#freedom-tech
123 items · 123 articles
Articles
The Instrument Returns: An Introduction to Bitcredit
Bitcredit is the concrete protocol reconstructing bills of exchange on Bitcoin, closing the credit layer gap that prior posts have diagnosed.
Two Roads to a Network Without Permission: Reticulum and FIPS
Reticulum and FIPS both build permissionless encrypted meshes, but they differ radically in routing, crypto primitives, and their relationship to IP.
The Key Inside the Ciphertext: A Full Introduction to PIPEs v2
PIPEs v2 turns spend conditions into key-recovery conditions, letting Bitcoin enforce proof-gated authorization through ordinary Schnorr signatures and extraordinary off-chain cryptography.
Computing on Secrets
Services no longer need to see data to compute on it. Cryptographic and hardware primitives make that contract a deployed reality.
The Missing Credit Layer
The parallel economy has sound money and encrypted communication but still lacks the credit layer needed to finance production across time.
Every Crowd Hides You Differently
From Bitcoin CoinJoin to zero-knowledge proofs, every serious approach to financial privacy bets on a different crowd to disappear into.
The Hard Part of Multi-Device Messaging
MIP-06 proposes the protocol basis for White Noise multi-device group membership, letting each device securely join as its own MLS leaf.
The Capital Structure of War
Cheap drones expose the state's war machine: centralized militaries accumulate fragile capital while decentralized force converts low-cost tools into strategic advantage.
The Third Court: Insurance, Arbitration, and the Private Production of Justice
Insurance prices risk, arbitration resolves disputes, restitution makes victims whole, and cryptographic enforcement binds them all into one complete system.
Inside Marmot: Six Specs That Make Private Group Messaging Work
Six protocol specs define how the Marmot Protocol delivers fully encrypted group messaging on Nostr without centralized servers or metadata leaks.
The Machine Cannot Want Your Job
Smart machines relocate comparative advantage; the weaker worker keeps value only where human judgment, ownership, and presence still command a premium.
Chaining Agents Needs a Spine
Most agent chains fail because they pass work around without narrowing the task, and the Ralph loop forces actual, reliable closure.
The Problem They Said Could Not Be Solved
The builders of the best encrypted messengers declared decentralized group encryption impossible. The Marmot protocol proved them wrong.
Sign What You Cannot See: A Field Guide to Blind Signatures
Four decades of blind signatures show that one algebraic trick, letting someone sign what they cannot see, protects ecash and CoinJoin.
The vibes are strong with this one
Shaka reimplements PAI's personal AI architecture from scratch with different tradeoffs, and the fact that the same primitives survived the rewrite says something about the design.
The Frequency of Dissent
Mesh networks turn every radio into a relay and every user into infrastructure, creating communication grids with no center to seize.
Your AI Should Answer to You: PAI vs. OpenClaw
PAI turns Claude Code into composable personal infrastructure you own through Markdown files. OpenClaw routes messages through a daemon you maintain.
Your Nostr Key Is Your Network Address
FIPS makes your Nostr npub a routable network address, unifying identity across social and infrastructure layers in a single self-sovereign keypair.
The Market for Peace
War persists because profits concentrate among those who wage it while costs disperse across those who must suffer and pay.
The Price of Blood
Every civilization before the modern state treated crime as a debt owed to the victim, enforced through restitution and community insurance.
The Merchant Court Returns
Justice is a service that degrades under monopoly and improves under competition. Merchants proved this; now builders are proving it again.
Self-Liquidating Credit: The Instrument That Destroys Itself
Bills of exchange carried a built-in death date and extinguished themselves as goods reached market; modern debt compounds forever by design.
Your Software Runs on Enemy Infrastructure
Freedom tech projects build censorship-resistant tools on censorship-susceptible platforms. The Nostr stack offers a coherent migration path for sovereign development infrastructure.
Verify Anyone on Any Channel
A simple challenge-response app can verify Nostr identities across any anonymous channel by querying the follow graph users already built.
When They Come for the Protocols
Governments cannot kill open protocols, so they imprison the humans who write them, spending $275 billion per year to catch nothing.
