diff --git a/config.toml b/config.toml
index f19e187b..e256387a 100644
--- a/config.toml
+++ b/config.toml
@@ -50,16 +50,10 @@ theme = "apsho"
weight = 1
[[menu.main]]
identifier = "blog"
- name = "Federated Blog"
+ name = "Sovereign Reset"
url = "/blog"
parent = "community"
weight = 2
-[[menu.main]]
- identifier = "sovereignreset"
- name = "Sovereign Reset"
- url = "/sovereignreset"
- parent = "community"
- weight = 3
[[menu.main]]
identifier = "projectswelove"
name = "Projects We Love"
diff --git a/content/blog/2022-year-of-desktop-linux.md b/content/blog/2022-year-of-desktop-linux.md
new file mode 100644
index 00000000..c0b8e05e
--- /dev/null
+++ b/content/blog/2022-year-of-desktop-linux.md
@@ -0,0 +1,15 @@
+---
+title: 2022 Year of Desktop Linux
+date: 2022-12-20
+featureImage: images/blog/linux.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Thanks to some Stack Overflow surveys, desktop Linux has arrived for developers
+
+According to a developer survey, Linux holds a 9% lead over macOS.
+
+[Year of the Linux Desktop](https://justingarrison.com/blog/year-of-linux-desktop/)
+
+It's getting better and better meaning there is less and less an excuse to support the *centralizer* operating systems.
\ No newline at end of file
diff --git a/content/blog/21-rules-of-bitcoin-maxi.md b/content/blog/21-rules-of-bitcoin-maxi.md
new file mode 100644
index 00000000..6aa2a73c
--- /dev/null
+++ b/content/blog/21-rules-of-bitcoin-maxi.md
@@ -0,0 +1,27 @@
+---
+title: 21 Rules of Bitcoin Maxi
+date: 2022-11-23
+featureImage: images/blog/bitcoin.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## What can self-sovereign individuals learn from Bitcoin maxis?
+
+We love Bitcoin maxis because they give the self-sovereign individual
+
+[21 Rules of a Bitcoin Maxi](https://darthcoin.substack.com/p/21-rules-of-a-bitcoin-maxi)
+
+Let's see how these some of these rules can be applied to the self-sovereign individual even if, horror, they have no interest in Bitcoin.
+
+1. Not your keys. This is the principal of decentralization. We don't use centralized services where are data is not our own.
+2. Stack sats. For the self-sovereign, this means moving data from fiat services to decentralized and continuing to use and accumulate data on decentralized services.
+4. No one needs to know how much bitcoin you have. Likewise, why advertise how you're accomplishing your digital freedom using decentralized tools?
+5. Run your own node. In the end, if you don't run it, our have "joint" custody so that you can take it over, it's not your data.
+6. Don't do shitcoining. When you interact with friends deep in the Google, Apple, Facebook, etc ecosystems, you're kissing up to shitcoiners. Maybe you need new friends?
+7. Back up your wallet seed words. There are great ways to preserve your sovreignty through backups.
+13. Bitcoin changes you. When you commit to the self-sovereign lifestyle, you change from "can I do this, please, sir?" to "I did this." It is life-changing.
+14. Bitcoin teaches you to be a champion of truth. Here "truth" means living authentically under the principle that only you can be responsible for yourself and those you love. The "state" or the "corporation" do not have your "truth" in mind.
+18. Always fight FUD. Most will say this lifestyle is not possible.
+
+Together we can change our world.
diff --git a/content/blog/NSA-collects-data.md b/content/blog/NSA-collects-data.md
new file mode 100644
index 00000000..3f34322f
--- /dev/null
+++ b/content/blog/NSA-collects-data.md
@@ -0,0 +1,15 @@
+---
+title: Proof the NSA Spies on Americans
+date: 2021-10-21
+featureImage: images/blog/amerciansurveillance.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Even when it is against the law. Who cars? Do you?
+
+Does anyone care when the NSA breaks US law to spy on Americans in the United States? No, not really. Nothing is done about it. This is fiat surveillance at its finest. High handed. Passed off as "protecting" Americans.
+
+https://threadreaderapp.com/thread/1587446686393122816.html
+
+What can be done about it? First, make it much harder by decentralizing everything.
\ No newline at end of file
diff --git a/content/blog/_index.md b/content/blog/_index.md
index 7ae1b45e..2582f734 100644
--- a/content/blog/_index.md
+++ b/content/blog/_index.md
@@ -1,5 +1,5 @@
---
-title: "Federated Computer Blog"
+title: "Sovereign Reset: the Federated Blog"
date: 2023-05-30
-description: "Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. For broader topics of health, money, relationships, technology, surveillance, see our sister blog at Sovereign Reset: https://www.sovereignreset.com."
+description: "Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance."
---
diff --git a/content/blog/acquire-non-kyc-bitcoin.md b/content/blog/acquire-non-kyc-bitcoin.md
new file mode 100644
index 00000000..0d07535a
--- /dev/null
+++ b/content/blog/acquire-non-kyc-bitcoin.md
@@ -0,0 +1,15 @@
+---
+title: No KYC Bitcoin
+date: 2021-10-21
+featureImage: images/blog/bitcoin.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## 15 methods for acquiring non-kyc bitcoin
+
+If you want to acquire bitcoin without an intermediary tracking your identity, here are fifteen options...
+
+https://sovrnbitcoiner.com/15-methods-to-aquire-non-kyc-bitcoin/
+
+What have we to hide? Everything! :blush:
\ No newline at end of file
diff --git a/content/blog/all-eyes-are-on-us.md b/content/blog/all-eyes-are-on-us.md
new file mode 100644
index 00000000..58f19f05
--- /dev/null
+++ b/content/blog/all-eyes-are-on-us.md
@@ -0,0 +1,15 @@
+---
+title: All Eyes Are On Us.
+date: 2022-11-22
+featureImage: images/blog/surveillance.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## 5 Eyes, 9 Eyes, 14 Eyes: Protect Yourself From Global Surveillance
+
+The fact of our lives today is constant global surveillance. By governments. By corporations.
+
+https://vpnoverview.com/privacy/anonymous-browsing/5-9-14-eyes/
+
+You may be shocked to the extent your government spies on you. In a "democracy". For your "safety".
\ No newline at end of file
diff --git a/content/blog/apple-ad-business.md b/content/blog/apple-ad-business.md
new file mode 100644
index 00000000..2f7938c8
--- /dev/null
+++ b/content/blog/apple-ad-business.md
@@ -0,0 +1,15 @@
+---
+title: Apple's Ad Business Booming
+date: 2022-10-03
+featureImage: images/blog/apple.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## How do we square a digital, tracking ad business with privacy?
+
+It's hard to see how a company running a $5 billion, and growing, digital (ie. tracking) ad business can be real about protecting privacy.
+
+https://adguard.com/en/blog/apple-tracking-ads-business.html
+
+Tim Cook famously said: "You are not our product. You are our customer. You are a jewel, and we care about the user experience." (2018) But does this line up with Apple's recent hard charge into the digital advertising business?
\ No newline at end of file
diff --git a/content/blog/apple-advertising-app-store.md b/content/blog/apple-advertising-app-store.md
new file mode 100644
index 00000000..9d3308ef
--- /dev/null
+++ b/content/blog/apple-advertising-app-store.md
@@ -0,0 +1,15 @@
+---
+title: Ads in Apple App Store
+date: 2021-10-21
+featureImage: images/blog/timcook.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## What happens when the white knight gets down and dirty with the central trackers?
+
+Apple has been slowly but surely expanding the reach of ads across their platforms for the past several years.
+
+https://basicappleguy.com/basicappleblog/you-might-also-like
+
+What to do? Try Linux. There are plenty of great distributions. Oh, the app you want/need isn't there? Spin up a Windows VM on your Linux distro for the times you need to bend over. You can even run macOS in a VM. If we don't like this advertising shit, why are we acting like a bunch of cucks and whining? Be self sovereign.
\ No newline at end of file
diff --git a/content/blog/apple-checking-images-evidence.md b/content/blog/apple-checking-images-evidence.md
new file mode 100644
index 00000000..ee19b6fc
--- /dev/null
+++ b/content/blog/apple-checking-images-evidence.md
@@ -0,0 +1,15 @@
+---
+title: Apple Checking Images? Evidence
+date: 2023-01-15
+featureImage: images/blog/applecampus.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Is Apple checking images we view in the Finder?
+
+The evidence for the case that Apple is checking images browsed in the Finder and sending metadata to a remote server.
+
+https://sneak.berlin/20230115/macos-scans-your-local-files-now/
+
+We have another post with a rebuttal.
\ No newline at end of file
diff --git a/content/blog/apple-checking-images-rebuttal.md b/content/blog/apple-checking-images-rebuttal.md
new file mode 100644
index 00000000..6c43bb23
--- /dev/null
+++ b/content/blog/apple-checking-images-rebuttal.md
@@ -0,0 +1,15 @@
+---
+title: Is Apple Checking Images? Rebuttal.
+date: 2023-01-18
+featureImage: images/blog/apple.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Is Apple checking images we view in the Finder?
+
+Little Snitch claims browsing an image sends a message from "mediaanalysisd" to an Apple server.
+
+https://eclecticlight.co/2023/01/18/is-apple-checking-images-we-view-in-the-finder/
+
+But it doesn't appear this is actually happening. But let's keep investigating.
\ No newline at end of file
diff --git a/content/blog/apple-is-building-demand-side-platform.md b/content/blog/apple-is-building-demand-side-platform.md
new file mode 100644
index 00000000..e903974a
--- /dev/null
+++ b/content/blog/apple-is-building-demand-side-platform.md
@@ -0,0 +1,15 @@
+---
+title: Apple Advertising
+date: 2021-10-21
+featureImage: images/blog/timcook.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## The fruit is building a demand-side platform
+
+Has there been a successful digtial advertising platform that doesn't track users?
+
+https://www.insiderintelligence.com/content/apple-will-emerge-advertising-player-watch-2023
+
+Hey baby, don't worry. This is Apple. :kissing:
\ No newline at end of file
diff --git a/content/blog/apple-refuses-to-cooperate.md b/content/blog/apple-refuses-to-cooperate.md
new file mode 100644
index 00000000..e1960ae4
--- /dev/null
+++ b/content/blog/apple-refuses-to-cooperate.md
@@ -0,0 +1,15 @@
+---
+title: Apple Refuses to Cooperate
+date: 2022-09-02
+featureImage: images/blog/applefans.jpg
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## The US Government Seeks Information About App Store Behaviors
+
+Apple's behavior with re: its App Store is notorious...
+
+http://www.fosspatents.com/2022/09/apple-refuses-to-cooperate-with-us.html
+
+"Apple taxes, tyrannizes, and "sherlocks" app developers. App developers are victims of Apple's conduct, and ACT | The App Association--which is actually just an Apple Association--unethically claims to represent the interests of small developers."
\ No newline at end of file
diff --git a/content/blog/apple-tracking-you-in-app-store.md b/content/blog/apple-tracking-you-in-app-store.md
new file mode 100644
index 00000000..b14c869c
--- /dev/null
+++ b/content/blog/apple-tracking-you-in-app-store.md
@@ -0,0 +1,15 @@
+---
+title: Apple Tracks You in the App Store
+date: 2022-11-03
+featureImage: images/blog/apple.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## As you browse and tap, Apple is watching
+
+"Ahem, we are building a better customer experience..."
+
+https://twitter.com/mysk_co/status/1588308341780262912
+
+...for us, Apple.
\ No newline at end of file
diff --git a/content/blog/apple-tracks-you-in-ios.md b/content/blog/apple-tracks-you-in-ios.md
new file mode 100644
index 00000000..0bf48133
--- /dev/null
+++ b/content/blog/apple-tracks-you-in-ios.md
@@ -0,0 +1,15 @@
+---
+title: "Apple Tracks You"
+date: 2022-11-08
+featureImage: images/blog/applecampus.jpg
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Even when its own privacy setting say 'no' tracking...
+
+Independent tests suggests Apple is tracking you on iOS even when you've disabled sharing "Device Analytics" altogether.
+
+[Apple Tracks You](https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558)
+
+It's Apple. They know best.
\ No newline at end of file
diff --git a/content/blog/apple-turned-off-airdrop.md b/content/blog/apple-turned-off-airdrop.md
new file mode 100644
index 00000000..c3aad4cc
--- /dev/null
+++ b/content/blog/apple-turned-off-airdrop.md
@@ -0,0 +1,19 @@
+---
+title: Apple turned off a private communication tool in China just before major protests broke out.
+date: 2021-10-21
+featureImage: images/blog/apple.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## What does it mean when a vendor tells you how to use tools on your device?
+
+https://reclaimthenet.org/apple-air-drop-china
+
+Apple made a change to how AirDrop works in mainland China restricting the way Apple customer could communicate with each other.
+
+According to the article published by Reclaim The Net on August 10, 2021, Apple has come under scrutiny for allegedly allowing Chinese users to receive unsolicited content through its AirDrop feature. The report states that Chinese users have been receiving unsolicited pornographic images and spam through AirDrop from strangers who are using anonymous usernames.
+
+The article further notes that the Chinese government has been cracking down on online pornography and other forms of illegal content, and the use of anonymous usernames has been banned in the country. However, the report suggests that the anonymity feature of AirDrop has allowed users to bypass this regulation and share illegal content.
+
+Apple has not yet commented on the matter, but the report raises concerns about the company's responsibility to prevent the spread of illegal content and protect its users from unwanted and potentially harmful material. It also highlights the challenges faced by tech companies operating in China, where strict government censorship and regulation often conflict with international standards of free speech and privacy.
\ No newline at end of file
diff --git a/content/blog/apple-tv-ad-product.md b/content/blog/apple-tv-ad-product.md
new file mode 100644
index 00000000..1784283e
--- /dev/null
+++ b/content/blog/apple-tv-ad-product.md
@@ -0,0 +1,15 @@
+---
+title: Apple TV Ad Product
+date: 2021-10-21
+featureImage: images/blog/timcook.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Quietly pushing an ad product with media agencies
+
+Where will we go for privacy when Apple abandons us to the verdant fields of advertising revenue?
+
+https://digiday.com/media/apple-is-quietly-pushing-a-tv-ad-product-with-media-agencies/
+
+To a self-sovereign, distributed, federated future.
\ No newline at end of file
diff --git a/content/blog/apple-webapps-browsers.md b/content/blog/apple-webapps-browsers.md
new file mode 100644
index 00000000..92300528
--- /dev/null
+++ b/content/blog/apple-webapps-browsers.md
@@ -0,0 +1,15 @@
+---
+title: Apple Looking Like 1990s Microsoft
+date: 2022-01-24
+featureImage: images/blog/apple.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Does it come down to the $20 billion in cash paid annually by Google?
+
+Apple really doesn't want competition on iOS for web browsers...
+
+https://twitter.com/openwebadvocacy/status/1617802614149894144
+
+Even Google allows competition on Android! Think of all the tracking offered up by iOS users to Google...
\ No newline at end of file
diff --git a/content/blog/automatic-csam-scanning-eu.md b/content/blog/automatic-csam-scanning-eu.md
new file mode 100644
index 00000000..50cd0743
--- /dev/null
+++ b/content/blog/automatic-csam-scanning-eu.md
@@ -0,0 +1,15 @@
+---
+title: CSAM Scanning in the EU
+date: 2021-10-21
+featureImage: images/blog/europeanunion.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Using the pretext of child protection to introduce mass surveillance
+
+This is still just a proposal.
+
+https://tutanota.com/blog/posts/eu-surveillance-csam/
+
+But the proposal would basically lead to all messages being read all the time. Get off the centralized services. Make it difficult.
\ No newline at end of file
diff --git a/content/blog/awesome-oss-alternatives.md b/content/blog/awesome-oss-alternatives.md
new file mode 100644
index 00000000..b6694f6d
--- /dev/null
+++ b/content/blog/awesome-oss-alternatives.md
@@ -0,0 +1,15 @@
+---
+title: Awesome FOSS Alternatives
+date: 2022-07-15
+featureImage: images/blog/selfhosted.gif
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## FOSS solutions to try
+
+Here's another compiled list of FOSS solutions to investigate rather than giving money to *centralizer* man.
+
+https://github.com/RunaCapital/awesome-oss-alternatives
+
+Which ones look promising to you?
\ No newline at end of file
diff --git a/content/blog/awesome-privacy.md b/content/blog/awesome-privacy.md
new file mode 100644
index 00000000..96263c5a
--- /dev/null
+++ b/content/blog/awesome-privacy.md
@@ -0,0 +1,15 @@
+---
+title: Awesome Privacy
+date: 2022-07-21
+featureImage: images/blog/privacy.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## A list of privacy and security-focused apps, software, and providers
+
+From the list: "Large data-hungry corporations dominate the digital world but with little, or no respect for your privacy. Migrating to open-source applications with a strong emphasis on security will help stop corporations, governments, and hackers from logging, storing or selling your personal data."
+
+https://github.com/Lissy93/awesome-privacy
+
+It would be even better if this was *not* hosted on Github. C'est la vie!
\ No newline at end of file
diff --git a/content/blog/awesome-self-hosted.md b/content/blog/awesome-self-hosted.md
new file mode 100644
index 00000000..3b3b6da9
--- /dev/null
+++ b/content/blog/awesome-self-hosted.md
@@ -0,0 +1,15 @@
+---
+title: Awesome Self-hosted
+date: 2022-01-21
+featureImage: images/blog/selfhosted.gif
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Github listing of self-hosted software
+
+This is a pretty comprehensive list of software you can self-host across a very wide variety of categories.
+
+https://github.com/awesome-selfhosted/awesome-selfhosted/blob/master/README.md
+
+While we think Federated is a pretty good curation of the "best" software for self-hosting out there, this list reminds us there is so, so much more.
\ No newline at end of file
diff --git a/content/blog/basecamp-is-leaving-the-cloud.md b/content/blog/basecamp-is-leaving-the-cloud.md
new file mode 100644
index 00000000..bd32c5ab
--- /dev/null
+++ b/content/blog/basecamp-is-leaving-the-cloud.md
@@ -0,0 +1,15 @@
+---
+title: Basecamp is Leaving the Cloud
+date: 2022-10-19
+featureImage: images/blog/selfhosted.gif
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## An explanation
+
+Basecamp's David Heinemeier Hansson explains the departure from the cloud.
+
+https://world.hey.com/dhh/why-we-re-leaving-the-cloud-654b47e0
+
+We don't agree with all the conclusions. Nevertheless, bon voyage! (Oh, side note, notice he mentions "analyze and store" with re: the Hey email service. Centralizer.)
\ No newline at end of file
diff --git a/content/blog/big-batch-of-breaches.md b/content/blog/big-batch-of-breaches.md
new file mode 100644
index 00000000..f1a27d83
--- /dev/null
+++ b/content/blog/big-batch-of-breaches.md
@@ -0,0 +1,15 @@
+---
+title: Breaches for Everyone!
+date: 2021-10-21
+featureImage: images/blog/breaches.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Looks like lots of centralized services relied on another central service...
+
+...and now the whole mass of them are breached.
+
+https://twitter.com/tayvano_/status/1611131230074073088?s=20&t=NR4Z4aJlKaNg_rHuQVYn7A
+
+CircleCI is the central culprit. We, the users of these centralized system have no clue whats going on in the entirely opaque background. No clue.
\ No newline at end of file
diff --git a/content/blog/bill-to-ban-tiktok-patriot-act-2.md b/content/blog/bill-to-ban-tiktok-patriot-act-2.md
new file mode 100644
index 00000000..88df87e0
--- /dev/null
+++ b/content/blog/bill-to-ban-tiktok-patriot-act-2.md
@@ -0,0 +1,15 @@
+---
+title: TikTok Ban is Patriot Act 2.0
+date: 2023-03-28
+featureImage: images/blog/americansurveillance.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Get informed.
+
+This is a global surveillance gambit.
+
+https://www.youtube.com/watch?v=FWQGA_n5Z4M
+
+It has very little to do with "China".
\ No newline at end of file
diff --git a/content/blog/bill-to-ban-tiktok.md b/content/blog/bill-to-ban-tiktok.md
new file mode 100644
index 00000000..417b6c71
--- /dev/null
+++ b/content/blog/bill-to-ban-tiktok.md
@@ -0,0 +1,15 @@
+---
+title: Bill to Ban TikTok Terrifying
+date: 2023-03-28
+featureImage: images/blog/tiktok.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## It's really about global surveillance
+
+There's nothing to like about this bill.
+
+https://twitter.com/greg_price11/status/1640722365809147905
+
+BTW: Twitter, Facebook, Instagram, Google suck away your metadata and give it to a government, too.
\ No newline at end of file
diff --git a/content/blog/bisq.md b/content/blog/bisq.md
new file mode 100644
index 00000000..67cdec77
--- /dev/null
+++ b/content/blog/bisq.md
@@ -0,0 +1,15 @@
+---
+title: Bisq
+date: 2021-10-21
+featureImage: images/blog/nokyc.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## As in biscuit? Or just no-KYC bitcoin?
+
+One of the best ways to buy bitcoin with no KYC.
+
+https://bisq.network/
+
+You'll also feel like a trader walking through a market in the town square. You get to set the deal.
\ No newline at end of file
diff --git a/content/blog/bitcoin-plugin-wordpress.md b/content/blog/bitcoin-plugin-wordpress.md
new file mode 100644
index 00000000..5033b571
--- /dev/null
+++ b/content/blog/bitcoin-plugin-wordpress.md
@@ -0,0 +1,15 @@
+---
+title: Bitcoin Lightning Publisher for WordPress
+date: 2022-11-21
+featureImage: images/blog/bitcoin.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Review of a plugin for WordPress allowing receipt of Bitcoin payments
+
+A description of a plugin for Wordpress enabling Bitcoin payments using the Lightning network.
+
+https://wordpress.org/plugins/bitcoin-lightning-publisher/
+
+Able to use a number of different Lightning backends.
\ No newline at end of file
diff --git a/content/blog/bitcoin-seed-phrase-backup-devices.md b/content/blog/bitcoin-seed-phrase-backup-devices.md
new file mode 100644
index 00000000..bff34fde
--- /dev/null
+++ b/content/blog/bitcoin-seed-phrase-backup-devices.md
@@ -0,0 +1,13 @@
+---
+title: Bitcoin Seed Backup Device Design
+date: 2022-08-13
+featureImage: images/blog/privatekeys.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Lessons learned stress testing dozens of seed phrase backup devices
+
+The seed phrase is like the password opening up the value of a Bitcoin address. If you lose it, you lose the Bitcoin. So, it is imperative, when using self-custodied Bitcoin address, that you have 100% reliable access to your seed phrase.
+
+https://blog.lopp.net/a-treatise-on-bitcoin-seed-backup-device-design/
diff --git a/content/blog/breaking-google-maps-monopoly.md b/content/blog/breaking-google-maps-monopoly.md
new file mode 100644
index 00000000..4f67f9d6
--- /dev/null
+++ b/content/blog/breaking-google-maps-monopoly.md
@@ -0,0 +1,15 @@
+---
+title: Google Maps Monopoly
+date: 2022-12-16
+featureImage: images/blog/googlemaps.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Linux, Amazon, Meta, and Microsoft want to break the Google Maps monopoly
+
+There's some bad *centralizers* in this alliance. And Google Maps is a really nice product! But we need it broken up.
+
+https://arstechnica.com/gadgets/2022/12/linux-amazon-meta-and-microsoft-want-to-break-the-google-maps-monopoly/
+
+P.S. There is no "Linux" in the way they use the term. :blush:
\ No newline at end of file
diff --git a/content/blog/btcmap-org.md b/content/blog/btcmap-org.md
new file mode 100644
index 00000000..70fd35ba
--- /dev/null
+++ b/content/blog/btcmap-org.md
@@ -0,0 +1,15 @@
+---
+title: BTCMap.org
+date: 2021-10-21
+featureImage: images/blog/bitcoin.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Where to spend your bitcoin
+
+This is the chicken-and-egg challenge for bitcoin. Money for spending (versus money for store of value).
+
+https://btcmap.org/map
+
+The solution is to continue to build communities of common-interest that can build small economies where bitcoin is taken back and forth. Maybe the solution is we *all* need to be willing and able to take bitcoin?
\ No newline at end of file
diff --git a/content/blog/build-a-gun.md b/content/blog/build-a-gun.md
new file mode 100644
index 00000000..5db9be10
--- /dev/null
+++ b/content/blog/build-a-gun.md
@@ -0,0 +1,13 @@
+---
+title: Build a Gun
+date: 2022-05-24
+featureImage: images/blog/selfsovereign.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Build a 22 rifle to keep the varmits at bay...
+
+Sure, you can buy a rifle, but why not learn about how things work by assembling the parts and building a custom rifle for pest control?
+
+https://www.youtube.com/watch?v=7D5twkg8HE0&t=304
diff --git a/content/blog/build-your-own-seedsigner.md b/content/blog/build-your-own-seedsigner.md
new file mode 100644
index 00000000..7a7fd4d9
--- /dev/null
+++ b/content/blog/build-your-own-seedsigner.md
@@ -0,0 +1,15 @@
+---
+title: Build Your Own Seedsigner
+date: 2021-10-21
+featureImage: images/blog/privatekeys.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## You need a seed signer to keep your Bitcoin safe
+
+With this technique, no one will know your seed phrase except the people you tell.
+
+https://seedsigner.com/
+
+No trust.
\ No newline at end of file
diff --git a/content/blog/building-a-self-sovereign-lifestyle.md b/content/blog/building-a-self-sovereign-lifestyle.md
new file mode 100644
index 00000000..466aa289
--- /dev/null
+++ b/content/blog/building-a-self-sovereign-lifestyle.md
@@ -0,0 +1,15 @@
+---
+title: Building a Self-sovereign Lifestyle
+date: 2022-11-07
+featureImage: images/blog/selfsovereign.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## The permaculture mentality homsteaders have is congruent with Bitcoin low-time-preference mentality
+
+What is true, even if you're not going to homestead, is you need to adopt a homesteading mentality...
+
+https://bitcoinmagazine.com/culture/building-homesteader-lifestyle-with-bitcoin
+
+The mentality of a homesteader is one that examines all areas of life to figure out how one can move from centralization to decentralization.
\ No newline at end of file
diff --git a/content/blog/building-arm64-server-hard-way.md b/content/blog/building-arm64-server-hard-way.md
new file mode 100644
index 00000000..13b4b79a
--- /dev/null
+++ b/content/blog/building-arm64-server-hard-way.md
@@ -0,0 +1,15 @@
+---
+title: Building an ARM64 Home Server
+date: 2023-02-19
+featureImage: images/blog/arm64.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## This is the hard way
+
+Honestly, we don't recommend this for anyone. But it does give a sense of the power and flexibility available to those wanting to self-host at home. My own self-hosted home server is similar.
+
+https://jforberg.se/blog/posts/2023-02-19-rockpro64/rockpro64.html
+
+By the way, there are so many great servers for sale on eBay with 16G ram, Xeon processors, etc. that work very well as a home server without the fragility and for roughly the same initial price.
\ No newline at end of file
diff --git a/content/blog/central-bank-digital-currency-video.md b/content/blog/central-bank-digital-currency-video.md
new file mode 100644
index 00000000..96381c13
--- /dev/null
+++ b/content/blog/central-bank-digital-currency-video.md
@@ -0,0 +1,15 @@
+---
+title: Central Bank Digital Currency Amouse Bouche
+date: 2023-03-01
+featureImage: images/blog/cbdc.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Fat Man Tells Truth
+
+Hey! Let's digitize all cash to something controlled by the guv'mint so that they can see who is doing what.
+
+https://twitter.com/ZLOK/status/1639898907529314304?s=20
+
+A person has to be insane, no, an idiot, to want to get on board with this idea.
\ No newline at end of file
diff --git a/content/blog/checklist-digital-privacy-security.md b/content/blog/checklist-digital-privacy-security.md
new file mode 100644
index 00000000..eb9d3e91
--- /dev/null
+++ b/content/blog/checklist-digital-privacy-security.md
@@ -0,0 +1,13 @@
+---
+title: Checklist for Digital Privacy and Security
+date: 2022-11-28
+featureImage: images/blog/privacy.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## hWork through them as you get the time...eadline
+
+Some of the recommendations are *centralizers*...but we like the effort and attention to the subject!
+
+https://twitter.com/_k3tan/status/1597327334004371462?t=_G4DaTq7_p30VkmonGcgSg&s=19
diff --git a/content/blog/choose-btc-wallet.md b/content/blog/choose-btc-wallet.md
new file mode 100644
index 00000000..9f28ef84
--- /dev/null
+++ b/content/blog/choose-btc-wallet.md
@@ -0,0 +1,15 @@
+---
+title: Choosing the Right BTC/LN Wallet
+date: 2022-09-16
+featureImage: images/blog/lightning.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Some advice for choosing the right Bitcoin and LIghtning Wallet
+
+Just like a password manager, choosing the right wallet for bitcoin can be stressful.
+
+https://stacker.news/items/70725
+
+As they say: "Think like a bank, not just be a bank."
\ No newline at end of file
diff --git a/content/blog/company-risk-assessment.md b/content/blog/company-risk-assessment.md
new file mode 100644
index 00000000..81342a5f
--- /dev/null
+++ b/content/blog/company-risk-assessment.md
@@ -0,0 +1,13 @@
+---
+title: Will Your Service/Product Provider Cancel You?
+date: 2021-10-21
+featureImage: images/blog/censorship.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## One listing of companies and a risk assessment...
+
+The company may not like you and show you the door...
+
+https://1792exchange.com/spotlightreports/
diff --git a/content/blog/computer-that-i-own.md b/content/blog/computer-that-i-own.md
new file mode 100644
index 00000000..682c8bb0
--- /dev/null
+++ b/content/blog/computer-that-i-own.md
@@ -0,0 +1,17 @@
+---
+title: I Want a Computer that I Own
+date: 2021-02-26
+featureImage: images/blog/selfsovereign.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Can I Own My Computer?
+
+These days, is it possible to own your computer and the data that flows through it?
+
+http://misc-stuff.terraaeon.com/articles/computer-i-own.html
+
+Self-ownership means "anonymity" and to "communicate securly with anyone on the planet without being observed by a third party". Of course, there are a number of parts to this puzzle. The hardware, the client software and operating system, the server hardware, software and operating system, and then the network and the means of utilizing that network. Each have their own challenges to "ownership" and incumbent third-parties such as Google, Apple, Microsoft, the NSA, five eyes, and all the rest who have built lucrative and oppressive business models on maintaining that observation.
+
+We stand today naked before our computing overlords. Only when we begin to clothe and cloak bit by bit do we begin to take away control from the peeping Toms, the creeps, the "authorities".
\ No newline at end of file
diff --git a/content/blog/corporate-coalition-wants-digital-id.md b/content/blog/corporate-coalition-wants-digital-id.md
new file mode 100644
index 00000000..af554c0b
--- /dev/null
+++ b/content/blog/corporate-coalition-wants-digital-id.md
@@ -0,0 +1,15 @@
+---
+title: Corporate Coalition Wants Government Digital ID
+date: 2021-10-21
+featureImage: images/blog/digitalid.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## The 'Better Identify Coalition' wants better ways to track you
+
+It's a real rogue's gallery of corporations pushing for a single way to track us no matter what we do on or off the network.
+
+https://reclaimthenet.org/corporations-push-for-digital-id
+
+Shame on you Yubico for being part of this proposal. Why mortgage whatever good will you have to kneel at the feet of your corporate overlords?
\ No newline at end of file
diff --git a/content/blog/create-your-own-bitcoin-giveaway-card.md b/content/blog/create-your-own-bitcoin-giveaway-card.md
new file mode 100644
index 00000000..880a7cf1
--- /dev/null
+++ b/content/blog/create-your-own-bitcoin-giveaway-card.md
@@ -0,0 +1,15 @@
+---
+title: Give Away Bitcoin on a Hotel Door Key
+date: 2022-12-28
+featureImage: images/blog/bitcoin.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Let's just say your traditional bank would frown on such behavior
+
+Bitcoin is also a technology teeming with new ideas, new innovations.
+
+https://twitter.com/3d_nout/status/1608245114052247552
+
+I'm sure your bank wouldn't allow you to do this with your fiat account. I bet the "bad guys" could use this! :laughing:
\ No newline at end of file
diff --git a/content/blog/cryptocurrency-question-of-trust.md b/content/blog/cryptocurrency-question-of-trust.md
new file mode 100644
index 00000000..6d83fda3
--- /dev/null
+++ b/content/blog/cryptocurrency-question-of-trust.md
@@ -0,0 +1,15 @@
+---
+title: Cryptocurrency, the Jews, and the Fundamental Question of Trust
+date: 2021-10-21
+featureImage: images/blog/bitcoin.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## How Bitcoin addressed a problem that has haunted human affairs for 2.5 million years
+
+How does the decentralized Bitcoin system work?
+
+https://www.tabletmag.com/sections/news/articles/cryptocurrency-jews-question-benjamin-samuels
+
+How Bitcoin solved the trust issue that has plagued societies for millenia. Some precursors to the Diffie-Hellman key exchange are discussed and explained.
\ No newline at end of file
diff --git a/content/blog/cryptography-is-not-enough.md b/content/blog/cryptography-is-not-enough.md
new file mode 100644
index 00000000..21c0e429
--- /dev/null
+++ b/content/blog/cryptography-is-not-enough.md
@@ -0,0 +1,21 @@
+---
+title: Cryptography Is Not Enough
+date: 2022-09-22
+featureImage: images/blog/privacy.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Going Beyond Cryptogrpahy
+
+This wide-ranging discussion proposes a lifestyle.
+
+https://dergigi.com/2022/09/10/cryptography-is-not-enough/
+
+According to the article published by Dergigi, cryptography alone is not sufficient to provide complete security for digital systems and data. While cryptography is an essential tool for protecting data against unauthorized access and tampering, it cannot address all of the security challenges that digital systems face.
+
+The article notes that cryptography is vulnerable to various attacks, including brute force attacks, side-channel attacks, and quantum attacks, which could potentially compromise the security of encrypted data. Additionally, cryptography cannot protect against other types of security threats, such as social engineering attacks, insider threats, and physical attacks on hardware and infrastructure.
+
+The report argues that a comprehensive approach to security is necessary, which includes not only cryptography but also other security measures such as access control, authentication, monitoring, and incident response. The article also highlights the importance of regular security audits and updates, as well as ongoing education and training for users to promote awareness of security best practices.
+
+The article notes that as digital systems become increasingly complex and interconnected, the need for a comprehensive security approach becomes even more important. It also highlights the potential risks of relying solely on cryptography for security, and the need for organizations and individuals to adopt a more holistic approach to protecting their data and systems.
\ No newline at end of file
diff --git a/content/blog/cypherpunks-manifesto.md b/content/blog/cypherpunks-manifesto.md
new file mode 100644
index 00000000..a52bf922
--- /dev/null
+++ b/content/blog/cypherpunks-manifesto.md
@@ -0,0 +1,15 @@
+---
+title: The Original Cypherpunk's Manifesto
+date: 1993-03-09
+featureImage: images/blog/cypherpunk.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## It starts with privacy
+
+The basis for everything we do at Federated Computer.
+
+https://what.cd/
+
+Privacy is the conerstone and that is built on anonymous systems.
\ No newline at end of file
diff --git a/content/blog/dandelion-root-recipes.md b/content/blog/dandelion-root-recipes.md
new file mode 100644
index 00000000..2b394e4f
--- /dev/null
+++ b/content/blog/dandelion-root-recipes.md
@@ -0,0 +1,13 @@
+---
+title: Dandelion Root Recipes
+date: 2023-05-07
+featureImage: images/blog/healthy.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Are there ways to use the very common dandelion for good?
+
+This time of year in the northern hemisphere, yards can be filled with the yellow-flowered weed. Let's use them for good.
+
+https://practicalselfreliance.com/dandelion-root-recipes/
diff --git a/content/blog/dangers-of-digital-identity.md b/content/blog/dangers-of-digital-identity.md
new file mode 100644
index 00000000..10f0c5e5
--- /dev/null
+++ b/content/blog/dangers-of-digital-identity.md
@@ -0,0 +1,15 @@
+---
+title: Dangers of Digital Identity
+date: 2022-03-24
+featureImage: images/blog/digitalid.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## What happens when your 'identity' is simply 1s and 0s?
+
+A digital identity isn't something from you. It is a dossier created by the *centralizers* to better understand, for themselves, the capabilities in the world allowed to you.
+
+https://www.boniface-institute.com/the-dangers-of-digital-identity/
+
+Identity is tied to access in the digital world.
\ No newline at end of file
diff --git a/content/blog/data-broker-helps-police-see-everywhere-youve-been.md b/content/blog/data-broker-helps-police-see-everywhere-youve-been.md
new file mode 100644
index 00000000..2b7d8733
--- /dev/null
+++ b/content/blog/data-broker-helps-police-see-everywhere-youve-been.md
@@ -0,0 +1,15 @@
+---
+title: Data Broker Rats You Out!
+date: 2022-09-01
+featureImage: images/blog/surveillance.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Your data is given to police so that they can see everywhere you've been with the click of a mouse.
+
+Hey, you're in the privacy of your home, what could go wrong?
+
+https://www.eff.org/de/press/releases/data-broker-helps-police-see-everywhere-youve-been-click-mouse-eff-investigation
+
+Answer: everything. Start taking back your privacy!
\ No newline at end of file
diff --git a/content/blog/delhi-rules-telegram-discloses.md b/content/blog/delhi-rules-telegram-discloses.md
new file mode 100644
index 00000000..20211d13
--- /dev/null
+++ b/content/blog/delhi-rules-telegram-discloses.md
@@ -0,0 +1,17 @@
+---
+title: Telegram Discloses Names After Ruling
+date: 2022-11-29
+featureImage: images/blog/telegram.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## You think your Telegram Data is Secure?
+
+If the thing you're using is centralized, it is so much easier for the "authorities" to compel disclosure of data. Case in point is Telegram who was recently forced to disclose names, phone numbers, and IP address accused of sharing material thought to infringe copyright.
+
+https://www.livelaw.in/news-updates/after-court-order-telegram-discloses-phone-numbers-ip-addresses-of-users-accused-of-sharing-infringing-material-215311
+
+The court order was issued by the Delhi High Court in India and required Telegram to disclose the information to the plaintiffs who had filed a copyright infringement case against the users.
+
+It is important to note that this action was taken in compliance with a specific court order and does not necessarily indicate a general policy or practice of Telegram to disclose user information. Telegram has previously stated that it values the privacy of its users and that it will only disclose user data in response to a valid court order or other legal requirement.
\ No newline at end of file
diff --git a/content/blog/dont-drink-to-health.md b/content/blog/dont-drink-to-health.md
new file mode 100644
index 00000000..af056e83
--- /dev/null
+++ b/content/blog/dont-drink-to-health.md
@@ -0,0 +1,13 @@
+---
+title: No Health Benefits for Moderate Drinking
+date: 2023-04-05
+featureImage: images/blog/healthy.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Can moderate drinking ever be healthy?
+
+It doesn't look like it is...
+
+https://www.japantimes.co.jp/news/2023/04/05/world/science-health-world/alcohol-health-studies/
diff --git a/content/blog/dropbox-is-watching-your-activity.md b/content/blog/dropbox-is-watching-your-activity.md
new file mode 100644
index 00000000..384320e2
--- /dev/null
+++ b/content/blog/dropbox-is-watching-your-activity.md
@@ -0,0 +1,13 @@
+---
+title: Dropbox is Watching Your Activity
+date: 2020-10-12
+featureImage: images/blog/surveillance.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Why All the Telemetry?
+
+Dropbox sure does collect lots of information...
+
+[Why So Much Telemetry?](https://www.dropboxforum.com/t5/Integrations/Why-So-Much-Telemetry/td-p/455961/page/3)
diff --git a/content/blog/drowning-in-ai-garbage.md b/content/blog/drowning-in-ai-garbage.md
new file mode 100644
index 00000000..5fceb9e7
--- /dev/null
+++ b/content/blog/drowning-in-ai-garbage.md
@@ -0,0 +1,31 @@
+---
+title: Drowning in AI Garbage
+date: 2022-12-05
+featureImage: images/blog/ai.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Drowning in AI Generated Garbage
+
+It's a contrarian opinion to opine that AI is anything but garbage (i.e. something written by a 5th grader doing a report). Look, we use ChatGPT to generate the summaries for these link list posts, because we are lazy, and we want to spend more time PC gaming. We're old school that way. But most of the summaries require a significant amount of re-writing...so how lazy are we after all?
+
+https://ploum.net/2022-12-05-drowning-in-ai-generated-garbage.html
+
+Here's the AI speaking...
+
+Discusses the proliferation of low-quality, AI-generated content on the internet and the challenges it poses for consumers and content creators alike.
+
+The author notes that while AI-generated content can be useful in certain contexts, such as language translation or image recognition, it can also be used to create vast quantities of low-quality content such as spam emails, fake reviews, and clickbait articles.
+
+(Clickbait articles? Hell, yes! This part was created by a human because, despite what the "consensus" might say, AI doesn't have a sense of attempted humor.)
+
+This flood of low-quality content can make it difficult for consumers to find trustworthy information and can undermine the credibility of legitimate content creators.
+
+(Human here, again. Difficult to find trustworthy information? Yes, because it is just re-gurgitating the internet!)
+
+The article also highlights the potential for AI-generated content to be used in more nefarious ways, such as the creation of deepfakes or the manipulation of social media algorithms to spread disinformation.
+
+The author argues that addressing the problem of AI-generated content will require a multi-faceted approach that involves both technical solutions and broader societal changes. For example, platforms could implement more robust content moderation and verification processes, while consumers could become more discerning in their online consumption habits and more willing to pay for high-quality content.
+
+Overall, the article underscores the need for continued scrutiny of the impact of AI on society and for thoughtful approaches to managing its potential downsides.
\ No newline at end of file
diff --git a/content/blog/dutch-schools-must-stop-using-google.md b/content/blog/dutch-schools-must-stop-using-google.md
new file mode 100644
index 00000000..dd8801c9
--- /dev/null
+++ b/content/blog/dutch-schools-must-stop-using-google.md
@@ -0,0 +1,15 @@
+---
+title: No Google for Dutch Schools
+date: 2021-10-21
+featureImage: images/blog/google.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Dutch Personal Data Authority raised concerns about Google's GDPR compliance
+
+Google donesn't carry. They'll just pay the fines.
+
+https://tutanota.com/blog/posts/dutch-schools-must-stop-using-google-email-and-cloud-services/
+
+And they believe we "need" them.
\ No newline at end of file
diff --git a/content/blog/email-clients-are-bad.md b/content/blog/email-clients-are-bad.md
new file mode 100644
index 00000000..d9c75c9e
--- /dev/null
+++ b/content/blog/email-clients-are-bad.md
@@ -0,0 +1,15 @@
+---
+title: Email Doesn't Suck. It's Email Clients
+date: 2022-08-24
+featureImage: images/blog/doesntusegmail.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Email clients need improving. Some thoughts.
+
+A shift to web-base email has meant a degradation in the quality of "fat" email clients.
+
+https://www.wired.com/story/email-clients-are-bad-so-use-vivaldi-mail/
+
+The author uses Mutt and Vivaldi mail. We suggest contributing time/talent/treasure to Thunderbird mail. Mutt is great, too.
\ No newline at end of file
diff --git a/content/blog/email-done-my-way.md b/content/blog/email-done-my-way.md
new file mode 100644
index 00000000..608033dd
--- /dev/null
+++ b/content/blog/email-done-my-way.md
@@ -0,0 +1,15 @@
+---
+title: E-Mail Done My Way
+date: 2022-08-05
+featureImage: images/blog/doesntusegmail.jpg
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## The journey to getting email self-hosting done right
+
+One man's (he's the Redhat evangelist for EMEA) way of running self-hosted email.
