Articles
137 articles
Money and Privacy
Money emerges by market process. Sound money carries privacy alongside its three classical functions; fiat lacks all four.
Privacy as Capital
Privacy tools are capital that compounds across uses; institutional promises last only as long as state goodwill does.
The Economic Value of Privacy
Privacy aids exchange by guarding deliberation and negotiation from observation that chills marginal trades and distorts the rest.
Sleep in a Net
Mexican matrimonial hammocks beat beds for comfort and free the whole room when unhooked. Sleep diagonally, flat back, anywhere on earth.
Information, Scarcity, and Property
Property rights apply to scarce things. Information is non-scarce, so privacy stands on self-ownership, owned media, and contract.
Chapter 5: The Axiom of Resistance
Systems can be designed to resist external control. The claim rests on computational hardness and the record of deployed tools.
Chapter 4: The Argumentation Axiom and Self-Ownership
To argue is to presuppose control of body and mind. Coerced surveillance breaks that presupposition and counts as aggression.
Chapter 3: The Action Axiom: Privacy as Structural Feature
Privacy is built into the structure of human action. Deliberation and the asymmetry between actor and observer are structural.
Chapter 2: Two Traditions, One Conclusion
Austrian deduction and cypherpunk code reach the same privacy conclusion from opposite directions. Their agreement is evidence.
Where Do You Want to Wake Up Tomorrow
Forty thousand forest parking spots across Europe, auto-discovered from open map data, scored for silence, isolation, and trees. Free download below.
Chapter 1: The Nature of Privacy
Privacy is control over disclosure. Observation cost decides if any targeted intervention runs, and cypherpunk tools raise it.
The Praxeology of Privacy: Endorsements, Foreword, Preface
Third edition, joining Austrian economics and cypherpunk engineering on what privacy is, why it survives, and how to defend it.
The Engineering Choice Between Complicated and Complex
Bitcoin converts a complex monetary problem into a complicated protocol, absorbing irreducible uncertainty into deterministic rules any node operator can verify.
Where to Start with Rothbard: A Reading Guide to His Major Works
Murray Rothbard built the most internally consistent radical libertarian system of the 20th century. This guide shows where to enter it.
The Instrument Returns: An Introduction to Bitcredit
Bitcredit is the concrete protocol reconstructing bills of exchange on Bitcoin, closing the credit layer gap that prior posts have diagnosed.
Two Roads to a Network Without Permission: Reticulum and FIPS
Reticulum and FIPS both build permissionless encrypted meshes, but they differ radically in routing, crypto primitives, and their relationship to IP.
The Key Inside the Ciphertext: A Full Introduction to PIPEs v2
PIPEs v2 turns spend conditions into key-recovery conditions, letting Bitcoin enforce proof-gated authorization through ordinary Schnorr signatures and extraordinary off-chain cryptography.
Computing on Secrets
Services no longer need to see data to compute on it. Cryptographic and hardware primitives make that contract a deployed reality.
The Missing Credit Layer
The parallel economy has sound money and encrypted communication but still lacks the credit layer needed to finance production across time.
Every Crowd Hides You Differently
From Bitcoin CoinJoin to zero-knowledge proofs, every serious approach to financial privacy bets on a different crowd to disappear into.