Articles

The Frequency of Dissent

The Frequency of Dissent

Mesh networks turn every radio into a relay and every user into infrastructure, creating communication grids with no center to seize.

Build for the Mole

Build for the Mole

Infiltration is inevitable; detection is unreliable. The real defense against state informants is building organizations where their presence cannot accomplish its purpose.

The Cheapest Defense

The Cheapest Defense

Privacy blinds the adversary's OODA loop at observation. When defense costs pennies and attack costs millions, surveillance becomes unprofitable.

The Praxeology of Privacy ~ Chapter 19: Operational Security

The Praxeology of Privacy ~ Chapter 19: Operational Security

Operational security prevents adversaries from gathering compromising information. Threat modeling guides defense. Human factors are the weakest link. Perfect OPSEC is impossible.

The Praxeology of Privacy ~ Chapter 17: Decentralized Social Infrastructure

The Praxeology of Privacy ~ Chapter 17: Decentralized Social Infrastructure

Nostr solves identity capture through cryptographic keys users control. Relays compete, moderation is market-driven, and the protocol extends beyond social posts.

The Praxeology of Privacy ~ Chapter 14: Anonymous Communication Networks

The Praxeology of Privacy ~ Chapter 14: Anonymous Communication Networks

The internet leaks metadata. VPNs help locally. Tor distributes trust through relays. Mixnets defeat global adversaries. Choose tools matching your threat model.

The Praxeology of Privacy ~ Chapter 12: The Crypto Wars

The Praxeology of Privacy ~ Chapter 12: The Crypto Wars

The Crypto Wars pit states against privacy technology. Mathematics ignores legislation. Developers face prosecution. The fundamental conflict is permanent and intensifying.

The Praxeology of Privacy ~ Chapter 11: Corporate Surveillance and Data Extraction

The Praxeology of Privacy ~ Chapter 11: Corporate Surveillance and Data Extraction

Corporate surveillance extracts behavioral data for prediction products. State and corporate surveillance are deeply entangled. Markets are responding to growing privacy demand.

The Praxeology of Privacy ~ Chapter 10: Financial Surveillance and State Control

The Praxeology of Privacy ~ Chapter 10: Financial Surveillance and State Control

Financial surveillance enables state control through observation. CBDCs complete the architecture. Privacy breaks the OODA loop at observation, making theft unprofitable.

The Praxeology of Privacy ~ Chapter 7: Exchange Theory and Privacy

The Praxeology of Privacy ~ Chapter 7: Exchange Theory and Privacy

Privacy enhances exchange by protecting deliberation and enabling negotiation. Surveillance distorts prices and chills transactions. Better privacy means better functioning markets.

The Praxeology of Privacy ~ Chapter 5: The Axiom of Resistance

The Praxeology of Privacy ~ Chapter 5: The Axiom of Resistance

The Axiom of Resistance assumes systems can resist control. Mathematics, empirical evidence, and similar systems support this well-grounded but non-self-evident assumption.

The Praxeology of Privacy ~ Chapter 1: The Nature of Privacy

The Praxeology of Privacy ~ Chapter 1: The Nature of Privacy

Privacy is selective disclosure, not hiding. Breaking adversary observation through the OODA loop is strategic defense. Cheap privacy defeats expensive surveillance.

The Praxeology of Privacy ~ Preface

The Praxeology of Privacy ~ Preface

Austrian economists theorize but cannot build. Cypherpunks build but lack theory. This book synthesizes both to make the state irrelevant.

The Last Leak: How MIP-05 Closes the Push Notification Surveillance Hole

The Last Leak: How MIP-05 Closes the Push Notification Surveillance Hole

Push notifications let governments track your messaging habits. MIP-05 encrypts device tokens with ephemeral keys, ensuring notification servers learn absolutely nothing.

Your Phone Is Not Your Property (Until You Install GrapheneOS)

Your Phone Is Not Your Property (Until You Install GrapheneOS)

Your smartphone surveils you by design. GrapheneOS transforms a Pixel into private hardware you actually control. Here's why it matters and how to do it.