The Mobile Podcast Setup That Actually Works
Testing earbuds, wired mics, and USB-C wireless systems revealed the Yealink BH71 as the best mobile podcast solution for GrapheneOS.
Programmable Magic Internet Money: How Nostr Apps Can Monetize Ethically and Profitably
Bitcoin plus Nostr creates programmable money that solves software monetization through micropayments respecting user sovereignty.
The Engine of Prosperity: How Four Sources Drive All Economic Progress
Four sources of economic progress form an interdependent system that emerges spontaneously from voluntary exchange when property rights remain completely intact.
The Credit Famine: How Modern Banking Starves Real Commerce
Modern banking systematically transformed from credit creator to deliberate gatekeeper, engineering $2.5 trillion trade finance gap while earning billions from derivatives.
The Mathematics That Bridges Bitcoin: From BitVM to Argo
Cryptographic enforcement succeeds where trust fails, and nowhere does this principle matter more than in Bitcoin's quest for trustless bridges.
The Non-Computational Nature of Agency
Vervaeke proves agency emerges from non-algorithmic relevance realization, explaining why Bitcoin and Nostr preserve human autonomy while algorithmic systems destroy it.
The Code Liberation: How AI Makes Software Infinitely Customizable
When AI handles compilation and patching tasks, source-based computing finally escapes the domain of experts, ending decades of binary distribution monopoly.
The Anatomy of Aggression
Rothbard's typology classifies all state intervention into autistic, binary, and triangular forms, revealing the common thread of coercive aggression beneath policy complexity.
The Merchant's Return: When Systems Fail, Producers Prosper
Being cast out of the system reveals its deepest secret: you were never its beneficiary, only its fuel. Freedom begins with this recognition.
Another round of patience
Time preference reveals through lending at interest rates. Hoarding refuses all rates, demanding present possession. Expected gains are speculation, not deferral.
Temporary Autonomous Zones: The Economics of Exit
When defense costs less than attack and property emerges through daily practice, autonomous zones become economically sustainable refuges.
The Root of Money
Money is neither vice nor virtue but the material expression of human judgment exercised through time. Only parasites hate it.
A Constitution for the Ungoverned
Medieval merchants and diaspora communities built functional legal systems without states; their principles can now govern disputes in cyberspace.
Build for the Mole
Infiltration is inevitable; detection is unreliable. The real defense against state informants is building organizations where their presence cannot accomplish its purpose.
Securing the Second Realm
Security in autonomous zones means making attack uneconomical through deterrence, distributed defense, and eternal vigilance against any protector becoming predator.
A Vibe Coding Setup in Your Pocket
GrapheneOS now runs a hardware-isolated Debian VM on your phone, and OpenCode provides open-source AI coding against any provider you choose.
The Third Option
Libertarian strategy gains more from building parallel institutions that coexist with state power than from reform or territorial exit.
The Consumption You Call Saving
Holding money does not defer gratification but consumes the opportunity cost of lending, making hoarding a present expense rather than proof of low time preference.
The Moral Case for Debt Repudiation
Public debt differs fundamentally from private debt: politicians pledge our wealth, bondholders knowingly invest in future theft, so repudiation restores justice.
The Algebra of Trust
Anonymous commerce requires solving the trust problem, and the solution may be to treat trust itself as a quantifiable, tradeable commodity.
The Constitution That Isn't One
The Universal Principles of Liberty codifies libertarian jurisprudence as discovered law, providing a meta-normative baseline for decentralized justice without sovereign authority.
The Action That Accomplishes Nothing
Decentralization does not prevent the adversary from acting against you. It ensures that his action accomplishes nothing.
The Cheapest Defense
Privacy blinds the adversary's OODA loop at observation. When defense costs pennies and attack costs millions, surveillance becomes unprofitable.
The Price of Patience
Hoarding is not low time preference; only lending expresses it. Wealth lowers time preference via diminishing marginal utility, not the reverse.
The Price of Patience
Hoarding is not low time preference; only lending expresses it. Wealth lowers time preference via diminishing marginal utility, not the reverse.
