<description>Recent content in Sovereign Reset: the Federated Blog on Federated Computer | A fast, responsive replacement for Google Workplace and much more</description>
<description>Remember those nostalgic evenings strolling through Blockbuster, savoring the process of selecting the perfect movie for your Friday night? This was a time when the choice was simpler, and you could find exactly what you needed without much fuss.
The current digital landscape for small businesses, however, feels more like being lost in the infinite scroll of Netflix. There are approximately 30,000 B2B SaaS companies worldwide promising to solve all your woes with software solutions ranging from the overly basic to the incredibly intricate.</description>
<description>In this digital age, our lives have become intricately entwined with the digital realm. From social media, e-commerce and home automation to ride share and food delivery, we willingly hand over our personal data to centralized behemoths like Facebook, Amazon, Google, and Microsoft, without fully comprehending the risks involved. But what lies beneath the vaneer of convenience and interconnectivity? In this post, we seek shed light on the dark side of centralization and explore the need for digital sovereignty and privacy.</description>
<description>Facebook is Censoring My History! As I scroll through my Facebook feed most of what I see from my history of posts is now censored!What was once seen by friends and family, no one can see anymore.It’s maddening!Many of these posts were sharing information about what was occurring with Edward Snowden and how all of the big tech companies were spying on us, everywhere and even with the government!</description>
<description>We are very proud to introduce Federated &ldquo;Core&rdquo; to the wide world. We built Federated Core because we were tired of the surveillance happening with common productivity tools on the web, our collection of tools was costing a small fortune every month, and it was a pain to get everything to work together.
Design Goals Federated Core was built to provide regular users who wanted privacy, great features and functions, the right price, basically all the benefits of today&rsquo;s software-as-a-service offerings, in a self-hosted environment but without the aggravation and technical commitment self-hosting requires.</description>
<description>How Bitcoin Becomes Money in the Next Decade
I have followed bitcoin for over a decade now and one of the best quotes I have seen is from Paul Buchheit, “Bitcoin may be the TCP/IP of money.” Just as TCP/IP facilitated the free flow of information and transformed how we communicate and access data globally, Bitcoin will have a similar impact on the transfer of value and the way we perceive and use money, MoIP, money over Internet protocol!</description>
<description>The Condition Oh, this is different than my iProud! I can&rsquo;t use that. I don&rsquo;t understand how to use this&hellip;Google does it for me. I don&rsquo;t care if they are watching me! Everybody likes Furries. What do I have to hide?
We&rsquo;d change, but it&rsquo;s going to mean we can&rsquo;t benefit from being limp cucks for Microsoft. They will tell us how we should work on our team and what we can or cannot do with our data.</description>
<description>At Federated, we try to put our tools, our digital tools, where our mouth is. We don&rsquo;t used centralized software for almost nothing to run our business preferring to use Federated Core and other self-hosted open-source projects.
While we have systems running (virtual machines) for Windows and macOS testing, we run Linux on the desktop with most of us choosing to run Pop!_OS. The &ldquo;tile windows&rdquo; manager and integration with Federated services makes this a winner.</description>
<description>The Origins of Federated Most of the founders of Federated Computer come from an earlier company that worked on decentralization called &ldquo;Joyent&rdquo;. You can read some of that story in a blog post I wrote when Joyent was sold to Samsung at this link.
The picture above shows the first few engineers and designers who worked on Joyent, including the now tremendously successful Apple, Dallas Cowboys, and other topics blogger and podcast John Gruber in the red shirt.</description>
<description>Cloud 1.0 At Joyent, my previous startup, we literally invented &ldquo;cloud computing&rdquo;. We figured developers would appreciate the ability to purchase an &ldquo;on-demand data center&rdquo; in order to build web applications at scale without the enormous up-front infrastructure costs previously associated with datacenters.
This all seems like old-hat today, but at the time, in the early 2000s, we were felt like pioneers.
Centralization Sucks What happened with cloud infrastructure is a story, in the technology universe, as old as time.</description>
<description>Are there ways to use the very common dandelion for good? This time of year in the northern hemisphere, yards can be filled with the yellow-flowered weed. Let&rsquo;s use them for good.
<description>Email is Important In today&rsquo;s digital world, email remains a cornerstone of communication for individuals and businesses alike. But with concerns about privacy, security, and dependence on big tech, many are seeking alternatives that align with their values. Enter Thunderbird, the open-source email client that has been revolutionizing the way we interact with our inboxes. In this article, we will explore Thunderbird&rsquo;s top features, shed light on its remarkable development journey, and emphasize the importance of using open-source software for a more secure and customizable email experience.</description>
<description>Using All The Software Components to Build Federated Core One of our best decisions, and we also had a number of bad decisions (but that&rsquo;s for another blog post), was to &ldquo;trial&rdquo; test different open-source software packages to see if we could fruitfully use them as a distributed, decentralized team building a stack of software, documentation, marketing materials for Federated Core.
We used Nextcloud as a traffic control. Nextcloud Files worked for sharing files and commenting on content.</description>
<description>Much like the incredible expense of all the software-as-a-service offerings today, when taken in aggragate, in the 1960s and 1970s, computing was a &ldquo;big company&rdquo; sport because of expense. Large computer companies sold mainframes and smaller mainframes (called &ldquo;minis&rdquo;) and were very content with the status quo and profits.
