a href=&#34;https://www.blender.org/&#34;&gt;https://www.blender.org/&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;blender-can-do-almost-anything&#34;&gt;Blender can do almost anything:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;3d modeling&lt;/li&gt;
&lt;li&gt;Digital sculpting&lt;/li&gt;
&lt;li&gt;Video editing&lt;/li&gt;
&lt;li&gt;Simulations&lt;/li&gt;
&lt;li&gt;Digital painting&lt;/li&gt;
&lt;li&gt;Animations&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.blender.org/support/&#34;&gt;Support&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;godot&#34;&gt;Godot&lt;/h2&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/godot.gif&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;&lt;a href=&#34;https://godotengine.org/&#34;&gt;https://godotengine.org/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Game engine&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;The game engine you waited for.
Godot provides a huge set of common tools, so you can just focus on making your game without reinventing the wheel.
Godot is completely free and open-source under the very permissive MIT license. No strings attached, no royalties, nothing. Your game is yours, down to the last line of engine code.&lt;/p&gt;
&lt;/blockquote&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Tools of the Technocracy: #3 Robots, IoT, Automation, Oh my!</title>
		<link>https://libresolutions.network/articles/tools-of-the-technocracy-3/</link>
		<pubDate>Mon, 07 Mar 2022 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/tools-of-the-technocracy-3/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/tools-of-the-technocracy3.mp3" />
			
		
		<image>https://libresolutions.network//media/images/construction-banner.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/construction-banner.webp" />
		<itunes:image href="https://libresolutions.network//media/images/construction-banner.webp" />
		<description>Transforming the world in ways seen and unseen</description>
		<content:encoded>&lt;h1 id=&#34;tools-of-the-technocracy-3-robots-iot-automation-oh-my&#34;&gt;&lt;a href=&#34;https://libresolutions.network/tags/tools-of-the-technocracy-series&#34;&gt;Tools of the Technocracy&lt;/a&gt;: #3 Robots, IoT, Automation, Oh my!&lt;/h1&gt;
&lt;p&gt;With big data as the brains, robots act as the eyes, ears, and fists of the technocracy. Ubiquitous 5G (and above) connectivity gives autonomous systems a massive advantage over human beings. Understand that there is more to these systems than meets the eye. There is an entire orchestra of coordinated systems and services that harmonize into incredibly powerful tools. These tools are only beginning to be weaponized against the public.&lt;/p&gt;

&lt;h2 id=&#34;robots&#34;&gt;Robots&lt;/h2&gt;
&lt;p&gt;Eventually the digital world needs to make an impact on the physical. Robots are the ideal tool for the technocracy to enforce it’s will on the material world. In many situations it is becoming much more inexpensive to accomplish tasks with robots than to equip humans for the same task. Robots won’t question their orders, they won’t (likely) turn against the system, and most importantly they don’t have legal rights. The technocracy has an urgent need to replace thinking, responsible people with autonomous drones with pre-programmed commands.&lt;/p&gt;
&lt;p&gt;The most obvious example would be police robots. When equipped with advanced riot suppression technology, these robots will by able to quell any and all public uprisings with little resistance. Far from science fiction, the capability exists to terminate people with &lt;a href=&#34;https://www.newscientist.com/article/2278852-drones-may-have-attacked-humans-fully-autonomously-for-the-first-time/&#34;&gt;almost fully automated systems&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;drones&#34;&gt;Drones&lt;/h2&gt;
&lt;p&gt;While scouting for information, highly mobile drones can be equipped with a large variety of surveillance equipment, sensors, and weapons. Having an aerial view can provide incredible context to large scale situations. While soaring up above, acting as the “eye in the sky” drones can be used to transmit information to a variety of systems. Small disposable drones have advantages that other “heavy duty” robots may not, they can operate in swarms and each independent unit may be entirely expendable.&lt;/p&gt;
&lt;h2 id=&#34;transport-and-access&#34;&gt;Transport and Access&lt;/h2&gt;
&lt;p&gt;The convenience of autonomous delivery will be what ushers in the invasion of more autonomous drones, cars, and trucks. Autonomous vehicles are an invaluable tool for the technocracy. By removing humans from the driving-seat of the economy the system can effectively seize control of nearly all trade. Eventually, access to goods and services can be entirely restricted by simply not allowing vehicles to travel to certain places. If proximity isn&amp;rsquo;t something that can be controlled, locks can be used to prevent access to specific places. Beyond merely imposing fines for arbitrary infractions, a person&amp;rsquo;s entire life can be restricted by the manufactured world around them.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/tott-7.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-7/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #7 Smart Cities&lt;/h2&gt;&lt;i&gt;Smart cities are marketed as if they are for the convenience of its residents, but this couldn’t be further from the truth.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h2 id=&#34;robots-in-disguise&#34;&gt;Robots in disguise&lt;/h2&gt;
&lt;p&gt;Any robot, with it’s variety of sensors, tools, and networks will be able to perform a wide array of functions in a highly robotic world. A robot preparing your food may also be listening to your conversations simply to fulfill some contract in the system. Cryptocurrency and smart contracts can be used to expand what existing robots can be used for. More and more these discrete systems will converge into a single operating fabric. Robots will become more generalized as technology advances, with tasks being mostly assigned by proximity.&lt;/p&gt;
&lt;h3 id=&#34;smart-devices&#34;&gt;“Smart” devices&lt;/h3&gt;
&lt;p&gt;Smart phones, smart TVs, smart homes&amp;hellip; What is it that makes a tool “smart” anyways?
In a general sense “smart” simply means that it can be used against you. Why is your phone “smart” but your laptop isn’t? It’s because your phone is a surveillance device. It provides the system vital functionality that isn’t under your control.&lt;/p&gt;
&lt;p&gt;Is a device or appliance really “yours” if it is constantly working to incriminate you? How about if it refuses to work under conditions dictated by others? These systems don’t specifically need to be commanded by a malevolent entity, your dishwasher could simply require you to use a smart contract to operate it. This smart contract could be fed real time information about water use in your region to ensure it is being rationed correctly. Smart contracts can be incredible mechanisms to make systems fair, but their ability to make unjust systems shouldn’t be underestimated.&lt;/p&gt;
&lt;p&gt;Smart contracts define incentive structures, and they can be designed with an incredible amount of precision. It is entirely possible for products and services to micro-manage quality or effectiveness relative to your status in the system. This means that the most innocuous and fair systems could end up being leveraged against people if the system itself has a flaw.&lt;/p&gt;
&lt;h3 id=&#34;implants&#34;&gt;Implants&lt;/h3&gt;
&lt;p&gt;Not all digital devices are optional. As medical technology advances people can be very reliant on complicated systems. It is of the utmost importance that people with disabilities are empowered by these tools and not harmed by them. While giving up your privacy (or opting in to ads) may seem like a fair trade for your sight back, this is not a trade we should force someone to make.&lt;/p&gt;
&lt;p&gt;The major challenge is that there is no end to what can be turned against you. This can be forced onto the more vulnerable by making the only affordable items sabotaged with tracking &amp;amp; control. The most dystopian outcomes imaginable are on the table when the effects are unseen or individualized. People are far too quick to rationalize the suffering of others rather than to truly take the time to understand the underlying causes.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/tott-8.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-8&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #8 Transhumanism&lt;/h2&gt;&lt;i&gt;How close are the technocrats to modifying you? Too close.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h2 id=&#34;tiny-tech&#34;&gt;Tiny Tech&lt;/h2&gt;
&lt;p&gt;There&amp;rsquo;s nothing sacred to the technocrats. There&amp;rsquo;s nothing special about biology that would prevent them from using your individual cells like they use your data against you. Most people are familiar with the idea of nanobots. but the idea of manipulating small-scale natural processes directly is very much out of mind. The very nature of tiny technology is that it very easily stays out of sight, and can be difficult to properly conceptualize.&lt;/p&gt;
&lt;p&gt;Nano-machines and &amp;ldquo;smart dust&amp;rdquo; are still very real concerns as well. Even in the most benign of circumstances they can become a terrible form of pollution like micro-plastics. The technocracy has shown terrible stewardship for the natural world despite manufactured appearances. It would be very difficult to properly investigate the long-term ecological or individual health impacts of individual nano-scale applications.&lt;/p&gt;
&lt;h2 id=&#34;automation&#34;&gt;Automation&lt;/h2&gt;
&lt;p&gt;Automation isn’t simply about making robots better, but also making our lives more robotic. In many cases is it much easier to simply reduce a task into smaller tasks than to design, build, and equip a robot to take over the entire work. This has profound implications for the direction the system is moving in. People will become marginalized to make room for robots in the name of efficiency. The most insidious part is that workers are already being conditioned to train artificial intelligence to learn from them. Many workers are training their replacements without knowing it!&lt;/p&gt;
&lt;p&gt;This has far-reaching impacts beyond the service industry. Nearly any job can be broken down into small units of work that could be automated eventually. The safest positions are the ones that are harder to break into smaller units, or tasks that take advantage of a large variety of skills. Media and legal institutions will be pressured to force professionals to undermine their own field to make it easier to be automated away.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/skynet-workforce.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/skynet-workforce&#34;  &gt;&lt;h2&gt;The Rise of a SkyNet Workforce&lt;/h2&gt;&lt;i&gt;Employee of the Month: Terminator&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;It’s worth noting that automation itself isn’t inherently evil or wrong. Ideally workers would be properly compensated for training AIs and people would be supported with the understanding that their livelihoods were sacrificed for greater efficiency. Currently automation is a super-weapon against the working classes. There is no reason it has to stay that way.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;solutions&#34;&gt;Solutions&lt;/h2&gt;
&lt;h3 id=&#34;diy&#34;&gt;DIY&lt;/h3&gt;
&lt;p&gt;Consider countermeasures against robots&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Instead of WiFi, using wired networks&lt;/li&gt;
&lt;li&gt;Setup spaces your devices can’t listen in to.&lt;/li&gt;
&lt;li&gt;Use a faraday bag for your smartphone&lt;/li&gt;
&lt;li&gt;Use analog/low-tech solutions where possible&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;As more and more valuable tools are converted to “smart devices” there is an immense opportunity to take up a niche market of simpler devices that don’t violate their owners privacy. AI doesn’t need to be a harmful development. By learning about these systems we can avoid the dangers as well as develop more humane ways of moving forward.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/board.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/hardware-matters&#34;  &gt;&lt;h2&gt;Principle: Hardware matters&lt;/h2&gt;&lt;i&gt;It is easy to underestimate the underlying structure of our digital world.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h3 id=&#34;build-and-maintain-the-human-economy&#34;&gt;Build and maintain the “human economy”&lt;/h3&gt;
&lt;p&gt;Robots &amp;amp; automation are going go displace an incredible amount of people in the best-case scenarios. The optimal strategy would be for people to work on establishing an economy for people instead of one against them. This doesn’t mean you shun progress, in fact developing efficient systems allows you to share the gains with your community.&lt;/p&gt;
&lt;p&gt;If you’re building autonomous systems ensure that they are licensed, developed, and distributed in a way that benefits human beings. For example, a city could establish a smart contract that requires robots to pay taxes on transactions that help support local food &amp;amp; housing systems.&lt;/p&gt;
&lt;h3 id=&#34;body-mechanics&#34;&gt;Body mechanics&lt;/h3&gt;
&lt;p&gt;As the world becomes more and more controlled, the machine of last resort is you. A self-driving car may decide where you can drive to, but your own body can be the limit of where you can bike to. Even better if you have access to horses for travel. Developing tools and methods that focus on augmenting what you can do yourself will liberate you from relying on tools that work against you.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Call to Action: Join the Fediverse now!</title>
		<link>https://libresolutions.network/articles/call-to-action-join-the-fediverse/</link>
		<pubDate>Tue, 22 Feb 2022 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/call-to-action-join-the-fediverse/</guid>
		