+
+https://jan.wildeboer.net/2022/08/Email-0-The-Journey-2022/
+
+As you'll see, email is a protocol, and an attitude.
\ No newline at end of file
diff --git a/content/blog/embracing-the-kill-switch.md b/content/blog/embracing-the-kill-switch.md
new file mode 100644
index 00000000..f92fffbb
--- /dev/null
+++ b/content/blog/embracing-the-kill-switch.md
@@ -0,0 +1,15 @@
+---
+title: Embracing the Kill Switch
+date: 2022-08-28
+featureImage: images/blog/surveillance.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Governments Embrace Internet Shutdowns as a Form of Control
+
+Well, one way to deal with it, if you can't control it, is to kill it.
+
+https://www.theguardian.com/technology/2022/aug/29/flicking-the-kill-switch-governments-embrace-internet-shutdowns-as-a-form-of-control
+
+This will always be an option so long as coercive government (a redundancy) has control over the network itself. The solution is, over time, to build *free* networks unburdened by government control. Examples are (ham) radio, LORA networks, and other forms of free and uncersorable communication. Not to mention getting off the government-approved network nore and more to build human networks of self-sovreignty.
\ No newline at end of file
diff --git a/content/blog/employers-surveill-employees.md b/content/blog/employers-surveill-employees.md
new file mode 100644
index 00000000..2e945148
--- /dev/null
+++ b/content/blog/employers-surveill-employees.md
@@ -0,0 +1,15 @@
+---
+title: Employers Are Doing 'Shocking Things' to Monitor Your Productivity
+date: 2022-08-26
+featureImage: images/blog/surveillance.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Treating employees like robots is the 'new normal'
+
+If I can track your every movement while you "work for me", that sounds more like slavery, than an exchange of goods.
+
+https://nypost.com/2022/08/26/its-everywhere-workplace-surveillance-methods-now-common/
+
+Not to mention it is the precursor to replacing humans with robots for which tracking is a must. Be self-sovereign. Don't work for these sorts of assholes. And if you must, figure out how you are going to escape.
\ No newline at end of file
diff --git a/content/blog/everything-you-need-passphrases.md b/content/blog/everything-you-need-passphrases.md
new file mode 100644
index 00000000..bcc337d0
--- /dev/null
+++ b/content/blog/everything-you-need-passphrases.md
@@ -0,0 +1,15 @@
+---
+title: Everything About Passphrases
+date: 2022-11-25
+featureImage: images/blog/privatekeys.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Some best practice for passphrases, private keys, and saving them all in a digital wallet
+
+Not your keys, not your _______________. But how do we protect our keys, our passphrases? What are some best practices to consider?
+
+https://blog.coinkite.com/everything-you-need-to-know-about-passphrases/
+
+If you're not incorporating many of these practices into your digital self-sovereign life, then how self-sovereign can you really be?
\ No newline at end of file
diff --git a/content/blog/fbi-watching-internet.md b/content/blog/fbi-watching-internet.md
new file mode 100644
index 00000000..a580aaa1
--- /dev/null
+++ b/content/blog/fbi-watching-internet.md
@@ -0,0 +1,13 @@
+---
+title: FBI Watching Internet
+date: 2023-04-25
+featureImage: images/blog/surveillance.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Is the FBI abusing access to FISA databases of private communications?
+
+The FBI can read out private communications without a warrant or judicial oversight.
+
+https://www.eff.org/deeplinks/2023/04/internal-documents-show-how-little-fbi-did-correct-misuse-section-702-databases
diff --git a/content/blog/federated-founders-and-our-joyent-history.md b/content/blog/federated-founders-and-our-joyent-history.md
index d144d7b1..6a7041d8 100644
--- a/content/blog/federated-founders-and-our-joyent-history.md
+++ b/content/blog/federated-founders-and-our-joyent-history.md
@@ -1,6 +1,6 @@
---
title: "Federated Founders and Our Joyent History"
-date: 2020-09-06T20:18:07+06:00
+date: 2023-05-26T20:18:07+06:00
featureImage: images/blog/joyent.jpg
author: David Young
authorThumb: images/author/david.png
@@ -31,4 +31,4 @@ Here's our "manifesto".
3. Open source allows us to offer high-value for a sane price. The price always needs to promote maximum adoption.
4. Every Customer or Team will, in time, become their own financial institution as the centralization of money continues to break down. Bitcoin is the key to that solution and we will deeply and fully integrate bitcoin, and the side networks helping with bitcoin adoption, into every facet of our take of Customer solutions.
5. Connect our digital self-sovereign efforts with a broaded cultural urge towards self-sovereignty. No global reset, instead a sovereign reset.
-6. Stop being a bitch. Let's get this done.
\ No newline at end of file
+6. Stop being a bitch. Let's get this done.
diff --git a/content/blog/fediverse-is-inefficient-thats-ok.md b/content/blog/fediverse-is-inefficient-thats-ok.md
new file mode 100644
index 00000000..42cbbc5a
--- /dev/null
+++ b/content/blog/fediverse-is-inefficient-thats-ok.md
@@ -0,0 +1,15 @@
+---
+title: The Fediverse is Inefficient, That's OK
+date: 2021-10-21
+featureImage: images/blog/decentralize.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Decentralization comes with some slow downs that avoid the dystopian pile up
+
+Why having everything move/improve at the speed of whim may not be the best idea.
+
+https://berk.es/2022/11/08/fediverse-inefficiencies/
+
+The example provided is Mastodon.
\ No newline at end of file
diff --git a/content/blog/fednow-payment-system-launching.md b/content/blog/fednow-payment-system-launching.md
new file mode 100644
index 00000000..79c112fe
--- /dev/null
+++ b/content/blog/fednow-payment-system-launching.md
@@ -0,0 +1,13 @@
+---
+title: FedNow Payment System Launching
+date: 2023-03-15
+featureImage: images/blog/federated.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Federal Reserve Payments System Moves to the Launchpad
+
+Why does the federal government, or any government, need a "payment system" unless the currency itself is property of same?
+
+https://www.cnbc.com/2023/03/15/long-awaited-fed-digital-payment-system-to-launch-in-july.html
diff --git a/content/blog/fighting-spam.md b/content/blog/fighting-spam.md
new file mode 100644
index 00000000..6429c322
--- /dev/null
+++ b/content/blog/fighting-spam.md
@@ -0,0 +1,15 @@
+---
+title: Fighting Spam
+date: 2022-09-18
+featureImage: images/blog/spam.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Some practical tips for fighting spam
+
+Spam is everywhere. Here are some thoughts about how to fight it.
+
+https://darthcoin.substack.com/p/avoid-being-spammed
+
+You'll want to use an email client like Thunderbird or Mutt to follow the "no images" rule.
\ No newline at end of file
diff --git a/content/blog/financial-information-facebook.md b/content/blog/financial-information-facebook.md
new file mode 100644
index 00000000..a7799a7f
--- /dev/null
+++ b/content/blog/financial-information-facebook.md
@@ -0,0 +1,21 @@
+---
+title: Your Financial Information Sent to Facebook
+date: 2021-03-11
+featureImage: images/blog/facebook.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Tax Filing Services Sending Financial Information to Facebook
+
+As if Facebook didn't know enough about us already...
+
+https://www.zerohedge.com/technology/appalling-major-tax-filing-services-have-been-sending-financial-information-facebook
+
+According to an article published by Zero Hedge, some major tax filing services in the US have been sending users' financial information, including their social security numbers and income details, to Facebook through tracking tools on their websites.
+
+The article states that tax filing services such as TurboTax, H&R Block, and TaxAct have been using tracking tools from Facebook and other third-party companies on their websites, which allow them to collect data on users' browsing behavior and interests. This data is then used to target users with personalized advertising on Facebook and other platforms.
+
+The report raises concerns about the potential security and privacy implications of this practice, as sensitive financial information could be vulnerable to hacking or misuse by third parties. It also highlights the need for users to be aware of the data collection practices of the websites and apps they use, and to take steps to protect their personal information, such as using strong passwords and enabling two-factor authentication.
+
+The article notes that TurboTax, H&R Block, and TaxAct have all stated that they do not sell users' personal information, and that they take measures to protect users' data. However, the use of tracking tools on their websites has raised questions about their commitment to user privacy and security.
\ No newline at end of file
diff --git a/content/blog/france-says-non.md b/content/blog/france-says-non.md
new file mode 100644
index 00000000..5a30a4bc
--- /dev/null
+++ b/content/blog/france-says-non.md
@@ -0,0 +1,15 @@
+---
+title: France Says "Non" to Office 365 and Google Workplace
+date: 2022-11-22
+featureImage: images/blog/surveillance.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Office 365 and Workplace Shouldn't be used in classrooms
+
+While the free versions of Office 365 and Workplace may be attractive, they vacuum up so much data on students they constitute a form of theft.
+
+https://www.theregister.com/2022/11/22/france_no_windows_google/
+
+Free services come with the "bargain" that the provider gets all your information. What a deal! The French say "no".
\ No newline at end of file
diff --git a/content/blog/free-services-an-allegory.md b/content/blog/free-services-an-allegory.md
new file mode 100644
index 00000000..e727241c
--- /dev/null
+++ b/content/blog/free-services-an-allegory.md
@@ -0,0 +1,15 @@
+---
+title: An Allegory
+date: 2021-10-21
+featureImage: images/blog/doesntusegmail.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## What happens when we are beholden to free services?
+
+Hey, you just wanted to see what the free service could do for you. Despite knowing the dangers. But it is so...
+
+https://twitter.com/PardesSeleh/status/1534251250744705024
+
+Please don't go...!
\ No newline at end of file
diff --git a/content/blog/front-matter-cms.md b/content/blog/front-matter-cms.md
new file mode 100644
index 00000000..bc4691e8
--- /dev/null
+++ b/content/blog/front-matter-cms.md
@@ -0,0 +1,15 @@
+---
+title: Front Matter CMS
+date: 2023-03-27
+featureImage: images/blog/hugo.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## A CMS that works with Federated Core
+
+Federated Core has a workflow allowing customers to create static-file websites, publish them to their private Gitea repository, and auto-publish to their private Caddy webserver. Front Matter supports this workflow beautifully...
+
+https://frontmatter.codes/
+
+It runs inside of Visual Studio Code among other tools allowing you to preview and create great content using Federated Core.
\ No newline at end of file
diff --git a/content/blog/get-off-gmail.md b/content/blog/get-off-gmail.md
new file mode 100644
index 00000000..695f77f1
--- /dev/null
+++ b/content/blog/get-off-gmail.md
@@ -0,0 +1,15 @@
+---
+title: Get Off Gmail
+date: 2022-09-28
+featureImage: images/blog/doesntusegmail.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Get off the big tech email providers
+
+Here's a quick mental exercise: if you can't imagine life without Google, Facebook, Apple or the other big centralized services, then you're digital freedom is toast.
+
+https://www.lifesitenews.com/blogs/the-simple-reason-why-you-should-stop-using-gmail/
+
+Don't make convenience the master of your freedom.
\ No newline at end of file
diff --git a/content/blog/gmail-encrypted.md b/content/blog/gmail-encrypted.md
new file mode 100644
index 00000000..e5bd5860
--- /dev/null
+++ b/content/blog/gmail-encrypted.md
@@ -0,0 +1,15 @@
+---
+title: Gmail Encrypted
+date: 2022-12-17
+featureImage: images/blog/doesntusegmail.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## End-to-end encryption for Gmail on the web
+
+Metadata still not encrypted.
+
+https://www.bleepingcomputer.com/news/security/google-introduces-end-to-end-encryption-for-gmail-on-the-web/
+
+Band-aid on a gaping chest wound. Zzzzz.
\ No newline at end of file
diff --git a/content/blog/gmail-is-breaking-email.md b/content/blog/gmail-is-breaking-email.md
new file mode 100644
index 00000000..f91a6b97
--- /dev/null
+++ b/content/blog/gmail-is-breaking-email.md
@@ -0,0 +1,15 @@
+---
+title: Gmail is Breaking Email
+date: 2023-03-30
+featureImage: images/blog/doesntusegmail.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## You can't send email to anyone on/from Gmail
+
+The *Centralizer* makes the rules for email, not the protocol.
+
+http://www.igregious.com/2023/03/gmail-is-breaking-email.html
+
+What can be done? Stop communicating to our fiat friends using Gmail?
\ No newline at end of file
diff --git a/content/blog/googerteller.md b/content/blog/googerteller.md
new file mode 100644
index 00000000..61f9cf28
--- /dev/null
+++ b/content/blog/googerteller.md
@@ -0,0 +1,15 @@
+---
+title: Googerteller
+date: 2022-08-21
+featureImage: images/blog/google.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Make music when Google spies on you
+
+This little utility provides auditory feedback whenever your browsing/internet activities feed back into the Google.
+
+https://github.com/berthubert/googerteller
+
+This [demo](https://twitter.com/bert_hu_bert/status/1561466204602220544) is pretty hilarious/scary.
\ No newline at end of file
diff --git a/content/blog/google-2fa-sync-service.md b/content/blog/google-2fa-sync-service.md
new file mode 100644
index 00000000..9cb93b63
--- /dev/null
+++ b/content/blog/google-2fa-sync-service.md
@@ -0,0 +1,13 @@
+---
+title: Are Google 2FA Secrets Unencrypted?
+date: 2023-04-25
+featureImage: images/blog/google.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Looking at how 2FA secrets are synched
+
+The synching appears to happen without any encryption. Google sees the secrets. If there is a breach...
+
+[Defcon Social @mysk](https://defcon.social/@mysk/110262313275622023)
\ No newline at end of file
diff --git a/content/blog/google-being-sneaky-maps-permissions.md b/content/blog/google-being-sneaky-maps-permissions.md
new file mode 100644
index 00000000..d43a766f
--- /dev/null
+++ b/content/blog/google-being-sneaky-maps-permissions.md
@@ -0,0 +1,15 @@
+---
+title: Sneaky Move, Google
+date: 2022-11-23
+featureImage: images/blog/google.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Allowing a change to maps permissions, opens up your world to Google
+
+Maps was and is a ground-breaking service offering from Google.
+
+https://garrit.xyz/posts/2022-11-24-smart-move-google
+
+Now they're bamboozling us to accept permission allowing them to geotrack us across all of their services. Hey kids, just don't use Google. :kissing_closed_eyes:
\ No newline at end of file
diff --git a/content/blog/google-drive-file-limits.md b/content/blog/google-drive-file-limits.md
new file mode 100644
index 00000000..38833347
--- /dev/null
+++ b/content/blog/google-drive-file-limits.md
@@ -0,0 +1,13 @@
+---
+title: Google Drive File Limits
+date: 2023-03-05
+featureImage: images/blog/google.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## You can't really use Google Drive any way you want
+
+Oh, nevermind. Google reversed themselves after the backlash. The idea was to put a hard limit on the number of files allowed on the service.
+
+https://arstechnica.com/gadgets/2023/03/google-drive-does-a-surprise-rollout-of-file-limits-locking-out-some-users/
diff --git a/content/blog/google-has-most-of-my-email.md b/content/blog/google-has-most-of-my-email.md
new file mode 100644
index 00000000..1b9ae25e
--- /dev/null
+++ b/content/blog/google-has-most-of-my-email.md
@@ -0,0 +1,15 @@
+---
+title: Google Has My Email
+date: 2014-05-11
+featureImage: images/blog/doesntusegmail.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Dealing with the problem that is Gmail
+
+Even if you run your own email server (or use a service like Federated Core), you will likely be interacting with those using Gmail.
+
+https://mako.cc/copyrighteous/google-has-most-of-my-email-because-it-has-all-of-yours
+
+It won't happen quickly or over-night, but we must choke out Gmail and other centralized emails services (looking at your outlook.com) if we are to reclaim email as a "free" as in "freedom" service.
\ No newline at end of file
diff --git a/content/blog/grapheneos.md b/content/blog/grapheneos.md
new file mode 100644
index 00000000..f8b56f16
--- /dev/null
+++ b/content/blog/grapheneos.md
@@ -0,0 +1,15 @@
+---
+title: GrapheneOS
+date: 2021-10-21
+featureImage: images/blog/grapheneos.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## One of the main alternative Andoid distributions
+
+You can use a mobile device with lots less tracking than on offer from Google and Apple.
+
+https://grapheneos.org/
+
+Just remember, when you leave tracking prison, you leave behind the apps that have your addicted. OK?
\ No newline at end of file
diff --git a/content/blog/have-i-been-pawned.md b/content/blog/have-i-been-pawned.md
new file mode 100644
index 00000000..1f353f85
--- /dev/null
+++ b/content/blog/have-i-been-pawned.md
@@ -0,0 +1,15 @@
+---
+title: Been Pwned?
+date: 2021-10-03
+featureImage: images/blog/pwned.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## One of the delights of using centralized services...
+
+It's really just a matter of time before your centralized service leaks your credentials or gets hacked. The honeypot is too valuable for the hackers to ignore.
+
+https://haveibeenpwned.com/
+
+Check your status here.
\ No newline at end of file
diff --git a/content/blog/how-a-lightning-address-works.md b/content/blog/how-a-lightning-address-works.md
new file mode 100644
index 00000000..fe05f22a
--- /dev/null
+++ b/content/blog/how-a-lightning-address-works.md
@@ -0,0 +1,15 @@
+---
+title: How Lightning Address Works
+date: 2022-09-02
+featureImage: images/blog/lightning.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Lightning invoice basics
+
+A nice, brief explainer on how lightning addresses work.
+
+https://stacker.news/items/65872
+
+Lightning is the off-chain bitcoin, etc payments clearing technology.
\ No newline at end of file
diff --git a/content/blog/how-to-be-a-profitable-lnd-node.md b/content/blog/how-to-be-a-profitable-lnd-node.md
new file mode 100644
index 00000000..329bde82
--- /dev/null
+++ b/content/blog/how-to-be-a-profitable-lnd-node.md
@@ -0,0 +1,15 @@
+---
+title: How to be a Profitable Lightning Node
+date: 2022-09-04
+featureImage: images/blog/lightning.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Some tips for how to run a Lightning Node profitably...
+
+We think Lightning, in time, will be more for information distribution, and less about Bitcoin payments settlement.
+
+https://stacker.news/items/66368
+
+In the meantime, as you begin your Lightning journey...
\ No newline at end of file
diff --git a/content/blog/how-to-delete-yourself-internet.md b/content/blog/how-to-delete-yourself-internet.md
new file mode 100644
index 00000000..6f26d3c1
--- /dev/null
+++ b/content/blog/how-to-delete-yourself-internet.md
@@ -0,0 +1,13 @@
+---
+title: Delete Yourself From The Internet
+date: 2023-02-10
+featureImage: images/blog/privacy.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Some advice for deleting your data trail from the internet
+
+The get us when we create data, and when we want to delete it...
+
+https://www.cnbc.com/2023/02/10/how-to-delete-yourself-from-the-internet.html
diff --git a/content/blog/how-to-stack-sats.md b/content/blog/how-to-stack-sats.md
new file mode 100644
index 00000000..bdfd895a
--- /dev/null
+++ b/content/blog/how-to-stack-sats.md
@@ -0,0 +1,14 @@
+---
+title: How to Stack Sats
+date: 2021-10-21
+featureImage: images/blog/bitcoin.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Anyone Can Earn Bitcoin
+
+Some great, creative ideas for how to earn and stack satoshis.
+
+https://www.stacksats.how/
+
diff --git a/content/blog/how-to-stop-google-collecting.md b/content/blog/how-to-stop-google-collecting.md
new file mode 100644
index 00000000..6d8fb89b
--- /dev/null
+++ b/content/blog/how-to-stop-google-collecting.md
@@ -0,0 +1,15 @@
+---
+title: Stop Google Collecting Your Data
+date: 2022-09-29
+featureImage: images/blog/google.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Here are the steps you need to take now
+
+And overview of how Google collects data and censors...
+
+https://www.lifesitenews.com/opinion/heres-how-to-stop-google-from-collecting-huge-amounts-of-your-data/
+
+While this is a *great* resource for what Google is doing, the recommendations for how to defeat the beast are, in our opinion, simplistic and, on top, don't lead to true digital self-sovereignty.
\ No newline at end of file
diff --git a/content/blog/huge-scale-of-US-gov-cell-location-data.md b/content/blog/huge-scale-of-US-gov-cell-location-data.md
new file mode 100644
index 00000000..2e43d4b1
--- /dev/null
+++ b/content/blog/huge-scale-of-US-gov-cell-location-data.md
@@ -0,0 +1,15 @@
+---
+title: Huge Scale of US Gov Cell Location Data
+date: 2022-07-22
+featureImage: images/blog/surveillance.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## New documents reveal the US government is tracking cell phone location
+
+The ACLU unearthed documents showing the US Department of Homeland Security is using mobile location data to track people's movements.
+
+https://techcrunch.com/2022/07/18/homeland-security-cell-phone-tracking/
+
+The tracking is taking place on a much larger scale that previously known.
\ No newline at end of file
diff --git a/content/blog/icloud-for-windows-problems.md b/content/blog/icloud-for-windows-problems.md
new file mode 100644
index 00000000..5a40a2cf
--- /dev/null
+++ b/content/blog/icloud-for-windows-problems.md
@@ -0,0 +1,21 @@
+---
+title: iCloud for Windows Downloads Other People's Photos?
+date: 2021-09-14
+featureImage: images/blog/apple.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## A Report of Strange Behavior by iCloud for Windows
+
+The perils of using centralized storage solutions from a company not known for building great services.
+
+https://forums.macrumors.com/threads/icloud-for-windows-corrupting-videos-downloading-other-peoples-photos.2370666/
+
+According to a thread on the MacRumors forums, some users of iCloud for Windows have reported experiencing issues with the service, including corrupted videos and downloading other people's photos.
+
+The thread includes reports from users who have experienced issues with iCloud for Windows, such as videos that are downloaded from iCloud being corrupted and unplayable, and photos that belong to other iCloud users being downloaded to their own devices. Some users have also reported that their files and folders have been deleted from iCloud without their knowledge or consent.
+
+The issue appears to be affecting a small number of users, and there is no clear consensus on the cause of the problem. Some users have speculated that it may be related to a recent update to iCloud for Windows, while others suggest that it may be related to conflicts with other software or hardware on their devices.
+
+Apple has not yet issued a statement regarding the issue, but some users have reported success in resolving the problem by uninstalling and reinstalling iCloud for Windows or by resetting their iCloud account. However, the reports highlight the potential risks of relying on cloud-based services for storing and sharing important files and data, and the need for users to regularly back up their data and be aware of potential security and privacy issues.
\ No newline at end of file
diff --git a/content/blog/impact-of-lastpass-on-bitcoin-wallets.md b/content/blog/impact-of-lastpass-on-bitcoin-wallets.md
new file mode 100644
index 00000000..da6cf8fa
--- /dev/null
+++ b/content/blog/impact-of-lastpass-on-bitcoin-wallets.md
@@ -0,0 +1,17 @@
+---
+title: Lastpass Breach Impact on Bitcoin Wallets
+date: 2021-10-21
+featureImage: images/blog/breaches.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## This person lost sats because of the Lastpass breach
+
+Can anyone spot how the magical hacker got in?
+
+https://twitter.com/Cryptopathic/status/1606416137771782151?s=20&t=glD3V7sn8VCOrCeheaWf8w
+
+A hint: "Having spoken to multiple professionals, it now seems far more likely that my encrypted vault was breached. However, at 100,100 PBKDF2 iterations, it is not realistic to brute force this. I think this situation goes far beyond what has been admitted."
+
+That's right, Lastpass may not have keep the data encrypted or sufficiently encrypted.
\ No newline at end of file
diff --git a/content/blog/indian-isps-give-givernment-full-access.md b/content/blog/indian-isps-give-givernment-full-access.md
new file mode 100644
index 00000000..68128e74
--- /dev/null
+++ b/content/blog/indian-isps-give-givernment-full-access.md
@@ -0,0 +1,15 @@
+---
+title: Indian ISPs Give Government Full Access
+date: 2022-11-10
+featureImage: images/blog/surveillance.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## They know when you've been naughty, they know when you're awake...
+
+Well, at least, I suppose, they're being honest about it.
+
+https://entrackr.com/2022/11/exclusive-indian-isps-we-already-give-govt-full-access-to-web-traffic/
+
+Or, more likely, just brazen. "What are you going to do about it?"
\ No newline at end of file
diff --git a/content/blog/invisv.md b/content/blog/invisv.md
new file mode 100644
index 00000000..80c21d96
--- /dev/null
+++ b/content/blog/invisv.md
@@ -0,0 +1,15 @@
+---
+title: Invisv
+date: 2022-10-21
+featureImage: images/blog/privacy.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Let's reinvent the wheel
+
+Congrats to Invisv for understanding the problem.
+
+https://invisv.com/
+
+We have questions, however. Is Invisv centralized? Are all these privacy break-throughs inter-operable with any other open standards, protocols?
\ No newline at end of file
diff --git a/content/blog/ios-16-leaks-connections.md b/content/blog/ios-16-leaks-connections.md
new file mode 100644
index 00000000..9d2166e0
--- /dev/null
+++ b/content/blog/ios-16-leaks-connections.md
@@ -0,0 +1,15 @@
+---
+title: iOS 16 Leaks Connections
+date: 2022-10-11
+featureImage: images/blog/timcook.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## But Apple is Muh Secure!
+
+Researches discovered iOS 16 communicates with Apple services outide an active VPN tunnel. Huh?
+
+https://twitter.com/mysk_co/status/1579997801047822336
+
+They used ProtonVPN and Wireshark for the testing. What's the solution? Different mobile OS.
\ No newline at end of file
diff --git a/content/blog/iphone-equals-privacy-question.md b/content/blog/iphone-equals-privacy-question.md
new file mode 100644
index 00000000..4101c758
--- /dev/null
+++ b/content/blog/iphone-equals-privacy-question.md
@@ -0,0 +1,15 @@
+---
+title: iPhone = Privacy?
+date: 2022-09-08
+featureImage: images/blog/apple.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Does using an iPhone mean you have the best privacy solution?
+
+Most believe the iPhone is a bastion of privacy. Tim Cook said so...
+
+https://kerkour.com/iphone-privacy
+
+Apple has marketed their devices as saving the world from a big brother dystopia. But, like so much gas-lighting these days, it is the savior playing the role of big brother.
\ No newline at end of file
diff --git a/content/blog/iphone-usage-data-anonymous.md b/content/blog/iphone-usage-data-anonymous.md
new file mode 100644
index 00000000..bfe42300
--- /dev/null
+++ b/content/blog/iphone-usage-data-anonymous.md
@@ -0,0 +1,23 @@
+---
+title: Is iPhone Usage Data Anonymous?
+date: 2021-11-23
+featureImage: images/blog/timcook.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+# Your iPhone's Analytics Data Includes an ID Number
+
+How anonymous is iPhone usage data after all?
+
+https://gizmodo.com/apple-iphone-privacy-dsid-analytics-personal-data-test-1849807619
+
+According to the article published by Gizmodo, Apple's iPhone was found to be collecting data on users' personal browsing habits through a feature called "DSID Analytics," which is enabled by default on all devices running iOS 15.
+
+The report notes that DSID Analytics collects data on users' app usage, search history, and web browsing behavior, which is then sent to Apple's servers for analysis. This data is reportedly used to improve the performance of Apple's products and services, such as Siri and the App Store.
+
+However, the article raises concerns about the potential privacy implications of this feature, as it collects personal information without users' explicit consent and without providing a clear way to opt-out. The report also notes that the data collected by DSID Analytics could be used to build detailed profiles of users' behavior and interests, which could be exploited by third parties for targeted advertising or other purposes.
+
+Apple has responded to the report, stating that the data collected by DSID Analytics is anonymous and aggregated, and that users can choose to disable the feature by going to Settings > Privacy > Analytics & Improvements > Share With App Developers and turning off the toggle.
+
+However, the report highlights the ongoing tension between tech companies' desire to collect data for product improvement and innovation, and users' rights to privacy and control over their personal information.
\ No newline at end of file
diff --git a/content/blog/katzenpost.md b/content/blog/katzenpost.md
new file mode 100644
index 00000000..21a36cdf
--- /dev/null
+++ b/content/blog/katzenpost.md
@@ -0,0 +1,15 @@
+---
+title: Katzenpost
+date: 2022-10-21
+featureImage: images/blog/federated.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## A service to resist on-line surveillance
+
+From the post, why end-to-end encryption is not enough: "End-to-end encryption has become more commonplace with major online messaging and communication tools, but encoding what you say to your friends online does not mean that the service provider cannot see who you contacted, when, from where. This metadata might be even more important than the content of an online conversation."
+
+https://nlnet.nl/project/katzenpost/
+
+You have to think about the metadata in the same way we think about how services like Facebook develop "graphs" of us for the purposes of advertising and scores.
\ No newline at end of file
diff --git a/content/blog/kyc-not-me.md b/content/blog/kyc-not-me.md
new file mode 100644
index 00000000..8389eb76
--- /dev/null
+++ b/content/blog/kyc-not-me.md
@@ -0,0 +1,15 @@
+---
+title: KYC Not Me
+date: 2023-03-21
+featureImage: images/blog/nokyc.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## KYC Scores
+
+KYC stands for "know your customer" which is another way of saying "surveillance" by the service and/or government interests. The KYCnot dot me website lists lots of websites, many for Bitcoin, and their relative scores for KYC.
+
+https://kycnot.me/
+
+There are also listings for VPNs, domains and hosting, phone numbers, and other various services and tools.
\ No newline at end of file
diff --git a/content/blog/lastpass-breach-gets-worse.md b/content/blog/lastpass-breach-gets-worse.md
new file mode 100644
index 00000000..4fb3efb5
--- /dev/null
+++ b/content/blog/lastpass-breach-gets-worse.md
@@ -0,0 +1,15 @@
+---
+title: Lastpass Breach Gets Worse
+date: 2023-02-04
+featureImage: images/blog/breaches.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## The Lastpass breach just gets worse and worse
+
+A wonderful post-mortem of the recent Lastpass data breach.
+
+https://old.reddit.com/r/sysadmin/comments/10kp4ye/lastpass_breach_gets_worse/
+
+Solution? Get off centralized password managers. Not your keys, not your passwords.
\ No newline at end of file
diff --git a/content/blog/lastpass-hacked.md b/content/blog/lastpass-hacked.md
new file mode 100644
index 00000000..78b72f23
--- /dev/null
+++ b/content/blog/lastpass-hacked.md
@@ -0,0 +1,15 @@
+---
+title: Most Popular Password Manager Hacked
+date: 2021-10-21
+featureImage: images/blog/breaches.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Lastpass Hacked, Again
+
+Lastpass is the world's most popular password manager...with hackers, too.
+
+https://www.bloomberg.com/news/articles/2022-08-25/the-world-s-most-popular-password-manager-says-it-was-hacked
+
+Solution, host your own password manager. It is possible. Unless you like giving the hackers your passwords...
\ No newline at end of file
diff --git a/content/blog/lastpass-security-incident.md b/content/blog/lastpass-security-incident.md
new file mode 100644
index 00000000..82496007
--- /dev/null
+++ b/content/blog/lastpass-security-incident.md
@@ -0,0 +1,15 @@
+---
+title: LastPass Security Incident
+date: 2022-12-22
+featureImage: images/blog/breaches.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## LastPass Gets Hacked
+
+LastPass, where so many store their sensitive passwords, has a security incident.
+
+https://blog.lastpass.com/2022/12/notice-of-recent-security-incident/
+
+An "unauthorized party" got access to the third-party storage where LastPass stores backups. When you're dealing with cloud services, there is tremendous "counterparty" risk, as they would say in the *fiat* financial markets. If you're using a cloud service, that service can swear all day that they are secure...but security is a combination of all the links, including the weak ones.
\ No newline at end of file
diff --git a/content/blog/learn-bitcoin-interactively.md b/content/blog/learn-bitcoin-interactively.md
new file mode 100644
index 00000000..819d3e24
--- /dev/null
+++ b/content/blog/learn-bitcoin-interactively.md
@@ -0,0 +1,13 @@
+---
+title: Learn Bitcoin Interactively
+date: 2021-10-21
+featureImage: images/blog/bitcoin.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## A tutorial to learn the technical side of bitcoin
+
+This neat interactive tutorial teaches you the technical overview of bitcoin.
+
+https://trybitcoin.satsie.dev/
diff --git a/content/blog/lets-build-a-chrome-extension-that-steals-everything.md b/content/blog/lets-build-a-chrome-extension-that-steals-everything.md
new file mode 100644
index 00000000..2a84b1e3
--- /dev/null
+++ b/content/blog/lets-build-a-chrome-extension-that-steals-everything.md
@@ -0,0 +1,15 @@
+---
+title: Let's Build to Steal Everything
+date: 2023-02-23
+featureImage: images/blog/surveillance.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Building a Chrome extension to steal everything
+
+The wonders of Chrome extensions on all the data they can pilfer...
+
+https://mattfrisbie.substack.com/p/spy-chrome-extension
+
+...would this be possible on the "safe" browsers like Brave and Vivaldi? Firefox?
\ No newline at end of file
diff --git a/content/blog/lightning-wallet-comparison.md b/content/blog/lightning-wallet-comparison.md
new file mode 100644
index 00000000..c130bc07
--- /dev/null
+++ b/content/blog/lightning-wallet-comparison.md
@@ -0,0 +1,15 @@
+---
+title: Lightning Wallet Comparison
+date: 2022-02-27
+featureImage: images/blog/lightning.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## A look at all the options for Lightning wallets
+
+Inevitably this blog post will get more and more out-of-date as time passes...
+
+https://darthcoin.substack.com/p/lightning-wallets-comparison
+
+But it provides a nice overview of the different approaches to wallets for holding Bitcoin on the LIghtning network.
\ No newline at end of file
diff --git a/content/blog/lineageos.md b/content/blog/lineageos.md
new file mode 100644
index 00000000..87bbf4ed
--- /dev/null
+++ b/content/blog/lineageos.md
@@ -0,0 +1,15 @@
+---
+title: LineageOS
+date: 2021-10-21
+featureImage: images/blog/lineageos.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## One of the main alternative Andoid distributions
+
+You can use a mobile device with lots less tracking than on offer from Google and Apple.
+
+https://lineageos.org/
+
+Just remember, when you leave tracking prison, you leave behind the apps that have your addicted. OK?
\ No newline at end of file
diff --git a/content/blog/marshall-mcluhan-future-advertising-information-services.md b/content/blog/marshall-mcluhan-future-advertising-information-services.md
new file mode 100644
index 00000000..7c8a95fd
--- /dev/null
+++ b/content/blog/marshall-mcluhan-future-advertising-information-services.md
@@ -0,0 +1,15 @@
+---
+title: Future of Advertising and Information Services
+date: 2021-10-21
+featureImage: images/blog/advertising.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Marshall McLuhan lays it out in 1966
+
+A wonderful look into the future, from the past.
+
+https://paleofuture.com/blog/2023/1/11/marshall-mcluhan-on-the-future-of-ads-and-the-internet
+
+One of the insights here is the idea that we *enjoy* being manipulated, being advertised to because the advertising itself is the beginning of the fulfillment of our desire for an object.
\ No newline at end of file
diff --git a/content/blog/marshall-mcluhan-surveillance-riff.md b/content/blog/marshall-mcluhan-surveillance-riff.md
new file mode 100644
index 00000000..0e5eed2e
--- /dev/null
+++ b/content/blog/marshall-mcluhan-surveillance-riff.md
@@ -0,0 +1,15 @@
+---
+title: Everybody is Under Surveillance
+date: 2023-01-02
+featureImage: images/blog/surveillance.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Media prophet Marshall McLuhan discusses CIA and FBI surveillance
+
+His conclusion we are all, are will be, under surveillance.
+
+https://twitter.com/bfcarlson/status/1609988081825751041?t=fY1f4HYgh45QSYXP4irXWw&s=19
+
+"One of the main occupations of mankind."
\ No newline at end of file
diff --git a/content/blog/mass-surveillance-app-secret.md b/content/blog/mass-surveillance-app-secret.md
new file mode 100644
index 00000000..85512903
--- /dev/null
+++ b/content/blog/mass-surveillance-app-secret.md
@@ -0,0 +1,14 @@
+---
+title: Cops Want Mass Surveillance App Secret
+date: 2021-10-21
+featureImage: images/blog/surveillance.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## The App 'Fog Reveal' is Almost Invisible
+
+Another tale of our local law enforcement tracking phones around the neighborhood.
+
+https://arstechnica.com/tech-policy/2022/09/cops-wanted-to-keep-mass-surveillance-app-secret-privacy-advocates-refused/
+
diff --git a/content/blog/meta-injecting-code-into-websites.md b/content/blog/meta-injecting-code-into-websites.md
new file mode 100644
index 00000000..2f5610f5
--- /dev/null
+++ b/content/blog/meta-injecting-code-into-websites.md
@@ -0,0 +1,15 @@
+---
+title: Meta Injecting Code to Track
+date: 2022-09-21
+featureImage: images/blog/facebook.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Meta and Instagram Rewrite Websites to Track Us
+
+This happens when you click on websites in Facebook and Instagram. You're taken to the link in an in-app browser. Then the hilarity begins.
+
+https://www.theguardian.com/technology/2022/aug/11/meta-injecting-code-into-websites-visited-by-its-users-to-track-them-research-says
+
+Solution. Don't use Facebook, Instagram, all the other Meta shit. Addicted? OK, then stop complaining. You're hooked up to the Zuckerborg and your actions harvested for profit.
\ No newline at end of file
diff --git a/content/blog/microsoft-killing-custom-domains.md b/content/blog/microsoft-killing-custom-domains.md
new file mode 100644
index 00000000..93736f7d
--- /dev/null
+++ b/content/blog/microsoft-killing-custom-domains.md
@@ -0,0 +1,15 @@
+---
+title: Microsoft Killing Custom Domains in Outlook.com
+date: 2021-10-21
+featureImage: images/blog/microsoft.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## No more individuality for you, slave
+
+You won't be able to use custom domains after November, 2023.
+
+https://www.bigtechwire.com/2022/11/02/microsoft-is-killing-custom-domain-names-in-outlook-com/
+
+This is a head-scratcher, for sure. Why would Microsoft do this? Is Google next? It is hard to understand any real technical justification for the move. Ideas?
\ No newline at end of file
diff --git a/content/blog/miliatary-captures-internet.md b/content/blog/miliatary-captures-internet.md
new file mode 100644
index 00000000..f40c70f5
--- /dev/null
+++ b/content/blog/miliatary-captures-internet.md
@@ -0,0 +1,15 @@
+---
+title: US Military Captures 93% of Internet
+date: 2021-10-21
+featureImage: images/blog/americansurveillance.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Senator Wyden suggests the military is up to no good
+
+They have everything.
+
+https://www.rt.com/news/563433-augury-military-internet-tracking-wyden/
+
+Of course, they are breaching privacy for the sake of keeping us "safe".
\ No newline at end of file
diff --git a/content/blog/monitor-brain-activity.md b/content/blog/monitor-brain-activity.md
new file mode 100644
index 00000000..70d458c7
--- /dev/null
+++ b/content/blog/monitor-brain-activity.md
@@ -0,0 +1,15 @@
+---
+title: Let Your Boss Monitor Your Brain
+date: 2021-10-21
+featureImage: images/blog/surveillance.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## More on the path to treating humans like robots
+
+When we are monitored at work, we are treated like machines, not humans.
+
+https://www.lifesitenews.com/news/world-economic-forum-speaker-touts-technology-that-allows-your-boss-to-monitor-your-brain-activity/
+
+If this is part of your experience at work, get another job. It is hard, but being surveilled all the time has its impact on our self-worth.
\ No newline at end of file
diff --git a/content/blog/moxie-marlinspike-on-centralization.md b/content/blog/moxie-marlinspike-on-centralization.md
new file mode 100644
index 00000000..d904eae0
--- /dev/null
+++ b/content/blog/moxie-marlinspike-on-centralization.md
@@ -0,0 +1,15 @@
+---
+title: Centralization is Cool
+date: 2021-10-21
+featureImage: images/blog/decntralize.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Moxie Marlinspike on Decentralization
+
+The (former) CEO of Signal thinks centralization is the way to go...
+
+https://マリウス.com/moxie-marlinspike-on-decentralization/
+
+What a surprise. The key argument is that it is too difficult to decentralize. And that decentralization leads to stagnation because we all have to agree on protocols and therefore it is tough to change them. But there are multiple flaws in this way of thinking, and the post lays them out well.
\ No newline at end of file
diff --git a/content/blog/mutt.md b/content/blog/mutt.md
new file mode 100644
index 00000000..abde94d5
--- /dev/null
+++ b/content/blog/mutt.md
@@ -0,0 +1,15 @@
+---
+title: Mutt
+date: 2021-10-21
+featureImage: images/blog/federated.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## The email client for discerning email users
+
+We have instructions on how to use Mutt with a Federated Core.
+
+http://www.mutt.org/
+
+Install it on a server your own, and, with the right access controls, you have secure access to your email from everywhere.
\ No newline at end of file
diff --git a/content/blog/no-kyc-aml-lists.md b/content/blog/no-kyc-aml-lists.md
new file mode 100644
index 00000000..0c4b766e
--- /dev/null
+++ b/content/blog/no-kyc-aml-lists.md
@@ -0,0 +1,15 @@
+---
+title: Individuals On Lists
+date: 2021-10-21
+featureImage: images/blog/nokyc.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Digging into the KYC/AML issue
+
+You may already be on a list...
+
+https://www.discreetlog.com/kyc/
+
+...but you can start to disappear.
\ No newline at end of file
diff --git a/content/blog/nostr-daily-stats.md b/content/blog/nostr-daily-stats.md
new file mode 100644
index 00000000..978317a3
--- /dev/null
+++ b/content/blog/nostr-daily-stats.md
@@ -0,0 +1,15 @@
+---
+title: Nostr Daily Stats
+date: 2023-04-21
+featureImage: images/blog/nostr.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## How is the decentralized network being used?
+
+See how the "next thing" is growing/plateauing/stagnating...
+
+https://stats.nostr.band/
+
+This must be a sample since the network is truly decentralized...Right?
\ No newline at end of file
diff --git a/content/blog/nsa-worked-to-track-bitcoin-users.md b/content/blog/nsa-worked-to-track-bitcoin-users.md
new file mode 100644
index 00000000..950e031a
--- /dev/null
+++ b/content/blog/nsa-worked-to-track-bitcoin-users.md
@@ -0,0 +1,21 @@
+---
+title: NSA Worked to Track Bitcoin Users
+date: 2018-03-18
+featureImage: images/blog/americansurveillance.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## NSA Seeks to Track Bitcoin Users
+
+In a story from the annals of the obvious... But why? They might as well haul in the whole village looking for the one villager who committed the *alledged* crime.
+
+https://theintercept.com/2018/03/20/the-nsa-worked-to-track-down-bitcoin-users-snowden-documents-reveal/
+
+The National Security Agency (NSA) worked to track down users of the cryptocurrency Bitcoin by analyzing internet traffic and other data sources, according to documents leaked by former NSA contractor Edward Snowden.
+
+The documents suggest that the NSA was interested in identifying Bitcoin users who may be engaged in illegal activities such as money laundering and drug trafficking. The agency reportedly used its surveillance capabilities to monitor Bitcoin users' internet traffic, as well as other data sources such as financial transactions and social media activity, in an attempt to identify individuals involved in criminal activity.
+
+The article notes that while the NSA's interest in Bitcoin users may have been motivated by a desire to combat illegal activity, it also raises concerns about government surveillance and privacy rights. Some critics argue that the NSA's actions represent an overreach of its surveillance powers and a violation of individuals' privacy, particularly given the largely unregulated nature of the cryptocurrency market.
+
+It's important to note that the documents cited in the article are from 2013, and it's unclear whether the NSA's activities in relation to Bitcoin users have continued or evolved since then.