Protocols for the Ungoverned
Functional legal orders emerge from voluntary adoption and competitive governance, not top-down decree; history proves that polycentric law outperforms territorial monopoly.
The Right to Walk Away: Angor and the Future of Bitcoin Crowdfunding
Angor gives investors what ICOs and crowdfunding never could: the cryptographic ability to recover their funds if projects fail to deliver.
The Poverty Lever: Why Regimes Want You Just Above Starving
Maximum political control comes not from wealth redistribution but from calibrated poverty: desperate enough to depend, not desperate enough to revolt.
The Colossus Falls - How to End All War
Wars persist because each generation consents to fight them; a generation that refused would be history's last to die in trenches.
Credit Before Coin: How Markets Bootstrap Sound Money Economies
Bills of exchange don't just provide elasticity within existing monetary systems; they can bootstrap entire economies that lack base money.
What Your Loved One Is Actually Trying to Tell You
They haven't joined a cult. They stumbled onto questions they couldn't stop asking, and they love you too much to keep them to themselves.
The Candle's Work: Helping Loved Ones Escape the Most Dangerous Superstition
You cannot argue someone out of state worship. Plant questions, model freedom, preserve the relationship, and wait for the harvest.
Algorithms as Identities: Why NIP-85 Matters
NIP-85 makes each algorithm a Nostr identity. Users follow algorithm-keys, see their outputs, and switch freely.
Strategic Intelligence for Freedom-Builders: Paul Rosenberg's Quarterly Newsletter
Rosenberg predicted Bitcoin in fiction seven years early. His quarterly newsletter delivers strategic intelligence for freedom-builders, not commentary for readers.
The Praxeology of Privacy ~ Chapter 21: Building the Parallel Economy
The parallel economy grows through counter-economics. Cheap defense defeats expensive attack. When theft becomes unprofitable, the state withers. Build. Trade. Resist.
The Praxeology of Privacy ~ Chapter 20: Implementation Strategy
Start with honest assessment. Build progressively from basics to advanced. Find community. Privacy is not a destination but ongoing practice. Progress matters.
The Praxeology of Privacy ~ Chapter 19: Operational Security
Operational security prevents adversaries from gathering compromising information. Threat modeling guides defense. Human factors are the weakest link. Perfect OPSEC is impossible.
The Praxeology of Privacy ~ Chapter 18: Lessons from History
DigiCash, e-gold, and Silk Road failed through centralization and poor OPSEC. Bitcoin succeeded through decentralization, open source, and properly aligned economic incentives.
The Praxeology of Privacy ~ Chapter 17: Decentralized Social Infrastructure
Nostr solves identity capture through cryptographic keys users control. Relays compete, moderation is market-driven, and the protocol extends beyond social posts.
The Praxeology of Privacy ~ Chapter 16: Zero-Knowledge Proofs
Zero-knowledge proofs enable verification without disclosure. SNARKs, STARKs, and Bulletproofs make different tradeoffs. Deployed in Zcash and rollups; broader adoption developing.
The Praxeology of Privacy ~ Chapter 15: Bitcoin: Resistance Money
Bitcoin solves double-spending without trusted third parties. Sound money enforced by code. Base layer privacy requires additional tools like Lightning and coinjoin.
The Praxeology of Privacy ~ Chapter 14: Anonymous Communication Networks
The internet leaks metadata. VPNs help locally. Tor distributes trust through relays. Mixnets defeat global adversaries. Choose tools matching your threat model.
The Praxeology of Privacy ~ Chapter 13: Cryptographic Foundations
Cryptography provides mathematical privacy foundations: encryption, hashing, and digital signatures enable trustless verification. Implementation bugs and human error remain the weakest links.
The Praxeology of Privacy ~ Chapter 12: The Crypto Wars
The Crypto Wars pit states against privacy technology. Mathematics ignores legislation. Developers face prosecution. The fundamental conflict is permanent and intensifying.