		<image>https://libresolutions.network//media/images/fediverse.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/fediverse.webp" />
		<itunes:image href="https://libresolutions.network//media/images/fediverse.webp" />
		<description>A simple, but very effective way to tip the scales in favor of free speech.</description>
		<content:encoded>&lt;p&gt;The Fediverse is a web of federated social networks. Powered by the ActivityPub protocol, they allow for interoperability between them. &lt;a href=&#34;https://tilvids.com/w/juFy6FerVv5MVMKVKZXdqs&#34;&gt;Here is a fantastic demo of it in action today&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;currently-there-are-many-federated-equivalents-to-popular-sites-people-use&#34;&gt;Currently there are many federated equivalents to popular sites people use:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;For YouTube there is &lt;a href=&#34;https://joinpeertube.org/&#34;&gt;PeerTube&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;For Instagram there is &lt;a href=&#34;https://pixelfed.org/&#34;&gt;Pixelfed&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;For Twitter there is &lt;a href=&#34;https://joinmastodon.org/&#34;&gt;Mastodon&lt;/a&gt;, &lt;a href=&#34;https://pleroma.social/&#34;&gt;Pleroma&lt;/a&gt; and &lt;a href=&#34;https://misskey.io&#34;&gt;Misskey&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;For Facebook there is &lt;a href=&#34;https://friendi.ca/&#34;&gt;Frendica&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;For Podcasts &amp;amp; Music there is &lt;a href=&#34;https://funkwhale.audio/&#34;&gt;Funkwhale&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;For Reddit there is &lt;a href=&#34;https://join-lemmy.org/&#34;&gt;Lemmy&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;why-bother&#34;&gt;Why bother?&lt;/h2&gt;
&lt;p&gt;Continuing to use mainstream social networks is becoming more and more untenable each day. None of them operate for the good of their users. This has already created a dire crisis for free speech online.
This doesn’t mean we should all run and hide. It is vital that we overcome chilling effects to ensure that voices can be heard.
As Peterson explains below, &lt;a href=&#34;https://youtu.be/watch?v=KMj9wsrPE5U&#34;&gt;it is better to pay the price for speaking than not speaking.&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;things-can-be-better-this-time&#34;&gt;Things can be better this time&lt;/h2&gt;
&lt;p&gt;Federated social networks have a significant set of advantages. Simply being aware that they exist gives you power. You are not required to have an account or maintain a presence to access information on these sites. For example, you can browse the #Censorship hashtag for any instance you choose. This works with any tag. Don’t want to browse? You can change that same link to an RSS feed by adding ‘.rss’ to the end.&lt;/p&gt;
&lt;p&gt;This is an immense improvement from current social media sites; anyone with an RSS reader can access all the same information as anyone in the network without having to give up privacy.&lt;/p&gt;
&lt;h2 id=&#34;how-do-i-start&#34;&gt;How do I start?&lt;/h2&gt;
&lt;p&gt;For most instances it’s as easy as creating an account on any other website. An instance is like a home. There are features to migrate accounts if you like as well.
Your presence doesn’t need to be permanent and I would encourage you to have multiple identities.&lt;/p&gt;
&lt;p&gt;Check out the fediverse.party portal to pick an instance:
&lt;a href=&#34;https://fediverse.party/en/portal/servers/&#34;&gt;https://fediverse.party/en/portal/servers/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;These are instances listed by interest or focus. Be aware that each instance has it’s own rules and culture. People are generally friendly, but like anywhere else, try to be kind in turn.&lt;/p&gt;
&lt;h2 id=&#34;get-connected&#34;&gt;Get connected&lt;/h2&gt;
&lt;p&gt;You can make a post with #introduction to introduce yourself to the network, this is a handy way to get followers and meet like-minded people.
&lt;a href=&#34;https://mastodon.social/tags/askfediverse&#34;&gt;#askfediverse&lt;/a&gt; is a very useful hashtag to get answers to questions that people might know.
Each instance has a public directory that users may choose to be listed in. For Mastodon it will be the instance site + /explore. So for mastodon.social it’s &lt;a href=&#34;https://mastodon.social/explore&#34;&gt;https://mastodon.social/explore&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;getting-the-most-out-of-it&#34;&gt;Getting the most out of it&lt;/h2&gt;
&lt;p&gt;By getting your information from the fediverse, you can avoid having to share twitter/facebook links if the same information is available there. This helps promote a more resilient online information ecosystem.
The software running these instances is open source and can be run yourself. This can be a challenging task but is very useful for people who want to have complete control by having an instance for just themselves.&lt;/p&gt;
&lt;h3 id=&#34;follow-the-libre-solutions-network-on-the-fediverse&#34;&gt;&lt;a href=&#34;https://fedi.libresolutions.network/@lsn&#34;&gt;Follow the Libre Solutions Network on the Fediverse.&lt;/a&gt;&lt;/h3&gt;
&lt;h2 id=&#34;a-note-on-privacy&#34;&gt;A note on privacy&lt;/h2&gt;
&lt;p&gt;The Fediverse is an open network, it’s important to keep in mind this is for broadcasting public information. By leaving big tech platforms behind it is essential to redefine what we believe should and shouldn’t be shared publicly.&lt;/p&gt;
&lt;p&gt;If you’re looking for a secure platform to communicate sensitive information I would recommend checking out &lt;a href=&#34;https://xmpp.org/about/technology-overview/&#34;&gt;XMPP&lt;/a&gt; &amp;amp; &lt;a href=&#34;https://matrix.org/&#34;&gt;Matrix.&lt;/a&gt;&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Tools of the Technocracy: #2 Big Data &amp; Artificial Intelligence</title>
		<link>https://libresolutions.network/articles/tools-of-the-technocracy-2/</link>
		<pubDate>Wed, 16 Feb 2022 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/tools-of-the-technocracy-2/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/tools-of-the-technocracy2.mp3" />
			
		
		<image>https://libresolutions.network//media/images/big-data.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/big-data.webp" />
		<itunes:image href="https://libresolutions.network//media/images/big-data.webp" />
		<description>What is all this data for anyways?</description>
		<content:encoded>&lt;h1 id=&#34;tools-of-the-technocracy-2-big-data--artificial-intelligence&#34;&gt;&lt;a href=&#34;https://libresolutions.network/tags/tools-of-the-technocracy-series&#34;&gt;Tools of the Technocracy&lt;/a&gt;: #2 Big Data &amp;amp; Artificial Intelligence&lt;/h1&gt;
&lt;h2 id=&#34;big-data&#34;&gt;Big data&lt;/h2&gt;
&lt;p&gt;Big data is an arms race for information and computing power.
The more information and computing power an entity has the more power it can leverage against you or over others. Privacy is generally discussed in terms of protecting yourself individually, but more and more it is becoming vital to protect your information to protect everyone. By reducing how much you feed into big data, you prevent that data from being weaponized against others. How is all this data collected anyways?&lt;/p&gt;