\ No newline at end of file
diff --git a/content/blog/old-phone-no-good.md b/content/blog/old-phone-no-good.md
new file mode 100644
index 00000000..ed098044
--- /dev/null
+++ b/content/blog/old-phone-no-good.md
@@ -0,0 +1,15 @@
+---
+title: Old Phone No Good
+date: 2023-01-04
+featureImage: images/blog/applefans.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Your old phone is no longer supported
+
+We get it, at some point, your Nokia from 2012 just isn't going to work anymore...
+
+https://www.youtube.com/watch?v=UxaCUugPoRY
+
+But should the error be to lock users out of data?
\ No newline at end of file
diff --git a/content/blog/opendesktop.md b/content/blog/opendesktop.md
new file mode 100644
index 00000000..10e9c838
--- /dev/null
+++ b/content/blog/opendesktop.md
@@ -0,0 +1,21 @@
+---
+title: Opendesktop
+date: 2021-10-21
+featureImage: images/blog/federated.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Introduction to the Opendesktop Project
+
+This is a centralized service based, in part, on Nextcloud and other open-source projects.
+
+https://www.opendesktop.org/
+
+OpenDesktop.org is a website that provides a platform for open-source software developers and users to share and download various applications, themes, icons, wallpapers, and other digital assets. The website is part of the OpenDesktop Network, which also includes other sites such as KDE-Apps.org, GNOME-Look.org, and XFCE-Look.org.
+
+OpenDesktop.org is a community-driven platform, where users can contribute their own software and content, as well as interact with other members of the community through forums, blogs, and messaging. The website is designed to be user-friendly and easy to navigate, with various categories and tags to help users find the content they are looking for.
+
+The website features a wide range of applications and digital assets, including desktop environments, media players, text editors, image editors, and more. Users can also find various themes, icons, and wallpapers to customize their desktop environments and applications.
+
+OpenDesktop.org is committed to promoting open-source software and encouraging collaboration and innovation within the open-source community. The website is free to use and does not charge users for downloading or sharing content. However, users are encouraged to donate to support the website and its contributors.
\ No newline at end of file
diff --git a/content/blog/oracle-worldwide-surveillance-machine.md b/content/blog/oracle-worldwide-surveillance-machine.md
new file mode 100644
index 00000000..8a3ab003
--- /dev/null
+++ b/content/blog/oracle-worldwide-surveillance-machine.md
@@ -0,0 +1,17 @@
+---
+title: Oracle's Worldwide Surveillance Machine
+date: 2022-08-22
+featureImage: images/blog/surveillance.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## The class action lawsuit against a behemouth's worldwide surveillance machine
+
+With dossiers on five billion people (!) which likely means they have one on you and me, what can't Oracle do?
+
+https://www.iccl.ie/news/class-action-against-oracle/
+
+"...and a detailed account of online activity..."
+
+You have no right to see this information and refute/fix it, if needed.
\ No newline at end of file
diff --git a/content/blog/orange-pilled-veteran.md b/content/blog/orange-pilled-veteran.md
new file mode 100644
index 00000000..8caa3f85
--- /dev/null
+++ b/content/blog/orange-pilled-veteran.md
@@ -0,0 +1,15 @@
+---
+title: Orange Pilled Veteran
+date: 2021-10-21
+featureImage: images/blog/bitcoiin.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Working in the Bitcoin industry
+
+Offered to suggest working in the self-sovereign industry should be just as rewarding.
+
+https://www.zerohedge.com/crypto/one-veterans-story-orange-pilled-green-beret
+
+We are always hiring at Federated. :smile:
\ No newline at end of file
diff --git a/content/blog/outlook-com-discarding-messages.md b/content/blog/outlook-com-discarding-messages.md
new file mode 100644
index 00000000..d3428a0b
--- /dev/null
+++ b/content/blog/outlook-com-discarding-messages.md
@@ -0,0 +1,15 @@
+---
+title: Outlook.com is Silently Discarding Email Messages
+date: 2015-01-11
+featureImage: images/blog/microsoft.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Microsoft knows what is best for you
+
+Outlook.com and Hotmail.com won't receive your email message unless they want to...
+
+https://blog.paranoidpenguin.net/2015/01/outlook-com-is-silently-discarding-email-messages/
+
+Microsoft continues to break the protocol. One solution? Don't email folks with outlook.com and hotmail.com email addresses. Tell them Microsoft has decided what is best.
\ No newline at end of file
diff --git a/content/blog/personal-security-checklist.md b/content/blog/personal-security-checklist.md
new file mode 100644
index 00000000..9ad9ef96
--- /dev/null
+++ b/content/blog/personal-security-checklist.md
@@ -0,0 +1,15 @@
+---
+title: Personal Security Checklist
+date: 2022-07-21
+featureImage: images/blog/selfsovereign.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Besides carrying a gun...
+
+"A curated checklist of tips to protect your digital security and privacy."
+
+https://github.com/Lissy93/personal-security-checklist
+
+It's a complete lifestyle, frankly.
\ No newline at end of file
diff --git a/content/blog/pine-64-project.md b/content/blog/pine-64-project.md
new file mode 100644
index 00000000..4849410d
--- /dev/null
+++ b/content/blog/pine-64-project.md
@@ -0,0 +1,15 @@
+---
+title: Pine64 Project
+date: 2021-10-21
+featureImage: images/blog/pine64.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Open source hardware and software for desktop, tablet, mobile
+
+Pine64 makes some very interesting kit...
+
+https://www.pine64.org/
+
+The number of enthusiasts continues to grow month after month.
\ No newline at end of file
diff --git a/content/blog/poste-io.md b/content/blog/poste-io.md
new file mode 100644
index 00000000..23645138
--- /dev/null
+++ b/content/blog/poste-io.md
@@ -0,0 +1,13 @@
+---
+title: Poste.io
+date: 2021-10-21
+featureImage: images/blog/selfhosting.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## A nice self-hosted email server
+
+A nice project for self-hosted email.
+
+https://poste.io/
diff --git a/content/blog/privacy-com-scam.md b/content/blog/privacy-com-scam.md
new file mode 100644
index 00000000..4113ed49
--- /dev/null
+++ b/content/blog/privacy-com-scam.md
@@ -0,0 +1,15 @@
+---
+title: Privacy dot com -- Yeah Right
+date: 2022-10-22
+featureImage: images/blog/surveillance.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Why privacy dot com is anything but...
+
+If you're using privacy.com to achieve some "privacy", you need to read this...
+
+https://ersei.net/en/blog/privacy-dot-com-yeah-right
+
+Basically, the thesis of privacy.com is we want to take your (surveilled) credit card transactions and surveil them even more. Suckers!
\ No newline at end of file
diff --git a/content/blog/privacy-is-ok.md b/content/blog/privacy-is-ok.md
new file mode 100644
index 00000000..84543e29
--- /dev/null
+++ b/content/blog/privacy-is-ok.md
@@ -0,0 +1,19 @@
+---
+title: Privacy is OK
+date: 2022-12-29
+featureImage: images/blog/surveillance.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Tim Bray wants to defend Signal
+
+This is really about whether "bad guys" can use Signal. Tim, rightly, says "who cares". We all need privacy.
+
+https://www.tbray.org/ongoing/When/202x/2022/12/29/Privacy-is-OK
+
+But then Tim admits Signal can and does hand over conversations to those with subpoena powers:
+
+>in the course of the law-enforcement investigation of the January 6th insurrection, police got access to the traitors’ Signal conversations
+
+Hmmm. OK. We don't want to wade into "traitors". Just to point out, if someone thinks your conversation deserves unmasking, and they can get a subpoena, it will be unmasked. That's the power of the *centralizers*.
\ No newline at end of file
diff --git a/content/blog/privacy-tools-for-information-age.md b/content/blog/privacy-tools-for-information-age.md
new file mode 100644
index 00000000..451fc3ee
--- /dev/null
+++ b/content/blog/privacy-tools-for-information-age.md
@@ -0,0 +1,15 @@
+---
+title: Privacy Tools for the Information Age
+date: 2022-11-23
+featureImage: images/blog/privacy.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Some resources for increasing and protecting your privacy online.
+
+A good list of tools and methods you can use to increase and protect your privacy online during this time of all-time-low privacy and self-sovreignty.
+
+https://secondl1ght.site/blog/privacy-tools
+
+Many of these tools deserves further exploration and explanation. Some are centralized solutions (and so not our preference).
\ No newline at end of file
diff --git a/content/blog/private-secure-lora-messaging.md b/content/blog/private-secure-lora-messaging.md
new file mode 100644
index 00000000..0e12734e
--- /dev/null
+++ b/content/blog/private-secure-lora-messaging.md
@@ -0,0 +1,15 @@
+---
+title: Private, Secure, Uncensorable Messaging Over LORA
+date: 2021-10-21
+featureImage: images/blog/lora.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## How to use the LORA protocol to set up a mesh network for communications
+
+The LORA protocol is interesting. Very intersting. There's a shitcoin project to try to extend LORA across the country. Great idea, bad execution.
+
+https://unsigned.io/private-messaging-over-lora/
+
+What would it take to set this up in your own neighborhood or community? Reach out to us if you'd like to do or know more.
\ No newline at end of file
diff --git a/content/blog/proton-mail-review.md b/content/blog/proton-mail-review.md
new file mode 100644
index 00000000..04936d11
--- /dev/null
+++ b/content/blog/proton-mail-review.md
@@ -0,0 +1,15 @@
+---
+title: Proton Mail Review 2023
+date: 2023-03-14
+featureImage: images/blog/decentralize.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## The Good and the Bad
+
+How's Proton Mail hanging when it comes to being "the most secure email" on the planet?
+
+https://restoreprivacy.com/email/reviews/protonmail/
+
+If the service is centralized, it is *not* secure from governments. End-to-end encryption sounds neat, but once you interact with an email counterparty not using encryption, the game is up. Requires third-party software to work with email clients/standards.
\ No newline at end of file
diff --git a/content/blog/protonmail-bridge-problems.md b/content/blog/protonmail-bridge-problems.md
new file mode 100644
index 00000000..0d68c46c
--- /dev/null
+++ b/content/blog/protonmail-bridge-problems.md
@@ -0,0 +1,15 @@
+---
+title: Protonmail Bridge Problems
+date: 2021-09-29
+featureImage: images/blog/decentralize.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Message UIDs are not stable
+
+When the IDs for messages aren't stable, whacky things happen.
+
+https://github.com/ProtonMail/proton-bridge/issues/220
+
+Note: this is an older note, may have been fixed. Please check the repository.
\ No newline at end of file
diff --git a/content/blog/qubes.md b/content/blog/qubes.md
new file mode 100644
index 00000000..0a9ee91b
--- /dev/null
+++ b/content/blog/qubes.md
@@ -0,0 +1,15 @@
+---
+title: QubesOS
+date: 2021-10-21
+featureImage: images/blog/linux.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## A reasonably secure operating system
+
+Qubes is an operating system where most of the userland work happens in sandboxed virtual machines.
+
+https://www.qubes-os.org/intro/
+
+With the right hardware resources, you can use multiple "insecure" operating systems at the same time.
\ No newline at end of file
diff --git a/content/blog/rant-about-signal.md b/content/blog/rant-about-signal.md
new file mode 100644
index 00000000..f633722b
--- /dev/null
+++ b/content/blog/rant-about-signal.md
@@ -0,0 +1,15 @@
+---
+title: Oh Signal!
+date: 2021-10-21
+featureImage: images/blog/decentralize.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## You were the chosen one...
+
+Someone else isn't so impressed with the direction Signal is going these days...
+
+https://media.ccc.de/v/mch2022-196-signal-you-were-the-chosen-one-
+
+It's a real head-scratcher when a "security service" wants to start measuring "engagement".
\ No newline at end of file
diff --git a/content/blog/reclaiming-mobile-privacy-grapheneos.md b/content/blog/reclaiming-mobile-privacy-grapheneos.md
new file mode 100644
index 00000000..4b27ee9b
--- /dev/null
+++ b/content/blog/reclaiming-mobile-privacy-grapheneos.md
@@ -0,0 +1,15 @@
+---
+title: Reclaiming Mobile Privacy with GrapheneOS
+date: 2021-10-21
+featureImage: images/blog/grapheneos.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## It's true. It can be done!
+
+This is the android distribution many of us at Federated use.
+
+https://マリウス.com/reclaiming-mobile-privacy-with-grapheneos/
+
+"The shiny devices we carry around in our pockets have increasingly become malicious tools of governments, law enforcement and even for-profit corporations."
\ No newline at end of file
diff --git a/content/blog/redecentralize.md b/content/blog/redecentralize.md
new file mode 100644
index 00000000..09fe0e58
--- /dev/null
+++ b/content/blog/redecentralize.md
@@ -0,0 +1,15 @@
+---
+title: Redecentralize
+date: 2022-07-01
+featureImage: images/blog/decentralize.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Inttroducing Redecentralize
+
+At Federated we support any organization fighting against digital monopolies, surveillance capitalism, and a lack of self-sovreignty.
+
+https://redecentralize.org/
+
+Redecentralize is an organization seeking "a world of open platforms and protocols with real choices of applications and services for people. We care about privacy, transparency and autonomy. Our organizations and tools should fundamentally be accountable and resilient." Amen.
\ No newline at end of file
diff --git a/content/blog/rediscovery-of-money.md b/content/blog/rediscovery-of-money.md
new file mode 100644
index 00000000..25677ed7
--- /dev/null
+++ b/content/blog/rediscovery-of-money.md
@@ -0,0 +1,15 @@
+---
+title: Rediscovery of Money
+date: 2022-12-02
+featureImage: images/blog/bitcoin.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Bitcoin is the Rediscovery of Money
+
+In this article, the idea of "money" is defined as the "removal of counterparty risk". If we think about that, it is a pretty good definition in the context of some "value" to be exchanged between parties with the understanding of the "value" in relation to the parties themselves. That is the risk, removed.
+
+https://dergigi.com/2022/12/02/bitcoin-is-the-rediscovery-of-money/
+
+The *risk* associated with bitcoin today, in as much as we can talk about risk on a time horizon, is one of volatility. But that is another topic.
\ No newline at end of file
diff --git a/content/blog/reply-to-thrown-in-the-towel.md b/content/blog/reply-to-thrown-in-the-towel.md
new file mode 100644
index 00000000..b78e2d3a
--- /dev/null
+++ b/content/blog/reply-to-thrown-in-the-towel.md
@@ -0,0 +1,15 @@
+---
+title: Replying to Carlos F. "Thrown in the Towel"
+date: 2022-09-05
+featureImage: images/blog/selfhosted.gif
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Self-hosted Email is the Hardest, but also the Easiest
+
+Here's one response to the post by Carlos F. throwing in the towel for self-hosted email.
+
+https://vadosware.io/post/its-never-been-easier-or-harder-to-self-host-email/
+
+Hosting your own email *is* hard, but not impossible. The technical aspects are easy. Getting your email to someone with an outlook.com address are practical impossible. But maybe you should just pick up the phone and tell that person Microsoft (for example) doesn't want them to get email from anyone except those who Microsoft says are "good". I know, I know, Microsoft is protecting me from "spam" even thought, to be honest, we solved that problem with technology a long time back...
\ No newline at end of file
diff --git a/content/blog/rights-laws-google.md b/content/blog/rights-laws-google.md
new file mode 100644
index 00000000..c30347c0
--- /dev/null
+++ b/content/blog/rights-laws-google.md
@@ -0,0 +1,15 @@
+---
+title: Rights, Laws, and Google
+date: 2022-08-29
+featureImage: images/blog/google.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## What happens when everything everywhere is scanned
+
+A very cautionary tale.
+
+https://stratechery.com/2022/rights-laws-and-google/
+
+In fact, we privacy advocates don't have to answer: "a question worth posing to anyone unilaterally opposed to Google’s approach is how big that number would have to be to have made it worthwhile". One case of child sex exploitation is horrible. However, the issue at root here is really a queasiness with "free will". The desire is to use "tech" to keep of clear of the bad outcomes from the exercise of human "free will".
\ No newline at end of file
diff --git a/content/blog/rise-of-user-hostile-software.md b/content/blog/rise-of-user-hostile-software.md
new file mode 100644
index 00000000..0194819b
--- /dev/null
+++ b/content/blog/rise-of-user-hostile-software.md
@@ -0,0 +1,15 @@
+---
+title: Rise of User-Hostile Software
+date: 2021-08-23
+featureImage: images/blog/surveillance.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Caring more about the developer than about the user
+
+This may be a perenial complaint, but it does seem as if the state of software today is more geared to the company or the developer rather than the user.
+
+https://den.dev/blog/user-hostile-software/
+
+Open source software fixes this.
\ No newline at end of file
diff --git a/content/blog/robosats.md b/content/blog/robosats.md
new file mode 100644
index 00000000..a3851b6a
--- /dev/null
+++ b/content/blog/robosats.md
@@ -0,0 +1,13 @@
+---
+title: Robosats
+date: 2021-10-29
+featureImage: images/blog/bitcoin.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## A simple and private way to exchange Bitcoin for fiat currencies
+
+Another great way to buy bitcoin without KYC intrusions.
+
+https://learn.robosats.com/
diff --git a/content/blog/router-security-howto.md b/content/blog/router-security-howto.md
new file mode 100644
index 00000000..9e917164
--- /dev/null
+++ b/content/blog/router-security-howto.md
@@ -0,0 +1,15 @@
+---
+title: Router Security
+date: 2021-10-21
+featureImage: images/blog/selfhosted.gif
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## We all have one of these things in our home...
+
+We all have a (wifi) router in our homes if we are typically connected to the internet. Here's some advice how to configure the device in the most secure way possible.
+
+https://routersecurity.org/#StartHere
+
+Explore the site for even more great stuff!
\ No newline at end of file
diff --git a/content/blog/safing-free-open-source-firewall.md b/content/blog/safing-free-open-source-firewall.md
new file mode 100644
index 00000000..14591ee4
--- /dev/null
+++ b/content/blog/safing-free-open-source-firewall.md
@@ -0,0 +1,15 @@
+---
+title: Safing Firewall
+date: 2021-10-21
+featureImage: images/blog/selfhosted.gif
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Free and Open Source
+
+A nice, easy-to-undestand firewall for Windows and Linux
+
+https://link
+
+Includes a VPN with the paid tier.
\ No newline at end of file
diff --git a/content/blog/saying-goodbye-to-github.md b/content/blog/saying-goodbye-to-github.md
new file mode 100644
index 00000000..1ec4729d
--- /dev/null
+++ b/content/blog/saying-goodbye-to-github.md
@@ -0,0 +1,15 @@
+---
+title: Saying Goodbye to Github
+date: 2023-04-02
+featureImage: images/blog/selfhosted.gif
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## But does Github care?
+
+No.
+
+https://ersei.net/en/blog/bye-bye-github
+
+It's too bad he moves from a behemouth *centralizer* to an up-and-coming *centralizer*. Will these people never learn?
\ No newline at end of file
diff --git a/content/blog/screw-it-ill-host-it-myself.md b/content/blog/screw-it-ill-host-it-myself.md
new file mode 100644
index 00000000..cf02f56b
--- /dev/null
+++ b/content/blog/screw-it-ill-host-it-myself.md
@@ -0,0 +1,15 @@
+---
+title: Screw It
+date: 2021-04-07
+featureImage: images/blog/selfhosted.gif
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## I'll host it myself
+
+As more and more folks have bad experiences with the *centralizers*, more and more begin to wonder what it would mean to do it all themselves.
+
+https://www.markozivanovic.com/screw-it-ill-host-it-myself/
+
+That's why Federated Core exists. To make it easier. :blush:
\ No newline at end of file
diff --git a/content/blog/scrub-yourself-from-the-internet.md b/content/blog/scrub-yourself-from-the-internet.md
new file mode 100644
index 00000000..8371b0d1
--- /dev/null
+++ b/content/blog/scrub-yourself-from-the-internet.md
@@ -0,0 +1,15 @@
+---
+title: Scrub Yourself From The Internet
+date: 2021-10-21
+featureImage: images/blog/surveillance.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Is it even possible?
+
+The long journey begins with a single step...
+
+https://www.msn.com/en-us/news/technology/how-to-scrub-yourself-from-the-internet-the-best-that-you-can/ar-AAYOXe0
+
+Internet "knowledge" of you is like weight. You're either adding or you're losing.
\ No newline at end of file
diff --git a/content/blog/self-hosted-podcast.md b/content/blog/self-hosted-podcast.md
new file mode 100644
index 00000000..ef87c104
--- /dev/null
+++ b/content/blog/self-hosted-podcast.md
@@ -0,0 +1,15 @@
+---
+title: Self Hosted Podcast
+date: 2021-10-21
+featureImage: images/blog/selfhosted.gif
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## A podcast for self-hosters
+
+Even if you don't practice self-hosting using Federated, please practice self-hosting. These guys might be able to provide some guidance!
+
+https://selfhosted.show/
+
+From their description: "Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show to share lessons and take you along the journey..."
\ No newline at end of file
diff --git a/content/blog/self-hosted-saas-tools.md b/content/blog/self-hosted-saas-tools.md
new file mode 100644
index 00000000..fa16c1d7
--- /dev/null
+++ b/content/blog/self-hosted-saas-tools.md
@@ -0,0 +1,15 @@
+---
+title: Self Hosted SaaS Tools
+date: 2021-10-21
+featureImage: images/blog/selfhosted.gif
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## hSome alternatives to the *centralizers*
+
+Another useful list and assessment.
+
+https://tedium.co/2023/03/04/self-hosted-saas-app-alternatives/
+
+Too bad the site is littered with ads for...SaaS companies. :open_mouth:
\ No newline at end of file
diff --git a/content/blog/self-hosting-guide.md b/content/blog/self-hosting-guide.md
new file mode 100644
index 00000000..c965f423
--- /dev/null
+++ b/content/blog/self-hosting-guide.md
@@ -0,0 +1,15 @@
+---
+title: Self Hosting Guide
+date: 2022-10-25
+featureImage: images/blog/selfhosted.gif
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## A guide for getting started with self hosting
+
+A nice guide for all the various services, hardware, clouds, etc available for the person wanting to self-host.
+
+https://github.com/mikeroyal/Self-Hosting-Guide
+
+Self-hosting offers freedom and responsibility. There are a number of projects out there that help with the process.
\ No newline at end of file
diff --git a/content/blog/self-hosting-in-2023.md b/content/blog/self-hosting-in-2023.md
new file mode 100644
index 00000000..bc26075f
--- /dev/null
+++ b/content/blog/self-hosting-in-2023.md
@@ -0,0 +1,15 @@
+---
+title: Self Hosting in 2023
+date: 2023-02-18
+featureImage: images/blog/selfhosted.gif
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## How to Self Host Your Webpage
+
+The long self-hosting journey starts with a first step...
+
+https://grifel.dev/decentralization/
+
+...then you discover, to be honest, that's really how the internet works. A server, a web page. In between are your optimizations.
\ No newline at end of file
diff --git a/content/blog/setup-home-server-bitcoin-node.md b/content/blog/setup-home-server-bitcoin-node.md
new file mode 100644
index 00000000..fad9f2df
--- /dev/null
+++ b/content/blog/setup-home-server-bitcoin-node.md
@@ -0,0 +1,15 @@
+---
+title: Home Server Bitcoin Node
+date: 2021-10-21
+featureImage: images/blog/bitcoin.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Caveat: liberating but lots of complexities
+
+You do need to run your own node at home. It's the best for privacy and securty. But it can be complex, and, with the wrong turn, you can lose Bitcoin.
+
+https://www.expressvpn.com/blog/how-to-set-up-a-home-server-and-use-it-as-a-bitcoin-node/
+
+But don't fear. Try it out. Get a feel for it. We need to learn to cook.
\ No newline at end of file
diff --git a/content/blog/seven-books-for-the-self-sovereign-individual.md b/content/blog/seven-books-for-the-self-sovereign-individual.md
new file mode 100644
index 00000000..ac9c7e87
--- /dev/null
+++ b/content/blog/seven-books-for-the-self-sovereign-individual.md
@@ -0,0 +1,14 @@
+---
+title: Seven Books for the Self Sovereign Individual
+date: 2023-04-02
+featureImage: images/blog/selfsovereign.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## A great list
+
+Lots of wonderful ideas in these books...
+
+https://twitter.com/heyalmoo/status/1642570681194885120
+
diff --git a/content/blog/sha256-algorithm-explained.md b/content/blog/sha256-algorithm-explained.md
new file mode 100644
index 00000000..013aba27
--- /dev/null
+++ b/content/blog/sha256-algorithm-explained.md
@@ -0,0 +1,13 @@
+---
+title: SHA256 Encryption Explained
+date: 2021-10-21
+featureImage: images/blog/encyrption.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Want to know how the encryption standard works?
+
+Wonderful website. More like a "lab" than a textual explainer. Understand through doing.
+
+https://sha256algorithm.com/
diff --git a/content/blog/signal-has-a-back-door.md b/content/blog/signal-has-a-back-door.md
new file mode 100644
index 00000000..035159ea
--- /dev/null
+++ b/content/blog/signal-has-a-back-door.md
@@ -0,0 +1,15 @@
+---
+title: Does Signal Have a Back Door
+date: 2021-10-21
+featureImage: images/blog/signal.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Backdoor proven?
+
+Further evidence Signal has a back door...
+
+https://twitter.com/DylanLeClair_/status/1640378672359129088?s=20
+
+Repeat after us, centralized is no good.
\ No newline at end of file
diff --git a/content/blog/silent-link-anonymous-esim.md b/content/blog/silent-link-anonymous-esim.md
new file mode 100644
index 00000000..cc0f3a92
--- /dev/null
+++ b/content/blog/silent-link-anonymous-esim.md
@@ -0,0 +1,15 @@
+---
+title: Anonymous eSIM
+date: 2021-10-25
+featureImage: images/blog/privacy.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Really private
+
+When you really want to disappear...
+
+https://silent.link/
+
+However, the better solution may be to just put down the phone, go outside, and talk a long walk in the sun.
\ No newline at end of file
diff --git a/content/blog/sky-secure-global-indictment.md b/content/blog/sky-secure-global-indictment.md
new file mode 100644
index 00000000..6bdce658
--- /dev/null
+++ b/content/blog/sky-secure-global-indictment.md
@@ -0,0 +1,15 @@
+---
+title: U.S. Indicts Encrypted Phone CEO
+date: 2021-03-12
+featureImage: images/blog/encryption.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Claims Sky Global provided service used by criminal networks
+
+File this is the "is encryption legal to sell" section.
+
+https://www.vice.com/en/article/4adzdj/sky-secure-global-indictment
+
+The US Department of Justice claims they filed the indictment because the firm expressly catered to those committing criminal acts. But actions like this raise concerns about the claims of authorities that encryption, in and of itself, is a prohibited "tool" for sale.
\ No newline at end of file
diff --git a/content/blog/smart-phones-fragment-attention-span.md b/content/blog/smart-phones-fragment-attention-span.md
new file mode 100644
index 00000000..7899e643
--- /dev/null
+++ b/content/blog/smart-phones-fragment-attention-span.md
@@ -0,0 +1,15 @@
+---
+title: Smart Phones Fragment Attention Span
+date: 2021-10-21
+featureImage: images/blog/selfsovereign.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Why even care about an attention span?
+
+Without an attention span, human intelligence is not capable of producing its magic.
+
+https://idratherbewriting.com/blog/awakening-moment-to-how-smartphones-fragment-our-attention/
+
+It is funny when the "solution" is to use the smart phone to help us with "focus". :satisfied:
\ No newline at end of file
diff --git a/content/blog/social-credit-score-to-access-internet.md b/content/blog/social-credit-score-to-access-internet.md
new file mode 100644
index 00000000..6ac17534
--- /dev/null
+++ b/content/blog/social-credit-score-to-access-internet.md
@@ -0,0 +1,15 @@
+---
+title: Social Credit Score to Access Internet
+date: 2022-12-22
+featureImage: images/blog/censorship.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Not enacted, but recommended under Australian goverment plan
+
+This idea was *not* enacted. But it was thoughtfully considered and proposed by the sitting government of Australia.
+
+https://twitter.com/BernieSpofforth/status/1602042530845057027
+
+If "the internet" is the fief of government, why can't they shut it off for a reason like a bad social credit score? Let's take away the fief. And defeat the idea of social credit scores.
\ No newline at end of file
diff --git a/content/blog/stop-apple-tracking-you.md b/content/blog/stop-apple-tracking-you.md
new file mode 100644
index 00000000..b74a60a6
--- /dev/null
+++ b/content/blog/stop-apple-tracking-you.md
@@ -0,0 +1,15 @@
+---
+title: Stop Apple Tracking You
+date: 2022-04-01
+featureImage: images/blog/timcook.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Ways to keep Apple from tracking you on iOS 14.5 and later
+
+Apple stopped other apps from tracking you starting with iOS 14.5...so that they could have all that delicious tracking goodness to appleself.
+
+https://www.youtube.com/watch?v=7y88gAAIN5g
+
+What's the worry? It's only metadata...
\ No newline at end of file
diff --git a/content/blog/stop-being-a-bitch.md b/content/blog/stop-being-a-bitch.md
index eabb8fe7..1634fd16 100644
--- a/content/blog/stop-being-a-bitch.md
+++ b/content/blog/stop-being-a-bitch.md
@@ -1,6 +1,6 @@
---
title: "Stop Being a Bitch"
-date: 2023-05-027T20:18:07+06:00
+date: 2023-05-27
featureImage: images/blog/bitch.png
author: Barry Goers
authorThumb: images/author/barry.png
diff --git a/content/blog/surveillance-state-making-a-list.md b/content/blog/surveillance-state-making-a-list.md
new file mode 100644
index 00000000..9725e6ba
--- /dev/null
+++ b/content/blog/surveillance-state-making-a-list.md
@@ -0,0 +1,17 @@
+---
+title: Surveillance State Making a List
+date: 2021-10-21
+featureImage: images/blog/americansurveillance.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## This Christmas-themed article is a big drag...
+
+All the various ways governments and corporations are working hard to watch our every move.
+
+https://www.zerohedge.com/political/youd-better-watch-out-surveillance-state-making-list-and-youre-it
+
+The track us on the internet, the mobile phone, our DNA, our face, our spending and consumer activities, public movements...
+
+We can cloak. It does require a commitment. It can be done.
\ No newline at end of file
diff --git a/content/blog/swinging-back-to-open-standards.md b/content/blog/swinging-back-to-open-standards.md
new file mode 100644
index 00000000..c8a76c86
--- /dev/null
+++ b/content/blog/swinging-back-to-open-standards.md
@@ -0,0 +1,15 @@
+---
+title: Back to Open Standards
+date: 2022-11-17
+featureImage: images/blog/federated.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Using open standards is the only way to defeat the *centralizers*
+
+A survey of how the more things change, the more they swing back to standards...
+
+https://puri.sm/posts/swinging-back-to-open-standards/
+
+PS. really dislike the font (mini-t) of this website. :stuck_out_tongue_closed_eyes:
\ No newline at end of file
diff --git a/content/blog/symptoms-of-fiat-poisoning.md b/content/blog/symptoms-of-fiat-poisoning.md
new file mode 100644
index 00000000..71bac34e
--- /dev/null
+++ b/content/blog/symptoms-of-fiat-poisoning.md
@@ -0,0 +1,15 @@
+---
+title: Symptoms of Fiat Poisoning
+date: 2022-12-16
+featureImage: images/blog/selfsovereign.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Signs you've been fiat poisoned
+
+Most folks think of bitcoin as the anecdote of fiat.
+
+https://stacker.news/items/108177
+
+We think of living a complete self-sovereign lifestyle as the comprehensive anecdote to fiat/arbitrary culture and the poisoning that comes with it.
\ No newline at end of file
diff --git a/content/blog/the-casino-chip-society.md b/content/blog/the-casino-chip-society.md
new file mode 100644
index 00000000..a6c0c5be
--- /dev/null
+++ b/content/blog/the-casino-chip-society.md
@@ -0,0 +1,15 @@
+---
+title: The Casino Chip Society
+date: 2022-11-30
+featureImage: images/blog/censorship.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## One-Type-Of-Money-Illusion
+
+This article helps us understand how cash and value works today in our fiat money society. Huh?
+
+https://brettscott.substack.com/p/casino-chip-cashless-society
+
+The same principles of data-sovereignty apply to money-sovereignty.
\ No newline at end of file
diff --git a/content/blog/the-story-of-your-enslavement.md b/content/blog/the-story-of-your-enslavement.md
new file mode 100644
index 00000000..9d786e91
--- /dev/null
+++ b/content/blog/the-story-of-your-enslavement.md
@@ -0,0 +1,13 @@
+---
+title: The Story of Your Enslavement
+date: 2021-10-21
+featureImage: images/blog/eatthecentralized.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## A film essay about the ways and forms of our enslavement
+
+A thought-provoking film essay about the ways and means of our quotidian enslavement in the modern world.
+
+https://youtu.be/eq3jjzI8Gdo
diff --git a/content/blog/thrown-in-the-towel-email-hosting.md b/content/blog/thrown-in-the-towel-email-hosting.md
new file mode 100644
index 00000000..fbb79686
--- /dev/null
+++ b/content/blog/thrown-in-the-towel-email-hosting.md
@@ -0,0 +1,15 @@
+---
+title: Thrown in the Towel Self-hosting Email
+date: 2022-09-04
+featureImage: images/blog/selfhosted.gif
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## The challenges faced by those seeking to self-host email
+
+Is it true self-hosting email is a lost cause? Carlos F. seems to think so.
+
+https://cfenollosa.com/blog/after-self-hosting-my-email-for-twenty-three-years-i-have-thrown-in-the-towel-the-oligopoly-has-won.html
+
+The purpose of this post isn't to be an *apologia* for self-hosting email. Rather, it is to highlight the oligarchic behaviors that exist on certain protocols (smtp, etc) and to say that we encourage this behavior when we give up and move to more niche protocols (eg nostr?) In the end, *they*, the *Centralizers* own the network. It can be done.
\ No newline at end of file
diff --git a/content/blog/thunderbird-supernova-preview.md b/content/blog/thunderbird-supernova-preview.md
new file mode 100644
index 00000000..5d1a9fcd
--- /dev/null
+++ b/content/blog/thunderbird-supernova-preview.md
@@ -0,0 +1,15 @@
+---
+title: Thunderbird Supernova Preview
+date: 2022-11-09
+featureImage: images/blog/thunderbird.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## New calendar design
+
+Thunderbird is getting better and better. Among many of the FOSS reasons to use Thunderbird, it's possible to set up Thunrderbird so that your settings move from machine to machine. Nice! But the integrated calendar was always sub-par. Looks like a future update named "Supernova" will fix that.
+
+https://blog.thunderbird.net/2022/11/thunderbird-supernova-preview-the-new-calendar-design/
+
+Check out the Federated Computer documentation for other types re: Thunderbird.
\ No newline at end of file
diff --git a/content/blog/time-and-attention-as-currency.md b/content/blog/time-and-attention-as-currency.md
new file mode 100644
index 00000000..7142400e
--- /dev/null
+++ b/content/blog/time-and-attention-as-currency.md
@@ -0,0 +1,15 @@
+---
+title: Time and Attention as Currency
+date: 2022-12-19
+featureImage: images/blog/bitcoin.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## How the attention economy is ruining us
+
+We need to return back to pseudonimity and anonymity as the basis for the marketplace EXCEPT when an actual trade of value for value is agreed by all parties.
+
+https://twitter.com/dergigi/status/1604785991608172544?s=20&t=ZOA98-7Et7TPpZYI8AHACg
+
+This is fundamentally impossible without "hard money" and its side-kick "hard digital decentralization".
\ No newline at end of file
diff --git a/content/blog/tmobile-starlink-link.md b/content/blog/tmobile-starlink-link.md
new file mode 100644
index 00000000..d602b8ca
--- /dev/null
+++ b/content/blog/tmobile-starlink-link.md
@@ -0,0 +1,15 @@
+---
+title: TMobile Starlink Link
+date: 2022-08-25
+featureImage: images/blog/starlink.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Starlink will offer global connection to TMobile phones
+
+Starlink will provide a means for Tmobile handsets to communicate (SMS, Voice) anywhere on the globe Starlink provides coverage using 3G-equivalent bandwidth.
+
+https://archive.ph/LGnFS
+
+As if we weren't tracked enough. :weary:
\ No newline at end of file
diff --git a/content/blog/tools-to-combat-surveillance.md b/content/blog/tools-to-combat-surveillance.md
new file mode 100644
index 00000000..52907447
--- /dev/null
+++ b/content/blog/tools-to-combat-surveillance.md
@@ -0,0 +1,14 @@
+---
+title: Tools to Combat Surveillance
+date: 2023-02-21
+featureImage: images/blog/surveillance.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## You need some tools to protect yourself
+
+What are you doing to protect yourself from pervasive surveillance today?
+
+https://www.youtube.com/watch?v=s-ny-I8EVH8
+
diff --git a/content/blog/tools-to-protect-macos.md b/content/blog/tools-to-protect-macos.md
new file mode 100644
index 00000000..5ce46a50
--- /dev/null
+++ b/content/blog/tools-to-protect-macos.md
@@ -0,0 +1,15 @@
+---
+title: Tools to Secure Your Mac
+date: 2021-11-21
+featureImage: images/blog/apple.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## A list of tools for protecting and securing your macOS device
+
+A nice list of tools you can use to protect and secure your macOS machine.
+
+https://objective-see.org/tools.html
+
+This is expert level stuff, but could be helpful for you and protecting those your support.
\ No newline at end of file
diff --git a/content/blog/top-ten-privacy-podcasts.md b/content/blog/top-ten-privacy-podcasts.md
new file mode 100644
index 00000000..c142394c
--- /dev/null
+++ b/content/blog/top-ten-privacy-podcasts.md
@@ -0,0 +1,15 @@
+---
+title: Top 10 Privacy Podcasts
+date: 2023-02-02
+featureImage: images/blog/privacy.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## A list of the top ten privacy podcasts
+
+Listen to these podcasts for some great insights on privacy.
+
+https://privacyplan.net/top-10-privacy-podcasts/
+
+We all need ways to learn. Listen up!
\ No newline at end of file
diff --git a/content/blog/tor-only-bitcoin-lightning-guide.md b/content/blog/tor-only-bitcoin-lightning-guide.md
new file mode 100644
index 00000000..f9d95058
--- /dev/null
+++ b/content/blog/tor-only-bitcoin-lightning-guide.md
@@ -0,0 +1,15 @@
+---
+title: Tor-Only Bitcoin and Lightning Guide
+date: 2021-05-06
+featureImage: images/blog/bitcoin.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## How to use Bitcoin and Lightning on the Tor network
+
+We are big fans of Bitcoin and the Lightning network at Federated and recommend using it over Tor. But it can be technically intimidating.
+
+https://blog.lopp.net/tor-only-bitcoin-lightning-guide/
+
+The purpose of Bitcoin and Lightning is to fully decentralize money. The purpose of Tor is to share as little information on the public network as possible. Together they can be very effective.
\ No newline at end of file
diff --git a/content/blog/torbox-release-040.md b/content/blog/torbox-release-040.md
new file mode 100644
index 00000000..3a8f5eff
--- /dev/null
+++ b/content/blog/torbox-release-040.md
@@ -0,0 +1,15 @@
+---
+title: TorBox 0.4.0 Released
+date: 2021-10-21
+featureImage: images/blog/tor.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Creates a WiFi hotspot routing over Tor using Raspberry Pi
+
+When you want Tor-routed services for all your wireless/WiFi traffic.
+
+https://www.torbox.ch/?p=2027
+
+You can even use this in hotels, for example, even if there is a captive portal, when traveling.
\ No newline at end of file
diff --git a/content/blog/tracing-cameras.md b/content/blog/tracing-cameras.md
new file mode 100644
index 00000000..758b8f74
--- /dev/null
+++ b/content/blog/tracing-cameras.md
@@ -0,0 +1,15 @@
+---
+title: Tracing Cameras
+date: 2022-07-01
+featureImage: images/blog/surveillance.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Using the slight imperfections of the sensor
+
+An interesting technique to trace individual digital cameras based on sensor information.
+
+https://petapixel.com/2022/07/01/police-can-trace-cameras-thanks-to-sensor-imperfection-fingerprints/
+
+How long until this is used in the wild to track everyone?
\ No newline at end of file
diff --git a/content/blog/tracking-every-cash-transaction.md b/content/blog/tracking-every-cash-transaction.md
new file mode 100644
index 00000000..5e2d8802
--- /dev/null
+++ b/content/blog/tracking-every-cash-transaction.md
@@ -0,0 +1,15 @@
+---
+title: Tracking American Cash Transactions
+date: 2021-10-21
+featureImage: images/blog/surveillance.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Wall Street Journal reports program tracks transactions above $500
+
+Homeland Security is using a tool to track cash transactions above $500.
+
+https://www.rt.com/news/570100-americans-money-transfers-spying/
+
+As Senator Wyden's (D-Oregon) investigation showed, this is being done without regard for established legal protections.
\ No newline at end of file
diff --git a/content/blog/tyranny-looms-digital-ids-cbdc.md b/content/blog/tyranny-looms-digital-ids-cbdc.md
new file mode 100644
index 00000000..e32891db
--- /dev/null
+++ b/content/blog/tyranny-looms-digital-ids-cbdc.md
@@ -0,0 +1,13 @@
+---
+title: Tyranny Looms Via Digital IDs and Currencies
+date: 2022-11-05
+featureImage: images/blog/digitalid.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Digital IDs and Currencies are means of control
+
+Does anyone besides the ruling classes really think digitizing IDs and currencies are anything but a means to control people?
+
+https://www.lifesitenews.com/blogs/tyranny-looms-as-digital-ids-and-currencies-roll-out-around-the-world/
diff --git a/content/blog/understanding-email.md b/content/blog/understanding-email.md
new file mode 100644
index 00000000..e4779005
--- /dev/null
+++ b/content/blog/understanding-email.md
@@ -0,0 +1,15 @@
+---
+title: Understanding Email
+date: 2021-05-07
+featureImage: images/blog/email.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Email explained from first principles
+
+Everything you ever wanted to know about how email works...
+
+https://explained-from-first-principles.com/email/
+
+...because you're going to want to know how it can be improved, protected, best served.
\ No newline at end of file
diff --git a/content/blog/unique-visitors-without-cookies.md b/content/blog/unique-visitors-without-cookies.md
new file mode 100644
index 00000000..4a342f07
--- /dev/null
+++ b/content/blog/unique-visitors-without-cookies.md
@@ -0,0 +1,15 @@
+---
+title: Counting Unique Visitors Ethically
+date: 2022-11-22
+featureImage: images/blog/federated.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## How to count visitors without using cookies
+
+A self-sovereign lifestyle means doing to others what you would want doen to yourself, including how you track your website visitors.
+
+https://notes.normally.com/cookieless-unique-visitor-counts/
+
+This article shows you how to build website analytics without storing information that can reveal a visitor's identity. If you don't want it done to you, don't do it to others. Simple. And the solution is brilliant.
\ No newline at end of file
diff --git a/content/blog/us-military-surveillance-on-internet.md b/content/blog/us-military-surveillance-on-internet.md
new file mode 100644
index 00000000..0ceff897
--- /dev/null
+++ b/content/blog/us-military-surveillance-on-internet.md
@@ -0,0 +1,15 @@
+---
+title: US Military Mass Monitors Internet Browsing, Email, Everything
+date: 2022-09-21
+featureImage: images/blog/americansurveillance.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## There's nothing else to capture except the smell of electricity.
+
+The “Augury” platform includes highly sensitive network data that Team Cymru, a private company, is selling to the military. “It’s everything. There’s nothing else to capture except the smell of electricity,” one cybersecurity expert said.
+
+https://www.vice.com/en/article/y3pnkw/us-military-bought-mass-monitoring-augury-team-cymru-browsing-email-data
+
+They violate our privacy for our safety. Is that a good bargain?
