Articles

The Frequency of Dissent

The Frequency of Dissent

Mesh networks turn every radio into a relay and every user into infrastructure, creating communication grids with no center to seize.

Your Software Runs on Enemy Infrastructure

Your Software Runs on Enemy Infrastructure

Freedom tech projects build censorship-resistant tools on censorship-susceptible platforms. The Nostr stack offers a coherent migration path for sovereign development infrastructure.

When They Come for the Protocols

When They Come for the Protocols

Governments cannot kill open protocols, so they imprison the humans who write them, spending $275 billion per year to catch nothing.

A Constitution for the Ungoverned

A Constitution for the Ungoverned

Medieval merchants and diaspora communities built functional legal systems without states; their principles can now govern disputes in cyberspace.

The Algebra of Trust

The Algebra of Trust

Anonymous commerce requires solving the trust problem, and the solution may be to treat trust itself as a quantifiable, tradeable commodity.

Strategic Intelligence for Freedom-Builders: Paul Rosenberg's Quarterly Newsletter

Strategic Intelligence for Freedom-Builders: Paul Rosenberg's Quarterly Newsletter

Rosenberg predicted Bitcoin in fiction seven years early. His quarterly newsletter delivers strategic intelligence for freedom-builders, not commentary for readers.

The Praxeology of Privacy ~ Chapter 21: Building the Parallel Economy

The Praxeology of Privacy ~ Chapter 21: Building the Parallel Economy

The parallel economy grows through counter-economics. Cheap defense defeats expensive attack. When theft becomes unprofitable, the state withers. Build. Trade. Resist.

The Praxeology of Privacy ~ Chapter 20: Implementation Strategy

The Praxeology of Privacy ~ Chapter 20: Implementation Strategy

Start with honest assessment. Build progressively from basics to advanced. Find community. Privacy is not a destination but ongoing practice. Progress matters.

The Praxeology of Privacy ~ Chapter 15: Bitcoin: Resistance Money

The Praxeology of Privacy ~ Chapter 15: Bitcoin: Resistance Money

Bitcoin solves double-spending without trusted third parties. Sound money enforced by code. Base layer privacy requires additional tools like Lightning and coinjoin.

The Praxeology of Privacy ~ Chapter 13: Cryptographic Foundations

The Praxeology of Privacy ~ Chapter 13: Cryptographic Foundations

Cryptography provides mathematical privacy foundations: encryption, hashing, and digital signatures enable trustless verification. Implementation bugs and human error remain the weakest links.

The Praxeology of Privacy ~ Chapter 12: The Crypto Wars

The Praxeology of Privacy ~ Chapter 12: The Crypto Wars

The Crypto Wars pit states against privacy technology. Mathematics ignores legislation. Developers face prosecution. The fundamental conflict is permanent and intensifying.

The Praxeology of Privacy ~ Chapter 11: Corporate Surveillance and Data Extraction

The Praxeology of Privacy ~ Chapter 11: Corporate Surveillance and Data Extraction

Corporate surveillance extracts behavioral data for prediction products. State and corporate surveillance are deeply entangled. Markets are responding to growing privacy demand.

The Praxeology of Privacy ~ Chapter 5: The Axiom of Resistance

The Praxeology of Privacy ~ Chapter 5: The Axiom of Resistance

The Axiom of Resistance assumes systems can resist control. Mathematics, empirical evidence, and similar systems support this well-grounded but non-self-evident assumption.

The Praxeology of Privacy ~ Chapter 2: Two Traditions, One Conclusion

The Praxeology of Privacy ~ Chapter 2: Two Traditions, One Conclusion

Austrian economics and cypherpunk practice converge independently on privacy's importance. Theory explains why; code demonstrates how. This book synthesizes both traditions.

The Praxeology of Privacy ~ Chapter 1: The Nature of Privacy

The Praxeology of Privacy ~ Chapter 1: The Nature of Privacy

Privacy is selective disclosure, not hiding. Breaking adversary observation through the OODA loop is strategic defense. Cheap privacy defeats expensive surveillance.

The Praxeology of Privacy ~ Preface

The Praxeology of Privacy ~ Preface

Austrian economists theorize but cannot build. Cypherpunks build but lack theory. This book synthesizes both to make the state irrelevant.

Seven Resolutions

Seven Resolutions

Freedom requires commitment, not sentiment. Seven resolutions define the ethical foundation for those who would build a voluntary society instead of complaining.

The Quiet Departure

The Quiet Departure

The loudest revolutions fail; the quiet ones succeed. We do not protest or petition. We build alternatives and simply leave.

Builders, Not Talkers

Builders, Not Talkers

Decades of libertarian theory and cypherpunk tools have produced almost nothing because ideas without builders are worthless. Act or leave us alone.

No Papers Required: How Zapstore Breaks the App Store Checkpoint

No Papers Required: How Zapstore Breaks the App Store Checkpoint

Developer KYC creates chokepoints that authoritarian governments ruthlessly exploit. Zapstore restores permissionless software distribution using cryptographic identity instead of government papers.

The Cypher Wars: Choose Your Weapon Wisely

The Cypher Wars: Choose Your Weapon Wisely

Use ChaCha20-Poly1305 everywhere without hardware AES. Use AES-256-GCM with AES-NI. Never reuse nonces. Prefer AEAD always.

Summary of: The Praxeology of Privacy ~ Economic Logic in Cypherpunk Implementation

A book explaining why Privacy = Economic necessity proven through Austrian logic. Three axioms (Action + Argumentation + Resistance) demonstrate that surveillance destroys market calculation like socialist planning, while cryptography restores conditions for voluntary coordination. Complete bridge between Austrian economics and cypherpunk technology.