Anonymity Is No Longer Optional

by | Jan 20, 2020

Anonymity Is No Longer Optional

by | Jan 20, 2020

Mechanic: Lemme tell you what you want. You wanna come and go like the wind. Invincible, invulnerable, invisible.

Customer: And I want it Thursday at nine.

~ Running Scared, film, 1986 

You want to be free. You want to have your property safe from thieves. You want your communications safe from spies. You want your family safe from outrage. You want to be left alone and not be bothered by bullies or hoodlums or busybodies. 

During the same period that the Internet was coming together there were two growing movements. One was open source software: better and thoroughly verified software that does exactly what the user wants. The other was public key cryptography, taking enormous strides toward communications privacy. Then, eleven years ago, came Bitcoin, combining these technologies. 

These things brought the promise of financial autonomy, meaningful privacy, and real alternatives to the “trusted intermediary” model. We see from the proliferation of hundreds of billions of dollars worth of market capitalization in crypto-currencies, and the designs of many new currencies, that a great deal of work has been done. We can also see that the promise has not been met. 

Surveillance technologies are very powerful. Chain analysis technologies combine “big data” with traffic analysis and careful examination of information included in transactions. Combined, these blow right through your privacy. 

Privacy coins have developed to address parts of this problem, especially by mixing small transactions. But as long as your connection to the Internet reveals your location, you have no privacy. 

Google Sits Athwart Your Web Browsing You may not use Google search, and you may have a private email address that isn’t served by Google Suite. These are good choices on your part. But did you know that millions of web sites are built with Google tools? Even web portals dedicated to individual freedom have Google scripts embedded in their pages. Here’s an example. 

The upper right part of this screen capture above shows dialogue from NoScript. You can see that a Google-related site and a Stripe site are involved. Loading the page with all of the scripts means that your web browsing activity is connected directly to Google. And we know (from WikiLeaks, Edward Snowden and others) that Google and other tech companies sell their data to corporations and governments world-wide. 

The people who buy the data sets from Microsoft, Google, Apple, Amazon, Facebook, Twitter, and others know everything about you: Which sibling you communicate with most often, what you really think of your boss and more. Everything you say, everything you see, everything you buy, everything you do online can be monitored if you browse directly through a normal connection. And the companies that buy your data wouldn’t part with their money unless they meant to use it in ways you wouldn’t. 

You Can Be Anonymous Since privacy, even with encrypted communications, is compromised when your communications are associated with your identity, what you need is anonymity. You really can’t be free without it. 

How do you get it? With a multi-hop, multiple-jurisdiction virtual privacy network… with an anonymous VPN

Multi-hop means two or more hops, so there is no direct tunneling. (A direct tunnel is a kind of VPN, but not a very effective one.) Two or more hops allow for traffic mixing and actual anonymity. Having the hops go through more than one jurisdiction makes tracing communications much more operationally complex. 

A company which has provided effective multi-hop, multi-jurisdiction VPN services for many years is 

Cryptohippie.com. Their system is jurisdictionally aware and they have service options for both individuals and businesses. 

Yes, there is “the onion router,” or TOR, but it simply isn’t usable for general surfing. You can try it yourself and see. 

If you want to be free you need anonymity; encryption alone is not enough. You can have private Internet communications only with anonymous access. 

==== Jim Davidson sent his first email in 1978, started posting on USEnet in 1982, and has studied, used, and taught encryption since 1992. He has traveled in Europe, Asia, Africa, and North America, and is one of the few voluntaryists who has lived in Somalia. You can connect with Jim at flote.app/planetaryjim and elsewhere online such as KanehCN3.com 