When the idea of personal computers came along, no establish computer company had any desire to play along. In fact, when Steve Wozniak created the Apple I personal computer, he offered it to his employer Hewlett-Packard five times but the big-computing company had no interest.</description>
<description>Choosing Free and Open Source Maybe Federated Core is the first time you and your team or business are explicitly choosing free and open-source software over some other solution that is costly and proprietary. In that case, we thought we would lay out why you&rsquo;ve made the right choice.
Is it Really &ldquo;Free&rdquo;? But let&rsquo;s get the elephant in the room out of the way first. Federated Computer charges $39/month, so how is anything &ldquo;free&rdquo;?</description>
<description>Looking at how 2FA secrets are synched The synching appears to happen without any encryption. Google sees the secrets. If there is a breach&hellip;
<description>Is the FBI abusing access to FISA databases of private communications? The FBI can read out private communications without a warrant or judicial oversight.
<description>This ID allows our masters at the WHO, UN, and WEF to track us everywhere The World Health Organization, United Nations, and World Economic Forum have a bureaucrats wet dream for tracking plebians wherever they go.
<description>A CMS that works with Federated Core Federated Core has a workflow allowing customers to create static-file websites, publish them to their private Gitea repository, and auto-publish to their private Caddy webserver. Front Matter supports this workflow beautifully&hellip;
https://frontmatter.codes/
It runs inside of Visual Studio Code among other tools allowing you to preview and create great content using Federated Core.</description>
<description>KYC Scores KYC stands for &ldquo;know your customer&rdquo; which is another way of saying &ldquo;surveillance&rdquo; by the service and/or government interests. The KYCnot dot me website lists lots of websites, many for Bitcoin, and their relative scores for KYC.
https://kycnot.me/
There are also listings for VPNs, domains and hosting, phone numbers, and other various services and tools.</description>
<description>Federal Reserve Payments System Moves to the Launchpad Why does the federal government, or any government, need a &ldquo;payment system&rdquo; unless the currency itself is property of same?
<description>The Good and the Bad How&rsquo;s Proton Mail hanging when it comes to being &ldquo;the most secure email&rdquo; on the planet?
If the service is centralized, it is not secure from governments. End-to-end encryption sounds neat, but once you interact with an email counterparty not using encryption, the game is up. Requires third-party software to work with email clients/standards.</description>
<description>You can&rsquo;t really use Google Drive any way you want Oh, nevermind. Google reversed themselves after the backlash. The idea was to put a hard limit on the number of files allowed on the service.
<description>Fat Man Tells Truth Hey! Let&rsquo;s digitize all cash to something controlled by the guv&rsquo;mint so that they can see who is doing what.
<description>This is the hard way Honestly, we don&rsquo;t recommend this for anyone. But it does give a sense of the power and flexibility available to those wanting to self-host at home. My own self-hosted home server is similar.
By the way, there are so many great servers for sale on eBay with 16G ram, Xeon processors, etc. that work very well as a home server without the fragility and for roughly the same initial price.</description>
<description>How to Self Host Your Webpage The long self-hosting journey starts with a first step&hellip;
https://grifel.dev/decentralization/
&hellip;then you discover, to be honest, that&rsquo;s really how the internet works. A server, a web page. In between are your optimizations.</description>
<description>Some intial descriptions of experience with Nostr One person&rsquo;s explorations of Nostr (&ldquo;notes and other stuff using relays&rdquo;)
https://stacker.news/items/135975
We will be writing in-depth about how Federated uses this technlogy.</description>
<description>Is Apple checking images we view in the Finder? Little Snitch claims browsing an image sends a message from &ldquo;mediaanalysisd&rdquo; to an Apple server.
<description>Is Apple checking images we view in the Finder? The evidence for the case that Apple is checking images browsed in the Finder and sending metadata to a remote server.
<description>Your old phone is no longer supported We get it, at some point, your Nokia from 2012 just isn&rsquo;t going to work anymore&hellip;
https://www.youtube.com/watch?v=UxaCUugPoRY
But should the error be to lock users out of data?</description>
<description>What if everything becomes an app on somebody else&rsquo;s platform? What happens when the only whay we can work or manipulate data is through &ldquo;proprietary&rdquo; apps, not the web?
<description>Tim Bray wants to defend Signal This is really about whether &ldquo;bad guys&rdquo; can use Signal. Tim, rightly, says &ldquo;who cares&rdquo;. We all need privacy.
<description>Let&rsquo;s just say your traditional bank would frown on such behavior Bitcoin is also a technology teeming with new ideas, new innovations.
I&rsquo;m sure your bank wouldn&rsquo;t allow you to do this with your fiat account. I bet the &ldquo;bad guys&rdquo; could use this! :laughing:</description>
An &ldquo;unauthorized party&rdquo; got access to the third-party storage where LastPass stores backups. When you&rsquo;re dealing with cloud services, there is tremendous &ldquo;counterparty&rdquo; risk, as they would say in the fiat financial markets. If you&rsquo;re using a cloud service, that service can swear all day that they are secure&hellip;but security is a combination of all the links, including the weak ones.</description>
</item>
<item>
<title>Social Credit Score to Access Internet</title>
<description>Not enacted, but recommended under Australian goverment plan This idea was not enacted. But it was thoughtfully considered and proposed by the sitting government of Australia.