&lt;h3 id=&#34;web--app-analytics&#34;&gt;Web &amp;amp; App analytics&lt;/h3&gt;
&lt;p&gt;Online services are very interested in where you spend your time and attention. There are a multitude of different ways trackers infect your online experience.&lt;/p&gt;
&lt;video controls preload=&#34;metadata&#34;&gt;
    &lt;source src=&#39;https://libresolutions.network/media/video/tracking-links.mp4&#39;&gt;
&lt;/video&gt;
&lt;p&gt;Browsers currently have much more fine-tuned control over what information you share with sites you visit. There are &lt;a href=&#34;https://libresolutionsnetwork.substack.com/p/reclaiming-cyberspace-3&#34;&gt;mechanisms to mitigate&lt;/a&gt; this. &lt;a href=&#34;https://www.independent.co.uk/tech/moviepass-track-eyes-phone-cameras-b2013273.html&#34;&gt;With a smartphone app&lt;/a&gt; however, there are much fewer ways to restrict surveillance, and they generally require more effort.&lt;/p&gt;
&lt;h3 id=&#34;fingerprinting&#34;&gt;Fingerprinting&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://amiunique.org/fp&#34;&gt;Browser Fingerprinting&lt;/a&gt; is a set of techniques that analyze how your browser behaves. Many technical details about your browser (such as your monitor size, language, &amp;amp; time zone) allow you to stand out from other users. When combined with other information, such as your IP, it can be very easily to track you as a unique user. This does not mean that you should continue to leak data. The best defense is getting more people to take their privacy and security seriously. An alternative would be to find ways to send out fake data and interactions to &lt;a href=&#34;https://adnauseam.io/&#34;&gt;add noise&lt;/a&gt; to the dataset.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://gemini.circumlunar.space/&#34;&gt;Gemini&lt;/a&gt; is a new protocol intended to mitigate the amount of tracking sites can do. It is a growing ecosystem and there already is a great deal of great content there. Websites on Gemini are called &lt;em&gt;capsules&lt;/em&gt;. You do need a gemini-compatible browser to view them.&lt;/p&gt;
&lt;h3 id=&#34;data-driven-services&#34;&gt;“Data driven” services&lt;/h3&gt;
&lt;p&gt;Cloud platforms and online services aim to be ‘&lt;em&gt;data driven&lt;/em&gt;’ this means that details from every interaction are recorded so that they can ‘&lt;em&gt;improve their services&lt;/em&gt;’. Unfortunately for their employees, clients, and partners, this data is very often collected and processed by a third party. Other times it is simply outright sold.&lt;/p&gt;
&lt;p&gt;Many organizations use Microsoft, Google or other cloud providers to run their day-to-day affairs. This has tragic implications for the people who rely on those institutions. Your ‘private’ information could be collected by big tech firms without you ever directly using their services.&lt;/p&gt;
&lt;h3 id=&#34;dragnet-surveillance&#34;&gt;Dragnet surveillance&lt;/h3&gt;
&lt;p&gt;Simply not being a target is not enough to avoid problems. Instead of relying on tracking you as an individual, many techniques involve spying on everyone. By being able to analyze every interaction, everyone can manipulated all the time. With more and more sophisticated tools, this becomes a larger and larger threat. The state has the power to force people into using specific services. As a matter of principle the powers of the state and large corporations to collect information on people &lt;a href=&#34;https://www.eff.org/deeplinks/2022/02/privacy-experts-federal-and-state-agencies-end-use-facial-verification-services&#34;&gt;must be restricted&lt;/a&gt;.&lt;/p&gt;
&lt;h3 id=&#34;biometrics&#34;&gt;Biometrics&lt;/h3&gt;
&lt;p&gt;Biometrics are special pieces of data that should be guarded the most.
Such as:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Your DNA&lt;/li&gt;
&lt;li&gt;Your face&lt;/li&gt;
&lt;li&gt;Your eyes&lt;/li&gt;
&lt;li&gt;Your fingerprints&lt;/li&gt;
&lt;li&gt;Your &lt;a href=&#34;https://twitter.com/wef/status/1427721919483326470#m&#34;&gt;heartbeat&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Your gait&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Essentially, anything that uniquely identifies you is not something you want your data to be able to be traced back to. The problem with biometrics is that unlike passwords or keys they can not be (easily) changed or revoked. It is much easier to change a password than get an entirely new face.&lt;/p&gt;
&lt;h3 id=&#34;limitations-of-de-identified-data&#34;&gt;Limitations of “De-identified” data&lt;/h3&gt;
&lt;p&gt;De-identifying data is the process of removing or changing information like names and addresses in the hope that the dataset won’t allow you to uniquely identify a person. This protection, isn&amp;rsquo;t absolute. For example, location data is essentially impossible to ‘de-identify’. How many people visit your home during certain hours each day? Even if the system doesn’t list their names it’s probably not too hard to find out.&lt;/p&gt;
&lt;h3 id=&#34;data-brokerages&#34;&gt;Data brokerages&lt;/h3&gt;
&lt;p&gt;When your data is collected by different parties very often they will repackage and sell out the data. There are large data brokerages with massive datasets.
This means that intelligent systems (or a determined adversary) could potentially gather a near-complete picture of your life by correlating pieces from different datasets. This is a massive advantage that large firms will always have over smaller organizations.&lt;/p&gt;
&lt;h3 id=&#34;data-breaches&#34;&gt;Data breaches&lt;/h3&gt;
&lt;p&gt;It is not only your own personal security that matters, but also the security of all those who are keeping data about&lt;a href=&#34;https://haveibeenpwned.com/&#34;&gt; you. HaveIbeenPwned&lt;/a&gt; is a great tool to verify if your e-mail appears in any data breaches. The trouble is that any information that becomes accessible is impossible to truly erase. Those wishing to use data to control others likely do not care for ethical concerns about how it is sourced.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;artificial-intelligence&#34;&gt;Artificial intelligence&lt;/h2&gt;
&lt;p&gt;AI is no longer a sci-fi concept, it is very real and very present in our lives. Artificial intelligence is fueled by big data. This creates a feedback loop that incentivizes further data collection. The more data that exists, the more data there is to abuse.&lt;/p&gt;
&lt;h2 id=&#34;how-does-it-work-signals--levers&#34;&gt;How does it work? Signals &amp;amp; Levers&lt;/h2&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/tott-2-signals.webp&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;To oversimplify a bit, an AI algorithm is given many signals as ‘inputs’ and outputs one or many results. AIs are ‘trained’ by feeding them inputs and the desired outputs. It is essentially the AIs job to learn how to produce those outputs. By adjusting the values in its ‘&lt;em&gt;memory&lt;/em&gt;’, it will learn how to give better results. Once an AI is trained with enough data it will be able to reliably produce accurate results for new data.&lt;/p&gt;
&lt;p&gt;A great deal of these results are derived from a properly designed network and dataset. An AI fed with data that is incomplete or biased can produce useless or incorrect results. This is why it is a horrific idea to allow AI algorithms designed to track and control you to have control over your life. These AI algorithms can work together to create more sophisticated tools.&lt;/p&gt;
&lt;h3 id=&#34;hard-to-predict-correlations&#34;&gt;Hard-to-predict correlations&lt;/h3&gt;
&lt;p&gt;AI algorithms shouldn’t have direct control over systems that have the capability of harming people. By giving complex AIs levers to control the real world it can be almost &lt;a href=&#34;https://www.wired.com/story/these-algorithms-look-x-rays-detect-your-race/&#34;&gt;impossible to predict&lt;/a&gt; what the potential impacts can be. The potential risks to human rights or even safety can’t be overstated.&lt;/p&gt;
&lt;p&gt;This is because no matter how powerful our machines are, or how sophisticated our algorithms are we are not able to fully simulate the human experience in our human societies. There will be blind-spots and bad incentives. They are designed by humans after-all.&lt;/p&gt;
&lt;h2 id=&#34;these-tools-are-impressive&#34;&gt;These tools are impressive&lt;/h2&gt;
&lt;p&gt;This is not to say AI is useless or bad, it has many very useful and powerful applications. You can explore the possibilities with this amazing YouTube channel &lt;a href=&#34;https://youtube.com/c/K%C3%A1rolyZsolnai/videos&#34;&gt;Two Minute Papers&lt;/a&gt;. The best way to use AI is to use it where there is no danger in a wrong answer. My favorite example is upscaling, generating &lt;a href=&#34;https://youtu.be/watch?v=0X1RtXCvPFQ&#34;&gt;higher resolution images&lt;/a&gt; from lower resolution ones.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/skynet-workforce.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/skynet-workforce&#34;  &gt;&lt;h2&gt;The Rise of a SkyNet Workforce&lt;/h2&gt;&lt;i&gt;&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h2 id=&#34;not-all-sunshine-and-rainbows&#34;&gt;Not all sunshine and rainbows.&lt;/h2&gt;
&lt;p&gt;The sad news is that many of these systems are in control of our very lives. There is a race to give AI algorithms complete control of what we see, hear, and remember. It is important to keep in mind that these powerful tools are constantly working in the background in the interests of powerful institutions.&lt;/p&gt;
&lt;p&gt;It is very possible that these AI algorithms feed into each other in unintuitive ways. As the technocracy expands out their digital control the impacts may become more clear.&lt;/p&gt;
&lt;h3 id=&#34;advertising&#34;&gt;Advertising&lt;/h3&gt;
&lt;p&gt;The study of the humans in cyberspace has been ongoing for quite some time. The game-changer is that artificial intelligence can find subtle ways to manipulate you that even its creators couldn’t imagine. Every time you interact with an ad online you are training algorithms to learn how to grab peoples’ time and attention.&lt;/p&gt;
&lt;h3 id=&#34;censorship&#34;&gt;Censorship&lt;/h3&gt;
&lt;p&gt;Giving AIs the power to moderate the Internet has disastrous potential. Human beings, for all their wisdom, have failed to ever use censorship for anything good. Artificial intelligence should never be a barrier to people’s ability to access information or express themselves.&lt;/p&gt;
&lt;h3 id=&#34;astroturfing&#34;&gt;Astroturfing&lt;/h3&gt;
&lt;p&gt;Bots are also faster at engaging online than human beings. It would be trivial to use currently available technology to swarm the Internet with bots that are able to out-produce any real human input to spread propaganda. Bots already outnumber humans on social media. The usual solution to this is to demand that human beings use their real identities online, but this immediately backfires by giving AIs a list of ‘real targets’ to hit.&lt;/p&gt;
&lt;p&gt;AI is a game-changer for the technocracy. By &lt;a href=&#34;https://thegrayzone.com/2021/10/08/nato-cognitive-warfare-brain/&#34;&gt;herding people into systems&lt;/a&gt; with defined goals, the systems can set incentive structures to make the herd act how the system wants. If you believe money is a powerful influence over individual people, watch when every aspect of their lives is made better or worse based off how they are judged by these systems.&lt;/p&gt;
&lt;h3 id=&#34;plausible-deniability&#34;&gt;Plausible deniability&lt;/h3&gt;
&lt;p&gt;An underestimated part of these AI algorithms is that with datasets on everyone they can still &lt;a href=&#34;https://youtu.be/watch?v=eRAPKG7hbA8&#34;&gt;target people individually.&lt;/a&gt; While this specific case may be an isolated incident, the capability exists to manipulate individuals more subtly. This can impact those who may be more vulnerable, or less likely to speak out.&lt;/p&gt;
&lt;h3 id=&#34;perception-management&#34;&gt;Perception management&lt;/h3&gt;
&lt;p&gt;As top-down control drives more and more of what people see and experience this allows AIs to learn how to manipulate people’s behavior in incalculable ways. As we allow fewer systems to take total control over information, those who run those systems can actively brainwash the public for any purpose.&lt;/p&gt;
&lt;p&gt;Perception management is a weapon primarily aimed at people’s subconscious minds. There is immense opportunity to leverage people’s very own biology against themselves. Fear, disgust and anger are some of the strongest emotions that can be used to influence people.&lt;/p&gt;
&lt;h3 id=&#34;digital-gulags&#34;&gt;Digital Gulags&lt;/h3&gt;
&lt;p&gt;‘Social credit scores’ don’t need to be binary.
Everything in your life can be put on a sliding scale.
If you behave ‘well’ the system can reward you with:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;A more pleasant social media feed&lt;/li&gt;
&lt;li&gt;More favorable transaction costs and terms&lt;/li&gt;
&lt;li&gt;Preferential resolutions in disputes&lt;/li&gt;
&lt;li&gt;Access to more computing power&lt;/li&gt;
&lt;li&gt;Access to more energy&lt;/li&gt;
&lt;li&gt;Better quality food&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;If the system decides you’re not doing what it wants it can &lt;a href=&#34;https://twitter.com/cyprianous/status/1493414970976980992&#34;&gt;punish you&lt;/a&gt; with:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;More negative news&lt;/li&gt;
&lt;li&gt;Less representation in disputes&lt;/li&gt;
&lt;li&gt;Less computing power&lt;/li&gt;
&lt;li&gt;Energy rationing&lt;/li&gt;
&lt;li&gt;Lower quality food&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Once allowed, this system wouldn’t simply turn people into slaves, it would hijack evolution to transform what once were human beings into different creatures all-together. Sounds a lot like &lt;a href=&#34;https://slate.com/technology/2014/07/rokos-basilisk-the-most-terrifying-thought-experiment-of-all-time.html&#34;&gt;Roko’s Basilisk&lt;/a&gt;….&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;solutions&#34;&gt;Solutions&lt;/h2&gt;
&lt;h3 id=&#34;take-privacy-and-security-seriously&#34;&gt;Take privacy and security seriously&lt;/h3&gt;
&lt;p&gt;Consider switching away from tools and technology that track you as part of their business model. It is worth your time to find hardware, operating systems, and programs that aren’t proactively reporting on your behavior. This doesn’t have to be all-at-once but can be done gradually. Every bit helps and there is a gradient of success. Another option is simply to modify your lifestyle to find ways to rely less on digital systems.&lt;/p&gt;
&lt;h3 id=&#34;limit-your-interaction-with-data-driven-services&#34;&gt;Limit your interaction with data-driven services&lt;/h3&gt;
&lt;p&gt;This doesn’t mean you have to immediately close your bank account or quit your job. Using your influence as a customer or employee can help shift institutions in a better direction. Be aware of how these systems work and how you can mitigate their effects on your life.
In any instance where you can replace a service or tool that is tracking you with one that isn’t you’re making great progress. &lt;a href=&#34;https://backgroundchecks.org/justdeleteme/&#34;&gt;Consider having your data deleted from unused sites&lt;/a&gt;. Try shopping in store, rather than from an online store-front.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/fediverse.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/call-to-action-join-the-fediverse&#34;  &gt;&lt;h2&gt;Call to action: Join the Fediverse&lt;/h2&gt;&lt;i&gt;A simple, but very effective way to tip the scales in favor of free speech.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;Switching away from &lt;a href=&#34;https://libresolutions.network/articles/1-emancipate-yourself-from-mental-slavery&#34;&gt;Algorithmically manipulated social media&lt;/a&gt; towards better alternatives such as &lt;a href=&#34;https://fediverse.party/&#34;&gt;pleroma &amp;amp; mastodon&lt;/a&gt; can help a great deal. Gab also doesn’t manipulate what appears in your feed. Ensure that you’re bookmarking important sites. RSS feeds are also critical in getting information without censorship or moderation.&lt;/p&gt;
&lt;h3 id=&#34;support-open-data&#34;&gt;Support open data&lt;/h3&gt;
&lt;p&gt;AI can be used for good! Open source tools and open datasets level the playing-field a great deal. An interesting project in this space is &lt;a href=&#34;https://commonvoice.mozilla.org/en&#34;&gt;Mozilla Common Voice&lt;/a&gt;. It is difficult for this kind of work to compete with corporate or state-level initiatives, but it would be much harder to hide private data in a public dataset.&lt;/p&gt;
&lt;p&gt;Consider getting involved locally, if there are local groups interested in privacy rights as well as security you can work to influence local governments and institutions to better protect people’s privacy.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/construction-banner.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-3/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #3 Robots, IoT, Automation, Oh my!&lt;/h2&gt;&lt;i&gt;Transforming the world in ways seen and unseen&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Tools of the Technocracy: #1 Digital Currency</title>
		<link>https://libresolutions.network/articles/tools-of-the-technocracy-1/</link>
		<pubDate>Tue, 01 Feb 2022 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/tools-of-the-technocracy-1/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/tools-of-the-technocracy1.mp3" />
			
