Money and Privacy

Money and Privacy

Money emerges by market process. Sound money carries privacy alongside its three classical functions; fiat lacks all four.

Privacy as Capital

Privacy as Capital

Privacy tools are capital that compounds across uses; institutional promises last only as long as state goodwill does.

The Economic Value of Privacy

The Economic Value of Privacy

Privacy aids exchange by guarding deliberation and negotiation from observation that chills marginal trades and distorts the rest.

Sleep in a Net

Sleep in a Net

Mexican matrimonial hammocks beat beds for comfort and free the whole room when unhooked. Sleep diagonally, flat back, anywhere on earth.

Information, Scarcity, and Property

Information, Scarcity, and Property

Property rights apply to scarce things. Information is non-scarce, so privacy stands on self-ownership, owned media, and contract.

Chapter 5: The Axiom of Resistance

Chapter 5: The Axiom of Resistance

Systems can be designed to resist external control. The claim rests on computational hardness and the record of deployed tools.

Chapter 4: The Argumentation Axiom and Self-Ownership

Chapter 4: The Argumentation Axiom and Self-Ownership

To argue is to presuppose control of body and mind. Coerced surveillance breaks that presupposition and counts as aggression.

Chapter 3: The Action Axiom: Privacy as Structural Feature

Chapter 3: The Action Axiom: Privacy as Structural Feature

Privacy is built into the structure of human action. Deliberation and the asymmetry between actor and observer are structural.

Chapter 2: Two Traditions, One Conclusion

Chapter 2: Two Traditions, One Conclusion

Austrian deduction and cypherpunk code reach the same privacy conclusion from opposite directions. Their agreement is evidence.

Where Do You Want to Wake Up Tomorrow

Where Do You Want to Wake Up Tomorrow

Forty thousand forest parking spots across Europe, auto-discovered from open map data, scored for silence, isolation, and trees. Free download below.

Chapter 1: The Nature of Privacy

Chapter 1: The Nature of Privacy

Privacy is control over disclosure. Observation cost decides if any targeted intervention runs, and cypherpunk tools raise it.

The Praxeology of Privacy: Endorsements, Foreword, Preface

The Praxeology of Privacy: Endorsements, Foreword, Preface

Third edition, joining Austrian economics and cypherpunk engineering on what privacy is, why it survives, and how to defend it.

The Engineering Choice Between Complicated and Complex

The Engineering Choice Between Complicated and Complex

Bitcoin converts a complex monetary problem into a complicated protocol, absorbing irreducible uncertainty into deterministic rules any node operator can verify.

Where to Start with Rothbard: A Reading Guide to His Major Works

Where to Start with Rothbard: A Reading Guide to His Major Works

Murray Rothbard built the most internally consistent radical libertarian system of the 20th century. This guide shows where to enter it.

The Instrument Returns: An Introduction to Bitcredit

The Instrument Returns: An Introduction to Bitcredit

Bitcredit is the concrete protocol reconstructing bills of exchange on Bitcoin, closing the credit layer gap that prior posts have diagnosed.

Two Roads to a Network Without Permission: Reticulum and FIPS

Two Roads to a Network Without Permission: Reticulum and FIPS

Reticulum and FIPS both build permissionless encrypted meshes, but they differ radically in routing, crypto primitives, and their relationship to IP.

The Key Inside the Ciphertext: A Full Introduction to PIPEs v2

The Key Inside the Ciphertext: A Full Introduction to PIPEs v2

PIPEs v2 turns spend conditions into key-recovery conditions, letting Bitcoin enforce proof-gated authorization through ordinary Schnorr signatures and extraordinary off-chain cryptography.

Computing on Secrets

Computing on Secrets

Services no longer need to see data to compute on it. Cryptographic and hardware primitives make that contract a deployed reality.

The Missing Credit Layer

The Missing Credit Layer

The parallel economy has sound money and encrypted communication but still lacks the credit layer needed to finance production across time.

Every Crowd Hides You Differently

Every Crowd Hides You Differently

From Bitcoin CoinJoin to zero-knowledge proofs, every serious approach to financial privacy bets on a different crowd to disappear into.