If &ldquo;the internet&rdquo; is the fief of government, why can&rsquo;t they shut it off for a reason like a bad social credit score? Let&rsquo;s take away the fief. And defeat the idea of social credit scores.</description>
<description>Thanks to some Stack Overflow surveys, desktop Linux has arrived for developers According to a developer survey, Linux holds a 9% lead over macOS.
Year of the Linux Desktop
It&rsquo;s getting better and better meaning there is less and less an excuse to support the centralizer operating systems.</description>
<description>How the attention economy is ruining us We need to return back to pseudonimity and anonymity as the basis for the marketplace EXCEPT when an actual trade of value for value is agreed by all parties.
This is fundamentally impossible without &ldquo;hard money&rdquo; and its side-kick &ldquo;hard digital decentralization&rdquo;.</description>
<description>Linux, Amazon, Meta, and Microsoft want to break the Google Maps monopoly There&rsquo;s some bad centralizers in this alliance. And Google Maps is a really nice product! But we need it broken up.
<description>Signs you&rsquo;ve been fiat poisoned Most folks think of bitcoin as the anecdote of fiat.
https://stacker.news/items/108177
We think of living a complete self-sovereign lifestyle as the comprehensive anecdote to fiat/arbitrary culture and the poisoning that comes with it.</description>
<description>Drowning in AI Generated Garbage It&rsquo;s a contrarian opinion to opine that AI is anything but garbage (i.e. something written by a 5th grader doing a report). Look, we use ChatGPT to generate the summaries for these link list posts, because we are lazy, and we want to spend more time PC gaming. We&rsquo;re old school that way. But most of the summaries require a significant amount of re-writing&hellip;so how lazy are we after all?</description>
<description>Bitcoin is the Rediscovery of Money In this article, the idea of &ldquo;money&rdquo; is defined as the &ldquo;removal of counterparty risk&rdquo;. If we think about that, it is a pretty good definition in the context of some &ldquo;value&rdquo; to be exchanged between parties with the understanding of the &ldquo;value&rdquo; in relation to the parties themselves. That is the risk, removed.
<description>You think your Telegram Data is Secure? If the thing you&rsquo;re using is centralized, it is so much easier for the &ldquo;authorities&rdquo; to compel disclosure of data. Case in point is Telegram who was recently forced to disclose names, phone numbers, and IP address accused of sharing material thought to infringe copyright.
The court order was issued by the Delhi High Court in India and required Telegram to disclose the information to the plaintiffs who had filed a copyright infringement case against the users.</description>
</item>
<item>
<title>Checklist for Digital Privacy and Security</title>
<description>hWork through them as you get the time&hellip;eadline Some of the recommendations are centralizers&hellip;but we like the effort and attention to the subject!
<description>Some best practice for passphrases, private keys, and saving them all in a digital wallet Not your keys, not your _______________. But how do we protect our keys, our passphrases? What are some best practices to consider?
If you&rsquo;re not incorporating many of these practices into your digital self-sovereign life, then how self-sovereign can you really be?</description>
<description>What can self-sovereign individuals learn from Bitcoin maxis? We love Bitcoin maxis because they give the self-sovereign individual
21 Rules of a Bitcoin Maxi
Let&rsquo;s see how these some of these rules can be applied to the self-sovereign individual even if, horror, they have no interest in Bitcoin.
Not your keys. This is the principal of decentralization. We don&rsquo;t use centralized services where are data is not our own. Stack sats.</description>
</item>
<item>
<title>Privacy Tools for the Information Age</title>
<description>Some resources for increasing and protecting your privacy online. A good list of tools and methods you can use to increase and protect your privacy online during this time of all-time-low privacy and self-sovreignty.
https://secondl1ght.site/blog/privacy-tools
Many of these tools deserves further exploration and explanation. Some are centralized solutions (and so not our preference).</description>
Now they&rsquo;re bamboozling us to accept permission allowing them to geotrack us across all of their services. Hey kids, just don&rsquo;t use Google. :kissing_closed_eyes:</description>
<description>5 Eyes, 9 Eyes, 14 Eyes: Protect Yourself From Global Surveillance The fact of our lives today is constant global surveillance. By governments. By corporations.
You may be shocked to the extent your government spies on you. In a &ldquo;democracy&rdquo;. For your &ldquo;safety&rdquo;.</description>
<description>How to count visitors without using cookies A self-sovereign lifestyle means doing to others what you would want doen to yourself, including how you track your website visitors.
This article shows you how to build website analytics without storing information that can reveal a visitor&rsquo;s identity. If you don&rsquo;t want it done to you, don&rsquo;t do it to others. Simple. And the solution is brilliant.</description>
</item>
<item>
<title>France Says "Non" to Office 365 and Google Workplace</title>
<description>Office 365 and Workplace Shouldn&rsquo;t be used in classrooms While the free versions of Office 365 and Workplace may be attractive, they vacuum up so much data on students they constitute a form of theft.
