#self-sovereignty
35 items · 35 articles
Articles
Your AI Should Answer to You: PAI vs. OpenClaw
PAI turns Claude Code into composable personal infrastructure you own through Markdown files. OpenClaw routes messages through a daemon you maintain.
Your Nostr Key Is Your Network Address
FIPS makes your Nostr npub a routable network address, unifying identity across social and infrastructure layers in a single self-sovereign keypair.
Your Software Runs on Enemy Infrastructure
Freedom tech projects build censorship-resistant tools on censorship-susceptible platforms. The Nostr stack offers a coherent migration path for sovereign development infrastructure.
Verify Anyone on Any Channel
A simple challenge-response app can verify Nostr identities across any anonymous channel by querying the follow graph users already built.
The Mobile Podcast Setup That Actually Works
Testing earbuds, wired mics, and USB-C wireless systems revealed the Yealink BH71 as the best mobile podcast solution for GrapheneOS.
Programmable Magic Internet Money: How Nostr Apps Can Monetize Ethically and Profitably
Bitcoin plus Nostr creates programmable money that solves software monetization through micropayments respecting user sovereignty.
The Non-Computational Nature of Agency
Vervaeke proves agency emerges from non-algorithmic relevance realization, explaining why Bitcoin and Nostr preserve human autonomy while algorithmic systems destroy it.
The Code Liberation: How AI Makes Software Infinitely Customizable
When AI handles compilation and patching tasks, source-based computing finally escapes the domain of experts, ending decades of binary distribution monopoly.
Securing the Second Realm
Security in autonomous zones means making attack uneconomical through deterrence, distributed defense, and eternal vigilance against any protector becoming predator.
A Vibe Coding Setup in Your Pocket
GrapheneOS now runs a hardware-isolated Debian VM on your phone, and OpenCode provides open-source AI coding against any provider you choose.
The Constitution That Isn't One
The Universal Principles of Liberty codifies libertarian jurisprudence as discovered law, providing a meta-normative baseline for decentralized justice without sovereign authority.
The Poverty Lever: Why Regimes Want You Just Above Starving
Maximum political control comes not from wealth redistribution but from calibrated poverty: desperate enough to depend, not desperate enough to revolt.
What Your Loved One Is Actually Trying to Tell You
They haven't joined a cult. They stumbled onto questions they couldn't stop asking, and they love you too much to keep them to themselves.
The Praxeology of Privacy ~ Chapter 20: Implementation Strategy
Start with honest assessment. Build progressively from basics to advanced. Find community. Privacy is not a destination but ongoing practice. Progress matters.
The Praxeology of Privacy ~ Chapter 17: Decentralized Social Infrastructure
Nostr solves identity capture through cryptographic keys users control. Relays compete, moderation is market-driven, and the protocol extends beyond social posts.
The Praxeology of Privacy ~ Chapter 6: Information, Scarcity, and Property
Information is non-scarce and cannot be property. Privacy is protected through self-ownership, physical property rights, and voluntary contracts, not intellectual property.
The Praxeology of Privacy ~ Chapter 4: The Argumentation Axiom and Self-Ownership
Argumentation ethics demonstrates self-ownership through performative contradiction. Denying it while arguing presupposes it. Privacy rights follow directly from self-ownership.
Breaking Free: Deprogramming State Dependence
Learned helplessness is the default response to prolonged state control; recovery requires demonstrating agency through deliberate action, not accumulating more theory.
Seven Resolutions
Freedom requires commitment, not sentiment. Seven resolutions define the ethical foundation for those who would build a voluntary society instead of complaining.
The Quiet Departure
The loudest revolutions fail; the quiet ones succeed. We do not protest or petition. We build alternatives and simply leave.
Own Your Outbox: Running Haven as Your Personal Nostr Relay
Your relay, your rules. Haven bundles four relay functions into one binary, easily deployable on a cheap VPS in an afternoon.
Your Phone Without Permission Slips: The GrapheneOS Nostr Stack
GrapheneOS plus Zapstore, Amber, Citrine, Amethyst, and White Noise creates the first phone free from corporate control over your digital life.
Your Phone Is Not Your Property (Until You Install GrapheneOS)
Your smartphone surveils you by design. GrapheneOS transforms a Pixel into private hardware you actually control. Here's why it matters and how to do it.
The Reasonably Paranoid's Guide to Qubes OS: Why Isolation Beats Every Patch
Qubes OS assumes all software has bugs and isolates every application in separate virtual machines, containing breaches instead of preventing them.
The Case for Custodial Nostr: Why Teams Should Stop Fighting the Lost War
Organizations already delegate key custody internally. A server-side Nostr client with permission management would be faster, stabler, and more honest than relay-dependent remote signing hacks.
When Can We Meet? Cross-Server Busy Sync for Nextcloud
Nextcloud can't sync busy times across separate instances. This bash script uses CalDAV to share availability between multiple Nextcloud servers without exposing event details.
No Papers Required: How Zapstore Breaks the App Store Checkpoint
Developer KYC creates chokepoints that authoritarian governments ruthlessly exploit. Zapstore restores permissionless software distribution using cryptographic identity instead of government papers.
The Great Decentralization Swindle: How Every Protocol But One Betrays Its Promise
The decentralized social landscape is littered with protocols that centralize through the back door. Nostr alone eliminates trusted third parties entirely, making it the only protocol where your identity truly belongs to you.
The Universal Principles of Liberty
A voluntary libertarian legal framework built on non-aggression, self-ownership, and property rights, with decentralized arbitration replacing state monopolies on law.
The Protocol Rothbard Would Have Built
Nostr implements Rothbard's anarcho-capitalist vision: cryptographic property rights, voluntary relay markets, and censorship-resistant communication without state-corporate gatekeepers.
Nostr-Native Distributed Storage System
The latest iteration of Garland, a privacy-preserving distributed storage system built on Nostr and Blossom, using erasure coding for durability and single-key recovery.
Garland: Exploring the Architecture
We're exploring an architecture for Garland: Cryptomator for encryption, Blossom for blob storage, Nostr for state. Your nsec becomes your Cryptomator password. We think this works - but we'd love your feedback before we commit.
Garland: Your Keys, Your Files, No Trusted Third Party
Garland turns Blossom blob storage into a virtual drive on your device. Your Nostr key is your password. No accounts, no cloud lock-in.
Owned by No One: Solving Nostr's Key Rotation Problem
Nostr's greatest strength - that you own your identity through cryptographic keys - becomes its greatest weakness when keys are lost or stolen. This post introduces two simple, social solutions that let users mark compromised keys and rotate to new ones through community verification, without complex cryptography or pre-planning.
Bitcoin Address Lookup: A Question of Privacy
Bitcoin wallets face a fundamental tradeoff: how to discover your transactions without revealing your addresses. Full nodes (2009) provide perfect privacy by downloading everything but require ~700 GB storage. Electrum (2011) achieves instant sync by transmitting your addresses directly to servers, exposing your complete transaction history. Block filters (2017-2019) restore privacy through client-side filtering - you download compact filters, check them locally, and only request matching blocks, revealing just block-level interest. Utreexo (2019) compresses the UTXO set from 11 GB to 480 bytes using cryptographic accumulators while maintaining full-node privacy, but requires 20% more bandwidth. Each approach trades privacy, storage, bandwidth, and convenience differently.