\ No newline at end of file
diff --git a/content/blog/value-for-value.md b/content/blog/value-for-value.md
new file mode 100644
index 00000000..ae710348
--- /dev/null
+++ b/content/blog/value-for-value.md
@@ -0,0 +1,15 @@
+---
+title: Value For Value
+date: 2022-04-01
+featureImage: images/blog/federated.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Explanation of Value for Value
+
+Many "media" or "social" businesses today rely on anadvertising model to pay the bills. However, the model itself begins to distort the message over time because the economic means (advertisers) will dictate what is acceptable content and even, in time, acceptable customers. The solution is value for value.
+
+https://value4value.info/
+
+Going further, value for value can be understood as a way of life, as the site says "a mindset of abundance" where an ecosystem develops of free exchange of "goods" understood as "time, talent, and treasure".
\ No newline at end of file
diff --git a/content/blog/verified-onion-sites.md b/content/blog/verified-onion-sites.md
new file mode 100644
index 00000000..93aed88c
--- /dev/null
+++ b/content/blog/verified-onion-sites.md
@@ -0,0 +1,15 @@
+---
+title: Verified Onion Sites
+date: 2021-07-21
+featureImage: images/blog/tor.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## An ever growing list of bitcoin and privacy related onion sites
+
+Fire up your Tor browser and browse...
+
+https://sovrnbitcoiner.com/verified-tor-onion-sites/
+
+A great list of some sites you want to visit using Tor.
\ No newline at end of file
diff --git a/content/blog/wading-into-nostr.md b/content/blog/wading-into-nostr.md
new file mode 100644
index 00000000..794d7154
--- /dev/null
+++ b/content/blog/wading-into-nostr.md
@@ -0,0 +1,15 @@
+---
+title: Wading into Nostr
+date: 2023-02-13
+featureImage: images/blog/nostr.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Some intial descriptions of experience with Nostr
+
+One person's explorations of Nostr ("notes and other stuff using relays")
+
+https://stacker.news/items/135975
+
+We will be writing in-depth about how Federated uses this technlogy.
\ No newline at end of file
diff --git a/content/blog/we-kill-people-based-on-metadata.md b/content/blog/we-kill-people-based-on-metadata.md
new file mode 100644
index 00000000..1728dae5
--- /dev/null
+++ b/content/blog/we-kill-people-based-on-metadata.md
@@ -0,0 +1,15 @@
+---
+title: We Kill People Based on Metadata
+date: 2022-08-22
+featureImage: images/blog/americansurveillance.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## The NSA and CIA use metadata to determine who should die
+
+General Michael Hayden, in a debate with ACLU national legal director David Cole, admitted metadata can be enough to determine if some person is a threat to the US sufficient enough to warrant death.
+
+https://darknetlive.com/post/we-kill-people-based-on-metadata-and-other-metadata-things-3b316d3c
+
+So... Take action. Get off the metadata supply wagon. "But I'm not a threat to the US security establishment." No, likely not. But you're of interest to Mark Zuckerberg and his establishment. You may be alive, but he wants to sell you those most comfortable ever lounging shoes if it's the last think he does. And Google, also interested. So interested they use your simple metadata to follow you around town like a benvolent advertising deity. Real God, help us!
\ No newline at end of file
diff --git a/content/blog/what-can-others-learn-scraping-instagram.md b/content/blog/what-can-others-learn-scraping-instagram.md
new file mode 100644
index 00000000..abcdb362
--- /dev/null
+++ b/content/blog/what-can-others-learn-scraping-instagram.md
@@ -0,0 +1,15 @@
+---
+title: Instagram Scraping
+date: 2021-10-21
+featureImage: images/blog/surveillance.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## What can others learn?
+
+Scraping social media services is wide-spread (here, Instagram) and highlights the data leaks exploited by many to find out much more about us.
+
+https://www.socialscrape.com/post/what-is-instagram-scraping
+
+"Basically anything you can get from a user's profile can be scraped." When combined with other information, a user dossier begins to emerge. D'oh!
\ No newline at end of file
diff --git a/content/blog/what-happens-web-loses.md b/content/blog/what-happens-web-loses.md
new file mode 100644
index 00000000..777c39de
--- /dev/null
+++ b/content/blog/what-happens-web-loses.md
@@ -0,0 +1,15 @@
+---
+title: What If Web Loses?
+date: 2023-01-04
+featureImage: images/blog/censorship.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## What if everything becomes an app on somebody else's platform?
+
+What happens when the only whay we can work or manipulate data is through "proprietary" apps, not the web?
+
+https://chriscoyier.net/2023/01/04/what-does-it-look-like-for-the-web-to-lose/
+
+Lock in, much? Lock in = surveillance, boys and girls.
\ No newline at end of file
diff --git a/content/blog/what-is-layer-three.md b/content/blog/what-is-layer-three.md
new file mode 100644
index 00000000..af0cc5c9
--- /dev/null
+++ b/content/blog/what-is-layer-three.md
@@ -0,0 +1,15 @@
+---
+title: Layer Three?
+date: 2022-07-14
+featureImage: images/blog/federated.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## What is layer three?
+
+A discussion re: the intersection bitcoin/lightning with the internet...
+
+https://twitter.com/PompPodcast/status/1547633870702424066?t=ysL2s0wxSyyAqZ-ZQJPTtQ&s=19p
+
+This is probably what "web 3" should/will be.
\ No newline at end of file
diff --git a/content/blog/whatsapp-messages-intercepted-by-government.md b/content/blog/whatsapp-messages-intercepted-by-government.md
new file mode 100644
index 00000000..ac072eb5
--- /dev/null
+++ b/content/blog/whatsapp-messages-intercepted-by-government.md
@@ -0,0 +1,15 @@
+---
+title: Whatsapp and Signal Messages Intercepted by Government
+date: 2022-10-02
+featureImage: images/blog/surveillance.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Australian government will be able to intercept WhatsApp and Signal messages
+
+If you thought your encypted WhatsApp and Signal messages were secure from surveillance, think again...
+
+https://www.smh.com.au/politics/federal/national-anti-corruption-commission-will-be-able-to-intercept-whatsapp-messages-a-g-20221002-p5bmis.html
+
+There's a simple principle. If it is centralized, it is not secure. It's the fiat of services. Another note: it's always "anti corruption" or "anti waste". Both are just gas-lighting for "anti freedom".
\ No newline at end of file
diff --git a/content/blog/who-controls-the-internet.md b/content/blog/who-controls-the-internet.md
new file mode 100644
index 00000000..34ef5a83
--- /dev/null
+++ b/content/blog/who-controls-the-internet.md
@@ -0,0 +1,15 @@
+---
+title: Who Controls the Internet?
+date: 2021-11-02
+featureImage: images/blog/censorship.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## From a speech given at NANOG 83
+
+From the guy who created PowerDNS comes an assessment of the ownership and control of the internet today.
+
+https://berthub.eu/articles/posts/who-controls-the-internet/
+
+Guess what? It's not so good...unless we re-double our efforts to take back control.
\ No newline at end of file
diff --git a/content/blog/who-wef-un-digital-id.md b/content/blog/who-wef-un-digital-id.md
new file mode 100644
index 00000000..7a2bc460
--- /dev/null
+++ b/content/blog/who-wef-un-digital-id.md
@@ -0,0 +1,13 @@
+---
+title: Digital ID from Hell
+date: 2023-04-19
+featureImage: images/blog/surveillance.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## This ID allows our masters at the WHO, UN, and WEF to track us everywhere
+
+The World Health Organization, United Nations, and World Economic Forum have a bureaucrats wet dream for tracking plebians wherever they go.
+
+https://twitter.com/ANTlWEF/status/1648676505562787840?s=20
diff --git a/content/blog/why-decentralization-matters.md b/content/blog/why-decentralization-matters.md
new file mode 100644
index 00000000..8144e65f
--- /dev/null
+++ b/content/blog/why-decentralization-matters.md
@@ -0,0 +1,15 @@
+---
+title: Why Decentralization Matters
+date: 2021-10-21
+featureImage: images/blog/decentralize.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## From the perspective of a notorious shitcoiner...
+
+It's funny how he's right on "decentralization" but every one of his implementations was backed by some (evil) centralization scheme. We're not hear to prove that, just a bold assertion. But he's right about decentralization.
+
+https://onezero.medium.com/why-decentralization-matters-5e3f79f7638e
+
+But how could "decentralization" ever be monetized? Value for value. Give people want they want and need and they will pay.
\ No newline at end of file
diff --git a/content/blog/why-self-hosting-is-important.md b/content/blog/why-self-hosting-is-important.md
new file mode 100644
index 00000000..8a46e852
--- /dev/null
+++ b/content/blog/why-self-hosting-is-important.md
@@ -0,0 +1,15 @@
+---
+title: Why Self-Hosting is Important
+date: 2021-07-23
+featureImage: images/blog/selfhosted.gif
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Self-hosting is about freedom
+
+Some observations and experiences with regards self-hosting.
+
+https://dataswamp.org/~solene/2021-07-23-why-selfhosting-is-important.html
+
+If you're reading this blog, you probably already know self-hosting is important. It is vital to keeping the internet and our data free.
\ No newline at end of file
diff --git a/content/blog/working-from-home-surveillance.md b/content/blog/working-from-home-surveillance.md
new file mode 100644
index 00000000..b01255ea
--- /dev/null
+++ b/content/blog/working-from-home-surveillance.md
@@ -0,0 +1,15 @@
+---
+title: Home Work is Corporate Surveillance Work
+date: 2021-10-21
+featureImage: images/blog/surveillance.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## The big man has access to all your waking minutes
+
+If the corporation can surveil employees while in the office (and we don't like this, mind you, but so many have accepted it), what happens when the office is your private home?
+
+https://www.zerohedge.com/technology/working-home-now-means-letting-corporate-surveillance-your-daily-life
+
+Maybe the solution is not to carry/have two of everything?
\ No newline at end of file
diff --git a/content/blog/your-identity-owned-by-email-provider.md b/content/blog/your-identity-owned-by-email-provider.md
new file mode 100644
index 00000000..73294c3c
--- /dev/null
+++ b/content/blog/your-identity-owned-by-email-provider.md
@@ -0,0 +1,15 @@
+---
+title: Online Identity Owned by Email Provider
+date: 2019-08-30
+featureImage: images/blog/surveillance.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Email is a great way to understand everything about a person
+
+If you don't own or run your email ("not your keys, not your email"), then your on-line identify is owned by your email provider.
+
+https://www.ctrl.blog/entry/email-identity-provider.html
+
+This is even true for Proton, kids. Centralization sucks.
\ No newline at end of file
diff --git a/content/blog/zero-data-app.md b/content/blog/zero-data-app.md
new file mode 100644
index 00000000..b9b697ba
--- /dev/null
+++ b/content/blog/zero-data-app.md
@@ -0,0 +1,15 @@
+---
+title: Zero Data App
+date: 2021-10-21
+featureImage: images/blog/selfsovereign.png
+author: Cincinnatus
+authorThumb: /images/author/cincinnatus.jpg
+---
+
+## Keeping data under your control
+
+A nice exposition of the idea that even your apps shouldn't be barriers to your data.
+
+https://0data.app/
+
+For the most part, this means using open data protocols and formats. Not even open-source applications do this today. But this website introduces us to apps that do.
\ No newline at end of file
diff --git a/content/sovereignreset.md b/content/sovereignreset.md
deleted file mode 100644
index e0363665..00000000
--- a/content/sovereignreset.md
+++ /dev/null
@@ -1,19 +0,0 @@
----
-title: "Sovereign Reset"
-description: "Learn to live a sovereign lifestyle."
----
-
-We started **[Sovereign Reset](https://sovereignreset.com)** to provide a place to talk about living a sovereign lifestyle in full beyond just digital sovereignty.
-
-**[Sovereign Reset](https://sovereignreset.com)** is a partnership between Federated Computer and a number of individuals and companies in the areas of:
-
-* food
-* relationships
-* digital
-* health
-* exercise
-* money
-
-There is a weekly **[Sovereign Reset Podcast](https://documentation.sovereignreset.com)** where we talk with interesting individuals working around the globe to bring the sovereign lifestyle to others.
-
-![image](/images/general/cincinnatus.jpg)
\ No newline at end of file
diff --git a/public/blog/2022-year-of-desktop-linux/index.html b/public/blog/2022-year-of-desktop-linux/index.html
new file mode 100644
index 00000000..4e8e0164
--- /dev/null
+++ b/public/blog/2022-year-of-desktop-linux/index.html
@@ -0,0 +1,312 @@
+
+
+
Let’s see how these some of these rules can be applied to the self-sovereign individual even if, horror, they have no interest in Bitcoin.
+
+
Not your keys. This is the principal of decentralization. We don’t use centralized services where are data is not our own.
+
Stack sats. For the self-sovereign, this means moving data from fiat services to decentralized and continuing to use and accumulate data on decentralized services.
+
No one needs to know how much bitcoin you have. Likewise, why advertise how you’re accomplishing your digital freedom using decentralized tools?
+
Run your own node. In the end, if you don’t run it, our have “joint” custody so that you can take it over, it’s not your data.
+
Don’t do shitcoining. When you interact with friends deep in the Google, Apple, Facebook, etc ecosystems, you’re kissing up to shitcoiners. Maybe you need new friends?
+
Back up your wallet seed words. There are great ways to preserve your sovreignty through backups.
+
Bitcoin changes you. When you commit to the self-sovereign lifestyle, you change from “can I do this, please, sir?” to “I did this.” It is life-changing.
+
Bitcoin teaches you to be a champion of truth. Here “truth” means living authentically under the principle that only you can be responsible for yourself and those you love. The “state” or the “corporation” do not have your “truth” in mind.
+
Always fight FUD. Most will say this lifestyle is not possible.
Tim Cook famously said: “You are not our product. You are our customer. You are a jewel, and we care about the user experience.” (2018) But does this line up with Apple’s recent hard charge into the digital advertising business?
What to do? Try Linux. There are plenty of great distributions. Oh, the app you want/need isn’t there? Spin up a Windows VM on your Linux distro for the times you need to bend over. You can even run macOS in a VM. If we don’t like this advertising shit, why are we acting like a bunch of cucks and whining? Be self sovereign.
“Apple taxes, tyrannizes, and “sherlocks” app developers. App developers are victims of Apple’s conduct, and ACT | The App Association–which is actually just an Apple Association–unethically claims to represent the interests of small developers.”
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
diff --git a/public/blog/apple-tracking-you-in-app-store/index.html b/public/blog/apple-tracking-you-in-app-store/index.html
new file mode 100644
index 00000000..03c7bc0f
--- /dev/null
+++ b/public/blog/apple-tracking-you-in-app-store/index.html
@@ -0,0 +1,312 @@
+
+
+
+
+ Apple Tracks You in the App Store
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Apple Tracks You in the App Store
+
+
+
+
+
+
+
+
+ Cincinnatus
+
+
+
+ November 3, 2022
+
+
+
+
+
+
+
+
+
+
+
+
+
+
As you browse and tap, Apple is watching
+
“Ahem, we are building a better customer experience…”
Apple made a change to how AirDrop works in mainland China restricting the way Apple customer could communicate with each other.
+
According to the article published by Reclaim The Net on August 10, 2021, Apple has come under scrutiny for allegedly allowing Chinese users to receive unsolicited content through its AirDrop feature. The report states that Chinese users have been receiving unsolicited pornographic images and spam through AirDrop from strangers who are using anonymous usernames.
+
The article further notes that the Chinese government has been cracking down on online pornography and other forms of illegal content, and the use of anonymous usernames has been banned in the country. However, the report suggests that the anonymity feature of AirDrop has allowed users to bypass this regulation and share illegal content.
+
Apple has not yet commented on the matter, but the report raises concerns about the company’s responsibility to prevent the spread of illegal content and protect its users from unwanted and potentially harmful material. It also highlights the challenges faced by tech companies operating in China, where strict government censorship and regulation often conflict with international standards of free speech and privacy.
A list of privacy and security-focused apps, software, and providers
+
From the list: “Large data-hungry corporations dominate the digital world but with little, or no respect for your privacy. Migrating to open-source applications with a strong emphasis on security will help stop corporations, governments, and hackers from logging, storing or selling your personal data.”
We don’t agree with all the conclusions. Nevertheless, bon voyage! (Oh, side note, notice he mentions “analyze and store” with re: the Hey email service. Centralizer.)
Lessons learned stress testing dozens of seed phrase backup devices
+
The seed phrase is like the password opening up the value of a Bitcoin address. If you lose it, you lose the Bitcoin. So, it is imperative, when using self-custodied Bitcoin address, that you have 100% reliable access to your seed phrase.
The solution is to continue to build communities of common-interest that can build small economies where bitcoin is taken back and forth. Maybe the solution is we all need to be willing and able to take bitcoin?
Honestly, we don’t recommend this for anyone. But it does give a sense of the power and flexibility available to those wanting to self-host at home. My own self-hosted home server is similar.
By the way, there are so many great servers for sale on eBay with 16G ram, Xeon processors, etc. that work very well as a home server without the fragility and for roughly the same initial price.
Self-ownership means “anonymity” and to “communicate securly with anyone on the planet without being observed by a third party”. Of course, there are a number of parts to this puzzle. The hardware, the client software and operating system, the server hardware, software and operating system, and then the network and the means of utilizing that network. Each have their own challenges to “ownership” and incumbent third-parties such as Google, Apple, Microsoft, the NSA, five eyes, and all the rest who have built lucrative and oppressive business models on maintaining that observation.
+
We stand today naked before our computing overlords. Only when we begin to clothe and cloak bit by bit do we begin to take away control from the peeping Toms, the creeps, the “authorities”.
How Bitcoin solved the trust issue that has plagued societies for millenia. Some precursors to the Diffie-Hellman key exchange are discussed and explained.
According to the article published by Dergigi, cryptography alone is not sufficient to provide complete security for digital systems and data. While cryptography is an essential tool for protecting data against unauthorized access and tampering, it cannot address all of the security challenges that digital systems face.
+
The article notes that cryptography is vulnerable to various attacks, including brute force attacks, side-channel attacks, and quantum attacks, which could potentially compromise the security of encrypted data. Additionally, cryptography cannot protect against other types of security threats, such as social engineering attacks, insider threats, and physical attacks on hardware and infrastructure.
+
The report argues that a comprehensive approach to security is necessary, which includes not only cryptography but also other security measures such as access control, authentication, monitoring, and incident response. The article also highlights the importance of regular security audits and updates, as well as ongoing education and training for users to promote awareness of security best practices.
+
The article notes that as digital systems become increasingly complex and interconnected, the need for a comprehensive security approach becomes even more important. It also highlights the potential risks of relying solely on cryptography for security, and the need for organizations and individuals to adopt a more holistic approach to protecting their data and systems.
What happens when your ‘identity’ is simply 1s and 0s?
+
A digital identity isn’t something from you. It is a dossier created by the centralizers to better understand, for themselves, the capabilities in the world allowed to you.
If the thing you’re using is centralized, it is so much easier for the “authorities” to compel disclosure of data. Case in point is Telegram who was recently forced to disclose names, phone numbers, and IP address accused of sharing material thought to infringe copyright.
The court order was issued by the Delhi High Court in India and required Telegram to disclose the information to the plaintiffs who had filed a copyright infringement case against the users.
+
It is important to note that this action was taken in compliance with a specific court order and does not necessarily indicate a general policy or practice of Telegram to disclose user information. Telegram has previously stated that it values the privacy of its users and that it will only disclose user data in response to a valid court order or other legal requirement.
It’s a contrarian opinion to opine that AI is anything but garbage (i.e. something written by a 5th grader doing a report). Look, we use ChatGPT to generate the summaries for these link list posts, because we are lazy, and we want to spend more time PC gaming. We’re old school that way. But most of the summaries require a significant amount of re-writing…so how lazy are we after all?
Discusses the proliferation of low-quality, AI-generated content on the internet and the challenges it poses for consumers and content creators alike.
+
The author notes that while AI-generated content can be useful in certain contexts, such as language translation or image recognition, it can also be used to create vast quantities of low-quality content such as spam emails, fake reviews, and clickbait articles.
+
(Clickbait articles? Hell, yes! This part was created by a human because, despite what the “consensus” might say, AI doesn’t have a sense of attempted humor.)
+
This flood of low-quality content can make it difficult for consumers to find trustworthy information and can undermine the credibility of legitimate content creators.
+
(Human here, again. Difficult to find trustworthy information? Yes, because it is just re-gurgitating the internet!)
+
The article also highlights the potential for AI-generated content to be used in more nefarious ways, such as the creation of deepfakes or the manipulation of social media algorithms to spread disinformation.
+
The author argues that addressing the problem of AI-generated content will require a multi-faceted approach that involves both technical solutions and broader societal changes. For example, platforms could implement more robust content moderation and verification processes, while consumers could become more discerning in their online consumption habits and more willing to pay for high-quality content.
+
Overall, the article underscores the need for continued scrutiny of the impact of AI on society and for thoughtful approaches to managing its potential downsides.
This will always be an option so long as coercive government (a redundancy) has control over the network itself. The solution is, over time, to build free networks unburdened by government control. Examples are (ham) radio, LORA networks, and other forms of free and uncersorable communication. Not to mention getting off the government-approved network nore and more to build human networks of self-sovreignty.
Not to mention it is the precursor to replacing humans with robots for which tracking is a must. Be self-sovereign. Don’t work for these sorts of assholes. And if you must, figure out how you are going to escape.
According to an article published by Zero Hedge, some major tax filing services in the US have been sending users' financial information, including their social security numbers and income details, to Facebook through tracking tools on their websites.
+
The article states that tax filing services such as TurboTax, H&R Block, and TaxAct have been using tracking tools from Facebook and other third-party companies on their websites, which allow them to collect data on users' browsing behavior and interests. This data is then used to target users with personalized advertising on Facebook and other platforms.
+
The report raises concerns about the potential security and privacy implications of this practice, as sensitive financial information could be vulnerable to hacking or misuse by third parties. It also highlights the need for users to be aware of the data collection practices of the websites and apps they use, and to take steps to protect their personal information, such as using strong passwords and enabling two-factor authentication.
+
The article notes that TurboTax, H&R Block, and TaxAct have all stated that they do not sell users' personal information, and that they take measures to protect users' data. However, the use of tracking tools on their websites has raised questions about their commitment to user privacy and security.
Federated Core has a workflow allowing customers to create static-file websites, publish them to their private Gitea repository, and auto-publish to their private Caddy webserver. Front Matter supports this workflow beautifully…
Here’s a quick mental exercise: if you can’t imagine life without Google, Facebook, Apple or the other big centralized services, then you’re digital freedom is toast.
Now they’re bamboozling us to accept permission allowing them to geotrack us across all of their services. Hey kids, just don’t use Google. :kissing_closed_eyes:
It won’t happen quickly or over-night, but we must choke out Gmail and other centralized emails services (looking at your outlook.com) if we are to reclaim email as a “free” as in “freedom” service.
One of the delights of using centralized services…
+
It’s really just a matter of time before your centralized service leaks your credentials or gets hacked. The honeypot is too valuable for the hackers to ignore.
While this is a great resource for what Google is doing, the recommendations for how to defeat the beast are, in our opinion, simplistic and, on top, don’t lead to true digital self-sovereignty.
According to a thread on the MacRumors forums, some users of iCloud for Windows have reported experiencing issues with the service, including corrupted videos and downloading other people’s photos.
+
The thread includes reports from users who have experienced issues with iCloud for Windows, such as videos that are downloaded from iCloud being corrupted and unplayable, and photos that belong to other iCloud users being downloaded to their own devices. Some users have also reported that their files and folders have been deleted from iCloud without their knowledge or consent.
+
The issue appears to be affecting a small number of users, and there is no clear consensus on the cause of the problem. Some users have speculated that it may be related to a recent update to iCloud for Windows, while others suggest that it may be related to conflicts with other software or hardware on their devices.
+
Apple has not yet issued a statement regarding the issue, but some users have reported success in resolving the problem by uninstalling and reinstalling iCloud for Windows or by resetting their iCloud account. However, the reports highlight the potential risks of relying on cloud-based services for storing and sharing important files and data, and the need for users to regularly back up their data and be aware of potential security and privacy issues.
A hint: “Having spoken to multiple professionals, it now seems far more likely that my encrypted vault was breached. However, at 100,100 PBKDF2 iterations, it is not realistic to brute force this. I think this situation goes far beyond what has been admitted.”
+
That’s right, Lastpass may not have keep the data encrypted or sufficiently encrypted.
- Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. For broader topics of health, money, relationships, technology, surveillance, see our sister blog at Sovereign Reset: https://www.sovereignreset.com.
+ Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance.
diff --git a/public/blog/index.xml b/public/blog/index.xml
index 05217215..84815aac 100644
--- a/public/blog/index.xml
+++ b/public/blog/index.xml
@@ -1,9 +1,9 @@
- Federated Computer Blog on Federated Computer | A fast, responsive replacement for Google Workplace and much more
+ Sovereign Reset: the Federated Blog on Federated Computer | A fast, responsive replacement for Google Workplace and much more
https://www.federated.computer/blog/
- Recent content in Federated Computer Blog on Federated Computer | A fast, responsive replacement for Google Workplace and much more
+ Recent content in Sovereign Reset: the Federated Blog on Federated Computer | A fast, responsive replacement for Google Workplace and much moreHugo -- gohugo.ioen-usTue, 30 May 2023 00:00:00 +0000
@@ -36,6 +36,16 @@ Design Goals Federated Core was built to provide regular users who wanted privac
I have followed bitcoin for over a decade now and one of the best quotes I have seen is from Paul Buchheit, “Bitcoin may be the TCP/IP of money.” Just as TCP/IP facilitated the free flow of information and transformed how we communicate and access data globally, Bitcoin will have a similar impact on the transfer of value and the way we perceive and use money, MoIP, money over Internet protocol!
+
+ Stop Being a Bitch
+ https://www.federated.computer/blog/stop-being-a-bitch/
+ Sat, 27 May 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/stop-being-a-bitch/
+ The Condition Oh, this is different than my iProud! I can’t use that. I don’t understand how to use this…Google does it for me. I don’t care if they are watching me! Everybody likes Furries. What do I have to hide?
+We’d change, but it’s going to mean we can’t benefit from being limp cucks for Microsoft. They will tell us how we should work on our team and what we can or cannot do with our data.
+
+
Digital Sovereign Toolbox
https://www.federated.computer/blog/digital-sovereign-toolbox/
@@ -46,6 +56,16 @@ I have followed bitcoin for over a decade now and one of the best quotes I have
While we have systems running (virtual machines) for Windows and macOS testing, we run Linux on the desktop with most of us choosing to run Pop!_OS. The “tile windows” manager and integration with Federated services makes this a winner.
+
+ Federated Founders and Our Joyent History
+ https://www.federated.computer/blog/federated-founders-and-our-joyent-history/
+ Fri, 26 May 2023 20:18:07 +0600
+
+ https://www.federated.computer/blog/federated-founders-and-our-joyent-history/
+ The Origins of Federated Most of the founders of Federated Computer come from an earlier company that worked on decentralization called “Joyent”. You can read some of that story in a blog post I wrote when Joyent was sold to Samsung at this link.
+The picture above shows the first few engineers and designers who worked on Joyent, including the now tremendously successful Apple, Dallas Cowboys, and other topics blogger and podcast John Gruber in the red shirt.
+
+
The Future of Cloud Computing
https://www.federated.computer/blog/the-future-of-cloud-computing/
@@ -57,6 +77,16 @@ This all seems like old-hat today, but at the time, in the early 2000s, we were
Centralization Sucks What happened with cloud infrastructure is a story, in the technology universe, as old as time.
+
+ Dandelion Root Recipes
+ https://www.federated.computer/blog/dandelion-root-recipes/
+ Sun, 07 May 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/dandelion-root-recipes/
+ Are there ways to use the very common dandelion for good? This time of year in the northern hemisphere, yards can be filled with the yellow-flowered weed. Let’s use them for good.
+https://practicalselfreliance.com/dandelion-root-recipes/
+
+
In Praise of Thunderbird
https://www.federated.computer/blog/in-praise-of-thunderbird/
@@ -97,23 +127,2004 @@ Is it Really “Free”? But let’s get the elephant in
- Federated Founders and Our Joyent History
- https://www.federated.computer/blog/federated-founders-and-our-joyent-history/
- Sun, 06 Sep 2020 20:18:07 +0600
+ Are Google 2FA Secrets Unencrypted?
+ https://www.federated.computer/blog/google-2fa-sync-service/
+ Tue, 25 Apr 2023 00:00:00 +0000
- https://www.federated.computer/blog/federated-founders-and-our-joyent-history/
- The Origins of Federated Most of the founders of Federated Computer come from an earlier company that worked on decentralization called “Joyent”. You can read some of that story in a blog post I wrote when Joyent was sold to Samsung at this link.
-The picture above shows the first few engineers and designers who worked on Joyent, including the now tremendously successful Apple, Dallas Cowboys, and other topics blogger and podcast John Gruber in the red shirt.
+ https://www.federated.computer/blog/google-2fa-sync-service/
+ Looking at how 2FA secrets are synched The synching appears to happen without any encryption. Google sees the secrets. If there is a breach…
+Defcon Social @mysk
- Stop Being a Bitch
- https://www.federated.computer/blog/stop-being-a-bitch/
- Mon, 01 Jan 0001 00:00:00 +0000
+ FBI Watching Internet
+ https://www.federated.computer/blog/fbi-watching-internet/
+ Tue, 25 Apr 2023 00:00:00 +0000
- https://www.federated.computer/blog/stop-being-a-bitch/
- The Condition Oh, this is different than my iProud! I can’t use that. I don’t understand how to use this…Google does it for me. I don’t care if they are watching me! Everybody likes Furries. What do I have to hide?
-We’d change, but it’s going to mean we can’t benefit from being limp cucks for Microsoft. They will tell us how we should work on our team and what we can or cannot do with our data.
+ https://www.federated.computer/blog/fbi-watching-internet/
+ Is the FBI abusing access to FISA databases of private communications? The FBI can read out private communications without a warrant or judicial oversight.
+https://www.eff.org/deeplinks/2023/04/internal-documents-show-how-little-fbi-did-correct-misuse-section-702-databases
+
+
+
+ Nostr Daily Stats
+ https://www.federated.computer/blog/nostr-daily-stats/
+ Fri, 21 Apr 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/nostr-daily-stats/
+ How is the decentralized network being used? See how the “next thing” is growing/plateauing/stagnating…
+https://stats.nostr.band/
+This must be a sample since the network is truly decentralized…Right?
+
+
+
+ Digital ID from Hell
+ https://www.federated.computer/blog/who-wef-un-digital-id/
+ Wed, 19 Apr 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/who-wef-un-digital-id/
+ This ID allows our masters at the WHO, UN, and WEF to track us everywhere The World Health Organization, United Nations, and World Economic Forum have a bureaucrats wet dream for tracking plebians wherever they go.
+https://twitter.com/ANTlWEF/status/1648676505562787840?s=20
+
+
+
+ No Health Benefits for Moderate Drinking
+ https://www.federated.computer/blog/dont-drink-to-health/
+ Wed, 05 Apr 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/dont-drink-to-health/
+ Can moderate drinking ever be healthy? It doesn’t look like it is…
+https://www.japantimes.co.jp/news/2023/04/05/world/science-health-world/alcohol-health-studies/
+
+
+
+ Saying Goodbye to Github
+ https://www.federated.computer/blog/saying-goodbye-to-github/
+ Sun, 02 Apr 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/saying-goodbye-to-github/
+ But does Github care? No.
+https://ersei.net/en/blog/bye-bye-github
+It’s too bad he moves from a behemouth centralizer to an up-and-coming centralizer. Will these people never learn?
+
+
+
+ Seven Books for the Self Sovereign Individual
+ https://www.federated.computer/blog/seven-books-for-the-self-sovereign-individual/
+ Sun, 02 Apr 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/seven-books-for-the-self-sovereign-individual/
+ A great list Lots of wonderful ideas in these books…
+https://twitter.com/heyalmoo/status/1642570681194885120
+
+
+
+ Gmail is Breaking Email
+ https://www.federated.computer/blog/gmail-is-breaking-email/
+ Thu, 30 Mar 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/gmail-is-breaking-email/
+ You can’t send email to anyone on/from Gmail The Centralizer makes the rules for email, not the protocol.
+http://www.igregious.com/2023/03/gmail-is-breaking-email.html
+What can be done? Stop communicating to our fiat friends using Gmail?
+
+
+
+ Bill to Ban TikTok Terrifying
+ https://www.federated.computer/blog/bill-to-ban-tiktok/
+ Tue, 28 Mar 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/bill-to-ban-tiktok/
+ It’s really about global surveillance There’s nothing to like about this bill.
+https://twitter.com/greg_price11/status/1640722365809147905
+BTW: Twitter, Facebook, Instagram, Google suck away your metadata and give it to a government, too.
+
+
+
+ TikTok Ban is Patriot Act 2.0
+ https://www.federated.computer/blog/bill-to-ban-tiktok-patriot-act-2/
+ Tue, 28 Mar 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/bill-to-ban-tiktok-patriot-act-2/
+ Get informed. This is a global surveillance gambit.
+https://www.youtube.com/watch?v=FWQGA_n5Z4M
+It has very little to do with “China”.
+
+
+
+ Front Matter CMS
+ https://www.federated.computer/blog/front-matter-cms/
+ Mon, 27 Mar 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/front-matter-cms/
+ A CMS that works with Federated Core Federated Core has a workflow allowing customers to create static-file websites, publish them to their private Gitea repository, and auto-publish to their private Caddy webserver. Front Matter supports this workflow beautifully…
+https://frontmatter.codes/
+It runs inside of Visual Studio Code among other tools allowing you to preview and create great content using Federated Core.
+
+
+
+ KYC Not Me
+ https://www.federated.computer/blog/kyc-not-me/
+ Tue, 21 Mar 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/kyc-not-me/
+ KYC Scores KYC stands for “know your customer” which is another way of saying “surveillance” by the service and/or government interests. The KYCnot dot me website lists lots of websites, many for Bitcoin, and their relative scores for KYC.
+https://kycnot.me/
+There are also listings for VPNs, domains and hosting, phone numbers, and other various services and tools.
+
+
+
+ FedNow Payment System Launching
+ https://www.federated.computer/blog/fednow-payment-system-launching/
+ Wed, 15 Mar 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/fednow-payment-system-launching/
+ Federal Reserve Payments System Moves to the Launchpad Why does the federal government, or any government, need a “payment system” unless the currency itself is property of same?
+https://www.cnbc.com/2023/03/15/long-awaited-fed-digital-payment-system-to-launch-in-july.html
+
+
+
+ Proton Mail Review 2023
+ https://www.federated.computer/blog/proton-mail-review/
+ Tue, 14 Mar 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/proton-mail-review/
+ The Good and the Bad How’s Proton Mail hanging when it comes to being “the most secure email” on the planet?
+https://restoreprivacy.com/email/reviews/protonmail/
+If the service is centralized, it is not secure from governments. End-to-end encryption sounds neat, but once you interact with an email counterparty not using encryption, the game is up. Requires third-party software to work with email clients/standards.
+
+
+
+ Google Drive File Limits
+ https://www.federated.computer/blog/google-drive-file-limits/
+ Sun, 05 Mar 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/google-drive-file-limits/
+ You can’t really use Google Drive any way you want Oh, nevermind. Google reversed themselves after the backlash. The idea was to put a hard limit on the number of files allowed on the service.
+https://arstechnica.com/gadgets/2023/03/google-drive-does-a-surprise-rollout-of-file-limits-locking-out-some-users/
+
+
+
+ Central Bank Digital Currency Amouse Bouche
+ https://www.federated.computer/blog/central-bank-digital-currency-video/
+ Wed, 01 Mar 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/central-bank-digital-currency-video/
+ Fat Man Tells Truth Hey! Let’s digitize all cash to something controlled by the guv’mint so that they can see who is doing what.
+https://twitter.com/ZLOK/status/1639898907529314304?s=20
+A person has to be insane, no, an idiot, to want to get on board with this idea.
+
+
+
+ Let's Build to Steal Everything
+ https://www.federated.computer/blog/lets-build-a-chrome-extension-that-steals-everything/
+ Thu, 23 Feb 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/lets-build-a-chrome-extension-that-steals-everything/
+ Building a Chrome extension to steal everything The wonders of Chrome extensions on all the data they can pilfer…
+https://mattfrisbie.substack.com/p/spy-chrome-extension
+…would this be possible on the “safe” browsers like Brave and Vivaldi? Firefox?
+
+
+
+ Tools to Combat Surveillance
+ https://www.federated.computer/blog/tools-to-combat-surveillance/
+ Tue, 21 Feb 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/tools-to-combat-surveillance/
+ You need some tools to protect yourself What are you doing to protect yourself from pervasive surveillance today?
+https://www.youtube.com/watch?v=s-ny-I8EVH8
+
+
+
+ Building an ARM64 Home Server
+ https://www.federated.computer/blog/building-arm64-server-hard-way/
+ Sun, 19 Feb 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/building-arm64-server-hard-way/
+ This is the hard way Honestly, we don’t recommend this for anyone. But it does give a sense of the power and flexibility available to those wanting to self-host at home. My own self-hosted home server is similar.
+https://jforberg.se/blog/posts/2023-02-19-rockpro64/rockpro64.html
+By the way, there are so many great servers for sale on eBay with 16G ram, Xeon processors, etc. that work very well as a home server without the fragility and for roughly the same initial price.
+
+
+
+ Self Hosting in 2023
+ https://www.federated.computer/blog/self-hosting-in-2023/
+ Sat, 18 Feb 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/self-hosting-in-2023/
+ How to Self Host Your Webpage The long self-hosting journey starts with a first step…
+https://grifel.dev/decentralization/
+…then you discover, to be honest, that’s really how the internet works. A server, a web page. In between are your optimizations.
+
+
+
+ Wading into Nostr
+ https://www.federated.computer/blog/wading-into-nostr/
+ Mon, 13 Feb 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/wading-into-nostr/
+ Some intial descriptions of experience with Nostr One person’s explorations of Nostr (“notes and other stuff using relays”)
+https://stacker.news/items/135975
+We will be writing in-depth about how Federated uses this technlogy.
+
+
+
+ Delete Yourself From The Internet
+ https://www.federated.computer/blog/how-to-delete-yourself-internet/
+ Fri, 10 Feb 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/how-to-delete-yourself-internet/
+ Some advice for deleting your data trail from the internet The get us when we create data, and when we want to delete it…
+https://www.cnbc.com/2023/02/10/how-to-delete-yourself-from-the-internet.html
+
+
+
+ Lastpass Breach Gets Worse
+ https://www.federated.computer/blog/lastpass-breach-gets-worse/
+ Sat, 04 Feb 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/lastpass-breach-gets-worse/
+ The Lastpass breach just gets worse and worse A wonderful post-mortem of the recent Lastpass data breach.
+https://old.reddit.com/r/sysadmin/comments/10kp4ye/lastpass_breach_gets_worse/
+Solution? Get off centralized password managers. Not your keys, not your passwords.
+
+
+
+ Top 10 Privacy Podcasts
+ https://www.federated.computer/blog/top-ten-privacy-podcasts/
+ Thu, 02 Feb 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/top-ten-privacy-podcasts/
+ A list of the top ten privacy podcasts Listen to these podcasts for some great insights on privacy.
+https://privacyplan.net/top-10-privacy-podcasts/
+We all need ways to learn. Listen up!
+
+
+
+ Is Apple Checking Images? Rebuttal.
+ https://www.federated.computer/blog/apple-checking-images-rebuttal/
+ Wed, 18 Jan 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/apple-checking-images-rebuttal/
+ Is Apple checking images we view in the Finder? Little Snitch claims browsing an image sends a message from “mediaanalysisd” to an Apple server.
+https://eclecticlight.co/2023/01/18/is-apple-checking-images-we-view-in-the-finder/
+But it doesn’t appear this is actually happening. But let’s keep investigating.
+
+
+
+ Apple Checking Images? Evidence
+ https://www.federated.computer/blog/apple-checking-images-evidence/
+ Sun, 15 Jan 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/apple-checking-images-evidence/
+ Is Apple checking images we view in the Finder? The evidence for the case that Apple is checking images browsed in the Finder and sending metadata to a remote server.
+https://sneak.berlin/20230115/macos-scans-your-local-files-now/
+We have another post with a rebuttal.
+
+
+
+ Old Phone No Good
+ https://www.federated.computer/blog/old-phone-no-good/
+ Wed, 04 Jan 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/old-phone-no-good/
+ Your old phone is no longer supported We get it, at some point, your Nokia from 2012 just isn’t going to work anymore…
+https://www.youtube.com/watch?v=UxaCUugPoRY
+But should the error be to lock users out of data?
+
+
+
+ What If Web Loses?
+ https://www.federated.computer/blog/what-happens-web-loses/
+ Wed, 04 Jan 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/what-happens-web-loses/
+ What if everything becomes an app on somebody else’s platform? What happens when the only whay we can work or manipulate data is through “proprietary” apps, not the web?
+https://chriscoyier.net/2023/01/04/what-does-it-look-like-for-the-web-to-lose/
+Lock in, much? Lock in = surveillance, boys and girls.
+
+
+
+ Everybody is Under Surveillance
+ https://www.federated.computer/blog/marshall-mcluhan-surveillance-riff/
+ Mon, 02 Jan 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/marshall-mcluhan-surveillance-riff/
+ Media prophet Marshall McLuhan discusses CIA and FBI surveillance His conclusion we are all, are will be, under surveillance.
+https://twitter.com/bfcarlson/status/1609988081825751041?t=fY1f4HYgh45QSYXP4irXWw&s=19
+“One of the main occupations of mankind.”
+
+
+
+ Privacy is OK
+ https://www.federated.computer/blog/privacy-is-ok/
+ Thu, 29 Dec 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/privacy-is-ok/
+ Tim Bray wants to defend Signal This is really about whether “bad guys” can use Signal. Tim, rightly, says “who cares”. We all need privacy.
+https://www.tbray.org/ongoing/When/202x/2022/12/29/Privacy-is-OK
+But then Tim admits Signal can and does hand over conversations to those with subpoena powers:
+ in the course of the law-enforcement investigation of the January 6th insurrection, police got access to the traitors’ Signal conversations
+ Hmmm. OK. We don’t want to wade into “traitors”.
+
+
+
+ Give Away Bitcoin on a Hotel Door Key
+ https://www.federated.computer/blog/create-your-own-bitcoin-giveaway-card/
+ Wed, 28 Dec 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/create-your-own-bitcoin-giveaway-card/
+ Let’s just say your traditional bank would frown on such behavior Bitcoin is also a technology teeming with new ideas, new innovations.
+https://twitter.com/3d_nout/status/1608245114052247552
+I’m sure your bank wouldn’t allow you to do this with your fiat account. I bet the “bad guys” could use this! :laughing:
+
+
+
+ LastPass Security Incident
+ https://www.federated.computer/blog/lastpass-security-incident/
+ Thu, 22 Dec 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/lastpass-security-incident/
+ LastPass Gets Hacked LastPass, where so many store their sensitive passwords, has a security incident.
+https://blog.lastpass.com/2022/12/notice-of-recent-security-incident/
+An “unauthorized party” got access to the third-party storage where LastPass stores backups. When you’re dealing with cloud services, there is tremendous “counterparty” risk, as they would say in the fiat financial markets. If you’re using a cloud service, that service can swear all day that they are secure…but security is a combination of all the links, including the weak ones.
+
+
+
+ Social Credit Score to Access Internet
+ https://www.federated.computer/blog/social-credit-score-to-access-internet/
+ Thu, 22 Dec 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/social-credit-score-to-access-internet/
+ Not enacted, but recommended under Australian goverment plan This idea was not enacted. But it was thoughtfully considered and proposed by the sitting government of Australia.