Free services come with the &ldquo;bargain&rdquo; that the provider gets all your information. What a deal! The French say &ldquo;no&rdquo;.</description>
</item>
<item>
<title>Bitcoin Lightning Publisher for WordPress</title>
<description>Review of a plugin for WordPress allowing receipt of Bitcoin payments A description of a plugin for Wordpress enabling Bitcoin payments using the Lightning network.
<description>Using open standards is the only way to defeat the centralizers A survey of how the more things change, the more they swing back to standards&hellip;
<description>They know when you&rsquo;ve been naughty, they know when you&rsquo;re awake&hellip; Well, at least, I suppose, they&rsquo;re being honest about it.
<description>New calendar design Thunderbird is getting better and better. Among many of the FOSS reasons to use Thunderbird, it&rsquo;s possible to set up Thunrderbird so that your settings move from machine to machine. Nice! But the integrated calendar was always sub-par. Looks like a future update named &ldquo;Supernova&rdquo; will fix that.
<description>Even when its own privacy setting say &lsquo;no&rsquo; tracking&hellip; Independent tests suggests Apple is tracking you on iOS even when you&rsquo;ve disabled sharing &ldquo;Device Analytics&rdquo; altogether.
Apple Tracks You
It&rsquo;s Apple. They know best.</description>
</item>
<item>
<title>Building a Self-sovereign Lifestyle</title>
<description>The permaculture mentality homsteaders have is congruent with Bitcoin low-time-preference mentality What is true, even if you&rsquo;re not going to homestead, is you need to adopt a homesteading mentality&hellip;
The mentality of a homesteader is one that examines all areas of life to figure out how one can move from centralization to decentralization.</description>
</item>
<item>
<title>Tyranny Looms Via Digital IDs and Currencies</title>
<description>Digital IDs and Currencies are means of control Does anyone besides the ruling classes really think digitizing IDs and currencies are anything but a means to control people?
<description>A guide for getting started with self hosting A nice guide for all the various services, hardware, clouds, etc available for the person wanting to self-host.
https://github.com/mikeroyal/Self-Hosting-Guide
Self-hosting offers freedom and responsibility. There are a number of projects out there that help with the process.</description>
<description>Why privacy dot com is anything but&hellip; If you&rsquo;re using privacy.com to achieve some &ldquo;privacy&rdquo;, you need to read this&hellip;
<description>Let&rsquo;s reinvent the wheel Congrats to Invisv for understanding the problem.
https://invisv.com/
We have questions, however. Is Invisv centralized? Are all these privacy break-throughs inter-operable with any other open standards, protocols?</description>
<description>A service to resist on-line surveillance From the post, why end-to-end encryption is not enough: &ldquo;End-to-end encryption has become more commonplace with major online messaging and communication tools, but encoding what you say to your friends online does not mean that the service provider cannot see who you contacted, when, from where. This metadata might be even more important than the content of an online conversation.&rdquo;
https://nlnet.nl/project/katzenpost/
You have to think about the metadata in the same way we think about how services like Facebook develop &ldquo;graphs&rdquo; of us for the purposes of advertising and scores.</description>
We don&rsquo;t agree with all the conclusions. Nevertheless, bon voyage! (Oh, side note, notice he mentions &ldquo;analyze and store&rdquo; with re: the Hey email service. Centralizer.)</description>
<description>How do we square a digital, tracking ad business with privacy? It&rsquo;s hard to see how a company running a $5 billion, and growing, digital (ie. tracking) ad business can be real about protecting privacy.
Tim Cook famously said: &ldquo;You are not our product. You are our customer. You are a jewel, and we care about the user experience.&rdquo; (2018) But does this line up with Apple&rsquo;s recent hard charge into the digital advertising business?</description>
</item>
<item>
<title>Whatsapp and Signal Messages Intercepted by Government</title>
<description>Australian government will be able to intercept WhatsApp and Signal messages If you thought your encypted WhatsApp and Signal messages were secure from surveillance, think again&hellip;
There&rsquo;s a simple principle. If it is centralized, it is not secure. It&rsquo;s the fiat of services. Another note: it&rsquo;s always &ldquo;anti corruption&rdquo; or &ldquo;anti waste&rdquo;. Both are just gas-lighting for &ldquo;anti freedom&rdquo;.</description>
While this is a great resource for what Google is doing, the recommendations for how to defeat the beast are, in our opinion, simplistic and, on top, don&rsquo;t lead to true digital self-sovereignty.</description>
<description>Get off the big tech email providers Here&rsquo;s a quick mental exercise: if you can&rsquo;t imagine life without Google, Facebook, Apple or the other big centralized services, then you&rsquo;re digital freedom is toast.
According to the article published by Dergigi, cryptography alone is not sufficient to provide complete security for digital systems and data. While cryptography is an essential tool for protecting data against unauthorized access and tampering, it cannot address all of the security challenges that digital systems face.
The article notes that cryptography is vulnerable to various attacks, including brute force attacks, side-channel attacks, and quantum attacks, which could potentially compromise the security of encrypted data.</description>
<description>Meta and Instagram Rewrite Websites to Track Us This happens when you click on websites in Facebook and Instagram. You&rsquo;re taken to the link in an in-app browser. Then the hilarity begins.