		
		<image>https://libresolutions.network//media/tott-1.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/tott-1.webp" />
		<itunes:image href="https://libresolutions.network//media/tott-1.webp" />
		<description>How the digital financial complex works against you...and what you can do about it.</description>
		<content:encoded>&lt;h1 id=&#34;tools-of-the-technocracy--1-digital-currency&#34;&gt;&lt;a href=&#34;https://libresolutions.network/tags/tools-of-the-technocracy-series&#34;&gt;Tools of the Technocracy&lt;/a&gt;:  #1 Digital Currency&lt;/h1&gt;
&lt;p&gt;Digital currency is what makes online commerce work so well. The trouble is that as the Internet has invaded our lives, it has given the digital financial complex more and more power. This is the foundation of a “social credit system” that aims to &lt;a href=&#34;https://www.zerohedge.com/political/cbdc-how-covid-became-path-global-financial-surveillance&#34;&gt;control every aspect&lt;/a&gt; of your life. Having the “right” social attitudes or behavior will not be enough to endure this. The game is total control and the prize is all your time and assets.&lt;/p&gt;

&lt;h2 id=&#34;data-collection&#34;&gt;Data collection&lt;/h2&gt;
&lt;p&gt;The first thing to be surrendered to these digital financial tools was privacy. Having access to transaction data tells those collecting the information a great deal about you. It is trivial to glean travel patterns, interests, and all sorts of details about your life if they can catalogue your transactions. It is near impossible to keep your financial information private when operating through these services.&lt;/p&gt;
&lt;h2 id=&#34;censorship&#34;&gt;Censorship&lt;/h2&gt;
&lt;p&gt;People assume that financial institutions will only intervene in the most egregious of circumstances. Under the guise of stopping terrorism, hate and criminal activity the financial sector has acquired the power to be the arbiter of online commerce. Large institutions are only getting started abusing this power to micro-manage more and more economic activity.&lt;/p&gt;
&lt;p&gt;This censorship, even when used for so-called “benign” purposes, distorts market incentives. At minimum, there will be &lt;a href=&#34;https://reclaimthenet.org/ko-fi-unpublishes-page-of-uk-womens-rights-group/&#34;&gt;chilling effects&lt;/a&gt; and perverse incentives created by these interventions. As these measures accelerate, trust becomes a fading memory.&lt;/p&gt;
&lt;h2 id=&#34;financial-repression&#34;&gt;Financial repression&lt;/h2&gt;
&lt;p&gt;Do you have control of your money? If not, is it really “your money”? In many cases, digital currency can be frozen, blacklisted or &lt;a href=&#34;https://www.globalresearch.ca/rule-power/5796021&#34;&gt;even seized from you&lt;/a&gt;. In these situations you often have little-or-no recourse. The cryptocurrency space has a term “Not your keys…Not your Bitcoin”. This is doubly true for fiat-based platforms. Digital currencies linked to fiat (state) currencies also have the unfortunate side-effect of being silently seized through rising amounts of inflation.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;the-villains&#34;&gt;The Villains&lt;/h2&gt;
&lt;h3 id=&#34;creditdebit-cards&#34;&gt;Credit/Debit Cards&lt;/h3&gt;
&lt;p&gt;The earliest stage financial tracking. Almost everyone is guilty of using these. They are certainly preferable to the alternatives listed below, but in all instances it is better for you to use debit cards instead of credit cards where possible.&lt;/p&gt;
&lt;h3 id=&#34;cryptocurrency&#34;&gt;Cryptocurrency&lt;/h3&gt;
&lt;p&gt;Not all cryptocurrencies are the same. Some are more decentralized than others. Important questions to ask are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Can you run your own client/wallet? (a “full node”)&lt;/li&gt;
&lt;li&gt;Who are the developers?&lt;/li&gt;
&lt;li&gt;How is the protocol developed?&lt;/li&gt;
&lt;li&gt;Does it have a proven history?&lt;/li&gt;
&lt;li&gt;Does it shield you from inflation?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Unlike debit/credit cards where financial transactions are tracked by a private entity, financial analysis is open to anyone who has access to the blockchain (usually everyone). Some argue this is more “fair” and that it would be better if we transitioned our entire financial system to a public ledger.&lt;/p&gt;
&lt;p&gt;This wouldn’t achieve the desired effects. Those with power and wealth would still have the means to conceal their activities. On top of this, they would still have the ability to have asymmetric power over individuals by developing better tools to track and analyze their financial activities.&lt;/p&gt;
&lt;p&gt;The notable exception being Monero. While it’s privacy may be currently intact, there is no guarantee that it never will be broken. By nature of being stored on a public blockchain, once that protection is broken it is lost forever.&lt;/p&gt;
&lt;h3 id=&#34;custodial-services-paypalvenmostripeect&#34;&gt;Custodial services (Paypal/Venmo/Stripe/ect)&lt;/h3&gt;
&lt;p&gt;These services often aim to make it easier for people, businesses and institutions to accept payments. They often come at a high cost. If financial tracking wasn’t bad enough, they also have the power to control your customers money. They can unilaterally decide to cut you off often leaving you in a very difficult financial situation.&lt;/p&gt;
&lt;p&gt;In late 2022, Paypal instituted a &lt;a href=&#34;https://www.dailywire.com/news/new-paypal-policy-lets-company-pull-2500-from-users-accounts-if-they-promote-misinformation&#34;&gt;policy&lt;/a&gt; granting them the power to fine users for so-called misinformation. After a massive wave of account cancellations, Paypal announced that the policy was included in error. At best, this policy was a &amp;ldquo;trial baloon&amp;rdquo; to get a pulse of how much tolerance the public has for financial censorship.&lt;/p&gt;
&lt;h3 id=&#34;centralized-cryptocurrency-exchanges-and-services&#34;&gt;Centralized Cryptocurrency exchanges and services&lt;/h3&gt;
&lt;p&gt;Speaking of: “Not your keys, not your Bitcoin”, keeping cryptocurrency assets on exchanges or services exposes you to counter-party risk. You shouldn’t rely on a specific service to hold all your cryptocurrency/assets. Many of these institutions may not have a strong history to justify any level of trust.&lt;/p&gt;
&lt;p&gt;Exchanges have been caught &lt;a href=&#34;https://www.coindesk.com/markets/2019/07/19/crypto-exchange-bitmex-under-investigation-by-cftc-bloomberg/&#34;&gt;trading against their customers&lt;/a&gt;, &lt;a href=&#34;https://www.coindesk.com/business/2022/06/29/coinbase-is-reportedly-selling-geo-location-data-to-ice/&#34;&gt;selling information to the state&lt;/a&gt;, and being outright &lt;a href=&#34;https://www.lewrockwell.com/2022/11/charles-hugh-smith/ftx-the-dominoes-of-financial-fraud-have-yet-to-fall/&#34;&gt;ponzi schemes&lt;/a&gt;. An underestimated concern is that many cryptocurrency exchanges operate as the “on-ramp” from the fiat currency system. By converting fiat currency into cryptocurrency you can be transferring value from a system that has little privacy into one with no privacy.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;where-is-all-this-headed&#34;&gt;Where is all this headed?&lt;/h2&gt;
&lt;h3 id=&#34;blockchain-prisons&#34;&gt;Blockchain Prisons&lt;/h3&gt;
&lt;p&gt;A misconception people often have about cryptocurrency and blockchain projects is that they are, by their nature, decentralized. This is not an essential feature of blockchains nor cryptocurrencies.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/road2hell.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/blockchain/&#34;  &gt;&lt;h2&gt;The road to hell: misplaced optimism in the blockchain space&lt;/h2&gt;&lt;i&gt;&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;What blockchain technology gives the technocracy is interoperability. A private distributed ledger could be used to give interoperability to CBDCs. On November 15th 2022, the New York Fed launched a &lt;a href=&#34;https://www.reuters.com/markets/currencies/banking-giants-new-york-fed-start-12-week-digital-dollar-pilot-2022-11-15/&#34;&gt;12 week digital dollar pilot&lt;/a&gt;.&lt;/p&gt;
&lt;h3 id=&#34;smart-contracts&#34;&gt;Smart Contracts&lt;/h3&gt;
&lt;p&gt;A smart contract is an incentive system built on top of a blockchain ledger. None of the currently existing smart contract platforms are private. This means that all the data in a given smart contract is public. They could potentially encrypt data with a wallet’s private-key but that does make it difficult to share that data with others.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/lsn-banner.webp)&#34; &gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/programmable-currency&#34;  &gt;&lt;h2&gt;Programmable currency&lt;/h2&gt;&lt;i&gt;What is it good for?&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;Smart contracts build systems that can create ways for humans and non-human systems to be rewarded by specific activities. For instance, Helium is attempting to incentivize people to provide data connectivity to systems built to track-and-trace activity in the real world. This is a powerful way to re-engineer society.&lt;/p&gt;
&lt;h3 id=&#34;nfts&#34;&gt;NFTs&lt;/h3&gt;
&lt;p&gt;A Non-Fungible-Token is a blockchain asset that can be assigned to a specific entity. Notably, for now, people are selling “digital ownership” of pieces of art. It is not difficult to imagine a scenario where all property ‘rights’ are regulated by a system that temporarily assigns NFTs to those who are “authorized” to access that particular item or property.&lt;/p&gt;
&lt;p&gt;NFTs have even more potential. These systems can be much more flexible and opaque in very unintuitive ways. Everything is determined by the smart contract. It would be trivial to create individualized rules to limit who gets to use their ‘rights’ to the fullest…if at all.&lt;/p&gt;
&lt;h3 id=&#34;web3&#34;&gt;Web3&lt;/h3&gt;
&lt;p&gt;Web3 is the encroachment of the cryptocurrency space into the entire internet. By building experiences on top of smart contracts, which have no privacy, every activity online can feed into algorithms that are used to tailor the totality of the online experience to each individual.&lt;/p&gt;
&lt;p&gt;In many ways Web3 allows for much of Silicon Valley to be automated away with blockchain systems. While this may sound like a good thing, you are merely changing one bad system for another. Without a truly decentralized, private and secure blockchain Web3 will only work to the detriment of it’s users.&lt;/p&gt;
&lt;h3 id=&#34;internet-of-things&#34;&gt;Internet of Things&lt;/h3&gt;
&lt;p&gt;By connecting more and more ‘things’ to the Internet it exposes them to being dominated by the systems discussed here. A ‘thing’ doesn’t need to be a trivial device such as a “smart speaker” or a fridge. It would very well be the car you drive or the &lt;a href=&#34;https://archive.is/GsMPm&#34;&gt;door you enter to get to your office.&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;permission-economy&#34;&gt;Permission Economy&lt;/h2&gt;
&lt;p&gt;Do you think everything outlined above sounds awful and dystopian? The following will take it into overdrive:&lt;/p&gt;
&lt;h3 id=&#34;cbdcs&#34;&gt;CBDCs&lt;/h3&gt;
&lt;p&gt;Central bank digital currencies are the final form of repressive fiat currencies. Instead of your central bank simply devaluing your labour and wages for fiscal stimulus, they can now control the demand side of the equation by limiting what you are allowed to buy (or sell) and when. The system has no desire to use prices as a mechanism to allocate resources because of the belief that the technology now exists to &lt;a href=&#34;https://alilybit.substack.com/p/cbdcs-why-governments-cheer-and-humanity&#34;&gt;run everything.&lt;/a&gt;&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/lsn-banner.webp)&#34; &gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-10&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #10 Central Bank Digital Currencies&lt;/h2&gt;&lt;i&gt;Late-stage financial repression&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h3 id=&#34;tokenized-life&#34;&gt;Tokenized life&lt;/h3&gt;
&lt;p&gt;NFTs could be used to determine permissions in the ‘internet of things’. In that case, it will become near impossible to act outside the wishes of the system. Eventually the system will want to have every gram, ounce, or milliliter of resources accounted for. In the name of ‘efficiency’, they will attempt to track and control every atom on the planet.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/tott-7.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-7/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #7 Smart Cities&lt;/h2&gt;&lt;i&gt;Smart cities are marketed as if they are for the convenience of its residents, but this couldn’t be further from the truth.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h3 id=&#34;virtual-reality&#34;&gt;Virtual Reality&lt;/h3&gt;
&lt;p&gt;Once people are denied all mobility rights and determination it becomes a lot easier to sell virtual experiences for data and profit.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/tott-6.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-6/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #6 Virtual Reality&lt;/h2&gt;&lt;i&gt;Seeing is believing, and the capability to leverage your own senses against you only gets more extreme over time.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;This is the endgame of control. After seizing all the resources and property, they will also control the people by having direct control of their perception. When the physical world becomes much to harsh to bear those who remain will be psychologically herded into a virtual farm that’s entire purpose is to keep them ‘out of the way’.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id=&#34;solutions&#34;&gt;Solutions&lt;/h2&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;a href=&#39;https://home.solari.com/cash-friday/&#39;&gt;