+https://twitter.com/BernieSpofforth/status/1602042530845057027
+If “the internet” is the fief of government, why can’t they shut it off for a reason like a bad social credit score? Let’s take away the fief. And defeat the idea of social credit scores.
+
+
+
+ 2022 Year of Desktop Linux
+ https://www.federated.computer/blog/2022-year-of-desktop-linux/
+ Tue, 20 Dec 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/2022-year-of-desktop-linux/
+ Thanks to some Stack Overflow surveys, desktop Linux has arrived for developers According to a developer survey, Linux holds a 9% lead over macOS.
+Year of the Linux Desktop
+It’s getting better and better meaning there is less and less an excuse to support the centralizer operating systems.
+
+
+
+ Time and Attention as Currency
+ https://www.federated.computer/blog/time-and-attention-as-currency/
+ Mon, 19 Dec 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/time-and-attention-as-currency/
+ How the attention economy is ruining us We need to return back to pseudonimity and anonymity as the basis for the marketplace EXCEPT when an actual trade of value for value is agreed by all parties.
+https://twitter.com/dergigi/status/1604785991608172544?s=20&t=ZOA98-7Et7TPpZYI8AHACg
+This is fundamentally impossible without “hard money” and its side-kick “hard digital decentralization”.
+
+
+
+ Gmail Encrypted
+ https://www.federated.computer/blog/gmail-encrypted/
+ Sat, 17 Dec 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/gmail-encrypted/
+ End-to-end encryption for Gmail on the web Metadata still not encrypted.
+https://www.bleepingcomputer.com/news/security/google-introduces-end-to-end-encryption-for-gmail-on-the-web/
+Band-aid on a gaping chest wound. Zzzzz.
+
+
+
+ Google Maps Monopoly
+ https://www.federated.computer/blog/breaking-google-maps-monopoly/
+ Fri, 16 Dec 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/breaking-google-maps-monopoly/
+ Linux, Amazon, Meta, and Microsoft want to break the Google Maps monopoly There’s some bad centralizers in this alliance. And Google Maps is a really nice product! But we need it broken up.
+https://arstechnica.com/gadgets/2022/12/linux-amazon-meta-and-microsoft-want-to-break-the-google-maps-monopoly/
+P.S. There is no “Linux” in the way they use the term. :blush:
+
+
+
+ Symptoms of Fiat Poisoning
+ https://www.federated.computer/blog/symptoms-of-fiat-poisoning/
+ Fri, 16 Dec 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/symptoms-of-fiat-poisoning/
+ Signs you’ve been fiat poisoned Most folks think of bitcoin as the anecdote of fiat.
+https://stacker.news/items/108177
+We think of living a complete self-sovereign lifestyle as the comprehensive anecdote to fiat/arbitrary culture and the poisoning that comes with it.
+
+
+
+ Drowning in AI Garbage
+ https://www.federated.computer/blog/drowning-in-ai-garbage/
+ Mon, 05 Dec 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/drowning-in-ai-garbage/
+ Drowning in AI Generated Garbage It’s a contrarian opinion to opine that AI is anything but garbage (i.e. something written by a 5th grader doing a report). Look, we use ChatGPT to generate the summaries for these link list posts, because we are lazy, and we want to spend more time PC gaming. We’re old school that way. But most of the summaries require a significant amount of re-writing…so how lazy are we after all?
+
+
+
+ Rediscovery of Money
+ https://www.federated.computer/blog/rediscovery-of-money/
+ Fri, 02 Dec 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/rediscovery-of-money/
+ Bitcoin is the Rediscovery of Money In this article, the idea of “money” is defined as the “removal of counterparty risk”. If we think about that, it is a pretty good definition in the context of some “value” to be exchanged between parties with the understanding of the “value” in relation to the parties themselves. That is the risk, removed.
+https://dergigi.com/2022/12/02/bitcoin-is-the-rediscovery-of-money/
+The risk associated with bitcoin today, in as much as we can talk about risk on a time horizon, is one of volatility.
+
+
+
+ The Casino Chip Society
+ https://www.federated.computer/blog/the-casino-chip-society/
+ Wed, 30 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/the-casino-chip-society/
+ One-Type-Of-Money-Illusion This article helps us understand how cash and value works today in our fiat money society. Huh?
+https://brettscott.substack.com/p/casino-chip-cashless-society
+The same principles of data-sovereignty apply to money-sovereignty.
+
+
+
+ Telegram Discloses Names After Ruling
+ https://www.federated.computer/blog/delhi-rules-telegram-discloses/
+ Tue, 29 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/delhi-rules-telegram-discloses/
+ You think your Telegram Data is Secure? If the thing you’re using is centralized, it is so much easier for the “authorities” to compel disclosure of data. Case in point is Telegram who was recently forced to disclose names, phone numbers, and IP address accused of sharing material thought to infringe copyright.
+https://www.livelaw.in/news-updates/after-court-order-telegram-discloses-phone-numbers-ip-addresses-of-users-accused-of-sharing-infringing-material-215311
+The court order was issued by the Delhi High Court in India and required Telegram to disclose the information to the plaintiffs who had filed a copyright infringement case against the users.
+
+
+
+ Checklist for Digital Privacy and Security
+ https://www.federated.computer/blog/checklist-digital-privacy-security/
+ Mon, 28 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/checklist-digital-privacy-security/
+ hWork through them as you get the time…eadline Some of the recommendations are centralizers…but we like the effort and attention to the subject!
+https://twitter.com/_k3tan/status/1597327334004371462?t=_G4DaTq7_p30VkmonGcgSg&s=19
+
+
+
+ Everything About Passphrases
+ https://www.federated.computer/blog/everything-you-need-passphrases/
+ Fri, 25 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/everything-you-need-passphrases/
+ Some best practice for passphrases, private keys, and saving them all in a digital wallet Not your keys, not your _______________. But how do we protect our keys, our passphrases? What are some best practices to consider?
+https://blog.coinkite.com/everything-you-need-to-know-about-passphrases/
+If you’re not incorporating many of these practices into your digital self-sovereign life, then how self-sovereign can you really be?
+
+
+
+ 21 Rules of Bitcoin Maxi
+ https://www.federated.computer/blog/21-rules-of-bitcoin-maxi/
+ Wed, 23 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/21-rules-of-bitcoin-maxi/
+ What can self-sovereign individuals learn from Bitcoin maxis? We love Bitcoin maxis because they give the self-sovereign individual
+21 Rules of a Bitcoin Maxi
+Let’s see how these some of these rules can be applied to the self-sovereign individual even if, horror, they have no interest in Bitcoin.
+ Not your keys. This is the principal of decentralization. We don’t use centralized services where are data is not our own. Stack sats.
+
+
+
+ Privacy Tools for the Information Age
+ https://www.federated.computer/blog/privacy-tools-for-information-age/
+ Wed, 23 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/privacy-tools-for-information-age/
+ Some resources for increasing and protecting your privacy online. A good list of tools and methods you can use to increase and protect your privacy online during this time of all-time-low privacy and self-sovreignty.
+https://secondl1ght.site/blog/privacy-tools
+Many of these tools deserves further exploration and explanation. Some are centralized solutions (and so not our preference).
+
+
+
+ Sneaky Move, Google
+ https://www.federated.computer/blog/google-being-sneaky-maps-permissions/
+ Wed, 23 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/google-being-sneaky-maps-permissions/
+ Allowing a change to maps permissions, opens up your world to Google Maps was and is a ground-breaking service offering from Google.
+https://garrit.xyz/posts/2022-11-24-smart-move-google
+Now they’re bamboozling us to accept permission allowing them to geotrack us across all of their services. Hey kids, just don’t use Google. :kissing_closed_eyes:
+
+
+
+ All Eyes Are On Us.
+ https://www.federated.computer/blog/all-eyes-are-on-us/
+ Tue, 22 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/all-eyes-are-on-us/
+ 5 Eyes, 9 Eyes, 14 Eyes: Protect Yourself From Global Surveillance The fact of our lives today is constant global surveillance. By governments. By corporations.
+https://vpnoverview.com/privacy/anonymous-browsing/5-9-14-eyes/
+You may be shocked to the extent your government spies on you. In a “democracy”. For your “safety”.
+
+
+
+ Counting Unique Visitors Ethically
+ https://www.federated.computer/blog/unique-visitors-without-cookies/
+ Tue, 22 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/unique-visitors-without-cookies/
+ How to count visitors without using cookies A self-sovereign lifestyle means doing to others what you would want doen to yourself, including how you track your website visitors.
+https://notes.normally.com/cookieless-unique-visitor-counts/
+This article shows you how to build website analytics without storing information that can reveal a visitor’s identity. If you don’t want it done to you, don’t do it to others. Simple. And the solution is brilliant.
+
+
+
+ France Says "Non" to Office 365 and Google Workplace
+ https://www.federated.computer/blog/france-says-non/
+ Tue, 22 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/france-says-non/
+ Office 365 and Workplace Shouldn’t be used in classrooms While the free versions of Office 365 and Workplace may be attractive, they vacuum up so much data on students they constitute a form of theft.
+https://www.theregister.com/2022/11/22/france_no_windows_google/
+Free services come with the “bargain” that the provider gets all your information. What a deal! The French say “no”.
+
+
+
+ Bitcoin Lightning Publisher for WordPress
+ https://www.federated.computer/blog/bitcoin-plugin-wordpress/
+ Mon, 21 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/bitcoin-plugin-wordpress/
+ Review of a plugin for WordPress allowing receipt of Bitcoin payments A description of a plugin for Wordpress enabling Bitcoin payments using the Lightning network.
+https://wordpress.org/plugins/bitcoin-lightning-publisher/
+Able to use a number of different Lightning backends.
+
+
+
+ Back to Open Standards
+ https://www.federated.computer/blog/swinging-back-to-open-standards/
+ Thu, 17 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/swinging-back-to-open-standards/
+ Using open standards is the only way to defeat the centralizers A survey of how the more things change, the more they swing back to standards…
+https://puri.sm/posts/swinging-back-to-open-standards/
+PS. really dislike the font (mini-t) of this website. :stuck_out_tongue_closed_eyes:
+
+
+
+ Indian ISPs Give Government Full Access
+ https://www.federated.computer/blog/indian-isps-give-givernment-full-access/
+ Thu, 10 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/indian-isps-give-givernment-full-access/
+ They know when you’ve been naughty, they know when you’re awake… Well, at least, I suppose, they’re being honest about it.
+https://entrackr.com/2022/11/exclusive-indian-isps-we-already-give-govt-full-access-to-web-traffic/
+Or, more likely, just brazen. “What are you going to do about it?”
+
+
+
+ Thunderbird Supernova Preview
+ https://www.federated.computer/blog/thunderbird-supernova-preview/
+ Wed, 09 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/thunderbird-supernova-preview/
+ New calendar design Thunderbird is getting better and better. Among many of the FOSS reasons to use Thunderbird, it’s possible to set up Thunrderbird so that your settings move from machine to machine. Nice! But the integrated calendar was always sub-par. Looks like a future update named “Supernova” will fix that.
+https://blog.thunderbird.net/2022/11/thunderbird-supernova-preview-the-new-calendar-design/
+Check out the Federated Computer documentation for other types re: Thunderbird.
+
+
+
+ Apple Tracks You
+ https://www.federated.computer/blog/apple-tracks-you-in-ios/
+ Tue, 08 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/apple-tracks-you-in-ios/
+ Even when its own privacy setting say ‘no’ tracking… Independent tests suggests Apple is tracking you on iOS even when you’ve disabled sharing “Device Analytics” altogether.
+Apple Tracks You
+It’s Apple. They know best.
+
+
+
+ Building a Self-sovereign Lifestyle
+ https://www.federated.computer/blog/building-a-self-sovereign-lifestyle/
+ Mon, 07 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/building-a-self-sovereign-lifestyle/
+ The permaculture mentality homsteaders have is congruent with Bitcoin low-time-preference mentality What is true, even if you’re not going to homestead, is you need to adopt a homesteading mentality…
+https://bitcoinmagazine.com/culture/building-homesteader-lifestyle-with-bitcoin
+The mentality of a homesteader is one that examines all areas of life to figure out how one can move from centralization to decentralization.
+
+
+
+ Tyranny Looms Via Digital IDs and Currencies
+ https://www.federated.computer/blog/tyranny-looms-digital-ids-cbdc/
+ Sat, 05 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/tyranny-looms-digital-ids-cbdc/
+ Digital IDs and Currencies are means of control Does anyone besides the ruling classes really think digitizing IDs and currencies are anything but a means to control people?
+https://www.lifesitenews.com/blogs/tyranny-looms-as-digital-ids-and-currencies-roll-out-around-the-world/
+
+
+
+ Apple Tracks You in the App Store
+ https://www.federated.computer/blog/apple-tracking-you-in-app-store/
+ Thu, 03 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/apple-tracking-you-in-app-store/
+ As you browse and tap, Apple is watching “Ahem, we are building a better customer experience…”
+https://twitter.com/mysk_co/status/1588308341780262912
+…for us, Apple.
+
+
+
+ Self Hosting Guide
+ https://www.federated.computer/blog/self-hosting-guide/
+ Tue, 25 Oct 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/self-hosting-guide/
+ A guide for getting started with self hosting A nice guide for all the various services, hardware, clouds, etc available for the person wanting to self-host.
+https://github.com/mikeroyal/Self-Hosting-Guide
+Self-hosting offers freedom and responsibility. There are a number of projects out there that help with the process.
+
+
+
+ Privacy dot com -- Yeah Right
+ https://www.federated.computer/blog/privacy-com-scam/
+ Sat, 22 Oct 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/privacy-com-scam/
+ Why privacy dot com is anything but… If you’re using privacy.com to achieve some “privacy”, you need to read this…
+https://ersei.net/en/blog/privacy-dot-com-yeah-right
+Basically, the thesis of privacy.com is we want to take your (surveilled) credit card transactions and surveil them even more. Suckers!
+
+
+
+ Invisv
+ https://www.federated.computer/blog/invisv/
+ Fri, 21 Oct 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/invisv/
+ Let’s reinvent the wheel Congrats to Invisv for understanding the problem.
+https://invisv.com/
+We have questions, however. Is Invisv centralized? Are all these privacy break-throughs inter-operable with any other open standards, protocols?
+
+
+
+ Katzenpost
+ https://www.federated.computer/blog/katzenpost/
+ Fri, 21 Oct 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/katzenpost/
+ A service to resist on-line surveillance From the post, why end-to-end encryption is not enough: “End-to-end encryption has become more commonplace with major online messaging and communication tools, but encoding what you say to your friends online does not mean that the service provider cannot see who you contacted, when, from where. This metadata might be even more important than the content of an online conversation.”
+https://nlnet.nl/project/katzenpost/
+You have to think about the metadata in the same way we think about how services like Facebook develop “graphs” of us for the purposes of advertising and scores.
+
+
+
+ Basecamp is Leaving the Cloud
+ https://www.federated.computer/blog/basecamp-is-leaving-the-cloud/
+ Wed, 19 Oct 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/basecamp-is-leaving-the-cloud/
+ An explanation Basecamp’s David Heinemeier Hansson explains the departure from the cloud.
+https://world.hey.com/dhh/why-we-re-leaving-the-cloud-654b47e0
+We don’t agree with all the conclusions. Nevertheless, bon voyage! (Oh, side note, notice he mentions “analyze and store” with re: the Hey email service. Centralizer.)
+
+
+
+ iOS 16 Leaks Connections
+ https://www.federated.computer/blog/ios-16-leaks-connections/
+ Tue, 11 Oct 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/ios-16-leaks-connections/
+ But Apple is Muh Secure! Researches discovered iOS 16 communicates with Apple services outide an active VPN tunnel. Huh?
+https://twitter.com/mysk_co/status/1579997801047822336
+They used ProtonVPN and Wireshark for the testing. What’s the solution? Different mobile OS.
+
+
+
+ Apple's Ad Business Booming
+ https://www.federated.computer/blog/apple-ad-business/
+ Mon, 03 Oct 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/apple-ad-business/
+ How do we square a digital, tracking ad business with privacy? It’s hard to see how a company running a $5 billion, and growing, digital (ie. tracking) ad business can be real about protecting privacy.
+https://adguard.com/en/blog/apple-tracking-ads-business.html
+Tim Cook famously said: “You are not our product. You are our customer. You are a jewel, and we care about the user experience.” (2018) But does this line up with Apple’s recent hard charge into the digital advertising business?
+
+
+
+ Whatsapp and Signal Messages Intercepted by Government
+ https://www.federated.computer/blog/whatsapp-messages-intercepted-by-government/
+ Sun, 02 Oct 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/whatsapp-messages-intercepted-by-government/
+ Australian government will be able to intercept WhatsApp and Signal messages If you thought your encypted WhatsApp and Signal messages were secure from surveillance, think again…
+https://www.smh.com.au/politics/federal/national-anti-corruption-commission-will-be-able-to-intercept-whatsapp-messages-a-g-20221002-p5bmis.html
+There’s a simple principle. If it is centralized, it is not secure. It’s the fiat of services. Another note: it’s always “anti corruption” or “anti waste”. Both are just gas-lighting for “anti freedom”.
+
+
+
+ Stop Google Collecting Your Data
+ https://www.federated.computer/blog/how-to-stop-google-collecting/
+ Thu, 29 Sep 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/how-to-stop-google-collecting/
+ Here are the steps you need to take now And overview of how Google collects data and censors…
+https://www.lifesitenews.com/opinion/heres-how-to-stop-google-from-collecting-huge-amounts-of-your-data/
+While this is a great resource for what Google is doing, the recommendations for how to defeat the beast are, in our opinion, simplistic and, on top, don’t lead to true digital self-sovereignty.
+
+
+
+ Get Off Gmail
+ https://www.federated.computer/blog/get-off-gmail/
+ Wed, 28 Sep 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/get-off-gmail/
+ Get off the big tech email providers Here’s a quick mental exercise: if you can’t imagine life without Google, Facebook, Apple or the other big centralized services, then you’re digital freedom is toast.
+https://www.lifesitenews.com/blogs/the-simple-reason-why-you-should-stop-using-gmail/
+Don’t make convenience the master of your freedom.
+
+
+
+ Cryptography Is Not Enough
+ https://www.federated.computer/blog/cryptography-is-not-enough/
+ Thu, 22 Sep 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/cryptography-is-not-enough/
+ Going Beyond Cryptogrpahy This wide-ranging discussion proposes a lifestyle.
+https://dergigi.com/2022/09/10/cryptography-is-not-enough/
+According to the article published by Dergigi, cryptography alone is not sufficient to provide complete security for digital systems and data. While cryptography is an essential tool for protecting data against unauthorized access and tampering, it cannot address all of the security challenges that digital systems face.
+The article notes that cryptography is vulnerable to various attacks, including brute force attacks, side-channel attacks, and quantum attacks, which could potentially compromise the security of encrypted data.
+
+
+
+ Meta Injecting Code to Track
+ https://www.federated.computer/blog/meta-injecting-code-into-websites/
+ Wed, 21 Sep 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/meta-injecting-code-into-websites/
+ Meta and Instagram Rewrite Websites to Track Us This happens when you click on websites in Facebook and Instagram. You’re taken to the link in an in-app browser. Then the hilarity begins.
+https://www.theguardian.com/technology/2022/aug/11/meta-injecting-code-into-websites-visited-by-its-users-to-track-them-research-says
+Solution. Don’t use Facebook, Instagram, all the other Meta shit. Addicted? OK, then stop complaining. You’re hooked up to the Zuckerborg and your actions harvested for profit.
+
+
+
+ US Military Mass Monitors Internet Browsing, Email, Everything
+ https://www.federated.computer/blog/us-military-surveillance-on-internet/
+ Wed, 21 Sep 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/us-military-surveillance-on-internet/
+ There’s nothing else to capture except the smell of electricity. The “Augury” platform includes highly sensitive network data that Team Cymru, a private company, is selling to the military. “It’s everything. There’s nothing else to capture except the smell of electricity,” one cybersecurity expert said.
+https://www.vice.com/en/article/y3pnkw/us-military-bought-mass-monitoring-augury-team-cymru-browsing-email-data
+They violate our privacy for our safety. Is that a good bargain?
+
+
+
+ Fighting Spam
+ https://www.federated.computer/blog/fighting-spam/
+ Sun, 18 Sep 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/fighting-spam/
+ Some practical tips for fighting spam Spam is everywhere. Here are some thoughts about how to fight it.
+https://darthcoin.substack.com/p/avoid-being-spammed
+You’ll want to use an email client like Thunderbird or Mutt to follow the “no images” rule.
+
+
+
+ Choosing the Right BTC/LN Wallet
+ https://www.federated.computer/blog/choose-btc-wallet/
+ Fri, 16 Sep 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/choose-btc-wallet/
+ Some advice for choosing the right Bitcoin and LIghtning Wallet Just like a password manager, choosing the right wallet for bitcoin can be stressful.
+https://stacker.news/items/70725
+As they say: “Think like a bank, not just be a bank.”
+
+
+
+ iPhone = Privacy?
+ https://www.federated.computer/blog/iphone-equals-privacy-question/
+ Thu, 08 Sep 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/iphone-equals-privacy-question/
+ Does using an iPhone mean you have the best privacy solution? Most believe the iPhone is a bastion of privacy. Tim Cook said so…
+https://kerkour.com/iphone-privacy
+Apple has marketed their devices as saving the world from a big brother dystopia. But, like so much gas-lighting these days, it is the savior playing the role of big brother.
+
+
+
+ Replying to Carlos F. "Thrown in the Towel"
+ https://www.federated.computer/blog/reply-to-thrown-in-the-towel/
+ Mon, 05 Sep 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/reply-to-thrown-in-the-towel/
+ Self-hosted Email is the Hardest, but also the Easiest Here’s one response to the post by Carlos F. throwing in the towel for self-hosted email.
+https://vadosware.io/post/its-never-been-easier-or-harder-to-self-host-email/
+Hosting your own email is hard, but not impossible. The technical aspects are easy. Getting your email to someone with an outlook.com address are practical impossible. But maybe you should just pick up the phone and tell that person Microsoft (for example) doesn’t want them to get email from anyone except those who Microsoft says are “good”.
+
+
+
+ How to be a Profitable Lightning Node
+ https://www.federated.computer/blog/how-to-be-a-profitable-lnd-node/
+ Sun, 04 Sep 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/how-to-be-a-profitable-lnd-node/
+ Some tips for how to run a Lightning Node profitably… We think Lightning, in time, will be more for information distribution, and less about Bitcoin payments settlement.
+https://stacker.news/items/66368
+In the meantime, as you begin your Lightning journey…
+
+
+
+ Thrown in the Towel Self-hosting Email
+ https://www.federated.computer/blog/thrown-in-the-towel-email-hosting/
+ Sun, 04 Sep 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/thrown-in-the-towel-email-hosting/
+ The challenges faced by those seeking to self-host email Is it true self-hosting email is a lost cause? Carlos F. seems to think so.
+https://cfenollosa.com/blog/after-self-hosting-my-email-for-twenty-three-years-i-have-thrown-in-the-towel-the-oligopoly-has-won.html
+The purpose of this post isn’t to be an apologia for self-hosting email. Rather, it is to highlight the oligarchic behaviors that exist on certain protocols (smtp, etc) and to say that we encourage this behavior when we give up and move to more niche protocols (eg nostr?
+
+
+
+ Apple Refuses to Cooperate
+ https://www.federated.computer/blog/apple-refuses-to-cooperate/
+ Fri, 02 Sep 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/apple-refuses-to-cooperate/
+ The US Government Seeks Information About App Store Behaviors Apple’s behavior with re: its App Store is notorious…
+http://www.fosspatents.com/2022/09/apple-refuses-to-cooperate-with-us.html
+“Apple taxes, tyrannizes, and “sherlocks” app developers. App developers are victims of Apple’s conduct, and ACT | The App Association–which is actually just an Apple Association–unethically claims to represent the interests of small developers.”
+
+
+
+ How Lightning Address Works
+ https://www.federated.computer/blog/how-a-lightning-address-works/
+ Fri, 02 Sep 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/how-a-lightning-address-works/
+ Lightning invoice basics A nice, brief explainer on how lightning addresses work.
+https://stacker.news/items/65872
+Lightning is the off-chain bitcoin, etc payments clearing technology.
+
+
+
+ Data Broker Rats You Out!
+ https://www.federated.computer/blog/data-broker-helps-police-see-everywhere-youve-been/
+ Thu, 01 Sep 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/data-broker-helps-police-see-everywhere-youve-been/
+ Your data is given to police so that they can see everywhere you’ve been with the click of a mouse. Hey, you’re in the privacy of your home, what could go wrong?
+https://www.eff.org/de/press/releases/data-broker-helps-police-see-everywhere-youve-been-click-mouse-eff-investigation
+Answer: everything. Start taking back your privacy!
+
+
+
+ Rights, Laws, and Google
+ https://www.federated.computer/blog/rights-laws-google/
+ Mon, 29 Aug 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/rights-laws-google/
+ What happens when everything everywhere is scanned A very cautionary tale.
+https://stratechery.com/2022/rights-laws-and-google/
+In fact, we privacy advocates don’t have to answer: “a question worth posing to anyone unilaterally opposed to Google’s approach is how big that number would have to be to have made it worthwhile”. One case of child sex exploitation is horrible. However, the issue at root here is really a queasiness with “free will”. The desire is to use “tech” to keep of clear of the bad outcomes from the exercise of human “free will”.
+
+
+
+ Embracing the Kill Switch
+ https://www.federated.computer/blog/embracing-the-kill-switch/
+ Sun, 28 Aug 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/embracing-the-kill-switch/
+ Governments Embrace Internet Shutdowns as a Form of Control Well, one way to deal with it, if you can’t control it, is to kill it.
+https://www.theguardian.com/technology/2022/aug/29/flicking-the-kill-switch-governments-embrace-internet-shutdowns-as-a-form-of-control
+This will always be an option so long as coercive government (a redundancy) has control over the network itself. The solution is, over time, to build free networks unburdened by government control. Examples are (ham) radio, LORA networks, and other forms of free and uncersorable communication.
+
+
+
+ Employers Are Doing 'Shocking Things' to Monitor Your Productivity
+ https://www.federated.computer/blog/employers-surveill-employees/
+ Fri, 26 Aug 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/employers-surveill-employees/
+ Treating employees like robots is the ‘new normal’ If I can track your every movement while you “work for me”, that sounds more like slavery, than an exchange of goods.
+https://nypost.com/2022/08/26/its-everywhere-workplace-surveillance-methods-now-common/
+Not to mention it is the precursor to replacing humans with robots for which tracking is a must. Be self-sovereign. Don’t work for these sorts of assholes. And if you must, figure out how you are going to escape.
+
+
+
+ TMobile Starlink Link
+ https://www.federated.computer/blog/tmobile-starlink-link/
+ Thu, 25 Aug 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/tmobile-starlink-link/
+ Starlink will offer global connection to TMobile phones Starlink will provide a means for Tmobile handsets to communicate (SMS, Voice) anywhere on the globe Starlink provides coverage using 3G-equivalent bandwidth.
+https://archive.ph/LGnFS
+As if we weren’t tracked enough. :weary:
+
+
+
+ Email Doesn't Suck. It's Email Clients
+ https://www.federated.computer/blog/email-clients-are-bad/
+ Wed, 24 Aug 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/email-clients-are-bad/
+ Email clients need improving. Some thoughts. A shift to web-base email has meant a degradation in the quality of “fat” email clients.
+https://www.wired.com/story/email-clients-are-bad-so-use-vivaldi-mail/
+The author uses Mutt and Vivaldi mail. We suggest contributing time/talent/treasure to Thunderbird mail. Mutt is great, too.
+
+
+
+ Oracle's Worldwide Surveillance Machine
+ https://www.federated.computer/blog/oracle-worldwide-surveillance-machine/
+ Mon, 22 Aug 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/oracle-worldwide-surveillance-machine/
+ The class action lawsuit against a behemouth’s worldwide surveillance machine With dossiers on five billion people (!) which likely means they have one on you and me, what can’t Oracle do?
+https://www.iccl.ie/news/class-action-against-oracle/
+“…and a detailed account of online activity…”
+You have no right to see this information and refute/fix it, if needed.
+
+
+
+ We Kill People Based on Metadata
+ https://www.federated.computer/blog/we-kill-people-based-on-metadata/
+ Mon, 22 Aug 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/we-kill-people-based-on-metadata/
+ The NSA and CIA use metadata to determine who should die General Michael Hayden, in a debate with ACLU national legal director David Cole, admitted metadata can be enough to determine if some person is a threat to the US sufficient enough to warrant death.
+https://darknetlive.com/post/we-kill-people-based-on-metadata-and-other-metadata-things-3b316d3c
+So… Take action. Get off the metadata supply wagon. “But I’m not a threat to the US security establishment.” No, likely not. But you’re of interest to Mark Zuckerberg and his establishment.
+
+
+
+ Googerteller
+ https://www.federated.computer/blog/googerteller/
+ Sun, 21 Aug 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/googerteller/
+ Make music when Google spies on you This little utility provides auditory feedback whenever your browsing/internet activities feed back into the Google.
+https://github.com/berthubert/googerteller
+This demo is pretty hilarious/scary.
+
+
+
+ Bitcoin Seed Backup Device Design
+ https://www.federated.computer/blog/bitcoin-seed-phrase-backup-devices/
+ Sat, 13 Aug 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/bitcoin-seed-phrase-backup-devices/
+ Lessons learned stress testing dozens of seed phrase backup devices The seed phrase is like the password opening up the value of a Bitcoin address. If you lose it, you lose the Bitcoin. So, it is imperative, when using self-custodied Bitcoin address, that you have 100% reliable access to your seed phrase.
+https://blog.lopp.net/a-treatise-on-bitcoin-seed-backup-device-design/
+
+
+
+ E-Mail Done My Way
+ https://www.federated.computer/blog/email-done-my-way/
+ Fri, 05 Aug 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/email-done-my-way/
+ The journey to getting email self-hosting done right One man’s (he’s the Redhat evangelist for EMEA) way of running self-hosted email.
+https://jan.wildeboer.net/2022/08/Email-0-The-Journey-2022/
+As you’ll see, email is a protocol, and an attitude.
+
+
+
+ Huge Scale of US Gov Cell Location Data
+ https://www.federated.computer/blog/huge-scale-of-us-gov-cell-location-data/
+ Fri, 22 Jul 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/huge-scale-of-us-gov-cell-location-data/
+ New documents reveal the US government is tracking cell phone location The ACLU unearthed documents showing the US Department of Homeland Security is using mobile location data to track people’s movements.
+https://techcrunch.com/2022/07/18/homeland-security-cell-phone-tracking/
+The tracking is taking place on a much larger scale that previously known.
+
+
+
+ Awesome Privacy
+ https://www.federated.computer/blog/awesome-privacy/
+ Thu, 21 Jul 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/awesome-privacy/
+ A list of privacy and security-focused apps, software, and providers From the list: “Large data-hungry corporations dominate the digital world but with little, or no respect for your privacy. Migrating to open-source applications with a strong emphasis on security will help stop corporations, governments, and hackers from logging, storing or selling your personal data.”
+https://github.com/Lissy93/awesome-privacy
+It would be even better if this was not hosted on Github. C’est la vie!
+
+
+
+ Personal Security Checklist
+ https://www.federated.computer/blog/personal-security-checklist/
+ Thu, 21 Jul 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/personal-security-checklist/
+ Besides carrying a gun… “A curated checklist of tips to protect your digital security and privacy.”
+https://github.com/Lissy93/personal-security-checklist
+It’s a complete lifestyle, frankly.
+
+
+
+ Awesome FOSS Alternatives
+ https://www.federated.computer/blog/awesome-oss-alternatives/
+ Fri, 15 Jul 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/awesome-oss-alternatives/
+ FOSS solutions to try Here’s another compiled list of FOSS solutions to investigate rather than giving money to centralizer man.
+https://github.com/RunaCapital/awesome-oss-alternatives
+Which ones look promising to you?
+
+
+
+ Layer Three?
+ https://www.federated.computer/blog/what-is-layer-three/
+ Thu, 14 Jul 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/what-is-layer-three/
+ What is layer three? A discussion re: the intersection bitcoin/lightning with the internet…
+https://twitter.com/PompPodcast/status/1547633870702424066?t=ysL2s0wxSyyAqZ-ZQJPTtQ&s=19p
+This is probably what “web 3” should/will be.
+
+
+
+ Redecentralize
+ https://www.federated.computer/blog/redecentralize/
+ Fri, 01 Jul 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/redecentralize/
+ Inttroducing Redecentralize At Federated we support any organization fighting against digital monopolies, surveillance capitalism, and a lack of self-sovreignty.
+https://redecentralize.org/
+Redecentralize is an organization seeking “a world of open platforms and protocols with real choices of applications and services for people. We care about privacy, transparency and autonomy. Our organizations and tools should fundamentally be accountable and resilient.” Amen.
+
+
+
+ Tracing Cameras
+ https://www.federated.computer/blog/tracing-cameras/
+ Fri, 01 Jul 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/tracing-cameras/
+ Using the slight imperfections of the sensor An interesting technique to trace individual digital cameras based on sensor information.
+https://petapixel.com/2022/07/01/police-can-trace-cameras-thanks-to-sensor-imperfection-fingerprints/
+How long until this is used in the wild to track everyone?
+
+
+
+ Build a Gun
+ https://www.federated.computer/blog/build-a-gun/
+ Tue, 24 May 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/build-a-gun/
+ Build a 22 rifle to keep the varmits at bay… Sure, you can buy a rifle, but why not learn about how things work by assembling the parts and building a custom rifle for pest control?
+https://www.youtube.com/watch?v=7D5twkg8HE0&t=304
+
+
+
+ Stop Apple Tracking You
+ https://www.federated.computer/blog/stop-apple-tracking-you/
+ Fri, 01 Apr 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/stop-apple-tracking-you/
+ Ways to keep Apple from tracking you on iOS 14.5 and later Apple stopped other apps from tracking you starting with iOS 14.5…so that they could have all that delicious tracking goodness to appleself.
+https://www.youtube.com/watch?v=7y88gAAIN5g
+What’s the worry? It’s only metadata…
+
+
+
+ Value For Value
+ https://www.federated.computer/blog/value-for-value/
+ Fri, 01 Apr 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/value-for-value/
+ Explanation of Value for Value Many “media” or “social” businesses today rely on anadvertising model to pay the bills. However, the model itself begins to distort the message over time because the economic means (advertisers) will dictate what is acceptable content and even, in time, acceptable customers. The solution is value for value.
+https://value4value.info/
+Going further, value for value can be understood as a way of life, as the site says “a mindset of abundance” where an ecosystem develops of free exchange of “goods” understood as “time, talent, and treasure”.
+
+
+
+ Dangers of Digital Identity
+ https://www.federated.computer/blog/dangers-of-digital-identity/
+ Thu, 24 Mar 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/dangers-of-digital-identity/
+ What happens when your ‘identity’ is simply 1s and 0s? A digital identity isn’t something from you. It is a dossier created by the centralizers to better understand, for themselves, the capabilities in the world allowed to you.
+https://www.boniface-institute.com/the-dangers-of-digital-identity/
+Identity is tied to access in the digital world.
+
+
+
+ Lightning Wallet Comparison
+ https://www.federated.computer/blog/lightning-wallet-comparison/
+ Sun, 27 Feb 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/lightning-wallet-comparison/
+ A look at all the options for Lightning wallets Inevitably this blog post will get more and more out-of-date as time passes…
+https://darthcoin.substack.com/p/lightning-wallets-comparison
+But it provides a nice overview of the different approaches to wallets for holding Bitcoin on the LIghtning network.
+
+
+
+ Apple Looking Like 1990s Microsoft
+ https://www.federated.computer/blog/apple-webapps-browsers/
+ Mon, 24 Jan 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/apple-webapps-browsers/
+ Does it come down to the $20 billion in cash paid annually by Google? Apple really doesn’t want competition on iOS for web browsers…
+https://twitter.com/openwebadvocacy/status/1617802614149894144
+Even Google allows competition on Android! Think of all the tracking offered up by iOS users to Google…
+
+
+
+ Awesome Self-hosted
+ https://www.federated.computer/blog/awesome-self-hosted/
+ Fri, 21 Jan 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/awesome-self-hosted/
+ Github listing of self-hosted software This is a pretty comprehensive list of software you can self-host across a very wide variety of categories.
+https://github.com/awesome-selfhosted/awesome-selfhosted/blob/master/README.md
+While we think Federated is a pretty good curation of the “best” software for self-hosting out there, this list reminds us there is so, so much more.
+
+
+
+ Is iPhone Usage Data Anonymous?
+ https://www.federated.computer/blog/iphone-usage-data-anonymous/
+ Tue, 23 Nov 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/iphone-usage-data-anonymous/
+ Your iPhone’s Analytics Data Includes an ID Number How anonymous is iPhone usage data after all?
+https://gizmodo.com/apple-iphone-privacy-dsid-analytics-personal-data-test-1849807619
+According to the article published by Gizmodo, Apple’s iPhone was found to be collecting data on users' personal browsing habits through a feature called “DSID Analytics,” which is enabled by default on all devices running iOS 15.
+The report notes that DSID Analytics collects data on users' app usage, search history, and web browsing behavior, which is then sent to Apple’s servers for analysis.
+
+
+
+ Tools to Secure Your Mac
+ https://www.federated.computer/blog/tools-to-protect-macos/
+ Sun, 21 Nov 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/tools-to-protect-macos/
+ A list of tools for protecting and securing your macOS device A nice list of tools you can use to protect and secure your macOS machine.
+https://objective-see.org/tools.html
+This is expert level stuff, but could be helpful for you and protecting those your support.
+
+
+
+ Who Controls the Internet?
+ https://www.federated.computer/blog/who-controls-the-internet/
+ Tue, 02 Nov 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/who-controls-the-internet/
+ From a speech given at NANOG 83 From the guy who created PowerDNS comes an assessment of the ownership and control of the internet today.
+https://berthub.eu/articles/posts/who-controls-the-internet/
+Guess what? It’s not so good…unless we re-double our efforts to take back control.
+
+
+
+ Robosats
+ https://www.federated.computer/blog/robosats/
+ Fri, 29 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/robosats/
+ A simple and private way to exchange Bitcoin for fiat currencies Another great way to buy bitcoin without KYC intrusions.
+https://learn.robosats.com/
+
+
+
+ Anonymous eSIM
+ https://www.federated.computer/blog/silent-link-anonymous-esim/
+ Mon, 25 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/silent-link-anonymous-esim/
+ Really private When you really want to disappear…
+https://silent.link/
+However, the better solution may be to just put down the phone, go outside, and talk a long walk in the sun.
+
+
+
+ Ads in Apple App Store
+ https://www.federated.computer/blog/apple-advertising-app-store/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/apple-advertising-app-store/
+ What happens when the white knight gets down and dirty with the central trackers? Apple has been slowly but surely expanding the reach of ads across their platforms for the past several years.
+https://basicappleguy.com/basicappleblog/you-might-also-like
+What to do? Try Linux. There are plenty of great distributions. Oh, the app you want/need isn’t there? Spin up a Windows VM on your Linux distro for the times you need to bend over. You can even run macOS in a VM.
+
+
+
+ An Allegory
+ https://www.federated.computer/blog/free-services-an-allegory/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/free-services-an-allegory/
+ What happens when we are beholden to free services? Hey, you just wanted to see what the free service could do for you. Despite knowing the dangers. But it is so…
+https://twitter.com/PardesSeleh/status/1534251250744705024
+Please don’t go…!
+
+
+
+ Apple Advertising
+ https://www.federated.computer/blog/apple-is-building-demand-side-platform/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/apple-is-building-demand-side-platform/
+ The fruit is building a demand-side platform Has there been a successful digtial advertising platform that doesn’t track users?
+https://www.insiderintelligence.com/content/apple-will-emerge-advertising-player-watch-2023
+Hey baby, don’t worry. This is Apple. :kissing:
+
+
+
+ Apple turned off a private communication tool in China just before major protests broke out.
+ https://www.federated.computer/blog/apple-turned-off-airdrop/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/apple-turned-off-airdrop/
+ What does it mean when a vendor tells you how to use tools on your device? https://reclaimthenet.org/apple-air-drop-china
+Apple made a change to how AirDrop works in mainland China restricting the way Apple customer could communicate with each other.
+According to the article published by Reclaim The Net on August 10, 2021, Apple has come under scrutiny for allegedly allowing Chinese users to receive unsolicited content through its AirDrop feature. The report states that Chinese users have been receiving unsolicited pornographic images and spam through AirDrop from strangers who are using anonymous usernames.
+
+
+
+ Apple TV Ad Product
+ https://www.federated.computer/blog/apple-tv-ad-product/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/apple-tv-ad-product/
+ Quietly pushing an ad product with media agencies Where will we go for privacy when Apple abandons us to the verdant fields of advertising revenue?
+https://digiday.com/media/apple-is-quietly-pushing-a-tv-ad-product-with-media-agencies/
+To a self-sovereign, distributed, federated future.
+
+
+
+ Bisq
+ https://www.federated.computer/blog/bisq/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/bisq/
+ As in biscuit? Or just no-KYC bitcoin? One of the best ways to buy bitcoin with no KYC.
+https://bisq.network/
+You’ll also feel like a trader walking through a market in the town square. You get to set the deal.
+
+
+
+ Breaches for Everyone!
+ https://www.federated.computer/blog/big-batch-of-breaches/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/big-batch-of-breaches/
+ Looks like lots of centralized services relied on another central service… …and now the whole mass of them are breached.
+https://twitter.com/tayvano_/status/1611131230074073088?s=20&t=NR4Z4aJlKaNg_rHuQVYn7A
+CircleCI is the central culprit. We, the users of these centralized system have no clue whats going on in the entirely opaque background. No clue.
+
+
+
+ BTCMap.org
+ https://www.federated.computer/blog/btcmap-org/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/btcmap-org/
+ Where to spend your bitcoin This is the chicken-and-egg challenge for bitcoin. Money for spending (versus money for store of value).
+https://btcmap.org/map
+The solution is to continue to build communities of common-interest that can build small economies where bitcoin is taken back and forth. Maybe the solution is we all need to be willing and able to take bitcoin?
+
+
+
+ Build Your Own Seedsigner
+ https://www.federated.computer/blog/build-your-own-seedsigner/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/build-your-own-seedsigner/
+ You need a seed signer to keep your Bitcoin safe With this technique, no one will know your seed phrase except the people you tell.
+https://seedsigner.com/
+No trust.
+
+
+
+ Centralization is Cool
+ https://www.federated.computer/blog/moxie-marlinspike-on-centralization/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/moxie-marlinspike-on-centralization/
+ Moxie Marlinspike on Decentralization The (former) CEO of Signal thinks centralization is the way to go…
+https://マリウス.com/moxie-marlinspike-on-decentralization/
+What a surprise. The key argument is that it is too difficult to decentralize. And that decentralization leads to stagnation because we all have to agree on protocols and therefore it is tough to change them. But there are multiple flaws in this way of thinking, and the post lays them out well.
+
+
+
+ Cops Want Mass Surveillance App Secret
+ https://www.federated.computer/blog/mass-surveillance-app-secret/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/mass-surveillance-app-secret/
+ The App ‘Fog Reveal’ is Almost Invisible Another tale of our local law enforcement tracking phones around the neighborhood.
+https://arstechnica.com/tech-policy/2022/09/cops-wanted-to-keep-mass-surveillance-app-secret-privacy-advocates-refused/
+
+
+
+ Corporate Coalition Wants Government Digital ID
+ https://www.federated.computer/blog/corporate-coalition-wants-digital-id/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/corporate-coalition-wants-digital-id/
+ The ‘Better Identify Coalition’ wants better ways to track you It’s a real rogue’s gallery of corporations pushing for a single way to track us no matter what we do on or off the network.