Solution. Don&rsquo;t use Facebook, Instagram, all the other Meta shit. Addicted? OK, then stop complaining. You&rsquo;re hooked up to the Zuckerborg and your actions harvested for profit.</description>
</item>
<item>
<title>US Military Mass Monitors Internet Browsing, Email, Everything</title>
<description>There&rsquo;s nothing else to capture except the smell of electricity. The “Augury” platform includes highly sensitive network data that Team Cymru, a private company, is selling to the military. “It’s everything. There’s nothing else to capture except the smell of electricity,” one cybersecurity expert said.
<description>Some advice for choosing the right Bitcoin and LIghtning Wallet Just like a password manager, choosing the right wallet for bitcoin can be stressful.
https://stacker.news/items/70725
As they say: &ldquo;Think like a bank, not just be a bank.&rdquo;</description>
<description>Does using an iPhone mean you have the best privacy solution? Most believe the iPhone is a bastion of privacy. Tim Cook said so&hellip;
https://kerkour.com/iphone-privacy
Apple has marketed their devices as saving the world from a big brother dystopia. But, like so much gas-lighting these days, it is the savior playing the role of big brother.</description>
</item>
<item>
<title>Replying to Carlos F. "Thrown in the Towel"</title>
<description>Self-hosted Email is the Hardest, but also the Easiest Here&rsquo;s one response to the post by Carlos F. throwing in the towel for self-hosted email.
Hosting your own email is hard, but not impossible. The technical aspects are easy. Getting your email to someone with an outlook.com address are practical impossible. But maybe you should just pick up the phone and tell that person Microsoft (for example) doesn&rsquo;t want them to get email from anyone except those who Microsoft says are &ldquo;good&rdquo;.</description>
</item>
<item>
<title>How to be a Profitable Lightning Node</title>
<description>Some tips for how to run a Lightning Node profitably&hellip; We think Lightning, in time, will be more for information distribution, and less about Bitcoin payments settlement.
https://stacker.news/items/66368
In the meantime, as you begin your Lightning journey&hellip;</description>
</item>
<item>
<title>Thrown in the Towel Self-hosting Email</title>
The purpose of this post isn&rsquo;t to be an apologia for self-hosting email. Rather, it is to highlight the oligarchic behaviors that exist on certain protocols (smtp, etc) and to say that we encourage this behavior when we give up and move to more niche protocols (eg nostr?</description>
&ldquo;Apple taxes, tyrannizes, and &ldquo;sherlocks&rdquo; app developers. App developers are victims of Apple&rsquo;s conduct, and ACT | The App Association&ndash;which is actually just an Apple Association&ndash;unethically claims to represent the interests of small developers.&rdquo;</description>
<description>Your data is given to police so that they can see everywhere you&rsquo;ve been with the click of a mouse. Hey, you&rsquo;re in the privacy of your home, what could go wrong?
In fact, we privacy advocates don&rsquo;t have to answer: &ldquo;a question worth posing to anyone unilaterally opposed to Google’s approach is how big that number would have to be to have made it worthwhile&rdquo;. One case of child sex exploitation is horrible. However, the issue at root here is really a queasiness with &ldquo;free will&rdquo;. The desire is to use &ldquo;tech&rdquo; to keep of clear of the bad outcomes from the exercise of human &ldquo;free will&rdquo;.</description>
<description>Governments Embrace Internet Shutdowns as a Form of Control Well, one way to deal with it, if you can&rsquo;t control it, is to kill it.
This will always be an option so long as coercive government (a redundancy) has control over the network itself. The solution is, over time, to build free networks unburdened by government control. Examples are (ham) radio, LORA networks, and other forms of free and uncersorable communication.</description>
</item>
<item>
<title>Employers Are Doing 'Shocking Things' to Monitor Your Productivity</title>
<description>Treating employees like robots is the &lsquo;new normal&rsquo; If I can track your every movement while you &ldquo;work for me&rdquo;, that sounds more like slavery, than an exchange of goods.
Not to mention it is the precursor to replacing humans with robots for which tracking is a must. Be self-sovereign. Don&rsquo;t work for these sorts of assholes. And if you must, figure out how you are going to escape.</description>
<description>Starlink will offer global connection to TMobile phones Starlink will provide a means for Tmobile handsets to communicate (SMS, Voice) anywhere on the globe Starlink provides coverage using 3G-equivalent bandwidth.
https://archive.ph/LGnFS
As if we weren&rsquo;t tracked enough. :weary:</description>
<description>Email clients need improving. Some thoughts. A shift to web-base email has meant a degradation in the quality of &ldquo;fat&rdquo; email clients.
<description>The class action lawsuit against a behemouth&rsquo;s worldwide surveillance machine With dossiers on five billion people (!) which likely means they have one on you and me, what can&rsquo;t Oracle do?
<description>The NSA and CIA use metadata to determine who should die General Michael Hayden, in a debate with ACLU national legal director David Cole, admitted metadata can be enough to determine if some person is a threat to the US sufficient enough to warrant death.
So&hellip; Take action. Get off the metadata supply wagon. &ldquo;But I&rsquo;m not a threat to the US security establishment.&rdquo; No, likely not. But you&rsquo;re of interest to Mark Zuckerberg and his establishment.</description>
<description>Make music when Google spies on you This little utility provides auditory feedback whenever your browsing/internet activities feed back into the Google.
https://github.com/berthubert/googerteller
This demo is pretty hilarious/scary.</description>
<description>Lessons learned stress testing dozens of seed phrase backup devices The seed phrase is like the password opening up the value of a Bitcoin address. If you lose it, you lose the Bitcoin. So, it is imperative, when using self-custodied Bitcoin address, that you have 100% reliable access to your seed phrase.