About Jim Davidson

Jim Davidson is a speaker, teacher, consultant, forensic accountant, author, actor, and entrepreneur with thirty years experience in estate planning, financial planning, and trusts. Currently the chief financial officer of three start-ups and vision director of Houston Space Society, Jim has been the founder and chancellor of Individual Sovereign University since 2009. He has worked since 1983 in banking, aerospace, financial planning, trusts, estate planning, real estate, entertainment, software development, finance, health practice management, management consulting, free port development, toll road development, fishing fleet development, digital gold currency exchange operations, private venture capital stock exchange operations, gold and silver coin sales, museum acquisitions, private equity, crypto-currency technology development, and university development. He is a published author of four books and hundreds of essays and articles. He has been involved in digital currencies since 1998. Starting at age 8 in the recycling business, Jim has owned and operated 17 businesses in various industries. He advanced rapidly in his term-time banking career while in college, and began writing business plans in 1986. He has been involved in business planning and financing for over 200 small businesses, which collectively raised in excess of $600 million with his involvement. His aerospace career included launch vehicle systems development, launch vehicle logistics management, voice of launch control, publicity, marketing, satellite launch sales, and a pioneering role in space tourism in 1991. His work in real estate included the development of $250 million in single family homes in Friendswood, Texas including road design, lot preparation, and housing contractor management. In software development he built database software, practice management software for chiropractors and medical doctors, and provided documentation expertise for enterprise encrypted storage software. Jim's management consulting practice began in 1995 with clients in the United States, Europe, Africa, and Asia. Beginning in 1978, Jim worked as a teacher including private tutoring, public community college and private school settings. He has taught mathematics, European and American history, office application software, database development, economics, Somali studies, space settlement systems development, business planning, encryption software operation, and a survey on cyber-security. Jim was educated at the University of Kansas, Columbia University in the City of New York, Rice University's Jesse H. Jones graduate school of business administration, and Individual Sovereign University. He has an MBA in marketing and entrepreneurship (Rice 1987) and a bachelors degree in history (Columbia 1985). He won several trophies in debate, studied the violin, drama, and martial arts. He's acted on stage and screen and has travelled extensively in Africa, Asia, Europe, and North America. His honours include the National Distillers Association's National Merit Scholarship (1981); the degree of distinction in the Natoinal Forensic League (1980); John Jay scholarships (1981-82); Kansas scholar; and membership in the Dayton Friends Meeting. +1-937-853-6986 jim@resilientways.net www.eldarcapital.com

Our Books

5 Libooks072420lg

Our Books

5 Libooks072420lg

Related Articles

Related

How the Pentagon Looted America’s PPE Funding

How the Pentagon Looted America’s PPE Funding

After six months of state-imposed lockdown, the United States faces nationwide mask and COVID test shortages, record high unemployment rates, and over 200,000 COVID-related deaths. Since Congress passed the $2.2 trillion Coronavirus Aid, Relief, and Economic Security...

read more
The Individual Against the Odds

The Individual Against the Odds

There is a genre in fiction that celebrates an individual's adversity against seemingly impossible odds. Whether this is a person who takes the war to organised crime (Mack Bolan), a secret agent saving the world for their government (James Bond), a wronged loner lost...

read more
Are States Inevitable? Ep. 131

Are States Inevitable? Ep. 131

https://youtu.be/4KiNyw7uSx8 If the governments of the world have formed and persist in a state of anarchy, does it follow that the State is an inevitable institution? How would a libertarian anarchist society prevent being conquered by a state or prevent itself from...

read more
What ‘Experts’ Miss About Economic Inequality

What ‘Experts’ Miss About Economic Inequality

How can the U.S. reduce economic inequality? That’s a question USA Today posed to three “policy experts on the left and the right” in this recent article. The responses, while unsurprising, were nevertheless disappointing. For libertarians, economic inequality itself...

read more
How the Military is Using Your Data to Fight China

How the Military is Using Your Data to Fight China

A new generation of Cold Warriors want your data to build artificial intelligence-powered weapons for their escalating conflict with China. This has been made explicit by the U.S. National Security Commission on Artificial Intelligence (NSCAI), a relatively new and...

read more
Book Foolssm

Fool’s Errand: Time to End the War in Afghanistan

by Scott Horton

Book Paulsm

The Great Ron Paul

by Scott Horton

Book Griggsm

No Quarter: The Ravings of William Norman Grigg

by Will Grigg

Book Animalssm

What Social Animals Owe to Each Other

by Sheldon Richman

Book Palestinesm

Coming to Palestine

by Sheldon Richman

Pin It on Pinterest

Share This