+https://reclaimthenet.org/corporations-push-for-digital-id
+Shame on you Yubico for being part of this proposal. Why mortgage whatever good will you have to kneel at the feet of your corporate overlords?
+
+
+
+ Cryptocurrency, the Jews, and the Fundamental Question of Trust
+ https://www.federated.computer/blog/cryptocurrency-question-of-trust/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/cryptocurrency-question-of-trust/
+ How Bitcoin addressed a problem that has haunted human affairs for 2.5 million years How does the decentralized Bitcoin system work?
+https://www.tabletmag.com/sections/news/articles/cryptocurrency-jews-question-benjamin-samuels
+How Bitcoin solved the trust issue that has plagued societies for millenia. Some precursors to the Diffie-Hellman key exchange are discussed and explained.
+
+
+
+ CSAM Scanning in the EU
+ https://www.federated.computer/blog/automatic-csam-scanning-eu/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/automatic-csam-scanning-eu/
+ Using the pretext of child protection to introduce mass surveillance This is still just a proposal.
+https://tutanota.com/blog/posts/eu-surveillance-csam/
+But the proposal would basically lead to all messages being read all the time. Get off the centralized services. Make it difficult.
+
+
+
+ Does Signal Have a Back Door
+ https://www.federated.computer/blog/signal-has-a-back-door/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/signal-has-a-back-door/
+ Backdoor proven? Further evidence Signal has a back door…
+https://twitter.com/DylanLeClair_/status/1640378672359129088?s=20
+Repeat after us, centralized is no good.
+
+
+
+ Future of Advertising and Information Services
+ https://www.federated.computer/blog/marshall-mcluhan-future-advertising-information-services/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/marshall-mcluhan-future-advertising-information-services/
+ Marshall McLuhan lays it out in 1966 A wonderful look into the future, from the past.
+https://paleofuture.com/blog/2023/1/11/marshall-mcluhan-on-the-future-of-ads-and-the-internet
+One of the insights here is the idea that we enjoy being manipulated, being advertised to because the advertising itself is the beginning of the fulfillment of our desire for an object.
+
+
+
+ GrapheneOS
+ https://www.federated.computer/blog/grapheneos/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/grapheneos/
+ One of the main alternative Andoid distributions You can use a mobile device with lots less tracking than on offer from Google and Apple.
+https://grapheneos.org/
+Just remember, when you leave tracking prison, you leave behind the apps that have your addicted. OK?
+
+
+
+ Home Server Bitcoin Node
+ https://www.federated.computer/blog/setup-home-server-bitcoin-node/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/setup-home-server-bitcoin-node/
+ Caveat: liberating but lots of complexities You do need to run your own node at home. It’s the best for privacy and securty. But it can be complex, and, with the wrong turn, you can lose Bitcoin.
+https://www.expressvpn.com/blog/how-to-set-up-a-home-server-and-use-it-as-a-bitcoin-node/
+But don’t fear. Try it out. Get a feel for it. We need to learn to cook.
+
+
+
+ Home Work is Corporate Surveillance Work
+ https://www.federated.computer/blog/working-from-home-surveillance/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/working-from-home-surveillance/
+ The big man has access to all your waking minutes If the corporation can surveil employees while in the office (and we don’t like this, mind you, but so many have accepted it), what happens when the office is your private home?
+https://www.zerohedge.com/technology/working-home-now-means-letting-corporate-surveillance-your-daily-life
+Maybe the solution is not to carry/have two of everything?
+
+
+
+ How to Stack Sats
+ https://www.federated.computer/blog/how-to-stack-sats/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/how-to-stack-sats/
+ Anyone Can Earn Bitcoin Some great, creative ideas for how to earn and stack satoshis.
+https://www.stacksats.how/
+
+
+
+ Individuals On Lists
+ https://www.federated.computer/blog/no-kyc-aml-lists/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/no-kyc-aml-lists/
+ Digging into the KYC/AML issue You may already be on a list…
+https://www.discreetlog.com/kyc/
+…but you can start to disappear.
+
+
+
+ Instagram Scraping
+ https://www.federated.computer/blog/what-can-others-learn-scraping-instagram/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/what-can-others-learn-scraping-instagram/
+ What can others learn? Scraping social media services is wide-spread (here, Instagram) and highlights the data leaks exploited by many to find out much more about us.
+https://www.socialscrape.com/post/what-is-instagram-scraping
+“Basically anything you can get from a user’s profile can be scraped.” When combined with other information, a user dossier begins to emerge. D’oh!
+
+
+
+ Lastpass Breach Impact on Bitcoin Wallets
+ https://www.federated.computer/blog/impact-of-lastpass-on-bitcoin-wallets/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/impact-of-lastpass-on-bitcoin-wallets/
+ This person lost sats because of the Lastpass breach Can anyone spot how the magical hacker got in?
+https://twitter.com/Cryptopathic/status/1606416137771782151?s=20&t=glD3V7sn8VCOrCeheaWf8w
+A hint: “Having spoken to multiple professionals, it now seems far more likely that my encrypted vault was breached. However, at 100,100 PBKDF2 iterations, it is not realistic to brute force this. I think this situation goes far beyond what has been admitted.”
+That’s right, Lastpass may not have keep the data encrypted or sufficiently encrypted.
+
+
+
+ Learn Bitcoin Interactively
+ https://www.federated.computer/blog/learn-bitcoin-interactively/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/learn-bitcoin-interactively/
+ A tutorial to learn the technical side of bitcoin This neat interactive tutorial teaches you the technical overview of bitcoin.
+https://trybitcoin.satsie.dev/
+
+
+
+ Let Your Boss Monitor Your Brain
+ https://www.federated.computer/blog/monitor-brain-activity/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/monitor-brain-activity/
+ More on the path to treating humans like robots When we are monitored at work, we are treated like machines, not humans.
+https://www.lifesitenews.com/news/world-economic-forum-speaker-touts-technology-that-allows-your-boss-to-monitor-your-brain-activity/
+If this is part of your experience at work, get another job. It is hard, but being surveilled all the time has its impact on our self-worth.
+
+
+
+ LineageOS
+ https://www.federated.computer/blog/lineageos/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/lineageos/
+ One of the main alternative Andoid distributions You can use a mobile device with lots less tracking than on offer from Google and Apple.
+https://lineageos.org/
+Just remember, when you leave tracking prison, you leave behind the apps that have your addicted. OK?
+
+
+
+ Microsoft Killing Custom Domains in Outlook.com
+ https://www.federated.computer/blog/microsoft-killing-custom-domains/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/microsoft-killing-custom-domains/
+ No more individuality for you, slave You won’t be able to use custom domains after November, 2023.
+https://www.bigtechwire.com/2022/11/02/microsoft-is-killing-custom-domain-names-in-outlook-com/
+This is a head-scratcher, for sure. Why would Microsoft do this? Is Google next? It is hard to understand any real technical justification for the move. Ideas?
+
+
+
+ Most Popular Password Manager Hacked
+ https://www.federated.computer/blog/lastpass-hacked/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/lastpass-hacked/
+ Lastpass Hacked, Again Lastpass is the world’s most popular password manager…with hackers, too.
+https://www.bloomberg.com/news/articles/2022-08-25/the-world-s-most-popular-password-manager-says-it-was-hacked
+Solution, host your own password manager. It is possible. Unless you like giving the hackers your passwords…
+
+
+
+ Mutt
+ https://www.federated.computer/blog/mutt/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/mutt/
+ The email client for discerning email users We have instructions on how to use Mutt with a Federated Core.
+http://www.mutt.org/
+Install it on a server your own, and, with the right access controls, you have secure access to your email from everywhere.
+
+
+
+ No Google for Dutch Schools
+ https://www.federated.computer/blog/dutch-schools-must-stop-using-google/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/dutch-schools-must-stop-using-google/
+ Dutch Personal Data Authority raised concerns about Google’s GDPR compliance Google donesn’t carry. They’ll just pay the fines.
+https://tutanota.com/blog/posts/dutch-schools-must-stop-using-google-email-and-cloud-services/
+And they believe we “need” them.
+
+
+
+ No KYC Bitcoin
+ https://www.federated.computer/blog/acquire-non-kyc-bitcoin/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/acquire-non-kyc-bitcoin/
+ 15 methods for acquiring non-kyc bitcoin If you want to acquire bitcoin without an intermediary tracking your identity, here are fifteen options…
+https://sovrnbitcoiner.com/15-methods-to-aquire-non-kyc-bitcoin/
+What have we to hide? Everything! :blush:
+
+
+
+ Oh Signal!
+ https://www.federated.computer/blog/rant-about-signal/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/rant-about-signal/
+ You were the chosen one… Someone else isn’t so impressed with the direction Signal is going these days…
+https://media.ccc.de/v/mch2022-196-signal-you-were-the-chosen-one-
+It’s a real head-scratcher when a “security service” wants to start measuring “engagement”.
+
+
+
+ Opendesktop
+ https://www.federated.computer/blog/opendesktop/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/opendesktop/
+ Introduction to the Opendesktop Project This is a centralized service based, in part, on Nextcloud and other open-source projects.
+https://www.opendesktop.org/
+OpenDesktop.org is a website that provides a platform for open-source software developers and users to share and download various applications, themes, icons, wallpapers, and other digital assets. The website is part of the OpenDesktop Network, which also includes other sites such as KDE-Apps.org, GNOME-Look.org, and XFCE-Look.org.
+OpenDesktop.org is a community-driven platform, where users can contribute their own software and content, as well as interact with other members of the community through forums, blogs, and messaging.
+
+
+
+ Orange Pilled Veteran
+ https://www.federated.computer/blog/orange-pilled-veteran/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/orange-pilled-veteran/
+ Working in the Bitcoin industry Offered to suggest working in the self-sovereign industry should be just as rewarding.
+https://www.zerohedge.com/crypto/one-veterans-story-orange-pilled-green-beret
+We are always hiring at Federated. :smile:
+
+
+
+ Pine64 Project
+ https://www.federated.computer/blog/pine-64-project/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/pine-64-project/
+ Open source hardware and software for desktop, tablet, mobile Pine64 makes some very interesting kit…
+https://www.pine64.org/
+The number of enthusiasts continues to grow month after month.
+
+
+
+ Poste.io
+ https://www.federated.computer/blog/poste-io/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/poste-io/
+ A nice self-hosted email server A nice project for self-hosted email.
+https://poste.io/
+
+
+
+ Private, Secure, Uncensorable Messaging Over LORA
+ https://www.federated.computer/blog/private-secure-lora-messaging/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/private-secure-lora-messaging/
+ How to use the LORA protocol to set up a mesh network for communications The LORA protocol is interesting. Very intersting. There’s a shitcoin project to try to extend LORA across the country. Great idea, bad execution.
+https://unsigned.io/private-messaging-over-lora/
+What would it take to set this up in your own neighborhood or community? Reach out to us if you’d like to do or know more.
+
+
+
+ Proof the NSA Spies on Americans
+ https://www.federated.computer/blog/nsa-collects-data/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/nsa-collects-data/
+ Even when it is against the law. Who cars? Do you? Does anyone care when the NSA breaks US law to spy on Americans in the United States? No, not really. Nothing is done about it. This is fiat surveillance at its finest. High handed. Passed off as “protecting” Americans.
+https://threadreaderapp.com/thread/1587446686393122816.html
+What can be done about it? First, make it much harder by decentralizing everything.
+
+
+
+ QubesOS
+ https://www.federated.computer/blog/qubes/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/qubes/
+ A reasonably secure operating system Qubes is an operating system where most of the userland work happens in sandboxed virtual machines.
+https://www.qubes-os.org/intro/
+With the right hardware resources, you can use multiple “insecure” operating systems at the same time.
+
+
+
+ Reclaiming Mobile Privacy with GrapheneOS
+ https://www.federated.computer/blog/reclaiming-mobile-privacy-grapheneos/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/reclaiming-mobile-privacy-grapheneos/
+ It’s true. It can be done! This is the android distribution many of us at Federated use.
+https://マリウス.com/reclaiming-mobile-privacy-with-grapheneos/
+“The shiny devices we carry around in our pockets have increasingly become malicious tools of governments, law enforcement and even for-profit corporations.”
+
+
+
+ Router Security
+ https://www.federated.computer/blog/router-security-howto/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/router-security-howto/
+ We all have one of these things in our home… We all have a (wifi) router in our homes if we are typically connected to the internet. Here’s some advice how to configure the device in the most secure way possible.
+https://routersecurity.org/#StartHere
+Explore the site for even more great stuff!
+
+
+
+ Safing Firewall
+ https://www.federated.computer/blog/safing-free-open-source-firewall/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/safing-free-open-source-firewall/
+ Free and Open Source A nice, easy-to-undestand firewall for Windows and Linux
+https://link
+Includes a VPN with the paid tier.
+
+
+
+ Scrub Yourself From The Internet
+ https://www.federated.computer/blog/scrub-yourself-from-the-internet/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/scrub-yourself-from-the-internet/
+ Is it even possible? The long journey begins with a single step…
+https://www.msn.com/en-us/news/technology/how-to-scrub-yourself-from-the-internet-the-best-that-you-can/ar-AAYOXe0
+Internet “knowledge” of you is like weight. You’re either adding or you’re losing.
+
+
+
+ Self Hosted Podcast
+ https://www.federated.computer/blog/self-hosted-podcast/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/self-hosted-podcast/
+ A podcast for self-hosters Even if you don’t practice self-hosting using Federated, please practice self-hosting. These guys might be able to provide some guidance!
+https://selfhosted.show/
+From their description: “Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show to share lessons and take you along the journey…”
+
+
+
+ Self Hosted SaaS Tools
+ https://www.federated.computer/blog/self-hosted-saas-tools/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/self-hosted-saas-tools/
+ hSome alternatives to the centralizers Another useful list and assessment.
+https://tedium.co/2023/03/04/self-hosted-saas-app-alternatives/
+Too bad the site is littered with ads for…SaaS companies. :open_mouth:
+
+
+
+ SHA256 Encryption Explained
+ https://www.federated.computer/blog/sha256-algorithm-explained/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/sha256-algorithm-explained/
+ Want to know how the encryption standard works? Wonderful website. More like a “lab” than a textual explainer. Understand through doing.
+https://sha256algorithm.com/
+
+
+
+ Smart Phones Fragment Attention Span
+ https://www.federated.computer/blog/smart-phones-fragment-attention-span/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/smart-phones-fragment-attention-span/
+ Why even care about an attention span? Without an attention span, human intelligence is not capable of producing its magic.
+https://idratherbewriting.com/blog/awakening-moment-to-how-smartphones-fragment-our-attention/
+It is funny when the “solution” is to use the smart phone to help us with “focus”. :satisfied:
+
+
+
+ Surveillance State Making a List
+ https://www.federated.computer/blog/surveillance-state-making-a-list/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/surveillance-state-making-a-list/
+ This Christmas-themed article is a big drag… All the various ways governments and corporations are working hard to watch our every move.
+https://www.zerohedge.com/political/youd-better-watch-out-surveillance-state-making-list-and-youre-it
+The track us on the internet, the mobile phone, our DNA, our face, our spending and consumer activities, public movements…
+We can cloak. It does require a commitment. It can be done.
+
+
+
+ The Fediverse is Inefficient, That's OK
+ https://www.federated.computer/blog/fediverse-is-inefficient-thats-ok/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/fediverse-is-inefficient-thats-ok/
+ Decentralization comes with some slow downs that avoid the dystopian pile up Why having everything move/improve at the speed of whim may not be the best idea.
+https://berk.es/2022/11/08/fediverse-inefficiencies/
+The example provided is Mastodon.
+
+
+
+ The Story of Your Enslavement
+ https://www.federated.computer/blog/the-story-of-your-enslavement/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/the-story-of-your-enslavement/
+ A film essay about the ways and forms of our enslavement A thought-provoking film essay about the ways and means of our quotidian enslavement in the modern world.
+https://youtu.be/eq3jjzI8Gdo
+
+
+
+ TorBox 0.4.0 Released
+ https://www.federated.computer/blog/torbox-release-040/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/torbox-release-040/
+ Creates a WiFi hotspot routing over Tor using Raspberry Pi When you want Tor-routed services for all your wireless/WiFi traffic.
+https://www.torbox.ch/?p=2027
+You can even use this in hotels, for example, even if there is a captive portal, when traveling.
+
+
+
+ Tracking American Cash Transactions
+ https://www.federated.computer/blog/tracking-every-cash-transaction/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/tracking-every-cash-transaction/
+ Wall Street Journal reports program tracks transactions above $500 Homeland Security is using a tool to track cash transactions above $500.
+https://www.rt.com/news/570100-americans-money-transfers-spying/
+As Senator Wyden’s (D-Oregon) investigation showed, this is being done without regard for established legal protections.
+
+
+
+ US Military Captures 93% of Internet
+ https://www.federated.computer/blog/miliatary-captures-internet/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/miliatary-captures-internet/
+ Senator Wyden suggests the military is up to no good They have everything.
+https://www.rt.com/news/563433-augury-military-internet-tracking-wyden/
+Of course, they are breaching privacy for the sake of keeping us “safe”.
+
+
+
+ Why Decentralization Matters
+ https://www.federated.computer/blog/why-decentralization-matters/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/why-decentralization-matters/
+ From the perspective of a notorious shitcoiner… It’s funny how he’s right on “decentralization” but every one of his implementations was backed by some (evil) centralization scheme. We’re not hear to prove that, just a bold assertion. But he’s right about decentralization.
+https://onezero.medium.com/why-decentralization-matters-5e3f79f7638e
+But how could “decentralization” ever be monetized? Value for value. Give people want they want and need and they will pay.
+
+
+
+ Will Your Service/Product Provider Cancel You?
+ https://www.federated.computer/blog/company-risk-assessment/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/company-risk-assessment/
+ One listing of companies and a risk assessment… The company may not like you and show you the door…
+https://1792exchange.com/spotlightreports/
+
+
+
+ Zero Data App
+ https://www.federated.computer/blog/zero-data-app/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/zero-data-app/
+ Keeping data under your control A nice exposition of the idea that even your apps shouldn’t be barriers to your data.
+https://0data.app/
+For the most part, this means using open data protocols and formats. Not even open-source applications do this today. But this website introduces us to apps that do.
+
+
+
+ Been Pwned?
+ https://www.federated.computer/blog/have-i-been-pawned/
+ Sun, 03 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/have-i-been-pawned/
+ One of the delights of using centralized services… It’s really just a matter of time before your centralized service leaks your credentials or gets hacked. The honeypot is too valuable for the hackers to ignore.
+https://haveibeenpwned.com/
+Check your status here.
+
+
+
+ Protonmail Bridge Problems
+ https://www.federated.computer/blog/protonmail-bridge-problems/
+ Wed, 29 Sep 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/protonmail-bridge-problems/
+ Message UIDs are not stable When the IDs for messages aren’t stable, whacky things happen.
+https://github.com/ProtonMail/proton-bridge/issues/220
+Note: this is an older note, may have been fixed. Please check the repository.
+
+
+
+ iCloud for Windows Downloads Other People's Photos?
+ https://www.federated.computer/blog/icloud-for-windows-problems/
+ Tue, 14 Sep 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/icloud-for-windows-problems/
+ A Report of Strange Behavior by iCloud for Windows The perils of using centralized storage solutions from a company not known for building great services.
+https://forums.macrumors.com/threads/icloud-for-windows-corrupting-videos-downloading-other-peoples-photos.2370666/
+According to a thread on the MacRumors forums, some users of iCloud for Windows have reported experiencing issues with the service, including corrupted videos and downloading other people’s photos.
+The thread includes reports from users who have experienced issues with iCloud for Windows, such as videos that are downloaded from iCloud being corrupted and unplayable, and photos that belong to other iCloud users being downloaded to their own devices.
+
+
+
+ Rise of User-Hostile Software
+ https://www.federated.computer/blog/rise-of-user-hostile-software/
+ Mon, 23 Aug 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/rise-of-user-hostile-software/
+ Caring more about the developer than about the user This may be a perenial complaint, but it does seem as if the state of software today is more geared to the company or the developer rather than the user.
+https://den.dev/blog/user-hostile-software/
+Open source software fixes this.
+
+
+
+ Why Self-Hosting is Important
+ https://www.federated.computer/blog/why-self-hosting-is-important/
+ Fri, 23 Jul 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/why-self-hosting-is-important/
+ Self-hosting is about freedom Some observations and experiences with regards self-hosting.
+https://dataswamp.org/~solene/2021-07-23-why-selfhosting-is-important.html
+If you’re reading this blog, you probably already know self-hosting is important. It is vital to keeping the internet and our data free.
+
+
+
+ Verified Onion Sites
+ https://www.federated.computer/blog/verified-onion-sites/
+ Wed, 21 Jul 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/verified-onion-sites/
+ An ever growing list of bitcoin and privacy related onion sites Fire up your Tor browser and browse…
+https://sovrnbitcoiner.com/verified-tor-onion-sites/
+A great list of some sites you want to visit using Tor.
+
+
+
+ Understanding Email
+ https://www.federated.computer/blog/understanding-email/
+ Fri, 07 May 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/understanding-email/
+ Email explained from first principles Everything you ever wanted to know about how email works…
+https://explained-from-first-principles.com/email/
+…because you’re going to want to know how it can be improved, protected, best served.
+
+
+
+ Tor-Only Bitcoin and Lightning Guide
+ https://www.federated.computer/blog/tor-only-bitcoin-lightning-guide/
+ Thu, 06 May 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/tor-only-bitcoin-lightning-guide/
+ How to use Bitcoin and Lightning on the Tor network We are big fans of Bitcoin and the Lightning network at Federated and recommend using it over Tor. But it can be technically intimidating.
+https://blog.lopp.net/tor-only-bitcoin-lightning-guide/
+The purpose of Bitcoin and Lightning is to fully decentralize money. The purpose of Tor is to share as little information on the public network as possible. Together they can be very effective.
+
+
+
+ Screw It
+ https://www.federated.computer/blog/screw-it-ill-host-it-myself/
+ Wed, 07 Apr 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/screw-it-ill-host-it-myself/
+ I’ll host it myself As more and more folks have bad experiences with the centralizers, more and more begin to wonder what it would mean to do it all themselves.
+https://www.markozivanovic.com/screw-it-ill-host-it-myself/
+That’s why Federated Core exists. To make it easier. :blush:
+
+
+
+ U.S. Indicts Encrypted Phone CEO
+ https://www.federated.computer/blog/sky-secure-global-indictment/
+ Fri, 12 Mar 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/sky-secure-global-indictment/
+ Claims Sky Global provided service used by criminal networks File this is the “is encryption legal to sell” section.
+https://www.vice.com/en/article/4adzdj/sky-secure-global-indictment
+The US Department of Justice claims they filed the indictment because the firm expressly catered to those committing criminal acts. But actions like this raise concerns about the claims of authorities that encryption, in and of itself, is a prohibited “tool” for sale.
+
+
+
+ Your Financial Information Sent to Facebook
+ https://www.federated.computer/blog/financial-information-facebook/
+ Thu, 11 Mar 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/financial-information-facebook/
+ Tax Filing Services Sending Financial Information to Facebook As if Facebook didn’t know enough about us already…
+https://www.zerohedge.com/technology/appalling-major-tax-filing-services-have-been-sending-financial-information-facebook
+According to an article published by Zero Hedge, some major tax filing services in the US have been sending users' financial information, including their social security numbers and income details, to Facebook through tracking tools on their websites.
+The article states that tax filing services such as TurboTax, H&R Block, and TaxAct have been using tracking tools from Facebook and other third-party companies on their websites, which allow them to collect data on users' browsing behavior and interests.
+
+
+
+ I Want a Computer that I Own
+ https://www.federated.computer/blog/computer-that-i-own/
+ Fri, 26 Feb 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/computer-that-i-own/
+ Can I Own My Computer? These days, is it possible to own your computer and the data that flows through it?
+http://misc-stuff.terraaeon.com/articles/computer-i-own.html
+Self-ownership means “anonymity” and to “communicate securly with anyone on the planet without being observed by a third party”. Of course, there are a number of parts to this puzzle. The hardware, the client software and operating system, the server hardware, software and operating system, and then the network and the means of utilizing that network.
+
+
+
+ Dropbox is Watching Your Activity
+ https://www.federated.computer/blog/dropbox-is-watching-your-activity/
+ Mon, 12 Oct 2020 00:00:00 +0000
+
+ https://www.federated.computer/blog/dropbox-is-watching-your-activity/
+ Why All the Telemetry? Dropbox sure does collect lots of information…
+Why So Much Telemetry?
+
+
+
+ Online Identity Owned by Email Provider
+ https://www.federated.computer/blog/your-identity-owned-by-email-provider/
+ Fri, 30 Aug 2019 00:00:00 +0000
+
+ https://www.federated.computer/blog/your-identity-owned-by-email-provider/
+ Email is a great way to understand everything about a person If you don’t own or run your email (“not your keys, not your email”), then your on-line identify is owned by your email provider.
+https://www.ctrl.blog/entry/email-identity-provider.html
+This is even true for Proton, kids. Centralization sucks.
+
+
+
+ NSA Worked to Track Bitcoin Users
+ https://www.federated.computer/blog/nsa-worked-to-track-bitcoin-users/
+ Sun, 18 Mar 2018 00:00:00 +0000
+
+ https://www.federated.computer/blog/nsa-worked-to-track-bitcoin-users/
+ NSA Seeks to Track Bitcoin Users In a story from the annals of the obvious… But why? They might as well haul in the whole village looking for the one villager who committed the alledged crime.
+https://theintercept.com/2018/03/20/the-nsa-worked-to-track-down-bitcoin-users-snowden-documents-reveal/
+The National Security Agency (NSA) worked to track down users of the cryptocurrency Bitcoin by analyzing internet traffic and other data sources, according to documents leaked by former NSA contractor Edward Snowden.
+The documents suggest that the NSA was interested in identifying Bitcoin users who may be engaged in illegal activities such as money laundering and drug trafficking.
+
+
+
+ Outlook.com is Silently Discarding Email Messages
+ https://www.federated.computer/blog/outlook-com-discarding-messages/
+ Sun, 11 Jan 2015 00:00:00 +0000
+
+ https://www.federated.computer/blog/outlook-com-discarding-messages/
+ Microsoft knows what is best for you Outlook.com and Hotmail.com won’t receive your email message unless they want to…
+https://blog.paranoidpenguin.net/2015/01/outlook-com-is-silently-discarding-email-messages/
+Microsoft continues to break the protocol. One solution? Don’t email folks with outlook.com and hotmail.com email addresses. Tell them Microsoft has decided what is best.
+
+
+
+ Google Has My Email
+ https://www.federated.computer/blog/google-has-most-of-my-email/
+ Sun, 11 May 2014 00:00:00 +0000
+
+ https://www.federated.computer/blog/google-has-most-of-my-email/
+ Dealing with the problem that is Gmail Even if you run your own email server (or use a service like Federated Core), you will likely be interacting with those using Gmail.
+https://mako.cc/copyrighteous/google-has-most-of-my-email-because-it-has-all-of-yours
+It won’t happen quickly or over-night, but we must choke out Gmail and other centralized emails services (looking at your outlook.com) if we are to reclaim email as a “free” as in “freedom” service.
+
+
+
+ The Original Cypherpunk's Manifesto
+ https://www.federated.computer/blog/cypherpunks-manifesto/
+ Tue, 09 Mar 1993 00:00:00 +0000
+
+ https://www.federated.computer/blog/cypherpunks-manifesto/
+ It starts with privacy The basis for everything we do at Federated Computer.
+https://what.cd/
+Privacy is the conerstone and that is built on anonymous systems.
diff --git a/public/blog/indian-isps-give-givernment-full-access/index.html b/public/blog/indian-isps-give-givernment-full-access/index.html
new file mode 100644
index 00000000..c02e9ec8
--- /dev/null
+++ b/public/blog/indian-isps-give-givernment-full-access/index.html
@@ -0,0 +1,312 @@
+
+
+
+
+ Indian ISPs Give Government Full Access
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Indian ISPs Give Government Full Access
+
+
+
+
+
+
+
+
+ Cincinnatus
+
+
+
+ November 10, 2022
+
+
+
+
+
+
+
+
+
+
+
+
+
+
They know when you’ve been naughty, they know when you’re awake…
+
Well, at least, I suppose, they’re being honest about it.
Apple has marketed their devices as saving the world from a big brother dystopia. But, like so much gas-lighting these days, it is the savior playing the role of big brother.
According to the article published by Gizmodo, Apple’s iPhone was found to be collecting data on users' personal browsing habits through a feature called “DSID Analytics,” which is enabled by default on all devices running iOS 15.
+
The report notes that DSID Analytics collects data on users' app usage, search history, and web browsing behavior, which is then sent to Apple’s servers for analysis. This data is reportedly used to improve the performance of Apple’s products and services, such as Siri and the App Store.
+
However, the article raises concerns about the potential privacy implications of this feature, as it collects personal information without users' explicit consent and without providing a clear way to opt-out. The report also notes that the data collected by DSID Analytics could be used to build detailed profiles of users' behavior and interests, which could be exploited by third parties for targeted advertising or other purposes.
+
Apple has responded to the report, stating that the data collected by DSID Analytics is anonymous and aggregated, and that users can choose to disable the feature by going to Settings > Privacy > Analytics & Improvements > Share With App Developers and turning off the toggle.
+
However, the report highlights the ongoing tension between tech companies' desire to collect data for product improvement and innovation, and users' rights to privacy and control over their personal information.
From the post, why end-to-end encryption is not enough: “End-to-end encryption has become more commonplace with major online messaging and communication tools, but encoding what you say to your friends online does not mean that the service provider cannot see who you contacted, when, from where. This metadata might be even more important than the content of an online conversation.”
You have to think about the metadata in the same way we think about how services like Facebook develop “graphs” of us for the purposes of advertising and scores.
KYC stands for “know your customer” which is another way of saying “surveillance” by the service and/or government interests. The KYCnot dot me website lists lots of websites, many for Bitcoin, and their relative scores for KYC.
An “unauthorized party” got access to the third-party storage where LastPass stores backups. When you’re dealing with cloud services, there is tremendous “counterparty” risk, as they would say in the fiat financial markets. If you’re using a cloud service, that service can swear all day that they are secure…but security is a combination of all the links, including the weak ones.
One of the insights here is the idea that we enjoy being manipulated, being advertised to because the advertising itself is the beginning of the fulfillment of our desire for an object.
Solution. Don’t use Facebook, Instagram, all the other Meta shit. Addicted? OK, then stop complaining. You’re hooked up to the Zuckerborg and your actions harvested for profit.
This is a head-scratcher, for sure. Why would Microsoft do this? Is Google next? It is hard to understand any real technical justification for the move. Ideas?
What a surprise. The key argument is that it is too difficult to decentralize. And that decentralization leads to stagnation because we all have to agree on protocols and therefore it is tough to change them. But there are multiple flaws in this way of thinking, and the post lays them out well.
Even when it is against the law. Who cars? Do you?
+
Does anyone care when the NSA breaks US law to spy on Americans in the United States? No, not really. Nothing is done about it. This is fiat surveillance at its finest. High handed. Passed off as “protecting” Americans.
In a story from the annals of the obvious… But why? They might as well haul in the whole village looking for the one villager who committed the alledged crime.
The National Security Agency (NSA) worked to track down users of the cryptocurrency Bitcoin by analyzing internet traffic and other data sources, according to documents leaked by former NSA contractor Edward Snowden.
+
The documents suggest that the NSA was interested in identifying Bitcoin users who may be engaged in illegal activities such as money laundering and drug trafficking. The agency reportedly used its surveillance capabilities to monitor Bitcoin users' internet traffic, as well as other data sources such as financial transactions and social media activity, in an attempt to identify individuals involved in criminal activity.
+
The article notes that while the NSA’s interest in Bitcoin users may have been motivated by a desire to combat illegal activity, it also raises concerns about government surveillance and privacy rights. Some critics argue that the NSA’s actions represent an overreach of its surveillance powers and a violation of individuals' privacy, particularly given the largely unregulated nature of the cryptocurrency market.
+
It’s important to note that the documents cited in the article are from 2013, and it’s unclear whether the NSA’s activities in relation to Bitcoin users have continued or evolved since then.
OpenDesktop.org is a website that provides a platform for open-source software developers and users to share and download various applications, themes, icons, wallpapers, and other digital assets. The website is part of the OpenDesktop Network, which also includes other sites such as KDE-Apps.org, GNOME-Look.org, and XFCE-Look.org.
+
OpenDesktop.org is a community-driven platform, where users can contribute their own software and content, as well as interact with other members of the community through forums, blogs, and messaging. The website is designed to be user-friendly and easy to navigate, with various categories and tags to help users find the content they are looking for.
+
The website features a wide range of applications and digital assets, including desktop environments, media players, text editors, image editors, and more. Users can also find various themes, icons, and wallpapers to customize their desktop environments and applications.
+
OpenDesktop.org is committed to promoting open-source software and encouraging collaboration and innovation within the open-source community. The website is free to use and does not charge users for downloading or sharing content. However, users are encouraged to donate to support the website and its contributors.
Microsoft continues to break the protocol. One solution? Don’t email folks with outlook.com and hotmail.com email addresses. Tell them Microsoft has decided what is best.
+ Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance.
+
+ Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance.
+
+ Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance.
+
+ Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance.
+
+ Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance.
+
+ Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance.
+
+ Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance.
+
+ Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance.
+
+ Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance.
+
+ Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance.
+
- Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. For broader topics of health, money, relationships, technology, surveillance, see our sister blog at Sovereign Reset: https://www.sovereignreset.com.
+ Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance.
+ Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance.
+
+ Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance.
+
+ Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance.
+
+ Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance.
+
+ Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance.
+
+ Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance.
+
+ Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance.
+
+ Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance.
+
+ Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance.
+
+ Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance.
+
+ Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance.
+
+ Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance.
+
+ Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance.
+
+ Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance.
+
+ Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance.
+
+ Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance.
+
+ Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance.
+
+ Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance.
+
+ Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance.
+
+ Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance.
+
+ Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance.
+
But then Tim admits Signal can and does hand over conversations to those with subpoena powers:
+
+
in the course of the law-enforcement investigation of the January 6th insurrection, police got access to the traitors’ Signal conversations
+
+
Hmmm. OK. We don’t want to wade into “traitors”. Just to point out, if someone thinks your conversation deserves unmasking, and they can get a subpoena, it will be unmasked. That’s the power of the centralizers.
If the service is centralized, it is not secure from governments. End-to-end encryption sounds neat, but once you interact with an email counterparty not using encryption, the game is up. Requires third-party software to work with email clients/standards.
“The shiny devices we carry around in our pockets have increasingly become malicious tools of governments, law enforcement and even for-profit corporations.”
Redecentralize is an organization seeking “a world of open platforms and protocols with real choices of applications and services for people. We care about privacy, transparency and autonomy. Our organizations and tools should fundamentally be accountable and resilient.” Amen.
In this article, the idea of “money” is defined as the “removal of counterparty risk”. If we think about that, it is a pretty good definition in the context of some “value” to be exchanged between parties with the understanding of the “value” in relation to the parties themselves. That is the risk, removed.
Hosting your own email is hard, but not impossible. The technical aspects are easy. Getting your email to someone with an outlook.com address are practical impossible. But maybe you should just pick up the phone and tell that person Microsoft (for example) doesn’t want them to get email from anyone except those who Microsoft says are “good”. I know, I know, Microsoft is protecting me from “spam” even thought, to be honest, we solved that problem with technology a long time back…
In fact, we privacy advocates don’t have to answer: “a question worth posing to anyone unilaterally opposed to Google’s approach is how big that number would have to be to have made it worthwhile”. One case of child sex exploitation is horrible. However, the issue at root here is really a queasiness with “free will”. The desire is to use “tech” to keep of clear of the bad outcomes from the exercise of human “free will”.
Caring more about the developer than about the user
+
This may be a perenial complaint, but it does seem as if the state of software today is more geared to the company or the developer rather than the user.
We all have a (wifi) router in our homes if we are typically connected to the internet. Here’s some advice how to configure the device in the most secure way possible.
From their description: “Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show to share lessons and take you along the journey…”
You do need to run your own node at home. It’s the best for privacy and securty. But it can be complex, and, with the wrong turn, you can lose Bitcoin.
The US Department of Justice claims they filed the indictment because the firm expressly catered to those committing criminal acts. But actions like this raise concerns about the claims of authorities that encryption, in and of itself, is a prohibited “tool” for sale.
If “the internet” is the fief of government, why can’t they shut it off for a reason like a bad social credit score? Let’s take away the fief. And defeat the idea of social credit scores.
The purpose of this post isn’t to be an apologia for self-hosting email. Rather, it is to highlight the oligarchic behaviors that exist on certain protocols (smtp, etc) and to say that we encourage this behavior when we give up and move to more niche protocols (eg nostr?) In the end, they, the Centralizers own the network. It can be done.
Thunderbird is getting better and better. Among many of the FOSS reasons to use Thunderbird, it’s possible to set up Thunrderbird so that your settings move from machine to machine. Nice! But the integrated calendar was always sub-par. Looks like a future update named “Supernova” will fix that.
We need to return back to pseudonimity and anonymity as the basis for the marketplace EXCEPT when an actual trade of value for value is agreed by all parties.
Starlink will offer global connection to TMobile phones
+
Starlink will provide a means for Tmobile handsets to communicate (SMS, Voice) anywhere on the globe Starlink provides coverage using 3G-equivalent bandwidth.
The purpose of Bitcoin and Lightning is to fully decentralize money. The purpose of Tor is to share as little information on the public network as possible. Together they can be very effective.
This article shows you how to build website analytics without storing information that can reveal a visitor’s identity. If you don’t want it done to you, don’t do it to others. Simple. And the solution is brilliant.
+ US Military Mass Monitors Internet Browsing, Email, Everything
+
+
+
+
+
+
+
+
+ Cincinnatus
+
+
+
+ September 21, 2022
+
+
+
+
+
+
+
+
+
+
+
+
+
+
There’s nothing else to capture except the smell of electricity.
+
The “Augury” platform includes highly sensitive network data that Team Cymru, a private company, is selling to the military. “It’s everything. There’s nothing else to capture except the smell of electricity,” one cybersecurity expert said.
Many “media” or “social” businesses today rely on anadvertising model to pay the bills. However, the model itself begins to distort the message over time because the economic means (advertisers) will dictate what is acceptable content and even, in time, acceptable customers. The solution is value for value.
Going further, value for value can be understood as a way of life, as the site says “a mindset of abundance” where an ecosystem develops of free exchange of “goods” understood as “time, talent, and treasure”.
diff --git a/public/blog/we-kill-people-based-on-metadata/index.html b/public/blog/we-kill-people-based-on-metadata/index.html
new file mode 100644
index 00000000..d7ff898d
--- /dev/null
+++ b/public/blog/we-kill-people-based-on-metadata/index.html
@@ -0,0 +1,312 @@
+
+
+
+
+ We Kill People Based on Metadata
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ We Kill People Based on Metadata
+
+
+
+
+
+
+
+
+ Cincinnatus
+
+
+
+ August 22, 2022
+
+
+
+
+
+
+
+
+
+
+
+
+
+
The NSA and CIA use metadata to determine who should die
+
General Michael Hayden, in a debate with ACLU national legal director David Cole, admitted metadata can be enough to determine if some person is a threat to the US sufficient enough to warrant death.
So… Take action. Get off the metadata supply wagon. “But I’m not a threat to the US security establishment.” No, likely not. But you’re of interest to Mark Zuckerberg and his establishment. You may be alive, but he wants to sell you those most comfortable ever lounging shoes if it’s the last think he does. And Google, also interested. So interested they use your simple metadata to follow you around town like a benvolent advertising deity. Real God, help us!
There’s a simple principle. If it is centralized, it is not secure. It’s the fiat of services. Another note: it’s always “anti corruption” or “anti waste”. Both are just gas-lighting for “anti freedom”.
It’s funny how he’s right on “decentralization” but every one of his implementations was backed by some (evil) centralization scheme. We’re not hear to prove that, just a bold assertion. But he’s right about decentralization.
If the corporation can surveil employees while in the office (and we don’t like this, mind you, but so many have accepted it), what happens when the office is your private home?
For the most part, this means using open data protocols and formats. Not even open-source applications do this today. But this website introduces us to apps that do.
diff --git a/public/index.xml b/public/index.xml
index 0c12a135..1069d1ff 100644
--- a/public/index.xml
+++ b/public/index.xml
@@ -36,6 +36,16 @@ Design Goals Federated Core was built to provide regular users who wanted privac
I have followed bitcoin for over a decade now and one of the best quotes I have seen is from Paul Buchheit, “Bitcoin may be the TCP/IP of money.” Just as TCP/IP facilitated the free flow of information and transformed how we communicate and access data globally, Bitcoin will have a similar impact on the transfer of value and the way we perceive and use money, MoIP, money over Internet protocol!
+
+ Stop Being a Bitch
+ https://www.federated.computer/blog/stop-being-a-bitch/
+ Sat, 27 May 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/stop-being-a-bitch/
+ The Condition Oh, this is different than my iProud! I can’t use that. I don’t understand how to use this…Google does it for me. I don’t care if they are watching me! Everybody likes Furries. What do I have to hide?
+We’d change, but it’s going to mean we can’t benefit from being limp cucks for Microsoft. They will tell us how we should work on our team and what we can or cannot do with our data.
+
+
Digital Sovereign Toolbox
https://www.federated.computer/blog/digital-sovereign-toolbox/
@@ -46,6 +56,16 @@ I have followed bitcoin for over a decade now and one of the best quotes I have
While we have systems running (virtual machines) for Windows and macOS testing, we run Linux on the desktop with most of us choosing to run Pop!_OS. The “tile windows” manager and integration with Federated services makes this a winner.
+
+ Federated Founders and Our Joyent History
+ https://www.federated.computer/blog/federated-founders-and-our-joyent-history/
+ Fri, 26 May 2023 20:18:07 +0600
+
+ https://www.federated.computer/blog/federated-founders-and-our-joyent-history/
+ The Origins of Federated Most of the founders of Federated Computer come from an earlier company that worked on decentralization called “Joyent”. You can read some of that story in a blog post I wrote when Joyent was sold to Samsung at this link.
+The picture above shows the first few engineers and designers who worked on Joyent, including the now tremendously successful Apple, Dallas Cowboys, and other topics blogger and podcast John Gruber in the red shirt.
+
+
The Future of Cloud Computing
https://www.federated.computer/blog/the-future-of-cloud-computing/
@@ -57,6 +77,16 @@ This all seems like old-hat today, but at the time, in the early 2000s, we were
Centralization Sucks What happened with cloud infrastructure is a story, in the technology universe, as old as time.
+
+ Dandelion Root Recipes
+ https://www.federated.computer/blog/dandelion-root-recipes/
+ Sun, 07 May 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/dandelion-root-recipes/
+ Are there ways to use the very common dandelion for good? This time of year in the northern hemisphere, yards can be filled with the yellow-flowered weed. Let’s use them for good.
+https://practicalselfreliance.com/dandelion-root-recipes/
+
+
In Praise of Thunderbird
https://www.federated.computer/blog/in-praise-of-thunderbird/
@@ -97,13 +127,2004 @@ Is it Really “Free”? But let’s get the elephant in
- Federated Founders and Our Joyent History
- https://www.federated.computer/blog/federated-founders-and-our-joyent-history/
- Sun, 06 Sep 2020 20:18:07 +0600
+ Are Google 2FA Secrets Unencrypted?
+ https://www.federated.computer/blog/google-2fa-sync-service/
+ Tue, 25 Apr 2023 00:00:00 +0000
- https://www.federated.computer/blog/federated-founders-and-our-joyent-history/
- The Origins of Federated Most of the founders of Federated Computer come from an earlier company that worked on decentralization called “Joyent”. You can read some of that story in a blog post I wrote when Joyent was sold to Samsung at this link.