<description>The journey to getting email self-hosting done right One man&rsquo;s (he&rsquo;s the Redhat evangelist for EMEA) way of running self-hosted email.
<description>New documents reveal the US government is tracking cell phone location The ACLU unearthed documents showing the US Department of Homeland Security is using mobile location data to track people&rsquo;s movements.
<description>A list of privacy and security-focused apps, software, and providers From the list: &ldquo;Large data-hungry corporations dominate the digital world but with little, or no respect for your privacy. Migrating to open-source applications with a strong emphasis on security will help stop corporations, governments, and hackers from logging, storing or selling your personal data.&rdquo;
https://github.com/Lissy93/awesome-privacy
It would be even better if this was not hosted on Github. C&rsquo;est la vie!</description>
<description>FOSS solutions to try Here&rsquo;s another compiled list of FOSS solutions to investigate rather than giving money to centralizer man.
<description>Inttroducing Redecentralize At Federated we support any organization fighting against digital monopolies, surveillance capitalism, and a lack of self-sovreignty.
https://redecentralize.org/
Redecentralize is an organization seeking &ldquo;a world of open platforms and protocols with real choices of applications and services for people. We care about privacy, transparency and autonomy. Our organizations and tools should fundamentally be accountable and resilient.&rdquo; Amen.</description>
<description>Build a 22 rifle to keep the varmits at bay&hellip; Sure, you can buy a rifle, but why not learn about how things work by assembling the parts and building a custom rifle for pest control?
<description>Ways to keep Apple from tracking you on iOS 14.5 and later Apple stopped other apps from tracking you starting with iOS 14.5&hellip;so that they could have all that delicious tracking goodness to appleself.
https://www.youtube.com/watch?v=7y88gAAIN5g
What&rsquo;s the worry? It&rsquo;s only metadata&hellip;</description>
<description>Explanation of Value for Value Many &ldquo;media&rdquo; or &ldquo;social&rdquo; businesses today rely on anadvertising model to pay the bills. However, the model itself begins to distort the message over time because the economic means (advertisers) will dictate what is acceptable content and even, in time, acceptable customers. The solution is value for value.
https://value4value.info/
Going further, value for value can be understood as a way of life, as the site says &ldquo;a mindset of abundance&rdquo; where an ecosystem develops of free exchange of &ldquo;goods&rdquo; understood as &ldquo;time, talent, and treasure&rdquo;.</description>
<description>What happens when your &lsquo;identity&rsquo; is simply 1s and 0s? A digital identity isn&rsquo;t something from you. It is a dossier created by the centralizers to better understand, for themselves, the capabilities in the world allowed to you.
<description>Does it come down to the $20 billion in cash paid annually by Google? Apple really doesn&rsquo;t want competition on iOS for web browsers&hellip;
<description>Github listing of self-hosted software This is a pretty comprehensive list of software you can self-host across a very wide variety of categories.
While we think Federated is a pretty good curation of the &ldquo;best&rdquo; software for self-hosting out there, this list reminds us there is so, so much more.</description>
According to the article published by Gizmodo, Apple&rsquo;s iPhone was found to be collecting data on users' personal browsing habits through a feature called &ldquo;DSID Analytics,&rdquo; which is enabled by default on all devices running iOS 15.
The report notes that DSID Analytics collects data on users' app usage, search history, and web browsing behavior, which is then sent to Apple&rsquo;s servers for analysis.</description>
<description>What happens when the white knight gets down and dirty with the central trackers? Apple has been slowly but surely expanding the reach of ads across their platforms for the past several years.
What to do? Try Linux. There are plenty of great distributions. Oh, the app you want/need isn&rsquo;t there? Spin up a Windows VM on your Linux distro for the times you need to bend over. You can even run macOS in a VM.</description>
<description>What happens when we are beholden to free services? Hey, you just wanted to see what the free service could do for you. Despite knowing the dangers. But it is so&hellip;
<description>What does it mean when a vendor tells you how to use tools on your device? https://reclaimthenet.org/apple-air-drop-china
Apple made a change to how AirDrop works in mainland China restricting the way Apple customer could communicate with each other.
According to the article published by Reclaim The Net on August 10, 2021, Apple has come under scrutiny for allegedly allowing Chinese users to receive unsolicited content through its AirDrop feature. The report states that Chinese users have been receiving unsolicited pornographic images and spam through AirDrop from strangers who are using anonymous usernames.</description>
<description>Quietly pushing an ad product with media agencies Where will we go for privacy when Apple abandons us to the verdant fields of advertising revenue?
<description>Looks like lots of centralized services relied on another central service&hellip; &hellip;and now the whole mass of them are breached.