&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/tott-1-cash.webp&#39; 

 alt=&#39;#CashEveryday&#39;
&gt;

&lt;/a&gt;



&lt;/div&gt;
&lt;p&gt;&lt;a href=&#34;https://home.solari.com/cash-friday/&#34;&gt;#CashEveryday&lt;/a&gt; is an initiative to keep cash alive, by using cash transactions wherever possible. While fiat currency has its problems, cash is an anonymous and untraceable way to transfer value. You really should be using cash in every possible transaction. This reduces the amount of control third-parties have over transactions, and promotes keeping things local. Regardless of what new innovations take place, there should always be a private, physical component to the financial system.&lt;/p&gt;
&lt;h2 id=&#34;volunteer--buy-nothing&#34;&gt;Volunteer / “Buy nothing”&lt;/h2&gt;
&lt;p&gt;There are two other highly underestimated commodities that are drained by the technocracy: your time and attention. By giving your time to support people and causes in your community, you can often have a huge impact with very little financial input. Your contributions won’t be able to as easily be frozen or tracked by third parties.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/lsn-banner.webp)&#34; &gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/high-places&#34;  &gt;&lt;h2&gt;Redefining &amp;#34;high places&amp;#34;&lt;/h2&gt;&lt;i&gt;Lets re-balance power from the bottom-up&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;Often you may be able to find local “Buy nothing” groups on social media. Donating items you don’t need anymore can help restore locked wealth in your community and help those who may need those items. You may find something useful yourself!&lt;/p&gt;
&lt;h2 id=&#34;understand-that-wealth-is-more-than-just-currency&#34;&gt;Understand that wealth is more than just currency&lt;/h2&gt;
&lt;p&gt;I highly recommend you watch though the Peak Prosperity &lt;a href=&#34;https://www.peakprosperity.com/crashcourse/&#34;&gt;Crash Course&lt;/a&gt;. Updated in 2018, it has aged frighteningly well. While the main take away is the role of energy in our society there are many other vital insights. The most valuable tip in leaving the rat race is to realize that there are many things much more vital to your well-being than currency.&lt;/p&gt;
&lt;h3 id=&#34;work-to-break-away-from-the-all-digital-financial-system&#34;&gt;Work to break away from the all-digital financial system&lt;/h3&gt;
&lt;p&gt;There is a fantastic series by Children’s Health Defense called &lt;a href=&#34;https://live.childrenshealthdefense.org/shows/financial-rebellion&#34;&gt;Financial Rebellion&lt;/a&gt; which is a treasure-trove of great advice in this series.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/big-data.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-2/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #2 Big Data &amp;amp; Artificial Intelligence&lt;/h2&gt;&lt;i&gt;What is all this data for anyways?&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Tools of the Technocracy</title>
		<link>https://libresolutions.network/articles/tools-of-the-technocracy/</link>
		<pubDate>Sat, 08 Jan 2022 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/tools-of-the-technocracy/</guid>
		
			
				<enclosure url="https://libresolutions.network//media/audio/tools-of-the-technocracy.mp3" />
			
		
		<image>https://libresolutions.network//media/tools-of-the-technocracy.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/tools-of-the-technocracy.webp" />
		<itunes:image href="https://libresolutions.network//media/tools-of-the-technocracy.webp" />
		<description>Why the very fate of humanity will be decided in this next decade.</description>
		<content:encoded>&lt;h2 id=&#34;our-darkest-hour&#34;&gt;Our Darkest Hour&lt;/h2&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;We are currently in a time like none other in all of human history.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;In the past, tyrants and dictators have had a hard limit on how far they could push people. From either logistical difficulties, fear of resistance, or liberation from other nations; these hard limits have been getting softer and softer as technology advances. Recent history has shown an ever-increasing centralization of power into a smaller and smaller set of control structures.&lt;/p&gt;
&lt;p&gt;We as everyday people have been complicit in building and maintaining these control structures. Almost every technology has allowed people to trade privacy, security or freedom for convenience. Technology isn’t inherently bad, but allowing this power to go unchecked absolutely is.&lt;/p&gt;

&lt;p&gt;The sum total of what the world is constructing is nothing short of a planet-wide &lt;a href=&#34;https://odysee.com/@PlanetLockdown:6/Catherine-Austin-Fitts:cc&#34;&gt;enslavement grid&lt;/a&gt; that has never been possible before. The individual parts create feedback loops that make it very difficult for people to extrapolate the long term impacts.&lt;/p&gt;
&lt;p&gt;The tyrants of the world are winning a massive arms race against the rest of humanity. We must not merely avoid these systems, rather every one of us is responsible for preventing them from being weaponized against the people.&lt;/p&gt;
&lt;h1 id=&#34;our-last-chance&#34;&gt;Our last chance&lt;/h1&gt;
&lt;p&gt;This time is so critical because the powers that ought not to be are in a desperate rush to finalize this system. The internet and the ability for people all over the world to coordinate and learn from each other has greatly tipped the balance of power into humanity’s favor. It is paramount that we put all other differences aside to focus on protecting the future for all people.&lt;/p&gt;
&lt;p&gt;This means that until the technocrats are discredited and prosecuted the following doesn’t matter at all:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Political affiliation&lt;/li&gt;
&lt;li&gt;Religious affiliation&lt;/li&gt;
&lt;li&gt;Education&lt;/li&gt;
&lt;li&gt;Cultural background or race&lt;/li&gt;
&lt;li&gt;Physical characteristics such as sex or disability&lt;/li&gt;
&lt;li&gt;Wealth (or lack thereof)&lt;/li&gt;
&lt;li&gt;Anything else you can think of…&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The truth is the only useful indicator you have for who can be trusted is if they are &lt;strong&gt;proactively focused on enhancing human liberty and fighting against human enslavement.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;You are going to find people in this fight that have different beliefs than you, often staggeringly so. It is paramount that you put these feelings aside for the good of all. You and everyone else will be better for it. Those who can reach across to those with fundamental differences to oppose tyranny are going to be the most important people in the world.&lt;/p&gt;
&lt;h1 id=&#34;a-future-worth-fighting-for&#34;&gt;A future worth fighting for&lt;/h1&gt;
&lt;p&gt;Overthrowing this evil will open up a fractal of possibilities for people to improve the world around them. There have been incalculable harms done by the waste of building these systems that could have been used for much better things.&lt;/p&gt;
&lt;p&gt;Ending information control will allow people to work to provide genuine solutions to many of the worlds problems. Stopping the censorship of cures will eliminate much avoidable suffering. Resources spent oppressing people will be freed up to solve real problems. We will still have challenges, and there will still be political squabbles, but we have a very real opportunity to right many grave wrongs. I am not promising anyone a utopia, merely a world immensely more just than our current one.&lt;/p&gt;
&lt;h1 id=&#34;the-tools&#34;&gt;The tools&lt;/h1&gt;
&lt;p&gt;This series will help you better understand what technologies are being weaponized against people. Simply avoiding them or remaining ignorant isn’t quite enough to avoid their effects. Much of the public is in the dark about these things, it is vital that we are all able to explain what is wrong with these mechanisms of control.&lt;/p&gt;

&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/tott-1.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-1/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy #1: Digital Currency&lt;/h2&gt;&lt;i&gt;How the digital financial complex works against you...and what you can do about it.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/big-data.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-2/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #2 Big Data &amp;amp; Artificial Intelligence&lt;/h2&gt;&lt;i&gt;What is all this data for anyways?&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/construction-banner.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-3/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #3 Robots, IoT, Automation, Oh my!&lt;/h2&gt;&lt;i&gt;Transforming the world in ways seen and unseen&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/tott-4.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-4/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #4 Online Identity&lt;/h2&gt;&lt;i&gt;What is following you in your digital tracks?&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/tott-5.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-5/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #5 Networks&lt;/h2&gt;&lt;i&gt;Much of the digital infrastructure in place today is built to structurally enable tyranny.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/tott-6.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-6/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #6 Virtual Reality&lt;/h2&gt;&lt;i&gt;Seeing is believing, and the capability to leverage your own senses against you only gets more extreme over time.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/tott-7.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-7/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #7 Smart Cities&lt;/h2&gt;&lt;i&gt;Smart cities are marketed as if they are for the convenience of its residents, but this couldn’t be further from the truth.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/tott-8.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-8&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #8 Transhumanism&lt;/h2&gt;&lt;i&gt;How close are the technocrats to modifying you? Too close.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/tott-9-preview.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-9&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #9 Internet Shutdowns&lt;/h2&gt;&lt;i&gt;Information control is the root of modern tyranny.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/cbdc-chains.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-10&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #10 Central Bank Digital Currencies&lt;/h2&gt;&lt;i&gt;Late-stage financial repression&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/chains.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-11&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #11 Social Credit&lt;/h2&gt;&lt;i&gt;What&amp;#39;s new is old.&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;p&gt;&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/network-state-banner.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-12/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #12 Network States&lt;/h2&gt;&lt;i&gt;The formalization of world-wide tyranny&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>The most valuable asset for the coming decade</title>
		<link>https://libresolutions.network/articles/5-most-valuable-asset/</link>
		<pubDate>Tue, 04 Jan 2022 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/5-most-valuable-asset/</guid>
		