-The picture above shows the first few engineers and designers who worked on Joyent, including the now tremendously successful Apple, Dallas Cowboys, and other topics blogger and podcast John Gruber in the red shirt.
+ https://www.federated.computer/blog/google-2fa-sync-service/
+ Looking at how 2FA secrets are synched The synching appears to happen without any encryption. Google sees the secrets. If there is a breach…
+Defcon Social @mysk
+
+
+
+ FBI Watching Internet
+ https://www.federated.computer/blog/fbi-watching-internet/
+ Tue, 25 Apr 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/fbi-watching-internet/
+ Is the FBI abusing access to FISA databases of private communications? The FBI can read out private communications without a warrant or judicial oversight.
+https://www.eff.org/deeplinks/2023/04/internal-documents-show-how-little-fbi-did-correct-misuse-section-702-databases
+
+
+
+ Nostr Daily Stats
+ https://www.federated.computer/blog/nostr-daily-stats/
+ Fri, 21 Apr 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/nostr-daily-stats/
+ How is the decentralized network being used? See how the “next thing” is growing/plateauing/stagnating…
+https://stats.nostr.band/
+This must be a sample since the network is truly decentralized…Right?
+
+
+
+ Digital ID from Hell
+ https://www.federated.computer/blog/who-wef-un-digital-id/
+ Wed, 19 Apr 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/who-wef-un-digital-id/
+ This ID allows our masters at the WHO, UN, and WEF to track us everywhere The World Health Organization, United Nations, and World Economic Forum have a bureaucrats wet dream for tracking plebians wherever they go.
+https://twitter.com/ANTlWEF/status/1648676505562787840?s=20
+
+
+
+ No Health Benefits for Moderate Drinking
+ https://www.federated.computer/blog/dont-drink-to-health/
+ Wed, 05 Apr 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/dont-drink-to-health/
+ Can moderate drinking ever be healthy? It doesn’t look like it is…
+https://www.japantimes.co.jp/news/2023/04/05/world/science-health-world/alcohol-health-studies/
+
+
+
+ Saying Goodbye to Github
+ https://www.federated.computer/blog/saying-goodbye-to-github/
+ Sun, 02 Apr 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/saying-goodbye-to-github/
+ But does Github care? No.
+https://ersei.net/en/blog/bye-bye-github
+It’s too bad he moves from a behemouth centralizer to an up-and-coming centralizer. Will these people never learn?
+
+
+
+ Seven Books for the Self Sovereign Individual
+ https://www.federated.computer/blog/seven-books-for-the-self-sovereign-individual/
+ Sun, 02 Apr 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/seven-books-for-the-self-sovereign-individual/
+ A great list Lots of wonderful ideas in these books…
+https://twitter.com/heyalmoo/status/1642570681194885120
+
+
+
+ Gmail is Breaking Email
+ https://www.federated.computer/blog/gmail-is-breaking-email/
+ Thu, 30 Mar 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/gmail-is-breaking-email/
+ You can’t send email to anyone on/from Gmail The Centralizer makes the rules for email, not the protocol.
+http://www.igregious.com/2023/03/gmail-is-breaking-email.html
+What can be done? Stop communicating to our fiat friends using Gmail?
+
+
+
+ Bill to Ban TikTok Terrifying
+ https://www.federated.computer/blog/bill-to-ban-tiktok/
+ Tue, 28 Mar 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/bill-to-ban-tiktok/
+ It’s really about global surveillance There’s nothing to like about this bill.
+https://twitter.com/greg_price11/status/1640722365809147905
+BTW: Twitter, Facebook, Instagram, Google suck away your metadata and give it to a government, too.
+
+
+
+ TikTok Ban is Patriot Act 2.0
+ https://www.federated.computer/blog/bill-to-ban-tiktok-patriot-act-2/
+ Tue, 28 Mar 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/bill-to-ban-tiktok-patriot-act-2/
+ Get informed. This is a global surveillance gambit.
+https://www.youtube.com/watch?v=FWQGA_n5Z4M
+It has very little to do with “China”.
+
+
+
+ Front Matter CMS
+ https://www.federated.computer/blog/front-matter-cms/
+ Mon, 27 Mar 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/front-matter-cms/
+ A CMS that works with Federated Core Federated Core has a workflow allowing customers to create static-file websites, publish them to their private Gitea repository, and auto-publish to their private Caddy webserver. Front Matter supports this workflow beautifully…
+https://frontmatter.codes/
+It runs inside of Visual Studio Code among other tools allowing you to preview and create great content using Federated Core.
+
+
+
+ KYC Not Me
+ https://www.federated.computer/blog/kyc-not-me/
+ Tue, 21 Mar 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/kyc-not-me/
+ KYC Scores KYC stands for “know your customer” which is another way of saying “surveillance” by the service and/or government interests. The KYCnot dot me website lists lots of websites, many for Bitcoin, and their relative scores for KYC.
+https://kycnot.me/
+There are also listings for VPNs, domains and hosting, phone numbers, and other various services and tools.
+
+
+
+ FedNow Payment System Launching
+ https://www.federated.computer/blog/fednow-payment-system-launching/
+ Wed, 15 Mar 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/fednow-payment-system-launching/
+ Federal Reserve Payments System Moves to the Launchpad Why does the federal government, or any government, need a “payment system” unless the currency itself is property of same?
+https://www.cnbc.com/2023/03/15/long-awaited-fed-digital-payment-system-to-launch-in-july.html
+
+
+
+ Proton Mail Review 2023
+ https://www.federated.computer/blog/proton-mail-review/
+ Tue, 14 Mar 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/proton-mail-review/
+ The Good and the Bad How’s Proton Mail hanging when it comes to being “the most secure email” on the planet?
+https://restoreprivacy.com/email/reviews/protonmail/
+If the service is centralized, it is not secure from governments. End-to-end encryption sounds neat, but once you interact with an email counterparty not using encryption, the game is up. Requires third-party software to work with email clients/standards.
+
+
+
+ Google Drive File Limits
+ https://www.federated.computer/blog/google-drive-file-limits/
+ Sun, 05 Mar 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/google-drive-file-limits/
+ You can’t really use Google Drive any way you want Oh, nevermind. Google reversed themselves after the backlash. The idea was to put a hard limit on the number of files allowed on the service.
+https://arstechnica.com/gadgets/2023/03/google-drive-does-a-surprise-rollout-of-file-limits-locking-out-some-users/
+
+
+
+ Central Bank Digital Currency Amouse Bouche
+ https://www.federated.computer/blog/central-bank-digital-currency-video/
+ Wed, 01 Mar 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/central-bank-digital-currency-video/
+ Fat Man Tells Truth Hey! Let’s digitize all cash to something controlled by the guv’mint so that they can see who is doing what.
+https://twitter.com/ZLOK/status/1639898907529314304?s=20
+A person has to be insane, no, an idiot, to want to get on board with this idea.
+
+
+
+ Let's Build to Steal Everything
+ https://www.federated.computer/blog/lets-build-a-chrome-extension-that-steals-everything/
+ Thu, 23 Feb 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/lets-build-a-chrome-extension-that-steals-everything/
+ Building a Chrome extension to steal everything The wonders of Chrome extensions on all the data they can pilfer…
+https://mattfrisbie.substack.com/p/spy-chrome-extension
+…would this be possible on the “safe” browsers like Brave and Vivaldi? Firefox?
+
+
+
+ Tools to Combat Surveillance
+ https://www.federated.computer/blog/tools-to-combat-surveillance/
+ Tue, 21 Feb 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/tools-to-combat-surveillance/
+ You need some tools to protect yourself What are you doing to protect yourself from pervasive surveillance today?
+https://www.youtube.com/watch?v=s-ny-I8EVH8
+
+
+
+ Building an ARM64 Home Server
+ https://www.federated.computer/blog/building-arm64-server-hard-way/
+ Sun, 19 Feb 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/building-arm64-server-hard-way/
+ This is the hard way Honestly, we don’t recommend this for anyone. But it does give a sense of the power and flexibility available to those wanting to self-host at home. My own self-hosted home server is similar.
+https://jforberg.se/blog/posts/2023-02-19-rockpro64/rockpro64.html
+By the way, there are so many great servers for sale on eBay with 16G ram, Xeon processors, etc. that work very well as a home server without the fragility and for roughly the same initial price.
+
+
+
+ Self Hosting in 2023
+ https://www.federated.computer/blog/self-hosting-in-2023/
+ Sat, 18 Feb 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/self-hosting-in-2023/
+ How to Self Host Your Webpage The long self-hosting journey starts with a first step…
+https://grifel.dev/decentralization/
+…then you discover, to be honest, that’s really how the internet works. A server, a web page. In between are your optimizations.
+
+
+
+ Wading into Nostr
+ https://www.federated.computer/blog/wading-into-nostr/
+ Mon, 13 Feb 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/wading-into-nostr/
+ Some intial descriptions of experience with Nostr One person’s explorations of Nostr (“notes and other stuff using relays”)
+https://stacker.news/items/135975
+We will be writing in-depth about how Federated uses this technlogy.
+
+
+
+ Delete Yourself From The Internet
+ https://www.federated.computer/blog/how-to-delete-yourself-internet/
+ Fri, 10 Feb 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/how-to-delete-yourself-internet/
+ Some advice for deleting your data trail from the internet The get us when we create data, and when we want to delete it…
+https://www.cnbc.com/2023/02/10/how-to-delete-yourself-from-the-internet.html
+
+
+
+ Lastpass Breach Gets Worse
+ https://www.federated.computer/blog/lastpass-breach-gets-worse/
+ Sat, 04 Feb 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/lastpass-breach-gets-worse/
+ The Lastpass breach just gets worse and worse A wonderful post-mortem of the recent Lastpass data breach.
+https://old.reddit.com/r/sysadmin/comments/10kp4ye/lastpass_breach_gets_worse/
+Solution? Get off centralized password managers. Not your keys, not your passwords.
+
+
+
+ Top 10 Privacy Podcasts
+ https://www.federated.computer/blog/top-ten-privacy-podcasts/
+ Thu, 02 Feb 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/top-ten-privacy-podcasts/
+ A list of the top ten privacy podcasts Listen to these podcasts for some great insights on privacy.
+https://privacyplan.net/top-10-privacy-podcasts/
+We all need ways to learn. Listen up!
+
+
+
+ Is Apple Checking Images? Rebuttal.
+ https://www.federated.computer/blog/apple-checking-images-rebuttal/
+ Wed, 18 Jan 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/apple-checking-images-rebuttal/
+ Is Apple checking images we view in the Finder? Little Snitch claims browsing an image sends a message from “mediaanalysisd” to an Apple server.
+https://eclecticlight.co/2023/01/18/is-apple-checking-images-we-view-in-the-finder/
+But it doesn’t appear this is actually happening. But let’s keep investigating.
+
+
+
+ Apple Checking Images? Evidence
+ https://www.federated.computer/blog/apple-checking-images-evidence/
+ Sun, 15 Jan 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/apple-checking-images-evidence/
+ Is Apple checking images we view in the Finder? The evidence for the case that Apple is checking images browsed in the Finder and sending metadata to a remote server.
+https://sneak.berlin/20230115/macos-scans-your-local-files-now/
+We have another post with a rebuttal.
+
+
+
+ Old Phone No Good
+ https://www.federated.computer/blog/old-phone-no-good/
+ Wed, 04 Jan 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/old-phone-no-good/
+ Your old phone is no longer supported We get it, at some point, your Nokia from 2012 just isn’t going to work anymore…
+https://www.youtube.com/watch?v=UxaCUugPoRY
+But should the error be to lock users out of data?
+
+
+
+ What If Web Loses?
+ https://www.federated.computer/blog/what-happens-web-loses/
+ Wed, 04 Jan 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/what-happens-web-loses/
+ What if everything becomes an app on somebody else’s platform? What happens when the only whay we can work or manipulate data is through “proprietary” apps, not the web?
+https://chriscoyier.net/2023/01/04/what-does-it-look-like-for-the-web-to-lose/
+Lock in, much? Lock in = surveillance, boys and girls.
+
+
+
+ Everybody is Under Surveillance
+ https://www.federated.computer/blog/marshall-mcluhan-surveillance-riff/
+ Mon, 02 Jan 2023 00:00:00 +0000
+
+ https://www.federated.computer/blog/marshall-mcluhan-surveillance-riff/
+ Media prophet Marshall McLuhan discusses CIA and FBI surveillance His conclusion we are all, are will be, under surveillance.
+https://twitter.com/bfcarlson/status/1609988081825751041?t=fY1f4HYgh45QSYXP4irXWw&s=19
+“One of the main occupations of mankind.”
+
+
+
+ Privacy is OK
+ https://www.federated.computer/blog/privacy-is-ok/
+ Thu, 29 Dec 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/privacy-is-ok/
+ Tim Bray wants to defend Signal This is really about whether “bad guys” can use Signal. Tim, rightly, says “who cares”. We all need privacy.
+https://www.tbray.org/ongoing/When/202x/2022/12/29/Privacy-is-OK
+But then Tim admits Signal can and does hand over conversations to those with subpoena powers:
+ in the course of the law-enforcement investigation of the January 6th insurrection, police got access to the traitors’ Signal conversations
+ Hmmm. OK. We don’t want to wade into “traitors”.
+
+
+
+ Give Away Bitcoin on a Hotel Door Key
+ https://www.federated.computer/blog/create-your-own-bitcoin-giveaway-card/
+ Wed, 28 Dec 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/create-your-own-bitcoin-giveaway-card/
+ Let’s just say your traditional bank would frown on such behavior Bitcoin is also a technology teeming with new ideas, new innovations.
+https://twitter.com/3d_nout/status/1608245114052247552
+I’m sure your bank wouldn’t allow you to do this with your fiat account. I bet the “bad guys” could use this! :laughing:
+
+
+
+ LastPass Security Incident
+ https://www.federated.computer/blog/lastpass-security-incident/
+ Thu, 22 Dec 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/lastpass-security-incident/
+ LastPass Gets Hacked LastPass, where so many store their sensitive passwords, has a security incident.
+https://blog.lastpass.com/2022/12/notice-of-recent-security-incident/
+An “unauthorized party” got access to the third-party storage where LastPass stores backups. When you’re dealing with cloud services, there is tremendous “counterparty” risk, as they would say in the fiat financial markets. If you’re using a cloud service, that service can swear all day that they are secure…but security is a combination of all the links, including the weak ones.
+
+
+
+ Social Credit Score to Access Internet
+ https://www.federated.computer/blog/social-credit-score-to-access-internet/
+ Thu, 22 Dec 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/social-credit-score-to-access-internet/
+ Not enacted, but recommended under Australian goverment plan This idea was not enacted. But it was thoughtfully considered and proposed by the sitting government of Australia.
+https://twitter.com/BernieSpofforth/status/1602042530845057027
+If “the internet” is the fief of government, why can’t they shut it off for a reason like a bad social credit score? Let’s take away the fief. And defeat the idea of social credit scores.
+
+
+
+ 2022 Year of Desktop Linux
+ https://www.federated.computer/blog/2022-year-of-desktop-linux/
+ Tue, 20 Dec 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/2022-year-of-desktop-linux/
+ Thanks to some Stack Overflow surveys, desktop Linux has arrived for developers According to a developer survey, Linux holds a 9% lead over macOS.
+Year of the Linux Desktop
+It’s getting better and better meaning there is less and less an excuse to support the centralizer operating systems.
+
+
+
+ Time and Attention as Currency
+ https://www.federated.computer/blog/time-and-attention-as-currency/
+ Mon, 19 Dec 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/time-and-attention-as-currency/
+ How the attention economy is ruining us We need to return back to pseudonimity and anonymity as the basis for the marketplace EXCEPT when an actual trade of value for value is agreed by all parties.
+https://twitter.com/dergigi/status/1604785991608172544?s=20&t=ZOA98-7Et7TPpZYI8AHACg
+This is fundamentally impossible without “hard money” and its side-kick “hard digital decentralization”.
+
+
+
+ Gmail Encrypted
+ https://www.federated.computer/blog/gmail-encrypted/
+ Sat, 17 Dec 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/gmail-encrypted/
+ End-to-end encryption for Gmail on the web Metadata still not encrypted.
+https://www.bleepingcomputer.com/news/security/google-introduces-end-to-end-encryption-for-gmail-on-the-web/
+Band-aid on a gaping chest wound. Zzzzz.
+
+
+
+ Google Maps Monopoly
+ https://www.federated.computer/blog/breaking-google-maps-monopoly/
+ Fri, 16 Dec 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/breaking-google-maps-monopoly/
+ Linux, Amazon, Meta, and Microsoft want to break the Google Maps monopoly There’s some bad centralizers in this alliance. And Google Maps is a really nice product! But we need it broken up.
+https://arstechnica.com/gadgets/2022/12/linux-amazon-meta-and-microsoft-want-to-break-the-google-maps-monopoly/
+P.S. There is no “Linux” in the way they use the term. :blush:
+
+
+
+ Symptoms of Fiat Poisoning
+ https://www.federated.computer/blog/symptoms-of-fiat-poisoning/
+ Fri, 16 Dec 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/symptoms-of-fiat-poisoning/
+ Signs you’ve been fiat poisoned Most folks think of bitcoin as the anecdote of fiat.
+https://stacker.news/items/108177
+We think of living a complete self-sovereign lifestyle as the comprehensive anecdote to fiat/arbitrary culture and the poisoning that comes with it.
+
+
+
+ Drowning in AI Garbage
+ https://www.federated.computer/blog/drowning-in-ai-garbage/
+ Mon, 05 Dec 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/drowning-in-ai-garbage/
+ Drowning in AI Generated Garbage It’s a contrarian opinion to opine that AI is anything but garbage (i.e. something written by a 5th grader doing a report). Look, we use ChatGPT to generate the summaries for these link list posts, because we are lazy, and we want to spend more time PC gaming. We’re old school that way. But most of the summaries require a significant amount of re-writing…so how lazy are we after all?
+
+
+
+ Rediscovery of Money
+ https://www.federated.computer/blog/rediscovery-of-money/
+ Fri, 02 Dec 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/rediscovery-of-money/
+ Bitcoin is the Rediscovery of Money In this article, the idea of “money” is defined as the “removal of counterparty risk”. If we think about that, it is a pretty good definition in the context of some “value” to be exchanged between parties with the understanding of the “value” in relation to the parties themselves. That is the risk, removed.
+https://dergigi.com/2022/12/02/bitcoin-is-the-rediscovery-of-money/
+The risk associated with bitcoin today, in as much as we can talk about risk on a time horizon, is one of volatility.
+
+
+
+ The Casino Chip Society
+ https://www.federated.computer/blog/the-casino-chip-society/
+ Wed, 30 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/the-casino-chip-society/
+ One-Type-Of-Money-Illusion This article helps us understand how cash and value works today in our fiat money society. Huh?
+https://brettscott.substack.com/p/casino-chip-cashless-society
+The same principles of data-sovereignty apply to money-sovereignty.
+
+
+
+ Telegram Discloses Names After Ruling
+ https://www.federated.computer/blog/delhi-rules-telegram-discloses/
+ Tue, 29 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/delhi-rules-telegram-discloses/
+ You think your Telegram Data is Secure? If the thing you’re using is centralized, it is so much easier for the “authorities” to compel disclosure of data. Case in point is Telegram who was recently forced to disclose names, phone numbers, and IP address accused of sharing material thought to infringe copyright.
+https://www.livelaw.in/news-updates/after-court-order-telegram-discloses-phone-numbers-ip-addresses-of-users-accused-of-sharing-infringing-material-215311
+The court order was issued by the Delhi High Court in India and required Telegram to disclose the information to the plaintiffs who had filed a copyright infringement case against the users.
+
+
+
+ Checklist for Digital Privacy and Security
+ https://www.federated.computer/blog/checklist-digital-privacy-security/
+ Mon, 28 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/checklist-digital-privacy-security/
+ hWork through them as you get the time…eadline Some of the recommendations are centralizers…but we like the effort and attention to the subject!
+https://twitter.com/_k3tan/status/1597327334004371462?t=_G4DaTq7_p30VkmonGcgSg&s=19
+
+
+
+ Everything About Passphrases
+ https://www.federated.computer/blog/everything-you-need-passphrases/
+ Fri, 25 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/everything-you-need-passphrases/
+ Some best practice for passphrases, private keys, and saving them all in a digital wallet Not your keys, not your _______________. But how do we protect our keys, our passphrases? What are some best practices to consider?
+https://blog.coinkite.com/everything-you-need-to-know-about-passphrases/
+If you’re not incorporating many of these practices into your digital self-sovereign life, then how self-sovereign can you really be?
+
+
+
+ 21 Rules of Bitcoin Maxi
+ https://www.federated.computer/blog/21-rules-of-bitcoin-maxi/
+ Wed, 23 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/21-rules-of-bitcoin-maxi/
+ What can self-sovereign individuals learn from Bitcoin maxis? We love Bitcoin maxis because they give the self-sovereign individual
+21 Rules of a Bitcoin Maxi
+Let’s see how these some of these rules can be applied to the self-sovereign individual even if, horror, they have no interest in Bitcoin.
+ Not your keys. This is the principal of decentralization. We don’t use centralized services where are data is not our own. Stack sats.
+
+
+
+ Privacy Tools for the Information Age
+ https://www.federated.computer/blog/privacy-tools-for-information-age/
+ Wed, 23 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/privacy-tools-for-information-age/
+ Some resources for increasing and protecting your privacy online. A good list of tools and methods you can use to increase and protect your privacy online during this time of all-time-low privacy and self-sovreignty.
+https://secondl1ght.site/blog/privacy-tools
+Many of these tools deserves further exploration and explanation. Some are centralized solutions (and so not our preference).
+
+
+
+ Sneaky Move, Google
+ https://www.federated.computer/blog/google-being-sneaky-maps-permissions/
+ Wed, 23 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/google-being-sneaky-maps-permissions/
+ Allowing a change to maps permissions, opens up your world to Google Maps was and is a ground-breaking service offering from Google.
+https://garrit.xyz/posts/2022-11-24-smart-move-google
+Now they’re bamboozling us to accept permission allowing them to geotrack us across all of their services. Hey kids, just don’t use Google. :kissing_closed_eyes:
+
+
+
+ All Eyes Are On Us.
+ https://www.federated.computer/blog/all-eyes-are-on-us/
+ Tue, 22 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/all-eyes-are-on-us/
+ 5 Eyes, 9 Eyes, 14 Eyes: Protect Yourself From Global Surveillance The fact of our lives today is constant global surveillance. By governments. By corporations.
+https://vpnoverview.com/privacy/anonymous-browsing/5-9-14-eyes/
+You may be shocked to the extent your government spies on you. In a “democracy”. For your “safety”.
+
+
+
+ Counting Unique Visitors Ethically
+ https://www.federated.computer/blog/unique-visitors-without-cookies/
+ Tue, 22 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/unique-visitors-without-cookies/
+ How to count visitors without using cookies A self-sovereign lifestyle means doing to others what you would want doen to yourself, including how you track your website visitors.
+https://notes.normally.com/cookieless-unique-visitor-counts/
+This article shows you how to build website analytics without storing information that can reveal a visitor’s identity. If you don’t want it done to you, don’t do it to others. Simple. And the solution is brilliant.
+
+
+
+ France Says "Non" to Office 365 and Google Workplace
+ https://www.federated.computer/blog/france-says-non/
+ Tue, 22 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/france-says-non/
+ Office 365 and Workplace Shouldn’t be used in classrooms While the free versions of Office 365 and Workplace may be attractive, they vacuum up so much data on students they constitute a form of theft.
+https://www.theregister.com/2022/11/22/france_no_windows_google/
+Free services come with the “bargain” that the provider gets all your information. What a deal! The French say “no”.
+
+
+
+ Bitcoin Lightning Publisher for WordPress
+ https://www.federated.computer/blog/bitcoin-plugin-wordpress/
+ Mon, 21 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/bitcoin-plugin-wordpress/
+ Review of a plugin for WordPress allowing receipt of Bitcoin payments A description of a plugin for Wordpress enabling Bitcoin payments using the Lightning network.
+https://wordpress.org/plugins/bitcoin-lightning-publisher/
+Able to use a number of different Lightning backends.
+
+
+
+ Back to Open Standards
+ https://www.federated.computer/blog/swinging-back-to-open-standards/
+ Thu, 17 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/swinging-back-to-open-standards/
+ Using open standards is the only way to defeat the centralizers A survey of how the more things change, the more they swing back to standards…
+https://puri.sm/posts/swinging-back-to-open-standards/
+PS. really dislike the font (mini-t) of this website. :stuck_out_tongue_closed_eyes:
+
+
+
+ Indian ISPs Give Government Full Access
+ https://www.federated.computer/blog/indian-isps-give-givernment-full-access/
+ Thu, 10 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/indian-isps-give-givernment-full-access/
+ They know when you’ve been naughty, they know when you’re awake… Well, at least, I suppose, they’re being honest about it.
+https://entrackr.com/2022/11/exclusive-indian-isps-we-already-give-govt-full-access-to-web-traffic/
+Or, more likely, just brazen. “What are you going to do about it?”
+
+
+
+ Thunderbird Supernova Preview
+ https://www.federated.computer/blog/thunderbird-supernova-preview/
+ Wed, 09 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/thunderbird-supernova-preview/
+ New calendar design Thunderbird is getting better and better. Among many of the FOSS reasons to use Thunderbird, it’s possible to set up Thunrderbird so that your settings move from machine to machine. Nice! But the integrated calendar was always sub-par. Looks like a future update named “Supernova” will fix that.
+https://blog.thunderbird.net/2022/11/thunderbird-supernova-preview-the-new-calendar-design/
+Check out the Federated Computer documentation for other types re: Thunderbird.
+
+
+
+ Apple Tracks You
+ https://www.federated.computer/blog/apple-tracks-you-in-ios/
+ Tue, 08 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/apple-tracks-you-in-ios/
+ Even when its own privacy setting say ‘no’ tracking… Independent tests suggests Apple is tracking you on iOS even when you’ve disabled sharing “Device Analytics” altogether.
+Apple Tracks You
+It’s Apple. They know best.
+
+
+
+ Building a Self-sovereign Lifestyle
+ https://www.federated.computer/blog/building-a-self-sovereign-lifestyle/
+ Mon, 07 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/building-a-self-sovereign-lifestyle/
+ The permaculture mentality homsteaders have is congruent with Bitcoin low-time-preference mentality What is true, even if you’re not going to homestead, is you need to adopt a homesteading mentality…
+https://bitcoinmagazine.com/culture/building-homesteader-lifestyle-with-bitcoin
+The mentality of a homesteader is one that examines all areas of life to figure out how one can move from centralization to decentralization.
+
+
+
+ Tyranny Looms Via Digital IDs and Currencies
+ https://www.federated.computer/blog/tyranny-looms-digital-ids-cbdc/
+ Sat, 05 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/tyranny-looms-digital-ids-cbdc/
+ Digital IDs and Currencies are means of control Does anyone besides the ruling classes really think digitizing IDs and currencies are anything but a means to control people?
+https://www.lifesitenews.com/blogs/tyranny-looms-as-digital-ids-and-currencies-roll-out-around-the-world/
+
+
+
+ Apple Tracks You in the App Store
+ https://www.federated.computer/blog/apple-tracking-you-in-app-store/
+ Thu, 03 Nov 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/apple-tracking-you-in-app-store/
+ As you browse and tap, Apple is watching “Ahem, we are building a better customer experience…”
+https://twitter.com/mysk_co/status/1588308341780262912
+…for us, Apple.
+
+
+
+ Self Hosting Guide
+ https://www.federated.computer/blog/self-hosting-guide/
+ Tue, 25 Oct 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/self-hosting-guide/
+ A guide for getting started with self hosting A nice guide for all the various services, hardware, clouds, etc available for the person wanting to self-host.
+https://github.com/mikeroyal/Self-Hosting-Guide
+Self-hosting offers freedom and responsibility. There are a number of projects out there that help with the process.
+
+
+
+ Privacy dot com -- Yeah Right
+ https://www.federated.computer/blog/privacy-com-scam/
+ Sat, 22 Oct 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/privacy-com-scam/
+ Why privacy dot com is anything but… If you’re using privacy.com to achieve some “privacy”, you need to read this…
+https://ersei.net/en/blog/privacy-dot-com-yeah-right
+Basically, the thesis of privacy.com is we want to take your (surveilled) credit card transactions and surveil them even more. Suckers!
+
+
+
+ Invisv
+ https://www.federated.computer/blog/invisv/
+ Fri, 21 Oct 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/invisv/
+ Let’s reinvent the wheel Congrats to Invisv for understanding the problem.
+https://invisv.com/
+We have questions, however. Is Invisv centralized? Are all these privacy break-throughs inter-operable with any other open standards, protocols?
+
+
+
+ Katzenpost
+ https://www.federated.computer/blog/katzenpost/
+ Fri, 21 Oct 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/katzenpost/
+ A service to resist on-line surveillance From the post, why end-to-end encryption is not enough: “End-to-end encryption has become more commonplace with major online messaging and communication tools, but encoding what you say to your friends online does not mean that the service provider cannot see who you contacted, when, from where. This metadata might be even more important than the content of an online conversation.”
+https://nlnet.nl/project/katzenpost/
+You have to think about the metadata in the same way we think about how services like Facebook develop “graphs” of us for the purposes of advertising and scores.
+
+
+
+ Basecamp is Leaving the Cloud
+ https://www.federated.computer/blog/basecamp-is-leaving-the-cloud/
+ Wed, 19 Oct 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/basecamp-is-leaving-the-cloud/
+ An explanation Basecamp’s David Heinemeier Hansson explains the departure from the cloud.
+https://world.hey.com/dhh/why-we-re-leaving-the-cloud-654b47e0
+We don’t agree with all the conclusions. Nevertheless, bon voyage! (Oh, side note, notice he mentions “analyze and store” with re: the Hey email service. Centralizer.)
+
+
+
+ iOS 16 Leaks Connections
+ https://www.federated.computer/blog/ios-16-leaks-connections/
+ Tue, 11 Oct 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/ios-16-leaks-connections/
+ But Apple is Muh Secure! Researches discovered iOS 16 communicates with Apple services outide an active VPN tunnel. Huh?
+https://twitter.com/mysk_co/status/1579997801047822336
+They used ProtonVPN and Wireshark for the testing. What’s the solution? Different mobile OS.
+
+
+
+ Apple's Ad Business Booming
+ https://www.federated.computer/blog/apple-ad-business/
+ Mon, 03 Oct 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/apple-ad-business/
+ How do we square a digital, tracking ad business with privacy? It’s hard to see how a company running a $5 billion, and growing, digital (ie. tracking) ad business can be real about protecting privacy.
+https://adguard.com/en/blog/apple-tracking-ads-business.html
+Tim Cook famously said: “You are not our product. You are our customer. You are a jewel, and we care about the user experience.” (2018) But does this line up with Apple’s recent hard charge into the digital advertising business?
+
+
+
+ Whatsapp and Signal Messages Intercepted by Government
+ https://www.federated.computer/blog/whatsapp-messages-intercepted-by-government/
+ Sun, 02 Oct 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/whatsapp-messages-intercepted-by-government/
+ Australian government will be able to intercept WhatsApp and Signal messages If you thought your encypted WhatsApp and Signal messages were secure from surveillance, think again…
+https://www.smh.com.au/politics/federal/national-anti-corruption-commission-will-be-able-to-intercept-whatsapp-messages-a-g-20221002-p5bmis.html
+There’s a simple principle. If it is centralized, it is not secure. It’s the fiat of services. Another note: it’s always “anti corruption” or “anti waste”. Both are just gas-lighting for “anti freedom”.
+
+
+
+ Stop Google Collecting Your Data
+ https://www.federated.computer/blog/how-to-stop-google-collecting/
+ Thu, 29 Sep 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/how-to-stop-google-collecting/
+ Here are the steps you need to take now And overview of how Google collects data and censors…
+https://www.lifesitenews.com/opinion/heres-how-to-stop-google-from-collecting-huge-amounts-of-your-data/
+While this is a great resource for what Google is doing, the recommendations for how to defeat the beast are, in our opinion, simplistic and, on top, don’t lead to true digital self-sovereignty.
+
+
+
+ Get Off Gmail
+ https://www.federated.computer/blog/get-off-gmail/
+ Wed, 28 Sep 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/get-off-gmail/
+ Get off the big tech email providers Here’s a quick mental exercise: if you can’t imagine life without Google, Facebook, Apple or the other big centralized services, then you’re digital freedom is toast.
+https://www.lifesitenews.com/blogs/the-simple-reason-why-you-should-stop-using-gmail/
+Don’t make convenience the master of your freedom.
+
+
+
+ Cryptography Is Not Enough
+ https://www.federated.computer/blog/cryptography-is-not-enough/
+ Thu, 22 Sep 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/cryptography-is-not-enough/
+ Going Beyond Cryptogrpahy This wide-ranging discussion proposes a lifestyle.
+https://dergigi.com/2022/09/10/cryptography-is-not-enough/
+According to the article published by Dergigi, cryptography alone is not sufficient to provide complete security for digital systems and data. While cryptography is an essential tool for protecting data against unauthorized access and tampering, it cannot address all of the security challenges that digital systems face.
+The article notes that cryptography is vulnerable to various attacks, including brute force attacks, side-channel attacks, and quantum attacks, which could potentially compromise the security of encrypted data.
+
+
+
+ Meta Injecting Code to Track
+ https://www.federated.computer/blog/meta-injecting-code-into-websites/
+ Wed, 21 Sep 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/meta-injecting-code-into-websites/
+ Meta and Instagram Rewrite Websites to Track Us This happens when you click on websites in Facebook and Instagram. You’re taken to the link in an in-app browser. Then the hilarity begins.
+https://www.theguardian.com/technology/2022/aug/11/meta-injecting-code-into-websites-visited-by-its-users-to-track-them-research-says
+Solution. Don’t use Facebook, Instagram, all the other Meta shit. Addicted? OK, then stop complaining. You’re hooked up to the Zuckerborg and your actions harvested for profit.
+
+
+
+ US Military Mass Monitors Internet Browsing, Email, Everything
+ https://www.federated.computer/blog/us-military-surveillance-on-internet/
+ Wed, 21 Sep 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/us-military-surveillance-on-internet/
+ There’s nothing else to capture except the smell of electricity. The “Augury” platform includes highly sensitive network data that Team Cymru, a private company, is selling to the military. “It’s everything. There’s nothing else to capture except the smell of electricity,” one cybersecurity expert said.
+https://www.vice.com/en/article/y3pnkw/us-military-bought-mass-monitoring-augury-team-cymru-browsing-email-data
+They violate our privacy for our safety. Is that a good bargain?
+
+
+
+ Fighting Spam
+ https://www.federated.computer/blog/fighting-spam/
+ Sun, 18 Sep 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/fighting-spam/
+ Some practical tips for fighting spam Spam is everywhere. Here are some thoughts about how to fight it.
+https://darthcoin.substack.com/p/avoid-being-spammed
+You’ll want to use an email client like Thunderbird or Mutt to follow the “no images” rule.
+
+
+
+ Choosing the Right BTC/LN Wallet
+ https://www.federated.computer/blog/choose-btc-wallet/
+ Fri, 16 Sep 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/choose-btc-wallet/
+ Some advice for choosing the right Bitcoin and LIghtning Wallet Just like a password manager, choosing the right wallet for bitcoin can be stressful.
+https://stacker.news/items/70725
+As they say: “Think like a bank, not just be a bank.”
+
+
+
+ iPhone = Privacy?
+ https://www.federated.computer/blog/iphone-equals-privacy-question/
+ Thu, 08 Sep 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/iphone-equals-privacy-question/
+ Does using an iPhone mean you have the best privacy solution? Most believe the iPhone is a bastion of privacy. Tim Cook said so…
+https://kerkour.com/iphone-privacy
+Apple has marketed their devices as saving the world from a big brother dystopia. But, like so much gas-lighting these days, it is the savior playing the role of big brother.
+
+
+
+ Replying to Carlos F. "Thrown in the Towel"
+ https://www.federated.computer/blog/reply-to-thrown-in-the-towel/
+ Mon, 05 Sep 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/reply-to-thrown-in-the-towel/
+ Self-hosted Email is the Hardest, but also the Easiest Here’s one response to the post by Carlos F. throwing in the towel for self-hosted email.
+https://vadosware.io/post/its-never-been-easier-or-harder-to-self-host-email/
+Hosting your own email is hard, but not impossible. The technical aspects are easy. Getting your email to someone with an outlook.com address are practical impossible. But maybe you should just pick up the phone and tell that person Microsoft (for example) doesn’t want them to get email from anyone except those who Microsoft says are “good”.
+
+
+
+ How to be a Profitable Lightning Node
+ https://www.federated.computer/blog/how-to-be-a-profitable-lnd-node/
+ Sun, 04 Sep 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/how-to-be-a-profitable-lnd-node/
+ Some tips for how to run a Lightning Node profitably… We think Lightning, in time, will be more for information distribution, and less about Bitcoin payments settlement.
+https://stacker.news/items/66368
+In the meantime, as you begin your Lightning journey…
+
+
+
+ Thrown in the Towel Self-hosting Email
+ https://www.federated.computer/blog/thrown-in-the-towel-email-hosting/
+ Sun, 04 Sep 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/thrown-in-the-towel-email-hosting/
+ The challenges faced by those seeking to self-host email Is it true self-hosting email is a lost cause? Carlos F. seems to think so.
+https://cfenollosa.com/blog/after-self-hosting-my-email-for-twenty-three-years-i-have-thrown-in-the-towel-the-oligopoly-has-won.html
+The purpose of this post isn’t to be an apologia for self-hosting email. Rather, it is to highlight the oligarchic behaviors that exist on certain protocols (smtp, etc) and to say that we encourage this behavior when we give up and move to more niche protocols (eg nostr?
+
+
+
+ Apple Refuses to Cooperate
+ https://www.federated.computer/blog/apple-refuses-to-cooperate/
+ Fri, 02 Sep 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/apple-refuses-to-cooperate/
+ The US Government Seeks Information About App Store Behaviors Apple’s behavior with re: its App Store is notorious…
+http://www.fosspatents.com/2022/09/apple-refuses-to-cooperate-with-us.html
+“Apple taxes, tyrannizes, and “sherlocks” app developers. App developers are victims of Apple’s conduct, and ACT | The App Association–which is actually just an Apple Association–unethically claims to represent the interests of small developers.”
+
+
+
+ How Lightning Address Works
+ https://www.federated.computer/blog/how-a-lightning-address-works/
+ Fri, 02 Sep 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/how-a-lightning-address-works/
+ Lightning invoice basics A nice, brief explainer on how lightning addresses work.
+https://stacker.news/items/65872
+Lightning is the off-chain bitcoin, etc payments clearing technology.
+
+
+
+ Data Broker Rats You Out!
+ https://www.federated.computer/blog/data-broker-helps-police-see-everywhere-youve-been/
+ Thu, 01 Sep 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/data-broker-helps-police-see-everywhere-youve-been/
+ Your data is given to police so that they can see everywhere you’ve been with the click of a mouse. Hey, you’re in the privacy of your home, what could go wrong?
+https://www.eff.org/de/press/releases/data-broker-helps-police-see-everywhere-youve-been-click-mouse-eff-investigation
+Answer: everything. Start taking back your privacy!
+
+
+
+ Rights, Laws, and Google
+ https://www.federated.computer/blog/rights-laws-google/
+ Mon, 29 Aug 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/rights-laws-google/
+ What happens when everything everywhere is scanned A very cautionary tale.
+https://stratechery.com/2022/rights-laws-and-google/
+In fact, we privacy advocates don’t have to answer: “a question worth posing to anyone unilaterally opposed to Google’s approach is how big that number would have to be to have made it worthwhile”. One case of child sex exploitation is horrible. However, the issue at root here is really a queasiness with “free will”. The desire is to use “tech” to keep of clear of the bad outcomes from the exercise of human “free will”.
+
+
+
+ Embracing the Kill Switch
+ https://www.federated.computer/blog/embracing-the-kill-switch/
+ Sun, 28 Aug 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/embracing-the-kill-switch/
+ Governments Embrace Internet Shutdowns as a Form of Control Well, one way to deal with it, if you can’t control it, is to kill it.
+https://www.theguardian.com/technology/2022/aug/29/flicking-the-kill-switch-governments-embrace-internet-shutdowns-as-a-form-of-control
+This will always be an option so long as coercive government (a redundancy) has control over the network itself. The solution is, over time, to build free networks unburdened by government control. Examples are (ham) radio, LORA networks, and other forms of free and uncersorable communication.
+
+
+
+ Employers Are Doing 'Shocking Things' to Monitor Your Productivity
+ https://www.federated.computer/blog/employers-surveill-employees/
+ Fri, 26 Aug 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/employers-surveill-employees/
+ Treating employees like robots is the ‘new normal’ If I can track your every movement while you “work for me”, that sounds more like slavery, than an exchange of goods.
+https://nypost.com/2022/08/26/its-everywhere-workplace-surveillance-methods-now-common/
+Not to mention it is the precursor to replacing humans with robots for which tracking is a must. Be self-sovereign. Don’t work for these sorts of assholes. And if you must, figure out how you are going to escape.
+
+
+
+ TMobile Starlink Link
+ https://www.federated.computer/blog/tmobile-starlink-link/
+ Thu, 25 Aug 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/tmobile-starlink-link/
+ Starlink will offer global connection to TMobile phones Starlink will provide a means for Tmobile handsets to communicate (SMS, Voice) anywhere on the globe Starlink provides coverage using 3G-equivalent bandwidth.
+https://archive.ph/LGnFS
+As if we weren’t tracked enough. :weary:
+
+
+
+ Email Doesn't Suck. It's Email Clients
+ https://www.federated.computer/blog/email-clients-are-bad/
+ Wed, 24 Aug 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/email-clients-are-bad/
+ Email clients need improving. Some thoughts. A shift to web-base email has meant a degradation in the quality of “fat” email clients.
+https://www.wired.com/story/email-clients-are-bad-so-use-vivaldi-mail/
+The author uses Mutt and Vivaldi mail. We suggest contributing time/talent/treasure to Thunderbird mail. Mutt is great, too.
+
+
+
+ Oracle's Worldwide Surveillance Machine
+ https://www.federated.computer/blog/oracle-worldwide-surveillance-machine/
+ Mon, 22 Aug 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/oracle-worldwide-surveillance-machine/
+ The class action lawsuit against a behemouth’s worldwide surveillance machine With dossiers on five billion people (!) which likely means they have one on you and me, what can’t Oracle do?
+https://www.iccl.ie/news/class-action-against-oracle/
+“…and a detailed account of online activity…”
+You have no right to see this information and refute/fix it, if needed.
+
+
+
+ We Kill People Based on Metadata
+ https://www.federated.computer/blog/we-kill-people-based-on-metadata/
+ Mon, 22 Aug 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/we-kill-people-based-on-metadata/
+ The NSA and CIA use metadata to determine who should die General Michael Hayden, in a debate with ACLU national legal director David Cole, admitted metadata can be enough to determine if some person is a threat to the US sufficient enough to warrant death.
+https://darknetlive.com/post/we-kill-people-based-on-metadata-and-other-metadata-things-3b316d3c
+So… Take action. Get off the metadata supply wagon. “But I’m not a threat to the US security establishment.” No, likely not. But you’re of interest to Mark Zuckerberg and his establishment.
+
+
+
+ Googerteller
+ https://www.federated.computer/blog/googerteller/
+ Sun, 21 Aug 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/googerteller/
+ Make music when Google spies on you This little utility provides auditory feedback whenever your browsing/internet activities feed back into the Google.
+https://github.com/berthubert/googerteller
+This demo is pretty hilarious/scary.