CircleCI is the central culprit. We, the users of these centralized system have no clue whats going on in the entirely opaque background. No clue.</description>
<description>Where to spend your bitcoin This is the chicken-and-egg challenge for bitcoin. Money for spending (versus money for store of value).
https://btcmap.org/map
The solution is to continue to build communities of common-interest that can build small economies where bitcoin is taken back and forth. Maybe the solution is we all need to be willing and able to take bitcoin?</description>
What a surprise. The key argument is that it is too difficult to decentralize. And that decentralization leads to stagnation because we all have to agree on protocols and therefore it is tough to change them. But there are multiple flaws in this way of thinking, and the post lays them out well.</description>
</item>
<item>
<title>Cops Want Mass Surveillance App Secret</title>
<description>The App &lsquo;Fog Reveal&rsquo; is Almost Invisible Another tale of our local law enforcement tracking phones around the neighborhood.
<description>The &lsquo;Better Identify Coalition&rsquo; wants better ways to track you It&rsquo;s a real rogue&rsquo;s gallery of corporations pushing for a single way to track us no matter what we do on or off the network.
Shame on you Yubico for being part of this proposal. Why mortgage whatever good will you have to kneel at the feet of your corporate overlords?</description>
</item>
<item>
<title>Cryptocurrency, the Jews, and the Fundamental Question of Trust</title>
How Bitcoin solved the trust issue that has plagued societies for millenia. Some precursors to the Diffie-Hellman key exchange are discussed and explained.</description>
One of the insights here is the idea that we enjoy being manipulated, being advertised to because the advertising itself is the beginning of the fulfillment of our desire for an object.</description>
<description>Caveat: liberating but lots of complexities You do need to run your own node at home. It&rsquo;s the best for privacy and securty. But it can be complex, and, with the wrong turn, you can lose Bitcoin.
<description>The big man has access to all your waking minutes If the corporation can surveil employees while in the office (and we don&rsquo;t like this, mind you, but so many have accepted it), what happens when the office is your private home?
<description>What can others learn? Scraping social media services is wide-spread (here, Instagram) and highlights the data leaks exploited by many to find out much more about us.
&ldquo;Basically anything you can get from a user&rsquo;s profile can be scraped.&rdquo; When combined with other information, a user dossier begins to emerge. D&rsquo;oh!</description>
</item>
<item>
<title>Lastpass Breach Impact on Bitcoin Wallets</title>
A hint: &ldquo;Having spoken to multiple professionals, it now seems far more likely that my encrypted vault was breached. However, at 100,100 PBKDF2 iterations, it is not realistic to brute force this. I think this situation goes far beyond what has been admitted.&rdquo;
That&rsquo;s right, Lastpass may not have keep the data encrypted or sufficiently encrypted.</description>
If this is part of your experience at work, get another job. It is hard, but being surveilled all the time has its impact on our self-worth.</description>
This is a head-scratcher, for sure. Why would Microsoft do this? Is Google next? It is hard to understand any real technical justification for the move. Ideas?</description>
</item>
<item>
<title>Most Popular Password Manager Hacked</title>
<description>Dutch Personal Data Authority raised concerns about Google&rsquo;s GDPR compliance Google donesn&rsquo;t carry. They&rsquo;ll just pay the fines.
<description>15 methods for acquiring non-kyc bitcoin If you want to acquire bitcoin without an intermediary tracking your identity, here are fifteen options&hellip;
It&rsquo;s a real head-scratcher when a &ldquo;security service&rdquo; wants to start measuring &ldquo;engagement&rdquo;.</description>
<description>Introduction to the Opendesktop Project This is a centralized service based, in part, on Nextcloud and other open-source projects.
https://www.opendesktop.org/
OpenDesktop.org is a website that provides a platform for open-source software developers and users to share and download various applications, themes, icons, wallpapers, and other digital assets. The website is part of the OpenDesktop Network, which also includes other sites such as KDE-Apps.org, GNOME-Look.org, and XFCE-Look.org.
OpenDesktop.org is a community-driven platform, where users can contribute their own software and content, as well as interact with other members of the community through forums, blogs, and messaging.</description>
<description>How to use the LORA protocol to set up a mesh network for communications The LORA protocol is interesting. Very intersting. There&rsquo;s a shitcoin project to try to extend LORA across the country. Great idea, bad execution.
https://unsigned.io/private-messaging-over-lora/
What would it take to set this up in your own neighborhood or community? Reach out to us if you&rsquo;d like to do or know more.</description>
<description>Even when it is against the law. Who cars? Do you? Does anyone care when the NSA breaks US law to spy on Americans in the United States? No, not really. Nothing is done about it. This is fiat surveillance at its finest. High handed. Passed off as &ldquo;protecting&rdquo; Americans.
&ldquo;The shiny devices we carry around in our pockets have increasingly become malicious tools of governments, law enforcement and even for-profit corporations.&rdquo;</description>
<description>We all have one of these things in our home&hellip; We all have a (wifi) router in our homes if we are typically connected to the internet. Here&rsquo;s some advice how to configure the device in the most secure way possible.
https://routersecurity.org/#StartHere
Explore the site for even more great stuff!</description>
<description>A podcast for self-hosters Even if you don&rsquo;t practice self-hosting using Federated, please practice self-hosting. These guys might be able to provide some guidance!
https://selfhosted.show/
From their description: &ldquo;Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show to share lessons and take you along the journey&hellip;&rdquo;</description>
<description>Want to know how the encryption standard works? Wonderful website. More like a &ldquo;lab&rdquo; than a textual explainer. Understand through doing.
https://sha256algorithm.com/</description>
</item>
<item>
<title>Smart Phones Fragment Attention Span</title>
<description>This Christmas-themed article is a big drag&hellip; All the various ways governments and corporations are working hard to watch our every move.