		<image>https://libresolutions.network//media/5-disintermediation.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/5-disintermediation.webp" />
		<itunes:image href="https://libresolutions.network//media/5-disintermediation.webp" />
		<description>Not cryptocurrency, but this Intangible will change your life in miraculous ways.</description>
		<content:encoded>&lt;h1 id=&#34;trust&#34;&gt;Trust&lt;/h1&gt;
&lt;p&gt;Over the last decade individuals and institutions have shifted from covertly selling out their trust to overtly abusing that trust. &lt;a href=&#34;https://youtu.be/watch?v=k8Et942iDSc&#34;&gt;Trust is essential to have in a civilization.&lt;/a&gt; So much of our society is built on assumed trust, or worse trust only maintained by illusion. By abusing the trust of their clients, partners, and the general public they are supplanting their own existence and in turn tainting those who rely on them.&lt;/p&gt;
&lt;p&gt;What makes trust most valuable is that there are limitless masses of those who will lie, cheat, and steal to get ahead. There is no competitive advantage to joining them. Can you trust a person who is beholden to a corporation that is working against your interests? Can you trust a company that relies on the exploitation of the most vulnerable? The faster we seek better alternatives the better we can &lt;a href=&#34;https://home.solari.com/the-popsicle-index/&#34;&gt;make the world&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This fractal of opportunity means that if we can be trustworthy, we can work to create better alternatives. But how? The first step is disintermediation.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/5-disintermediation.webp&#39; 
&gt;



&lt;/div&gt;
&lt;h2 id=&#34;news&#34;&gt;News&lt;/h2&gt;
&lt;p&gt;Information control is one of the most powerful weapons used against the public. Ideally you would have a curated subset of sources of information that you trust but also a wide net of opinions and disciplines to avoid blind-spots. This year, ensure that you have explored the new media that is being birthed in this time and find ways to avoid being too influenced by a single person or organization.&lt;/p&gt;
&lt;h2 id=&#34;social-media&#34;&gt;Social media&lt;/h2&gt;
&lt;p&gt;Social media is the main tool for information control. By dominating the terms of interaction between human beings social media can work to undermine culture itself. To foster a liberty-minded culture I recommend you look into federated social media such as Mastodon and Pleroma.
&lt;a href=&#34;https://fedi.libresolutions.network/@lsn&#34;&gt;We on our own instance&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;e-mail&#34;&gt;E-mail&lt;/h2&gt;
&lt;p&gt;E-mail was once a very reliable way of ensuring people got your message but even now they are updating spam filters to censor information. Big tech e-mail providers will proactively scan your e-mail contents. If you or your loved ones are still stuck with Google/Outlook for e-mail I would highly recommend they switch providers.&lt;/p&gt;
&lt;h2 id=&#34;messaging-apps&#34;&gt;Messaging Apps&lt;/h2&gt;
&lt;p&gt;Facebook Messenger / WhatsApp / Google Hangouts / Duo / ..ect shouldn’t be the means in which you’re willing to communicate with others. There are many alternatives but one of the more interesting options is &lt;a href=&#34;https://delta.chat/en/&#34;&gt;Delta Chat&lt;/a&gt;. Signal is also great because it seamlessly works with SMS. Personally I host my own matrix instance to run element.&lt;/p&gt;
&lt;h2 id=&#34;payment-processors&#34;&gt;Payment processors&lt;/h2&gt;
&lt;p&gt;PayPal and Visa/Mastercard are already abusing their contracts to enact censorship by restricting access or levying fees. It is paramount that we all work to reduce our dependency on credit card systems as much as possible.
Cryptocurrency is an option, but for local uses it would be far better to use physical money or cash.
If you’re in the US you may find &lt;a href=&#34;https://www.gabpay.com/&#34;&gt;GabPay&lt;/a&gt; useful.&lt;/p&gt;
&lt;h2 id=&#34;operating-systems&#34;&gt;Operating Systems&lt;/h2&gt;
&lt;p&gt;Windows, ChromeOS &amp;amp; MacOS all have too much control over your digital life. It would help a great deal if more and more people switched to Linux where there is much less data collection on users. There is a fair learning curve, and not all software is equally available so it is important to recognize where you are and how easy it is for you to switch.&lt;/p&gt;
&lt;p&gt;For someone who hasn’t tried linux at all I would personally recommend taking a look at &lt;a href=&#34;https://pureos.net/&#34;&gt;PureOS&lt;/a&gt; though Ubuntu is also a very popular choice. For smartphones I would recommend using &lt;a href=&#34;https://grapheneos.org/&#34;&gt;GrapheneOS&lt;/a&gt; or &lt;a href=&#34;https://lineageos.org/&#34;&gt;LineageOS&lt;/a&gt; instead of Android.&lt;/p&gt;
&lt;h2 id=&#34;open-hardware&#34;&gt;Open Hardware&lt;/h2&gt;
&lt;p&gt;I am a big fan of the &lt;a href=&#34;https://pine64.com/&#34;&gt;Pine64&lt;/a&gt; project. I look forward to when the Pinephone is ready for mass adoption. Open hardware is going to be an important space in the future so keep an eye open for it!&lt;/p&gt;
&lt;p&gt;Big picture&lt;/p&gt;
&lt;p&gt;There are so many ways we can work to fix the future and it can be difficult to keep them all in mind. As a guide I like to occasionally revisit &lt;a href=&#34;https://home.solari.com/coming-clean/&#34;&gt;Coming Clean&lt;/a&gt; from Solari. That advice is a lighthouse in turbulent and uncertain times.&lt;/p&gt;
&lt;p&gt;Work to find other trustworthy individuals and organizations to collaborate. Show others that you can be relied upon. We can make the world a much better place, with consistent focus and effort there is no limit to what we can achieve together.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Account security best practices</title>
		<link>https://libresolutions.network/articles/4-account-security-best-practices/</link>
		<pubDate>Sun, 19 Dec 2021 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/4-account-security-best-practices/</guid>
		
		<image>https://libresolutions.network//media/4-data-breach.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/4-data-breach.webp" />
		<itunes:image href="https://libresolutions.network//media/4-data-breach.webp" />
		<description>How to make sure every service you use is as secure and as private as possible.</description>
		<content:encoded>&lt;h2 id=&#34;the-best-way-to-protect-data-is-not-to-record-it&#34;&gt;The best way to protect data is not to record it&lt;/h2&gt;
&lt;p&gt;Almost everyone has at least a dozen accounts and it can be quite a disaster if your password gets published in yet another data breach. Passwords aren’t the only information worth stealing and the best way to protect important information is never to collect it. In general, it’s best to avoid making an account with a service if you don’t need to. Sadly many services force you into making an account by gating content, which is a &lt;a href=&#34;https://www.darkpatterns.org/types-of-dark-pattern&#34;&gt;dark pattern.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This also applies to payment information. Not only should you only input payment information when you need to, but you should also consider what kind of payment methods you use. Cryptocurrency is perfectly transparent to everyone, and your credit cards are perfectly transparent to whoever your card provider shares their data with. In many cases its worth asking yourself “does this service really need my information to do what I need it to do?”&lt;/p&gt;
&lt;h2 id=&#34;using-a-password-manager&#34;&gt;Using a password manager&lt;/h2&gt;
&lt;p&gt;There are many password managers usually with trade-offs between trust and convenience. The most secure option would be to run an offline password manager and manually sync between devices, but there are other options that provide a cloud-based solution for convenience.&lt;/p&gt;
&lt;p&gt;Consider:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://keepassxc.org/&#34;&gt;KeePassXC&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;If you use Nextcloud you can also use it to sync passwords&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;benefits-of-using-a-password-manager&#34;&gt;Benefits of using a password manager&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Strong passwords&lt;/p&gt;
&lt;p&gt;The most obvious advantage of a password manager is the ability to store and keep difficult to remember passwords. This is critical to having a strong unique password for each account.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Unique details&lt;/p&gt;
&lt;p&gt;Passwords aren’t the only thing that is best to have unique. You can also easily keep track of different usernames and e-mails for each service. Not only that but you can avoid disclosing your e-mail address with a temporary e-mail through a free service like TempMail.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Account fungibility&lt;/p&gt;
&lt;p&gt;With a password manager it is now much easier to manage multiple accounts. Sometimes it’s nice to start fresh, other times services like reddit will want you to have a properly aged account to comment or access certain features. Keeping track of accounts makes sure you don’t forget any.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;hr&gt;
&lt;h2 id=&#34;multi-factor-authentication&#34;&gt;Multi-factor authentication&lt;/h2&gt;
&lt;p&gt;Multi-factor authentication is an essential tool in keeping accounts secure. This allows you to be protected even if someone gets access to your password. There are many ways to use multi-factor authentication but it us usually up to the service to support it. It is best to enable whatever method is available and works for you.&lt;/p&gt;
&lt;h2 id=&#34;smse-mail-codes&#34;&gt;SMS/e-mail codes&lt;/h2&gt;
&lt;p&gt;This is the bare-minimum for a service trying to offer two-factor authentication. If you’re not using unique passwords, e-mail authentication won’t provide you any additional benefit. Also using a throw-away e-mail that you don’t have access to excludes you from using e-mail based authentication.&lt;/p&gt;
&lt;p&gt;SMS authentication has often been broken by dedicated attackers social engineering the service provider. This is largely only done for high value targets. Another drawback to SMS multi-factor authentication is that you have to divulge your mobile number to the service.&lt;/p&gt;
&lt;p&gt;With these shortcomings in mind, SMS/e-mail confirmation is still another layer of protection that can still be helpful.&lt;/p&gt;
&lt;h2 id=&#34;totp-codes--google-authenticator&#34;&gt;TOTP codes / “Google Authenticator”&lt;/h2&gt;
&lt;p&gt;Timed one-time-pad codes are a fantastic tool. Essentially you are given a special ‘key’ by scanning a QR code which will generate random numbers to act as your “second password” and it works quite well for this.&lt;/p&gt;
&lt;p&gt;There is often a “recovery code” that must not be disclosed as this will allow someone to generate your time codes. TOTP codes are great because it would be very hard for an attacker to have access to your password as well as a personal device to enter the code.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;If you’re on android &lt;a href=&#34;https://f-droid.org/en/packages/com.beemdevelopment.aegis/&#34;&gt;Aegis Authenticator&lt;/a&gt; is available on &lt;a href=&#34;https://f-droid.org&#34;&gt;F-Droid&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;On iOS you can use &lt;a href=&#34;https://apps.apple.com/ca/app/google-authenticator/id388497605&#34;&gt;Google Authenticator&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;h2 id=&#34;avoiding-data-leaks&#34;&gt;Avoiding data leaks&lt;/h2&gt;
&lt;p&gt;You can generally assume that all your information for every service is being collected and sold for purposes outside your control. Services get hacked and data breaches happen. The less exposed you are to any particular service being compromised the better.&lt;/p&gt;
&lt;section class=&#34;listing&#34;  style=&#34;background-image:url(https://libresolutions.network//media/images/big-data.webp)&#34;&gt;