+
+
+
+ Bitcoin Seed Backup Device Design
+ https://www.federated.computer/blog/bitcoin-seed-phrase-backup-devices/
+ Sat, 13 Aug 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/bitcoin-seed-phrase-backup-devices/
+ Lessons learned stress testing dozens of seed phrase backup devices The seed phrase is like the password opening up the value of a Bitcoin address. If you lose it, you lose the Bitcoin. So, it is imperative, when using self-custodied Bitcoin address, that you have 100% reliable access to your seed phrase.
+https://blog.lopp.net/a-treatise-on-bitcoin-seed-backup-device-design/
+
+
+
+ E-Mail Done My Way
+ https://www.federated.computer/blog/email-done-my-way/
+ Fri, 05 Aug 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/email-done-my-way/
+ The journey to getting email self-hosting done right One man’s (he’s the Redhat evangelist for EMEA) way of running self-hosted email.
+https://jan.wildeboer.net/2022/08/Email-0-The-Journey-2022/
+As you’ll see, email is a protocol, and an attitude.
+
+
+
+ Huge Scale of US Gov Cell Location Data
+ https://www.federated.computer/blog/huge-scale-of-us-gov-cell-location-data/
+ Fri, 22 Jul 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/huge-scale-of-us-gov-cell-location-data/
+ New documents reveal the US government is tracking cell phone location The ACLU unearthed documents showing the US Department of Homeland Security is using mobile location data to track people’s movements.
+https://techcrunch.com/2022/07/18/homeland-security-cell-phone-tracking/
+The tracking is taking place on a much larger scale that previously known.
+
+
+
+ Awesome Privacy
+ https://www.federated.computer/blog/awesome-privacy/
+ Thu, 21 Jul 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/awesome-privacy/
+ A list of privacy and security-focused apps, software, and providers From the list: “Large data-hungry corporations dominate the digital world but with little, or no respect for your privacy. Migrating to open-source applications with a strong emphasis on security will help stop corporations, governments, and hackers from logging, storing or selling your personal data.”
+https://github.com/Lissy93/awesome-privacy
+It would be even better if this was not hosted on Github. C’est la vie!
+
+
+
+ Personal Security Checklist
+ https://www.federated.computer/blog/personal-security-checklist/
+ Thu, 21 Jul 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/personal-security-checklist/
+ Besides carrying a gun… “A curated checklist of tips to protect your digital security and privacy.”
+https://github.com/Lissy93/personal-security-checklist
+It’s a complete lifestyle, frankly.
+
+
+
+ Awesome FOSS Alternatives
+ https://www.federated.computer/blog/awesome-oss-alternatives/
+ Fri, 15 Jul 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/awesome-oss-alternatives/
+ FOSS solutions to try Here’s another compiled list of FOSS solutions to investigate rather than giving money to centralizer man.
+https://github.com/RunaCapital/awesome-oss-alternatives
+Which ones look promising to you?
+
+
+
+ Layer Three?
+ https://www.federated.computer/blog/what-is-layer-three/
+ Thu, 14 Jul 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/what-is-layer-three/
+ What is layer three? A discussion re: the intersection bitcoin/lightning with the internet…
+https://twitter.com/PompPodcast/status/1547633870702424066?t=ysL2s0wxSyyAqZ-ZQJPTtQ&s=19p
+This is probably what “web 3” should/will be.
+
+
+
+ Redecentralize
+ https://www.federated.computer/blog/redecentralize/
+ Fri, 01 Jul 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/redecentralize/
+ Inttroducing Redecentralize At Federated we support any organization fighting against digital monopolies, surveillance capitalism, and a lack of self-sovreignty.
+https://redecentralize.org/
+Redecentralize is an organization seeking “a world of open platforms and protocols with real choices of applications and services for people. We care about privacy, transparency and autonomy. Our organizations and tools should fundamentally be accountable and resilient.” Amen.
+
+
+
+ Tracing Cameras
+ https://www.federated.computer/blog/tracing-cameras/
+ Fri, 01 Jul 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/tracing-cameras/
+ Using the slight imperfections of the sensor An interesting technique to trace individual digital cameras based on sensor information.
+https://petapixel.com/2022/07/01/police-can-trace-cameras-thanks-to-sensor-imperfection-fingerprints/
+How long until this is used in the wild to track everyone?
+
+
+
+ Build a Gun
+ https://www.federated.computer/blog/build-a-gun/
+ Tue, 24 May 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/build-a-gun/
+ Build a 22 rifle to keep the varmits at bay… Sure, you can buy a rifle, but why not learn about how things work by assembling the parts and building a custom rifle for pest control?
+https://www.youtube.com/watch?v=7D5twkg8HE0&t=304
+
+
+
+ Stop Apple Tracking You
+ https://www.federated.computer/blog/stop-apple-tracking-you/
+ Fri, 01 Apr 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/stop-apple-tracking-you/
+ Ways to keep Apple from tracking you on iOS 14.5 and later Apple stopped other apps from tracking you starting with iOS 14.5…so that they could have all that delicious tracking goodness to appleself.
+https://www.youtube.com/watch?v=7y88gAAIN5g
+What’s the worry? It’s only metadata…
+
+
+
+ Value For Value
+ https://www.federated.computer/blog/value-for-value/
+ Fri, 01 Apr 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/value-for-value/
+ Explanation of Value for Value Many “media” or “social” businesses today rely on anadvertising model to pay the bills. However, the model itself begins to distort the message over time because the economic means (advertisers) will dictate what is acceptable content and even, in time, acceptable customers. The solution is value for value.
+https://value4value.info/
+Going further, value for value can be understood as a way of life, as the site says “a mindset of abundance” where an ecosystem develops of free exchange of “goods” understood as “time, talent, and treasure”.
+
+
+
+ Dangers of Digital Identity
+ https://www.federated.computer/blog/dangers-of-digital-identity/
+ Thu, 24 Mar 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/dangers-of-digital-identity/
+ What happens when your ‘identity’ is simply 1s and 0s? A digital identity isn’t something from you. It is a dossier created by the centralizers to better understand, for themselves, the capabilities in the world allowed to you.
+https://www.boniface-institute.com/the-dangers-of-digital-identity/
+Identity is tied to access in the digital world.
+
+
+
+ Lightning Wallet Comparison
+ https://www.federated.computer/blog/lightning-wallet-comparison/
+ Sun, 27 Feb 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/lightning-wallet-comparison/
+ A look at all the options for Lightning wallets Inevitably this blog post will get more and more out-of-date as time passes…
+https://darthcoin.substack.com/p/lightning-wallets-comparison
+But it provides a nice overview of the different approaches to wallets for holding Bitcoin on the LIghtning network.
+
+
+
+ Apple Looking Like 1990s Microsoft
+ https://www.federated.computer/blog/apple-webapps-browsers/
+ Mon, 24 Jan 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/apple-webapps-browsers/
+ Does it come down to the $20 billion in cash paid annually by Google? Apple really doesn’t want competition on iOS for web browsers…
+https://twitter.com/openwebadvocacy/status/1617802614149894144
+Even Google allows competition on Android! Think of all the tracking offered up by iOS users to Google…
+
+
+
+ Awesome Self-hosted
+ https://www.federated.computer/blog/awesome-self-hosted/
+ Fri, 21 Jan 2022 00:00:00 +0000
+
+ https://www.federated.computer/blog/awesome-self-hosted/
+ Github listing of self-hosted software This is a pretty comprehensive list of software you can self-host across a very wide variety of categories.
+https://github.com/awesome-selfhosted/awesome-selfhosted/blob/master/README.md
+While we think Federated is a pretty good curation of the “best” software for self-hosting out there, this list reminds us there is so, so much more.
+
+
+
+ Is iPhone Usage Data Anonymous?
+ https://www.federated.computer/blog/iphone-usage-data-anonymous/
+ Tue, 23 Nov 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/iphone-usage-data-anonymous/
+ Your iPhone’s Analytics Data Includes an ID Number How anonymous is iPhone usage data after all?
+https://gizmodo.com/apple-iphone-privacy-dsid-analytics-personal-data-test-1849807619
+According to the article published by Gizmodo, Apple’s iPhone was found to be collecting data on users' personal browsing habits through a feature called “DSID Analytics,” which is enabled by default on all devices running iOS 15.
+The report notes that DSID Analytics collects data on users' app usage, search history, and web browsing behavior, which is then sent to Apple’s servers for analysis.
+
+
+
+ Tools to Secure Your Mac
+ https://www.federated.computer/blog/tools-to-protect-macos/
+ Sun, 21 Nov 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/tools-to-protect-macos/
+ A list of tools for protecting and securing your macOS device A nice list of tools you can use to protect and secure your macOS machine.
+https://objective-see.org/tools.html
+This is expert level stuff, but could be helpful for you and protecting those your support.
+
+
+
+ Who Controls the Internet?
+ https://www.federated.computer/blog/who-controls-the-internet/
+ Tue, 02 Nov 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/who-controls-the-internet/
+ From a speech given at NANOG 83 From the guy who created PowerDNS comes an assessment of the ownership and control of the internet today.
+https://berthub.eu/articles/posts/who-controls-the-internet/
+Guess what? It’s not so good…unless we re-double our efforts to take back control.
+
+
+
+ Robosats
+ https://www.federated.computer/blog/robosats/
+ Fri, 29 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/robosats/
+ A simple and private way to exchange Bitcoin for fiat currencies Another great way to buy bitcoin without KYC intrusions.
+https://learn.robosats.com/
+
+
+
+ Anonymous eSIM
+ https://www.federated.computer/blog/silent-link-anonymous-esim/
+ Mon, 25 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/silent-link-anonymous-esim/
+ Really private When you really want to disappear…
+https://silent.link/
+However, the better solution may be to just put down the phone, go outside, and talk a long walk in the sun.
+
+
+
+ Ads in Apple App Store
+ https://www.federated.computer/blog/apple-advertising-app-store/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/apple-advertising-app-store/
+ What happens when the white knight gets down and dirty with the central trackers? Apple has been slowly but surely expanding the reach of ads across their platforms for the past several years.
+https://basicappleguy.com/basicappleblog/you-might-also-like
+What to do? Try Linux. There are plenty of great distributions. Oh, the app you want/need isn’t there? Spin up a Windows VM on your Linux distro for the times you need to bend over. You can even run macOS in a VM.
+
+
+
+ An Allegory
+ https://www.federated.computer/blog/free-services-an-allegory/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/free-services-an-allegory/
+ What happens when we are beholden to free services? Hey, you just wanted to see what the free service could do for you. Despite knowing the dangers. But it is so…
+https://twitter.com/PardesSeleh/status/1534251250744705024
+Please don’t go…!
+
+
+
+ Apple Advertising
+ https://www.federated.computer/blog/apple-is-building-demand-side-platform/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/apple-is-building-demand-side-platform/
+ The fruit is building a demand-side platform Has there been a successful digtial advertising platform that doesn’t track users?
+https://www.insiderintelligence.com/content/apple-will-emerge-advertising-player-watch-2023
+Hey baby, don’t worry. This is Apple. :kissing:
+
+
+
+ Apple turned off a private communication tool in China just before major protests broke out.
+ https://www.federated.computer/blog/apple-turned-off-airdrop/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/apple-turned-off-airdrop/
+ What does it mean when a vendor tells you how to use tools on your device? https://reclaimthenet.org/apple-air-drop-china
+Apple made a change to how AirDrop works in mainland China restricting the way Apple customer could communicate with each other.
+According to the article published by Reclaim The Net on August 10, 2021, Apple has come under scrutiny for allegedly allowing Chinese users to receive unsolicited content through its AirDrop feature. The report states that Chinese users have been receiving unsolicited pornographic images and spam through AirDrop from strangers who are using anonymous usernames.
+
+
+
+ Apple TV Ad Product
+ https://www.federated.computer/blog/apple-tv-ad-product/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/apple-tv-ad-product/
+ Quietly pushing an ad product with media agencies Where will we go for privacy when Apple abandons us to the verdant fields of advertising revenue?
+https://digiday.com/media/apple-is-quietly-pushing-a-tv-ad-product-with-media-agencies/
+To a self-sovereign, distributed, federated future.
+
+
+
+ Bisq
+ https://www.federated.computer/blog/bisq/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/bisq/
+ As in biscuit? Or just no-KYC bitcoin? One of the best ways to buy bitcoin with no KYC.
+https://bisq.network/
+You’ll also feel like a trader walking through a market in the town square. You get to set the deal.
+
+
+
+ Breaches for Everyone!
+ https://www.federated.computer/blog/big-batch-of-breaches/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/big-batch-of-breaches/
+ Looks like lots of centralized services relied on another central service… …and now the whole mass of them are breached.
+https://twitter.com/tayvano_/status/1611131230074073088?s=20&t=NR4Z4aJlKaNg_rHuQVYn7A
+CircleCI is the central culprit. We, the users of these centralized system have no clue whats going on in the entirely opaque background. No clue.
+
+
+
+ BTCMap.org
+ https://www.federated.computer/blog/btcmap-org/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/btcmap-org/
+ Where to spend your bitcoin This is the chicken-and-egg challenge for bitcoin. Money for spending (versus money for store of value).
+https://btcmap.org/map
+The solution is to continue to build communities of common-interest that can build small economies where bitcoin is taken back and forth. Maybe the solution is we all need to be willing and able to take bitcoin?
+
+
+
+ Build Your Own Seedsigner
+ https://www.federated.computer/blog/build-your-own-seedsigner/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/build-your-own-seedsigner/
+ You need a seed signer to keep your Bitcoin safe With this technique, no one will know your seed phrase except the people you tell.
+https://seedsigner.com/
+No trust.
+
+
+
+ Centralization is Cool
+ https://www.federated.computer/blog/moxie-marlinspike-on-centralization/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/moxie-marlinspike-on-centralization/
+ Moxie Marlinspike on Decentralization The (former) CEO of Signal thinks centralization is the way to go…
+https://マリウス.com/moxie-marlinspike-on-decentralization/
+What a surprise. The key argument is that it is too difficult to decentralize. And that decentralization leads to stagnation because we all have to agree on protocols and therefore it is tough to change them. But there are multiple flaws in this way of thinking, and the post lays them out well.
+
+
+
+ Cops Want Mass Surveillance App Secret
+ https://www.federated.computer/blog/mass-surveillance-app-secret/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/mass-surveillance-app-secret/
+ The App ‘Fog Reveal’ is Almost Invisible Another tale of our local law enforcement tracking phones around the neighborhood.
+https://arstechnica.com/tech-policy/2022/09/cops-wanted-to-keep-mass-surveillance-app-secret-privacy-advocates-refused/
+
+
+
+ Corporate Coalition Wants Government Digital ID
+ https://www.federated.computer/blog/corporate-coalition-wants-digital-id/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/corporate-coalition-wants-digital-id/
+ The ‘Better Identify Coalition’ wants better ways to track you It’s a real rogue’s gallery of corporations pushing for a single way to track us no matter what we do on or off the network.
+https://reclaimthenet.org/corporations-push-for-digital-id
+Shame on you Yubico for being part of this proposal. Why mortgage whatever good will you have to kneel at the feet of your corporate overlords?
+
+
+
+ Cryptocurrency, the Jews, and the Fundamental Question of Trust
+ https://www.federated.computer/blog/cryptocurrency-question-of-trust/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/cryptocurrency-question-of-trust/
+ How Bitcoin addressed a problem that has haunted human affairs for 2.5 million years How does the decentralized Bitcoin system work?
+https://www.tabletmag.com/sections/news/articles/cryptocurrency-jews-question-benjamin-samuels
+How Bitcoin solved the trust issue that has plagued societies for millenia. Some precursors to the Diffie-Hellman key exchange are discussed and explained.
+
+
+
+ CSAM Scanning in the EU
+ https://www.federated.computer/blog/automatic-csam-scanning-eu/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/automatic-csam-scanning-eu/
+ Using the pretext of child protection to introduce mass surveillance This is still just a proposal.
+https://tutanota.com/blog/posts/eu-surveillance-csam/
+But the proposal would basically lead to all messages being read all the time. Get off the centralized services. Make it difficult.
+
+
+
+ Does Signal Have a Back Door
+ https://www.federated.computer/blog/signal-has-a-back-door/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/signal-has-a-back-door/
+ Backdoor proven? Further evidence Signal has a back door…
+https://twitter.com/DylanLeClair_/status/1640378672359129088?s=20
+Repeat after us, centralized is no good.
+
+
+
+ Future of Advertising and Information Services
+ https://www.federated.computer/blog/marshall-mcluhan-future-advertising-information-services/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/marshall-mcluhan-future-advertising-information-services/
+ Marshall McLuhan lays it out in 1966 A wonderful look into the future, from the past.
+https://paleofuture.com/blog/2023/1/11/marshall-mcluhan-on-the-future-of-ads-and-the-internet
+One of the insights here is the idea that we enjoy being manipulated, being advertised to because the advertising itself is the beginning of the fulfillment of our desire for an object.
+
+
+
+ GrapheneOS
+ https://www.federated.computer/blog/grapheneos/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/grapheneos/
+ One of the main alternative Andoid distributions You can use a mobile device with lots less tracking than on offer from Google and Apple.
+https://grapheneos.org/
+Just remember, when you leave tracking prison, you leave behind the apps that have your addicted. OK?
+
+
+
+ Home Server Bitcoin Node
+ https://www.federated.computer/blog/setup-home-server-bitcoin-node/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/setup-home-server-bitcoin-node/
+ Caveat: liberating but lots of complexities You do need to run your own node at home. It’s the best for privacy and securty. But it can be complex, and, with the wrong turn, you can lose Bitcoin.
+https://www.expressvpn.com/blog/how-to-set-up-a-home-server-and-use-it-as-a-bitcoin-node/
+But don’t fear. Try it out. Get a feel for it. We need to learn to cook.
+
+
+
+ Home Work is Corporate Surveillance Work
+ https://www.federated.computer/blog/working-from-home-surveillance/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/working-from-home-surveillance/
+ The big man has access to all your waking minutes If the corporation can surveil employees while in the office (and we don’t like this, mind you, but so many have accepted it), what happens when the office is your private home?
+https://www.zerohedge.com/technology/working-home-now-means-letting-corporate-surveillance-your-daily-life
+Maybe the solution is not to carry/have two of everything?
+
+
+
+ How to Stack Sats
+ https://www.federated.computer/blog/how-to-stack-sats/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/how-to-stack-sats/
+ Anyone Can Earn Bitcoin Some great, creative ideas for how to earn and stack satoshis.
+https://www.stacksats.how/
+
+
+
+ Individuals On Lists
+ https://www.federated.computer/blog/no-kyc-aml-lists/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/no-kyc-aml-lists/
+ Digging into the KYC/AML issue You may already be on a list…
+https://www.discreetlog.com/kyc/
+…but you can start to disappear.
+
+
+
+ Instagram Scraping
+ https://www.federated.computer/blog/what-can-others-learn-scraping-instagram/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/what-can-others-learn-scraping-instagram/
+ What can others learn? Scraping social media services is wide-spread (here, Instagram) and highlights the data leaks exploited by many to find out much more about us.
+https://www.socialscrape.com/post/what-is-instagram-scraping
+“Basically anything you can get from a user’s profile can be scraped.” When combined with other information, a user dossier begins to emerge. D’oh!
+
+
+
+ Lastpass Breach Impact on Bitcoin Wallets
+ https://www.federated.computer/blog/impact-of-lastpass-on-bitcoin-wallets/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/impact-of-lastpass-on-bitcoin-wallets/
+ This person lost sats because of the Lastpass breach Can anyone spot how the magical hacker got in?
+https://twitter.com/Cryptopathic/status/1606416137771782151?s=20&t=glD3V7sn8VCOrCeheaWf8w
+A hint: “Having spoken to multiple professionals, it now seems far more likely that my encrypted vault was breached. However, at 100,100 PBKDF2 iterations, it is not realistic to brute force this. I think this situation goes far beyond what has been admitted.”
+That’s right, Lastpass may not have keep the data encrypted or sufficiently encrypted.
+
+
+
+ Learn Bitcoin Interactively
+ https://www.federated.computer/blog/learn-bitcoin-interactively/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/learn-bitcoin-interactively/
+ A tutorial to learn the technical side of bitcoin This neat interactive tutorial teaches you the technical overview of bitcoin.
+https://trybitcoin.satsie.dev/
+
+
+
+ Let Your Boss Monitor Your Brain
+ https://www.federated.computer/blog/monitor-brain-activity/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/monitor-brain-activity/
+ More on the path to treating humans like robots When we are monitored at work, we are treated like machines, not humans.
+https://www.lifesitenews.com/news/world-economic-forum-speaker-touts-technology-that-allows-your-boss-to-monitor-your-brain-activity/
+If this is part of your experience at work, get another job. It is hard, but being surveilled all the time has its impact on our self-worth.
+
+
+
+ LineageOS
+ https://www.federated.computer/blog/lineageos/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/lineageos/
+ One of the main alternative Andoid distributions You can use a mobile device with lots less tracking than on offer from Google and Apple.
+https://lineageos.org/
+Just remember, when you leave tracking prison, you leave behind the apps that have your addicted. OK?
+
+
+
+ Microsoft Killing Custom Domains in Outlook.com
+ https://www.federated.computer/blog/microsoft-killing-custom-domains/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/microsoft-killing-custom-domains/
+ No more individuality for you, slave You won’t be able to use custom domains after November, 2023.
+https://www.bigtechwire.com/2022/11/02/microsoft-is-killing-custom-domain-names-in-outlook-com/
+This is a head-scratcher, for sure. Why would Microsoft do this? Is Google next? It is hard to understand any real technical justification for the move. Ideas?
+
+
+
+ Most Popular Password Manager Hacked
+ https://www.federated.computer/blog/lastpass-hacked/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/lastpass-hacked/
+ Lastpass Hacked, Again Lastpass is the world’s most popular password manager…with hackers, too.
+https://www.bloomberg.com/news/articles/2022-08-25/the-world-s-most-popular-password-manager-says-it-was-hacked
+Solution, host your own password manager. It is possible. Unless you like giving the hackers your passwords…
+
+
+
+ Mutt
+ https://www.federated.computer/blog/mutt/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/mutt/
+ The email client for discerning email users We have instructions on how to use Mutt with a Federated Core.
+http://www.mutt.org/
+Install it on a server your own, and, with the right access controls, you have secure access to your email from everywhere.
+
+
+
+ No Google for Dutch Schools
+ https://www.federated.computer/blog/dutch-schools-must-stop-using-google/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/dutch-schools-must-stop-using-google/
+ Dutch Personal Data Authority raised concerns about Google’s GDPR compliance Google donesn’t carry. They’ll just pay the fines.
+https://tutanota.com/blog/posts/dutch-schools-must-stop-using-google-email-and-cloud-services/
+And they believe we “need” them.
+
+
+
+ No KYC Bitcoin
+ https://www.federated.computer/blog/acquire-non-kyc-bitcoin/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/acquire-non-kyc-bitcoin/
+ 15 methods for acquiring non-kyc bitcoin If you want to acquire bitcoin without an intermediary tracking your identity, here are fifteen options…
+https://sovrnbitcoiner.com/15-methods-to-aquire-non-kyc-bitcoin/
+What have we to hide? Everything! :blush:
+
+
+
+ Oh Signal!
+ https://www.federated.computer/blog/rant-about-signal/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/rant-about-signal/
+ You were the chosen one… Someone else isn’t so impressed with the direction Signal is going these days…
+https://media.ccc.de/v/mch2022-196-signal-you-were-the-chosen-one-
+It’s a real head-scratcher when a “security service” wants to start measuring “engagement”.
+
+
+
+ Opendesktop
+ https://www.federated.computer/blog/opendesktop/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/opendesktop/
+ Introduction to the Opendesktop Project This is a centralized service based, in part, on Nextcloud and other open-source projects.
+https://www.opendesktop.org/
+OpenDesktop.org is a website that provides a platform for open-source software developers and users to share and download various applications, themes, icons, wallpapers, and other digital assets. The website is part of the OpenDesktop Network, which also includes other sites such as KDE-Apps.org, GNOME-Look.org, and XFCE-Look.org.
+OpenDesktop.org is a community-driven platform, where users can contribute their own software and content, as well as interact with other members of the community through forums, blogs, and messaging.
+
+
+
+ Orange Pilled Veteran
+ https://www.federated.computer/blog/orange-pilled-veteran/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/orange-pilled-veteran/
+ Working in the Bitcoin industry Offered to suggest working in the self-sovereign industry should be just as rewarding.
+https://www.zerohedge.com/crypto/one-veterans-story-orange-pilled-green-beret
+We are always hiring at Federated. :smile:
+
+
+
+ Pine64 Project
+ https://www.federated.computer/blog/pine-64-project/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/pine-64-project/
+ Open source hardware and software for desktop, tablet, mobile Pine64 makes some very interesting kit…
+https://www.pine64.org/
+The number of enthusiasts continues to grow month after month.
+
+
+
+ Poste.io
+ https://www.federated.computer/blog/poste-io/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/poste-io/
+ A nice self-hosted email server A nice project for self-hosted email.
+https://poste.io/
+
+
+
+ Private, Secure, Uncensorable Messaging Over LORA
+ https://www.federated.computer/blog/private-secure-lora-messaging/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/private-secure-lora-messaging/
+ How to use the LORA protocol to set up a mesh network for communications The LORA protocol is interesting. Very intersting. There’s a shitcoin project to try to extend LORA across the country. Great idea, bad execution.
+https://unsigned.io/private-messaging-over-lora/
+What would it take to set this up in your own neighborhood or community? Reach out to us if you’d like to do or know more.
+
+
+
+ Proof the NSA Spies on Americans
+ https://www.federated.computer/blog/nsa-collects-data/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/nsa-collects-data/
+ Even when it is against the law. Who cars? Do you? Does anyone care when the NSA breaks US law to spy on Americans in the United States? No, not really. Nothing is done about it. This is fiat surveillance at its finest. High handed. Passed off as “protecting” Americans.
+https://threadreaderapp.com/thread/1587446686393122816.html
+What can be done about it? First, make it much harder by decentralizing everything.
+
+
+
+ QubesOS
+ https://www.federated.computer/blog/qubes/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/qubes/
+ A reasonably secure operating system Qubes is an operating system where most of the userland work happens in sandboxed virtual machines.
+https://www.qubes-os.org/intro/
+With the right hardware resources, you can use multiple “insecure” operating systems at the same time.
+
+
+
+ Reclaiming Mobile Privacy with GrapheneOS
+ https://www.federated.computer/blog/reclaiming-mobile-privacy-grapheneos/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/reclaiming-mobile-privacy-grapheneos/
+ It’s true. It can be done! This is the android distribution many of us at Federated use.
+https://マリウス.com/reclaiming-mobile-privacy-with-grapheneos/
+“The shiny devices we carry around in our pockets have increasingly become malicious tools of governments, law enforcement and even for-profit corporations.”
+
+
+
+ Router Security
+ https://www.federated.computer/blog/router-security-howto/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/router-security-howto/
+ We all have one of these things in our home… We all have a (wifi) router in our homes if we are typically connected to the internet. Here’s some advice how to configure the device in the most secure way possible.
+https://routersecurity.org/#StartHere
+Explore the site for even more great stuff!
+
+
+
+ Safing Firewall
+ https://www.federated.computer/blog/safing-free-open-source-firewall/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/safing-free-open-source-firewall/
+ Free and Open Source A nice, easy-to-undestand firewall for Windows and Linux
+https://link
+Includes a VPN with the paid tier.
+
+
+
+ Scrub Yourself From The Internet
+ https://www.federated.computer/blog/scrub-yourself-from-the-internet/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/scrub-yourself-from-the-internet/
+ Is it even possible? The long journey begins with a single step…
+https://www.msn.com/en-us/news/technology/how-to-scrub-yourself-from-the-internet-the-best-that-you-can/ar-AAYOXe0
+Internet “knowledge” of you is like weight. You’re either adding or you’re losing.
+
+
+
+ Self Hosted Podcast
+ https://www.federated.computer/blog/self-hosted-podcast/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/self-hosted-podcast/
+ A podcast for self-hosters Even if you don’t practice self-hosting using Federated, please practice self-hosting. These guys might be able to provide some guidance!
+https://selfhosted.show/
+From their description: “Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show to share lessons and take you along the journey…”
+
+
+
+ Self Hosted SaaS Tools
+ https://www.federated.computer/blog/self-hosted-saas-tools/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/self-hosted-saas-tools/
+ hSome alternatives to the centralizers Another useful list and assessment.
+https://tedium.co/2023/03/04/self-hosted-saas-app-alternatives/
+Too bad the site is littered with ads for…SaaS companies. :open_mouth:
+
+
+
+ SHA256 Encryption Explained
+ https://www.federated.computer/blog/sha256-algorithm-explained/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/sha256-algorithm-explained/
+ Want to know how the encryption standard works? Wonderful website. More like a “lab” than a textual explainer. Understand through doing.
+https://sha256algorithm.com/
+
+
+
+ Smart Phones Fragment Attention Span
+ https://www.federated.computer/blog/smart-phones-fragment-attention-span/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/smart-phones-fragment-attention-span/
+ Why even care about an attention span? Without an attention span, human intelligence is not capable of producing its magic.
+https://idratherbewriting.com/blog/awakening-moment-to-how-smartphones-fragment-our-attention/
+It is funny when the “solution” is to use the smart phone to help us with “focus”. :satisfied:
+
+
+
+ Surveillance State Making a List
+ https://www.federated.computer/blog/surveillance-state-making-a-list/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/surveillance-state-making-a-list/
+ This Christmas-themed article is a big drag… All the various ways governments and corporations are working hard to watch our every move.
+https://www.zerohedge.com/political/youd-better-watch-out-surveillance-state-making-list-and-youre-it
+The track us on the internet, the mobile phone, our DNA, our face, our spending and consumer activities, public movements…
+We can cloak. It does require a commitment. It can be done.
+
+
+
+ The Fediverse is Inefficient, That's OK
+ https://www.federated.computer/blog/fediverse-is-inefficient-thats-ok/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/fediverse-is-inefficient-thats-ok/
+ Decentralization comes with some slow downs that avoid the dystopian pile up Why having everything move/improve at the speed of whim may not be the best idea.
+https://berk.es/2022/11/08/fediverse-inefficiencies/
+The example provided is Mastodon.
+
+
+
+ The Story of Your Enslavement
+ https://www.federated.computer/blog/the-story-of-your-enslavement/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/the-story-of-your-enslavement/
+ A film essay about the ways and forms of our enslavement A thought-provoking film essay about the ways and means of our quotidian enslavement in the modern world.
+https://youtu.be/eq3jjzI8Gdo
+
+
+
+ TorBox 0.4.0 Released
+ https://www.federated.computer/blog/torbox-release-040/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/torbox-release-040/
+ Creates a WiFi hotspot routing over Tor using Raspberry Pi When you want Tor-routed services for all your wireless/WiFi traffic.
+https://www.torbox.ch/?p=2027
+You can even use this in hotels, for example, even if there is a captive portal, when traveling.
+
+
+
+ Tracking American Cash Transactions
+ https://www.federated.computer/blog/tracking-every-cash-transaction/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/tracking-every-cash-transaction/
+ Wall Street Journal reports program tracks transactions above $500 Homeland Security is using a tool to track cash transactions above $500.
+https://www.rt.com/news/570100-americans-money-transfers-spying/
+As Senator Wyden’s (D-Oregon) investigation showed, this is being done without regard for established legal protections.
+
+
+
+ US Military Captures 93% of Internet
+ https://www.federated.computer/blog/miliatary-captures-internet/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/miliatary-captures-internet/
+ Senator Wyden suggests the military is up to no good They have everything.
+https://www.rt.com/news/563433-augury-military-internet-tracking-wyden/
+Of course, they are breaching privacy for the sake of keeping us “safe”.
+
+
+
+ Why Decentralization Matters
+ https://www.federated.computer/blog/why-decentralization-matters/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/why-decentralization-matters/
+ From the perspective of a notorious shitcoiner… It’s funny how he’s right on “decentralization” but every one of his implementations was backed by some (evil) centralization scheme. We’re not hear to prove that, just a bold assertion. But he’s right about decentralization.
+https://onezero.medium.com/why-decentralization-matters-5e3f79f7638e
+But how could “decentralization” ever be monetized? Value for value. Give people want they want and need and they will pay.
+
+
+
+ Will Your Service/Product Provider Cancel You?
+ https://www.federated.computer/blog/company-risk-assessment/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/company-risk-assessment/
+ One listing of companies and a risk assessment… The company may not like you and show you the door…
+https://1792exchange.com/spotlightreports/
+
+
+
+ Zero Data App
+ https://www.federated.computer/blog/zero-data-app/
+ Thu, 21 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/zero-data-app/
+ Keeping data under your control A nice exposition of the idea that even your apps shouldn’t be barriers to your data.
+https://0data.app/
+For the most part, this means using open data protocols and formats. Not even open-source applications do this today. But this website introduces us to apps that do.
+
+
+
+ Been Pwned?
+ https://www.federated.computer/blog/have-i-been-pawned/
+ Sun, 03 Oct 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/have-i-been-pawned/
+ One of the delights of using centralized services… It’s really just a matter of time before your centralized service leaks your credentials or gets hacked. The honeypot is too valuable for the hackers to ignore.
+https://haveibeenpwned.com/
+Check your status here.
+
+
+
+ Protonmail Bridge Problems
+ https://www.federated.computer/blog/protonmail-bridge-problems/
+ Wed, 29 Sep 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/protonmail-bridge-problems/
+ Message UIDs are not stable When the IDs for messages aren’t stable, whacky things happen.
+https://github.com/ProtonMail/proton-bridge/issues/220
+Note: this is an older note, may have been fixed. Please check the repository.
+
+
+
+ iCloud for Windows Downloads Other People's Photos?
+ https://www.federated.computer/blog/icloud-for-windows-problems/
+ Tue, 14 Sep 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/icloud-for-windows-problems/
+ A Report of Strange Behavior by iCloud for Windows The perils of using centralized storage solutions from a company not known for building great services.
+https://forums.macrumors.com/threads/icloud-for-windows-corrupting-videos-downloading-other-peoples-photos.2370666/
+According to a thread on the MacRumors forums, some users of iCloud for Windows have reported experiencing issues with the service, including corrupted videos and downloading other people’s photos.
+The thread includes reports from users who have experienced issues with iCloud for Windows, such as videos that are downloaded from iCloud being corrupted and unplayable, and photos that belong to other iCloud users being downloaded to their own devices.
+
+
+
+ Rise of User-Hostile Software
+ https://www.federated.computer/blog/rise-of-user-hostile-software/
+ Mon, 23 Aug 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/rise-of-user-hostile-software/
+ Caring more about the developer than about the user This may be a perenial complaint, but it does seem as if the state of software today is more geared to the company or the developer rather than the user.
+https://den.dev/blog/user-hostile-software/
+Open source software fixes this.
+
+
+
+ Why Self-Hosting is Important
+ https://www.federated.computer/blog/why-self-hosting-is-important/
+ Fri, 23 Jul 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/why-self-hosting-is-important/
+ Self-hosting is about freedom Some observations and experiences with regards self-hosting.
+https://dataswamp.org/~solene/2021-07-23-why-selfhosting-is-important.html
+If you’re reading this blog, you probably already know self-hosting is important. It is vital to keeping the internet and our data free.
+
+
+
+ Verified Onion Sites
+ https://www.federated.computer/blog/verified-onion-sites/
+ Wed, 21 Jul 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/verified-onion-sites/
+ An ever growing list of bitcoin and privacy related onion sites Fire up your Tor browser and browse…
+https://sovrnbitcoiner.com/verified-tor-onion-sites/
+A great list of some sites you want to visit using Tor.
+
+
+
+ Understanding Email
+ https://www.federated.computer/blog/understanding-email/
+ Fri, 07 May 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/understanding-email/
+ Email explained from first principles Everything you ever wanted to know about how email works…
+https://explained-from-first-principles.com/email/
+…because you’re going to want to know how it can be improved, protected, best served.
+
+
+
+ Tor-Only Bitcoin and Lightning Guide
+ https://www.federated.computer/blog/tor-only-bitcoin-lightning-guide/
+ Thu, 06 May 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/tor-only-bitcoin-lightning-guide/
+ How to use Bitcoin and Lightning on the Tor network We are big fans of Bitcoin and the Lightning network at Federated and recommend using it over Tor. But it can be technically intimidating.
+https://blog.lopp.net/tor-only-bitcoin-lightning-guide/
+The purpose of Bitcoin and Lightning is to fully decentralize money. The purpose of Tor is to share as little information on the public network as possible. Together they can be very effective.
+
+
+
+ Screw It
+ https://www.federated.computer/blog/screw-it-ill-host-it-myself/
+ Wed, 07 Apr 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/screw-it-ill-host-it-myself/
+ I’ll host it myself As more and more folks have bad experiences with the centralizers, more and more begin to wonder what it would mean to do it all themselves.
+https://www.markozivanovic.com/screw-it-ill-host-it-myself/
+That’s why Federated Core exists. To make it easier. :blush:
+
+
+
+ U.S. Indicts Encrypted Phone CEO
+ https://www.federated.computer/blog/sky-secure-global-indictment/
+ Fri, 12 Mar 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/sky-secure-global-indictment/
+ Claims Sky Global provided service used by criminal networks File this is the “is encryption legal to sell” section.
+https://www.vice.com/en/article/4adzdj/sky-secure-global-indictment
+The US Department of Justice claims they filed the indictment because the firm expressly catered to those committing criminal acts. But actions like this raise concerns about the claims of authorities that encryption, in and of itself, is a prohibited “tool” for sale.
+
+
+
+ Your Financial Information Sent to Facebook
+ https://www.federated.computer/blog/financial-information-facebook/
+ Thu, 11 Mar 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/financial-information-facebook/
+ Tax Filing Services Sending Financial Information to Facebook As if Facebook didn’t know enough about us already…
+https://www.zerohedge.com/technology/appalling-major-tax-filing-services-have-been-sending-financial-information-facebook
+According to an article published by Zero Hedge, some major tax filing services in the US have been sending users' financial information, including their social security numbers and income details, to Facebook through tracking tools on their websites.
+The article states that tax filing services such as TurboTax, H&R Block, and TaxAct have been using tracking tools from Facebook and other third-party companies on their websites, which allow them to collect data on users' browsing behavior and interests.
+
+
+
+ I Want a Computer that I Own
+ https://www.federated.computer/blog/computer-that-i-own/
+ Fri, 26 Feb 2021 00:00:00 +0000
+
+ https://www.federated.computer/blog/computer-that-i-own/
+ Can I Own My Computer? These days, is it possible to own your computer and the data that flows through it?
+http://misc-stuff.terraaeon.com/articles/computer-i-own.html
+Self-ownership means “anonymity” and to “communicate securly with anyone on the planet without being observed by a third party”. Of course, there are a number of parts to this puzzle. The hardware, the client software and operating system, the server hardware, software and operating system, and then the network and the means of utilizing that network.
+
+
+
+ Dropbox is Watching Your Activity
+ https://www.federated.computer/blog/dropbox-is-watching-your-activity/
+ Mon, 12 Oct 2020 00:00:00 +0000
+
+ https://www.federated.computer/blog/dropbox-is-watching-your-activity/
+ Why All the Telemetry? Dropbox sure does collect lots of information…
+Why So Much Telemetry?
+
+
+
+ Online Identity Owned by Email Provider
+ https://www.federated.computer/blog/your-identity-owned-by-email-provider/
+ Fri, 30 Aug 2019 00:00:00 +0000
+
+ https://www.federated.computer/blog/your-identity-owned-by-email-provider/
+ Email is a great way to understand everything about a person If you don’t own or run your email (“not your keys, not your email”), then your on-line identify is owned by your email provider.
+https://www.ctrl.blog/entry/email-identity-provider.html
+This is even true for Proton, kids. Centralization sucks.
+
+
+
+ NSA Worked to Track Bitcoin Users
+ https://www.federated.computer/blog/nsa-worked-to-track-bitcoin-users/
+ Sun, 18 Mar 2018 00:00:00 +0000
+
+ https://www.federated.computer/blog/nsa-worked-to-track-bitcoin-users/
+ NSA Seeks to Track Bitcoin Users In a story from the annals of the obvious… But why? They might as well haul in the whole village looking for the one villager who committed the alledged crime.
+https://theintercept.com/2018/03/20/the-nsa-worked-to-track-down-bitcoin-users-snowden-documents-reveal/
+The National Security Agency (NSA) worked to track down users of the cryptocurrency Bitcoin by analyzing internet traffic and other data sources, according to documents leaked by former NSA contractor Edward Snowden.
+The documents suggest that the NSA was interested in identifying Bitcoin users who may be engaged in illegal activities such as money laundering and drug trafficking.
+
+
+
+ Outlook.com is Silently Discarding Email Messages
+ https://www.federated.computer/blog/outlook-com-discarding-messages/
+ Sun, 11 Jan 2015 00:00:00 +0000
+
+ https://www.federated.computer/blog/outlook-com-discarding-messages/
+ Microsoft knows what is best for you Outlook.com and Hotmail.com won’t receive your email message unless they want to…
+https://blog.paranoidpenguin.net/2015/01/outlook-com-is-silently-discarding-email-messages/
+Microsoft continues to break the protocol. One solution? Don’t email folks with outlook.com and hotmail.com email addresses. Tell them Microsoft has decided what is best.
+
+
+
+ Google Has My Email
+ https://www.federated.computer/blog/google-has-most-of-my-email/
+ Sun, 11 May 2014 00:00:00 +0000
+
+ https://www.federated.computer/blog/google-has-most-of-my-email/
+ Dealing with the problem that is Gmail Even if you run your own email server (or use a service like Federated Core), you will likely be interacting with those using Gmail.
+https://mako.cc/copyrighteous/google-has-most-of-my-email-because-it-has-all-of-yours
+It won’t happen quickly or over-night, but we must choke out Gmail and other centralized emails services (looking at your outlook.com) if we are to reclaim email as a “free” as in “freedom” service.
+
+
+
+ The Original Cypherpunk's Manifesto
+ https://www.federated.computer/blog/cypherpunks-manifesto/
+ Tue, 09 Mar 1993 00:00:00 +0000
+
+ https://www.federated.computer/blog/cypherpunks-manifesto/
+ It starts with privacy The basis for everything we do at Federated Computer.
+https://what.cd/
+Privacy is the conerstone and that is built on anonymous systems.
@@ -214,27 +2235,6 @@ We offer (5) ways to buy Federated Core (either with fiat or BTC). We don&rs
You’ll received a “temporary” domain to test, copy over data, emails, photos, everything, before you switch over to your “real” domain.
-
- Sovereign Reset
- https://www.federated.computer/sovereignreset/
- Mon, 01 Jan 0001 00:00:00 +0000
-
- https://www.federated.computer/sovereignreset/
- We started Sovereign Reset to provide a place to talk about living a sovereign lifestyle in full beyond just digital sovereignty.
-Sovereign Reset is a partnership between Federated Computer and a number of individuals and companies in the areas of:
- food relationships digital health exercise money There is a weekly Sovereign Reset Podcast where we talk with interesting individuals working around the globe to bring the sovereign lifestyle to others.
-
-
-
- Stop Being a Bitch
- https://www.federated.computer/blog/stop-being-a-bitch/
- Mon, 01 Jan 0001 00:00:00 +0000
-
- https://www.federated.computer/blog/stop-being-a-bitch/
- The Condition Oh, this is different than my iProud! I can’t use that. I don’t understand how to use this…Google does it for me. I don’t care if they are watching me! Everybody likes Furries. What do I have to hide?
-We’d change, but it’s going to mean we can’t benefit from being limp cucks for Microsoft. They will tell us how we should work on our team and what we can or cannot do with our data.
-
-
Support
https://www.federated.computer/support/
diff --git a/public/merchandise/index.html b/public/merchandise/index.html
index 22344ad3..c8bf2f87 100644
--- a/public/merchandise/index.html
+++ b/public/merchandise/index.html
@@ -103,11 +103,7 @@