The Praxeology of Privacy ~ Chapter 11: Corporate Surveillance and Data Extraction
Corporate surveillance extracts behavioral data for prediction products. State and corporate surveillance are deeply entangled. Markets are responding to growing privacy demand.
The Praxeology of Privacy ~ Chapter 10: Financial Surveillance and State Control
Financial surveillance enables state control through observation. CBDCs complete the architecture. Privacy breaks the OODA loop at observation, making theft unprofitable.
The Praxeology of Privacy ~ Chapter 9: Monetary Theory and Sound Money
Sound money emerges spontaneously from markets, not decrees. Bitcoin implements digital soundness with fixed supply and censorship resistance; privacy requires additional tools.
The Praxeology of Privacy ~ Chapter 8: Capital Theory and Entrepreneurship
Privacy infrastructure is capital requiring present sacrifice for future capability. Entrepreneurial discovery drives innovation. Markets coordinate heterogeneous privacy tools most effectively.
The Praxeology of Privacy ~ Chapter 7: Exchange Theory and Privacy
Privacy enhances exchange by protecting deliberation and enabling negotiation. Surveillance distorts prices and chills transactions. Better privacy means better functioning markets.
The Praxeology of Privacy ~ Chapter 6: Information, Scarcity, and Property
Information is non-scarce and cannot be property. Privacy is protected through self-ownership, physical property rights, and voluntary contracts, not intellectual property.
The Praxeology of Privacy ~ Chapter 5: The Axiom of Resistance
The Axiom of Resistance assumes systems can resist control. Mathematics, empirical evidence, and similar systems support this well-grounded but non-self-evident assumption.
The Praxeology of Privacy ~ Chapter 4: The Argumentation Axiom and Self-Ownership
Argumentation ethics demonstrates self-ownership through performative contradiction. Denying it while arguing presupposes it. Privacy rights follow directly from self-ownership.
The Praxeology of Privacy ~ Chapter 3: The Action Axiom: Privacy as Structural Feature
The Action Axiom proves privacy is structural to human action. Deliberation is internal; preferences are subjective; information asymmetry is inherent.
The Praxeology of Privacy ~ Chapter 2: Two Traditions, One Conclusion
Austrian economics and cypherpunk practice converge independently on privacy's importance. Theory explains why; code demonstrates how. This book synthesizes both traditions.
The Praxeology of Privacy ~ Chapter 1: The Nature of Privacy
Privacy is selective disclosure, not hiding. Breaking adversary observation through the OODA loop is strategic defense. Cheap privacy defeats expensive surveillance.
The Praxeology of Privacy ~ Preface
Austrian economists theorize but cannot build. Cypherpunks build but lack theory. This book synthesizes both to make the state irrelevant.
Breaking Free: Deprogramming State Dependence
Learned helplessness is the default response to prolonged state control; recovery requires demonstrating agency through deliberate action, not accumulating more theory.
Trust Without Ceremonies: How Nostr Fixed the Web of Trust
PGP's web of trust failed because it demanded explicit rituals. Nostr succeeds by extracting trust from ordinary social behavior.
Seven Resolutions
Freedom requires commitment, not sentiment. Seven resolutions define the ethical foundation for those who would build a voluntary society instead of complaining.
The Quiet Departure
The loudest revolutions fail; the quiet ones succeed. We do not protest or petition. We build alternatives and simply leave.
The Market's Money: Bills of Exchange and the Credit System Governments Killed
Bills of exchange were capitalism's self-regulating credit mechanism for seven centuries, until governments monopolized money creation and destroyed the entire system.
The Problem-Solver's Fortune
Wealth flows to those who solve others' problems, starting with their own, because subjective value makes every voluntary exchange mutual gain.
Builders, Not Talkers
Decades of libertarian theory and cypherpunk tools have produced almost nothing because ideas without builders are worthless. Act or leave us alone.
Own Your Outbox: Running Haven as Your Personal Nostr Relay
Your relay, your rules. Haven bundles four relay functions into one binary, easily deployable on a cheap VPS in an afternoon.
Free Men Will Build the Roads
Nobody asks who will bake the bread because markets already do it excellently; the roads question reveals statist capture of imagination.