<description>Decentralization comes with some slow downs that avoid the dystopian pile up Why having everything move/improve at the speed of whim may not be the best idea.
<description>A film essay about the ways and forms of our enslavement A thought-provoking film essay about the ways and means of our quotidian enslavement in the modern world.
<description>Wall Street Journal reports program tracks transactions above $500 Homeland Security is using a tool to track cash transactions above $500.
<description>From the perspective of a notorious shitcoiner&hellip; It&rsquo;s funny how he&rsquo;s right on &ldquo;decentralization&rdquo; but every one of his implementations was backed by some (evil) centralization scheme. We&rsquo;re not hear to prove that, just a bold assertion. But he&rsquo;s right about decentralization.
But how could &ldquo;decentralization&rdquo; ever be monetized? Value for value. Give people want they want and need and they will pay.</description>
</item>
<item>
<title>Will Your Service/Product Provider Cancel You?</title>
<description>Keeping data under your control A nice exposition of the idea that even your apps shouldn&rsquo;t be barriers to your data.
https://0data.app/
For the most part, this means using open data protocols and formats. Not even open-source applications do this today. But this website introduces us to apps that do.</description>
<description>One of the delights of using centralized services&hellip; It&rsquo;s really just a matter of time before your centralized service leaks your credentials or gets hacked. The honeypot is too valuable for the hackers to ignore.
<description>A Report of Strange Behavior by iCloud for Windows The perils of using centralized storage solutions from a company not known for building great services.
According to a thread on the MacRumors forums, some users of iCloud for Windows have reported experiencing issues with the service, including corrupted videos and downloading other people&rsquo;s photos.
The thread includes reports from users who have experienced issues with iCloud for Windows, such as videos that are downloaded from iCloud being corrupted and unplayable, and photos that belong to other iCloud users being downloaded to their own devices.</description>
<description>Caring more about the developer than about the user This may be a perenial complaint, but it does seem as if the state of software today is more geared to the company or the developer rather than the user.
If you&rsquo;re reading this blog, you probably already know self-hosting is important. It is vital to keeping the internet and our data free.</description>
<description>How to use Bitcoin and Lightning on the Tor network We are big fans of Bitcoin and the Lightning network at Federated and recommend using it over Tor. But it can be technically intimidating.
The purpose of Bitcoin and Lightning is to fully decentralize money. The purpose of Tor is to share as little information on the public network as possible. Together they can be very effective.</description>
<description>I&rsquo;ll host it myself As more and more folks have bad experiences with the centralizers, more and more begin to wonder what it would mean to do it all themselves.
The US Department of Justice claims they filed the indictment because the firm expressly catered to those committing criminal acts. But actions like this raise concerns about the claims of authorities that encryption, in and of itself, is a prohibited &ldquo;tool&rdquo; for sale.</description>
</item>
<item>
<title>Your Financial Information Sent to Facebook</title>
According to an article published by Zero Hedge, some major tax filing services in the US have been sending users' financial information, including their social security numbers and income details, to Facebook through tracking tools on their websites.
The article states that tax filing services such as TurboTax, H&amp;R Block, and TaxAct have been using tracking tools from Facebook and other third-party companies on their websites, which allow them to collect data on users' browsing behavior and interests.</description>
Self-ownership means &ldquo;anonymity&rdquo; and to &ldquo;communicate securly with anyone on the planet without being observed by a third party&rdquo;. Of course, there are a number of parts to this puzzle. The hardware, the client software and operating system, the server hardware, software and operating system, and then the network and the means of utilizing that network.</description>
<description>Email is a great way to understand everything about a person If you don&rsquo;t own or run your email (&ldquo;not your keys, not your email&rdquo;), then your on-line identify is owned by your email provider.
<description>NSA Seeks to Track Bitcoin Users In a story from the annals of the obvious&hellip; But why? They might as well haul in the whole village looking for the one villager who committed the alledged crime.
The National Security Agency (NSA) worked to track down users of the cryptocurrency Bitcoin by analyzing internet traffic and other data sources, according to documents leaked by former NSA contractor Edward Snowden.
The documents suggest that the NSA was interested in identifying Bitcoin users who may be engaged in illegal activities such as money laundering and drug trafficking.</description>
</item>
<item>
<title>Outlook.com is Silently Discarding Email Messages</title>
<description>Microsoft knows what is best for you Outlook.com and Hotmail.com won&rsquo;t receive your email message unless they want to&hellip;
Microsoft continues to break the protocol. One solution? Don&rsquo;t email folks with outlook.com and hotmail.com email addresses. Tell them Microsoft has decided what is best.</description>
<description>Dealing with the problem that is Gmail Even if you run your own email server (or use a service like Federated Core), you will likely be interacting with those using Gmail.
It won&rsquo;t happen quickly or over-night, but we must choke out Gmail and other centralized emails services (looking at your outlook.com) if we are to reclaim email as a &ldquo;free&rdquo; as in &ldquo;freedom&rdquo; service.</description>
</item>
<item>
<title>The Original Cypherpunk's Manifesto</title>