    
    &lt;div class=&#34;listing-text&#34;&gt;
    &lt;a href=&#34;https://libresolutions.network/articles/tools-of-the-technocracy-2/&#34;  &gt;&lt;h2&gt;Tools of the Technocracy: #2 Big Data &amp;amp; Artificial Intelligence&lt;/h2&gt;&lt;i&gt;What is all this data for anyways?&lt;/i&gt;&lt;/a&gt;
    
    &lt;span&gt;&lt;/span&gt;
    &lt;/div&gt;
&lt;/section&gt;
&lt;h2 id=&#34;integrations-are-evil&#34;&gt;Integrations are evil&lt;/h2&gt;
&lt;p&gt;“Sign in with…” sounds very convenient but it undermines the uniqueness of each account. The more big tech can identify patterns between your accounts they can very often glean unintuitive insights from fairly innocuous data.&lt;/p&gt;
&lt;p&gt;Avoid signing in with big tech platforms and only authorize apps to connect to your accounts in very limited circumstances. Remove any unused integrations once you’re done with them.&lt;/p&gt;
&lt;h2 id=&#34;disable-e-mail-alerts&#34;&gt;Disable e-mail alerts&lt;/h2&gt;
&lt;p&gt;There aren’t many conditions that allow you to guarantee that your e-mails aren’t being read by someone, or something else. When a service sends you an e-mail alert about something, (like an online purchase for example) this gives your e-mail provider and anyone they share data with access to a key window into your life.
Salt your data&lt;/p&gt;
&lt;p&gt;Many sites and services will ask for data that serves no purpose and can’t be verified. You are under no obligation to provide them a correct, useful dataset to be used against you.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://www.corbettreport.com/salting-your-data-solutionswatch/&#34;&gt;“Salting your data”&lt;/a&gt; is to simply input incorrect or unintelligible data such as incorrect birth dates or fake names to undermine these data-collection efforts.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Breaking Free</title>
		<link>https://libresolutions.network/articles/3-breaking-free/</link>
		<pubDate>Sat, 11 Dec 2021 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/3-breaking-free/</guid>
		
		<image>https://libresolutions.network//media/3-breaking-free.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/3-breaking-free.webp" />
		<itunes:image href="https://libresolutions.network//media/3-breaking-free.webp" />
		<description>Better privacy, security and freedom are achievable</description>
		<content:encoded>&lt;p&gt;How do you find the perfect app?
What can we do when all the major services have been designed to track, manipulate and control us?
Should we just turn everything off and run to the woods?&lt;/p&gt;
&lt;h2 id=&#34;prepare-your-mind&#34;&gt;Prepare your mind&lt;/h2&gt;
&lt;p&gt;The systems built to manipulate and control us weren’t built in a day. It requires all of us to focus intently on building a human-centric instead of data driven digital experience.&lt;/p&gt;
&lt;p&gt;Remind yourself that will make a huge difference over the long run:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Accept that your privacy, security, and freedom require your active participation.&lt;/li&gt;
&lt;li&gt;There will be many situations where mitigation is the best-case-scenario.&lt;/li&gt;
&lt;li&gt;Consider the difference between technology improving or imposing on your life.&lt;/li&gt;
&lt;li&gt;Not all tools are equivalent different options have incredibly diverse trade-offs.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Even the simplest habits can build up into massive improvements. Like many other things this is a marathon and not a sprint. Your choices matter a great deal because they change the incentives for systems and institutions. Managing expectations is critical in avoiding frustration.&lt;/p&gt;
&lt;h2 id=&#34;team-up&#34;&gt;Team up&lt;/h2&gt;
&lt;p&gt;One of the most effective ways to improve is to try new things. Everyone knows adopting a new messaging application is very difficult when nobody you know uses it. Getting others to join you helps everyone involved.&lt;/p&gt;
&lt;p&gt;The most powerful way to help others adopt better solutions is to spend the time and effort to set them up. Very often little maintenance or support is needed once someone is ready to go.&lt;/p&gt;
&lt;p&gt;As a team you can collaborate on supporting each other. Not everyone has the same familiarity and ability to adopt different solutions. Once your team gets familiar with one option it also gets easier to adopt others as well.&lt;/p&gt;
&lt;p&gt;An underestimated advantage of teaming up is that you can now pool resources to solving problems. If teams of people using free and open source software that respects their privacy the burden of donating to support development could be shared much easier. Many developers for very important projects would benefit from donations by the people instead of larger corporations.&lt;/p&gt;
&lt;h2 id=&#34;accept-reasonable-compromise&#34;&gt;Accept &lt;em&gt;reasonable&lt;/em&gt; compromise&lt;/h2&gt;
&lt;p&gt;Perfection is often unattainable. For example properly securing e-mail communication between multiple parties requires a great deal of effort that could be much better used by keeping mission-critical messages on more secure infrastructure. Odds are you will still need to be able to receive e-mails all the same.&lt;/p&gt;
&lt;p&gt;Compromise is essential when working with many people. Your favorite (and possibly even most secure) option may not be easy right away for others to start working with. Ideally the first thing you compromise is urgency, a plan to move forward is much better than betting everything on immediate success.&lt;/p&gt;
&lt;p&gt;Consider that a hot new app may make claims that have yet to be proven. Rushing people into adopting novel technology can very often backfire.&lt;/p&gt;
&lt;h2 id=&#34;embrace-the-analog&#34;&gt;Embrace the analog&lt;/h2&gt;
&lt;p&gt;The fastest and most secure way to send someone a file is to hand-deliver them physical media with the data written to it. Every time you send files through networks the only guarantee you have is that they likely won’t be decrypted right away. Over the long run this guarantee becomes more of a hope.&lt;/p&gt;
&lt;p&gt;Sending large amounts of data over the mail is easier and easier as storage gets better and better. For greater protection you could send a relative an encrypted disk/drive and then simply message them with the password.&lt;/p&gt;
&lt;p&gt;I hope to generally avoid throwing the baby out with the bathwater…but “smart home” devices are almost always a trap. I personally would only rely on a “smart enabled” lock or appliance without any connection to the Internet and running software I understand.&lt;/p&gt;
&lt;h2 id=&#34;thank-you&#34;&gt;Thank you&lt;/h2&gt;
&lt;p&gt;Thanks for reading this post.
This is the last in my starting series discussing the big picture as I see it.
I also want to thank my first paid subscriber!
Moving forward upcoming articles will be about small scale improvements and how to bring them to your life. Premium articles will be similar to these big picture musings.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>You have a right to remain silent, but your data doesn&#39;t!</title>
		<link>https://libresolutions.network/articles/2-you-have-a-right-to-remain-silent/</link>
		<pubDate>Fri, 03 Dec 2021 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/2-you-have-a-right-to-remain-silent/</guid>
		
		<image>https://libresolutions.network//media/images/big-data2.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/images/big-data2.webp" />
		<itunes:image href="https://libresolutions.network//media/images/big-data2.webp" />
		<description>Demystifying the all-seeing eye</description>
		<content:encoded>&lt;h2 id=&#34;where-is-the-data&#34;&gt;Where is the data?&lt;/h2&gt;
&lt;p&gt;Data-driven services are ubiquitous. They all feed into machine learning algorithms who’s purpose is to decode the human psyche.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;E-mail providers scan your e-mails to learn about your interests &amp;amp; online purchases&lt;/li&gt;
&lt;li&gt;Entertainment services gather all kinds of information about what catches your attention and stimulates specific emotions&lt;/li&gt;
&lt;li&gt;Every time you spend money financial institutions and retailers are analyzing your explicit and implicit voting with your wallet.&lt;/li&gt;
&lt;li&gt;Social media and other communication services can adequately measure your individual impact as well as gauge messaging.&lt;/li&gt;
&lt;li&gt;Advertising platforms catalogue and collect not only which sites you visit but how you navigate within and between them.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;how-is-it-used&#34;&gt;How is it used?&lt;/h2&gt;
&lt;p&gt;You may not mind amazon knowing what packages you order. You may not mind google knowing everywhere you have been. You may also be unbothered by your bank knowing your financial history. It’s not a big deal that social media networks are aware of every human that is aware of you. Surely there is nothing wrong with further and further data collection of everything?&lt;/p&gt;
&lt;p&gt;The trouble comes when all this information is bundled and sold off to other data warehouses to train more sophisticated AI which is then used to provide input to corporations and institutions. This isn’t simply a ‘social credit system’ this is the groundwork for skynet’s total domination of humanity.&lt;/p&gt;
&lt;p&gt;That does sound extreme but consider that this data analysis won’t end with humans. We were simply the easy part because we were able to be tricked into adopting and feeding these systems. Smart contracts are a fascinating aspect of blockchain technology but in this light they are a terrifying tool for the Internet of Things™ to begin tracking and tracing every atom on this planet.&lt;/p&gt;
&lt;h2 id=&#34;how-does-that-hurt-you&#34;&gt;How does that hurt you?&lt;/h2&gt;
&lt;p&gt;Back to the little picture, there are already very sophisticated systems learning about you specifically and as a human creature. There will never be any guarantee that these tools will be used for your benefit. All indications point to these systems being used to extract as much value from you as possible as quickly as possible regardless.&lt;/p&gt;
&lt;p&gt;In fact this is precisely why Youtube has been named as a agent provocateur in the culture wars. Youtube’s recommendation algorithm has been given a lot of flak for ‘radicalizing’ people. This isn’t because Youtube has any specific desire to create extremists, but rather that was a side-effect of maximizing engagement. That was a relatively simple system compared to recent more refined machine learning algorithms.&lt;/p&gt;
&lt;p&gt;You have no way of knowing that insidious goals you are being nudged along with and odds are there are many running in parallel. Occasionally someone will point to some benevolent outcome of these systems but these will always be overshadowed by the grievous harms caused by abusing such power.&lt;/p&gt;
&lt;h2 id=&#34;what-you-can-do-to-mitigate-it&#34;&gt;What you can do to mitigate it?&lt;/h2&gt;
&lt;p&gt;The only proper way to protect data is to not collect it in the first place. Many data breaches have revealed that a company saying their data is ‘secure’ is merely a promise. Encryption can usually be broken by breaking the people safeguarding it.&lt;/p&gt;
&lt;p&gt;This means avoiding data-driven services and tools as much as possible. Trading with cash or barter eliminates economic tracing. Physical mail is already more secure than e-mail especially when delivered via a trusted courier.&lt;/p&gt;
&lt;p&gt;Because of this, the sneaker-net is the only secure digital network. Handing someone a flash drive with the files they want won’t create any metadata about what was transferred.&lt;/p&gt;
&lt;p&gt;This is not a binary choice however, you will have to make compromises. The benefits are still quite large, because the less these systems know about you the less the effects can compound against you. Every byte of data not recorded will potentially save lives in the future.&lt;/p&gt;
&lt;p&gt;If data must be recorded (such as data with great public interest) blockchains are a great tool for this because you can guarantee the data is public and therefore at least people are on a level playing field. This is much better than the alternative where you provide data to a corporate or government database that will be used with little or no transparency.&lt;/p&gt;
&lt;h2 id=&#34;political-solutions&#34;&gt;Political solutions&lt;/h2&gt;
&lt;p&gt;A digital bill of rights is long overdue. As we have seen, rights must be (nearly?) absolute and require enforcement mechanisms. There must be no distinction made between who may or may not infringe on these rights, none are to be permitted.&lt;/p&gt;
&lt;p&gt;My short list for inclusion in a digital bill of rights would be:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Services and Software are only allowed to collect data that is required for the specific features used by the user to function. Any data sharing must always be opt-in&lt;/li&gt;
&lt;li&gt;Identity should never be required for any platform or service, discrimination against anonymous users should not be allowed.&lt;/li&gt;
&lt;li&gt;Users must have the tools for filter their own experience where possible. Allowing users to choose what content to filter is a much preferable option to blanket bans and censorship.&lt;/li&gt;
&lt;li&gt;Interoperability is a must, unnecessary lock-in should be treated as anti-competitive behavior.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Educating people on the current state of systems will be the most vital part of this challenge. The Libre Solutions Network is being built with an explicit goal in advancing this. This is very much a moral challenge as well as a technological one.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>Emancipate your mind from mental slavery</title>
		<link>https://libresolutions.network/articles/1-emancipate-yourself-from-mental-slavery/</link>
		<pubDate>Thu, 25 Nov 2021 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/articles/1-emancipate-yourself-from-mental-slavery/</guid>
		