The Trust Shift: Secure Enclaves for Private Nostr Relays
TEE relays shift trust from operators to chip manufacturers. For most threats, that trade is worth making, with eyes open.
The Predator's Pedestal
The state is not society's protector but its predator, surviving through ideology and intellectual capture, growing through war, vulnerable to withdrawn consent.
The Gap Between PIR and Nostr: Open Problems in Private Relay Queries
Can PIR hide Nostr queries from relays? Compound filters and subscriptions don't map to existing schemes. Here are the open problems.
The One Rule That Creates All Wealth
Prosperity has one prerequisite: do not steal. Secure property rights enable voluntary exchange, which accumulates capital fairly. The West is collapsing because governments have become systematic thieves.
The Last Leak: How MIP-05 Closes the Push Notification Surveillance Hole
Push notifications let governments track your messaging habits. MIP-05 encrypts device tokens with ephemeral keys, ensuring notification servers learn absolutely nothing.
Know Your Enemy, Name Your Defenses
Good security engineering means naming your enemies. Marmot's threat model specifies exactly which adversaries it defeats and how it defeats them.
Your Phone Without Permission Slips: The GrapheneOS Nostr Stack
GrapheneOS plus Zapstore, Amber, Citrine, Amethyst, and White Noise creates the first phone free from corporate control over your digital life.
Your Phone Is Not Your Property (Until You Install GrapheneOS)
Your smartphone surveils you by design. GrapheneOS transforms a Pixel into private hardware you actually control. Here's why it matters and how to do it.
The Reasonably Paranoid's Guide to Qubes OS: Why Isolation Beats Every Patch
Qubes OS assumes all software has bugs and isolates every application in separate virtual machines, containing breaches instead of preventing them.
The Case for Custodial Nostr: Why Teams Should Stop Fighting the Lost War
Organizations already delegate key custody internally. A server-side Nostr client with permission management would be faster, stabler, and more honest than relay-dependent remote signing hacks.
When Can We Meet? Cross-Server Busy Sync for Nextcloud
Nextcloud can't sync busy times across separate instances. This bash script uses CalDAV to share availability between multiple Nextcloud servers without exposing event details.
No Papers Required: How Zapstore Breaks the App Store Checkpoint
Developer KYC creates chokepoints that authoritarian governments ruthlessly exploit. Zapstore restores permissionless software distribution using cryptographic identity instead of government papers.
The Sacred Leaf: Paraguay, Tereré, and the Gods Who Understood Hospitality
Yerba mate outlasted every empire that tried to control it because the Guaraní built their ritual on hospitality, not permission.
The Great Decentralization Swindle: How Every Protocol But One Betrays Its Promise
The decentralized social landscape is littered with protocols that centralize through the back door. Nostr alone eliminates trusted third parties entirely, making it the only protocol where your identity truly belongs to you.
The Universal Principles of Liberty
A voluntary libertarian legal framework built on non-aggression, self-ownership, and property rights, with decentralized arbitration replacing state monopolies on law.
The Protocol Rothbard Would Have Built
Nostr implements Rothbard's anarcho-capitalist vision: cryptographic property rights, voluntary relay markets, and censorship-resistant communication without state-corporate gatekeepers.
The Cypher Wars: Choose Your Weapon Wisely
Use ChaCha20-Poly1305 everywhere without hardware AES. Use AES-256-GCM with AES-NI. Never reuse nonces. Prefer AEAD always.
Nostr-Native Distributed Storage System
The latest iteration of Garland, a privacy-preserving distributed storage system built on Nostr and Blossom, using erasure coding for durability and single-key recovery.
The Art of Waiting: Random Delays for Private Payments
Two scripts that randomize timing between Wasabi coinjoin rounds, making your payment patterns indistinguishable from organic human behavior.
When Math Catches Your Typos
Bech32's BCH code detects up to 4 typos with 100% certainty, locates up to 2 error positions, but deliberately refuses to auto-correct to prevent catastrophic mistakes.
