#surveillance
15 items · 15 articles
Articles
The Frequency of Dissent
Mesh networks turn every radio into a relay and every user into infrastructure, creating communication grids with no center to seize.
Build for the Mole
Infiltration is inevitable; detection is unreliable. The real defense against state informants is building organizations where their presence cannot accomplish its purpose.
The Cheapest Defense
Privacy blinds the adversary's OODA loop at observation. When defense costs pennies and attack costs millions, surveillance becomes unprofitable.
The Praxeology of Privacy ~ Chapter 19: Operational Security
Operational security prevents adversaries from gathering compromising information. Threat modeling guides defense. Human factors are the weakest link. Perfect OPSEC is impossible.
The Praxeology of Privacy ~ Chapter 17: Decentralized Social Infrastructure
Nostr solves identity capture through cryptographic keys users control. Relays compete, moderation is market-driven, and the protocol extends beyond social posts.
The Praxeology of Privacy ~ Chapter 14: Anonymous Communication Networks
The internet leaks metadata. VPNs help locally. Tor distributes trust through relays. Mixnets defeat global adversaries. Choose tools matching your threat model.
The Praxeology of Privacy ~ Chapter 12: The Crypto Wars
The Crypto Wars pit states against privacy technology. Mathematics ignores legislation. Developers face prosecution. The fundamental conflict is permanent and intensifying.
The Praxeology of Privacy ~ Chapter 11: Corporate Surveillance and Data Extraction
Corporate surveillance extracts behavioral data for prediction products. State and corporate surveillance are deeply entangled. Markets are responding to growing privacy demand.
The Praxeology of Privacy ~ Chapter 10: Financial Surveillance and State Control
Financial surveillance enables state control through observation. CBDCs complete the architecture. Privacy breaks the OODA loop at observation, making theft unprofitable.
The Praxeology of Privacy ~ Chapter 7: Exchange Theory and Privacy
Privacy enhances exchange by protecting deliberation and enabling negotiation. Surveillance distorts prices and chills transactions. Better privacy means better functioning markets.
The Praxeology of Privacy ~ Chapter 5: The Axiom of Resistance
The Axiom of Resistance assumes systems can resist control. Mathematics, empirical evidence, and similar systems support this well-grounded but non-self-evident assumption.
The Praxeology of Privacy ~ Chapter 1: The Nature of Privacy
Privacy is selective disclosure, not hiding. Breaking adversary observation through the OODA loop is strategic defense. Cheap privacy defeats expensive surveillance.
The Praxeology of Privacy ~ Preface
Austrian economists theorize but cannot build. Cypherpunks build but lack theory. This book synthesizes both to make the state irrelevant.
The Last Leak: How MIP-05 Closes the Push Notification Surveillance Hole
Push notifications let governments track your messaging habits. MIP-05 encrypts device tokens with ephemeral keys, ensuring notification servers learn absolutely nothing.
Your Phone Is Not Your Property (Until You Install GrapheneOS)
Your smartphone surveils you by design. GrapheneOS transforms a Pixel into private hardware you actually control. Here's why it matters and how to do it.