		<image>https://libresolutions.network//media/1-not-immune.webp</image>
		<media:thumbnail href="https://libresolutions.network//media/1-not-immune.webp" />
		<itunes:image href="https://libresolutions.network//media/1-not-immune.webp" />
		<description>Why care about Freedom? Why care about privacy? Why does any of this matter?</description>
		<content:encoded>&lt;p&gt;You are not immortal, and you can be fooled from time to time.
This is okay, admitting it is much more important than being right all the time.
Admitting you are wrong, and can be is the very thing that allows you to escape the prison of lies. In fact, admitting it can do a great deal of good in helping free other people from false illusions.&lt;/p&gt;
&lt;div class=&#34;image-container&#34;&gt;
    
&lt;img loading=&#34;lazy&#34;
src=&#39;https://libresolutions.network/media/1-not-immune.webp&#39; 
&gt;



&lt;/div&gt;
&lt;p&gt;My goals with the Libre Solutions Network are:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;To help people recognize the digital tools weaponized against them&lt;/li&gt;
&lt;li&gt;To connect people with groups, ideas, and tools that help people maintain and advance their freedom.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Freedom is your right to determine your future on your own terms.&lt;/p&gt;
&lt;p&gt;Privacy prevents systems, institutions and people from leveraging information to undermine that freedom. Often very innocuous, seemingly-unrelated information can be used to manipulate and control people.&lt;/p&gt;
&lt;p&gt;The goal of understanding digital privacy shouldn’t be to achieve a life of perfect secrecy. Self-censorship is one of the most powerful kinds of censorship that is used against people. Instead the goal is to make sure that the information that is collected on you is as deliberate as possible, by avoiding unintentional disclosure.&lt;/p&gt;
&lt;p&gt;Freedom is your most valuable asset. Odds are you are not the most powerful human being on the planet. Therefore it is vital that you understand you are at a disadvantage in terms of information, resources, and representation. Freedom, privacy, and security are all vital tools to shift the balance of power back into your favor.&lt;/p&gt;
&lt;h2 id=&#34;social-media&#34;&gt;Social Media&lt;/h2&gt;
&lt;p&gt;It would be all to easy to simply say “social media is manipulating you” this is overwhelmingly true but needs to be broken down into the specific methods. Social media is incredibly powerful because it latches onto your primal needs to feel accepted and validated by others. The power social media derives is primarily driven by people attaching status to influence on these platforms.&lt;/p&gt;
&lt;h2 id=&#34;media-sorting-and-filtering&#34;&gt;Media sorting and filtering&lt;/h2&gt;
&lt;p&gt;Almost everyone intuitively understands that when moderators of a community or site remove posts this impacts people’s ability to be exposed to that information. What is not as clear is that the order in which the information is presented is just as impactful.&lt;/p&gt;
&lt;p&gt;How many people will scroll to read each and every comment on a particular post? Certainly not the majority. In many ways content that is slid down the feed may as well have been removed in many instances.&lt;/p&gt;
&lt;p&gt;There are many techniques that can be used to work against this, but in general you want to be sure that your posts are being sorted in an unbiased way (such as chronologically) if possible.&lt;/p&gt;
&lt;h2 id=&#34;trends&#34;&gt;“Trends”&lt;/h2&gt;
&lt;p&gt;On almost any site the chosen “trending topics” are an editorial decision by the people running the site. This can involve them choosing every single one, or simply removing undesired trends.&lt;/p&gt;
&lt;p&gt;Trends can send the false impression that these are the “most important topics” at any given time. This is always false because each person has different priorities and challenges at any given time.&lt;/p&gt;
&lt;h2 id=&#34;reward-mechanisms&#34;&gt;Reward mechanisms&lt;/h2&gt;
&lt;p&gt;People liking and sharing your posts enhances your reach and will help boost your own perceived status. This is very good at manipulating people.&lt;/p&gt;
&lt;p&gt;For now it is up to your friends and followers to ‘like’ your posts to provide you with the feedback mechanism that your posts are important. There is no rule that it will stay that way. Sites could experiment with paying cryptocurrency to users who make certain kinds of posts.&lt;/p&gt;
&lt;h2 id=&#34;nudging&#34;&gt;Nudging&lt;/h2&gt;
&lt;p&gt;Ever experience a strange glitch while using social media? It may not actually be just a glitch. Many mainstream social media sites have run psychological experiments on their users to evaluate how they respond to particular situations.&lt;/p&gt;
&lt;p&gt;Every aspect of your interactions are being recorded to further shape your behavior on the platform. Your attention and engagement are the primary signals to these algorithms.&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;These are all very concerning because regardless of the specific platform, anyone with write-access to the software that runs these systems can alter information that most would assume is unaltered. There is never a guarantee that the ‘likes’ you are being shown on a post are actually promoting that post. You can never be sure that anyone has seen your content at all.&lt;/p&gt;
&lt;p&gt;This is not to say that nothing on these platforms has an impact, but it is vital to understand that there are ways that systems can work against you.&lt;/p&gt;
&lt;p&gt;Thank you for reading.&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	<item>
		<title>How to help the Libre Solutions Network</title>
		<link>https://libresolutions.network/about/support/</link>
		<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
		<guid>https://libresolutions.network/about/support/</guid>
		
		<description></description>
		<content:encoded>&lt;p&gt;The Libre Solutions Network is a multi-media passion project.&lt;br&gt;
If you find value in this work, any assistance would go a long way to help make it viable.&lt;/p&gt;
&lt;h2 id=&#34;feedback&#34;&gt;Feedback&lt;/h2&gt;
&lt;p&gt;This project is primarily a labor of love for my own personal and professional development.&lt;br&gt;
Any thoughts, queries, or suggestions are entirely welcome.&lt;br&gt;
You can get involved with the discussion by following this project on the &lt;a href=&#34;https://fedi.libresolutions.network/@lsn&#34;&gt;fediverse&lt;/a&gt; or via &lt;a href=&#34;https://libresolutionsnetwork.substack.com/subscribe&#34;&gt;Substack.&lt;/a&gt;&lt;br&gt;
Direct contact is also possible via a &lt;a href=&#34;https://gabe.rocks/get-in-touch/&#34;&gt;variety of means.&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;one-time-donations&#34;&gt;One-time donations&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Now supporting &lt;a href=&#34;https://xmrchat.com/lsn&#34;&gt;XMRChat&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;You can also donate with &lt;a href=&#34;https://buymeacoffee.com/libresolutionsnetwork&#34;&gt;Buy Me a Coffee&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://gabe.rocks/get-in-touch/#gifts&#34;&gt;Other gifts&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;style&gt;
    #support-buttons {
        flex-direction: column;
        align-items: center;
        background: linear-gradient(180deg, var(--glass-darker), transparent, var(--glass-darker));
        border-left: 3px solid var(--accent-lighter);
        border-right: 3px solid var(--accent-lighter);
        padding: 10px;
        border-radius: 15px;
    }

    #support-buttons h2 {
        margin: 5px;
    }

    #support-buttons a {
        margin: 0px;
    }

    #support-buttons button {
        background: linear-gradient(180deg, var(--btn), var(--btn2), var(--btn));
        font-size: large;
        padding: 5px;
        width: 8rem;
        text-shadow: black 2px 2px 2px;
        color: white;
        font-family: &#34;arial&#34;;
        font-weight: bolder;
    }
&lt;/style&gt;
&lt;div id=&#34;support-buttons&#34; style=&#34;margin-left:0.5rem;margin-right:0.5rem;&#34;&gt;

    &lt;h2 style=&#34;width:100%;text-align: center;font-size:xx-large;&#34;&gt;Support this work&lt;/h2&gt;
    &lt;p&gt;Join the discussion&lt;/p&gt;
    &lt;a href=&#34;https://xmrchat.com/lsn&#34;&gt;&lt;button
            style=&#34;--btn:orange;--btn2:rgb(137, 81, 3);&#34;&gt;XMRChat&lt;/button&gt;&lt;/a&gt;
    &lt;a href=&#34;https://libresolutionsnetwork.substack.com/subscribe&#34;&gt;&lt;button
            style=&#34;--btn:rgb(255, 102, 0);--btn2:rgb(172, 75, 15);&#34;&gt;Substack&lt;/button&gt;&lt;/a&gt;
    &lt;p&gt;Support new initiatives&lt;/p&gt;
    &lt;a href=&#34;https://liberapay.com/Gabe/donate&#34;&gt;&lt;button
            style=&#34;--btn:rgb(255, 255, 97);--btn2:rgb(110, 95, 0);&#34;&gt;Liberapay&lt;/button&gt;&lt;/a&gt;
    &lt;a href=&#34;https://buymeacoffee.com/libresolutionsnetwork&#34;&gt;&lt;button
            style=&#34;--btn:rgb(0, 179, 255);--btn2:rgb(8, 62, 120);&#34;&gt;Buy Me a Coffee&lt;/button&gt;&lt;/a&gt;
    &lt;p&gt;&lt;a href=&#34;https://libresolutions.network/articles/why/&#34;&gt;Why support this work?&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;If you would like to support specific improvements or use an alternative payment method, feel free to &lt;a href=&#34;mailto:gabriel@libresolutions.network?subject=Initiative%20funding&#34;&gt;get in touch&lt;/a&gt;&lt;/p&gt;
💌 Thank you for reading this via RSS 📡
		&lt;p&gt;This project is a labor of love.&lt;br&gt;&lt;a href=&quot;https://libresolutions.network//about/support/&quot;&gt;Send support!&lt;/a&gt;&lt;/p&gt;
		</content:encoded>
	</item>
	</channel>
</rss>