Proving You Belong Without Saying Who You Are
Zero-knowledge proofs let Nostr users prove they're trusted without revealing their identity, enabling anonymous rate-limiting and reputation-gated relay access.
Counting Grains of Sand in an Infinite Universe: Why CoinJoin Privacy Doesn't Need Perfect Math
Coinjoin entropy becomes computationally impossible to calculate exactly for large transactions, but lower-bound estimates provide rigorous cryptographic guarantees through information theory.
Vanishing Secrets: Auto-Wipe Your Clipboard on Qubes OS
One command in your Qubes template installs `xsel` and creates an autostart service that wipes your clipboard 30 seconds after you copy anything. Works on Debian, Fedora, and Whonix minimal templates.
Disappear Into the Crowd: Wasabi's Hidden Payment Superpower
Three bash scripts to queue, cancel, and run Wasabi coinjoin payments from terminal - with smart denomination suggestions for maximum privacy.
Garland: Exploring the Architecture
We're exploring an architecture for Garland: Cryptomator for encryption, Blossom for blob storage, Nostr for state. Your nsec becomes your Cryptomator password. We think this works - but we'd love your feedback before we commit.
Sifting Through the Archive: Private Set Membership for Blossom
Binary Fuse filters let Blossom clients privately check which files exist on a server - download a compact filter once, query locally with zero server load, and use delta lists for real-time accuracy.
Garland: Your Keys, Your Files, No Trusted Third Party
Garland turns Blossom blob storage into a virtual drive on your device. Your Nostr key is your password. No accounts, no cloud lock-in.
Curated Feeds: A Simpler Alternative to DVM Feeds
Replace DVM request/response overhead with simple replaceable events. Publishers maintain feed lists, clients just subscribe. No round trips, no privacy leakage
Private Relay Connections: Zero-Knowledge Solutions for Nostr
Nostr relays see everything - who connects, what they fetch, how often they post. Zero-knowledge cryptography can fix all three problems: Semaphore-based authentication hides which whitelisted user is connecting, private information retrieval hides which notes you're fetching, and Privacy Pass enables rate limiting without identity linkage.
Owned by No One: Solving Nostr's Key Rotation Problem
Nostr's greatest strength - that you own your identity through cryptographic keys - becomes its greatest weakness when keys are lost or stolen. This post introduces two simple, social solutions that let users mark compromised keys and rotate to new ones through community verification, without complex cryptography or pre-planning.
The Gossip Vulnerability: Why NIP-17's "Deniable" Messages Aren't
NIP-17 promises deniable messaging with its three-layer design: an unsigned "rumor," a signed "seal," and an ephemeral "gift wrap." However, this setup has a hidden vulnerability. The signed seal allows recipients to prove that a message was sent by the claimed author, even without revealing the content. This creates a perfect scenario for gossip attacks, where the mere proof of communication can damage reputations. As we explore NIP-17, we find that the rumor, despite being unsigned, is not as deniable as it seems, making it a potential risk for exposure.
Bitcoin Address Lookup: A Question of Privacy
Bitcoin wallets face a fundamental tradeoff: how to discover your transactions without revealing your addresses. Full nodes (2009) provide perfect privacy by downloading everything but require ~700 GB storage. Electrum (2011) achieves instant sync by transmitting your addresses directly to servers, exposing your complete transaction history. Block filters (2017-2019) restore privacy through client-side filtering - you download compact filters, check them locally, and only request matching blocks, revealing just block-level interest. Utreexo (2019) compresses the UTXO set from 11 GB to 480 bytes using cryptographic accumulators while maintaining full-node privacy, but requires 20% more bandwidth. Each approach trades privacy, storage, bandwidth, and convenience differently.
Summary of: The Praxeology of Privacy ~ Economic Logic in Cypherpunk Implementation
A book explaining why Privacy = Economic necessity proven through Austrian logic. Three axioms (Action + Argumentation + Resistance) demonstrate that surveillance destroys market calculation like socialist planning, while cryptography restores conditions for voluntary coordination. Complete bridge between Austrian economics and cypherpunk technology.