Anonymity Is No Longer Optional

by | Jan 20, 2020

Anonymity Is No Longer Optional

by | Jan 20, 2020

Mechanic: Lemme tell you what you want. You wanna come and go like the wind. Invincible, invulnerable, invisible.

Customer: And I want it Thursday at nine.

~ Running Scared, film, 1986 

You want to be free. You want to have your property safe from thieves. You want your communications safe from spies. You want your family safe from outrage. You want to be left alone and not be bothered by bullies or hoodlums or busybodies. 

During the same period that the Internet was coming together there were two growing movements. One was open source software: better and thoroughly verified software that does exactly what the user wants. The other was public key cryptography, taking enormous strides toward communications privacy. Then, eleven years ago, came Bitcoin, combining these technologies. 

These things brought the promise of financial autonomy, meaningful privacy, and real alternatives to the “trusted intermediary” model. We see from the proliferation of hundreds of billions of dollars worth of market capitalization in crypto-currencies, and the designs of many new currencies, that a great deal of work has been done. We can also see that the promise has not been met. 

Surveillance technologies are very powerful. Chain analysis technologies combine “big data” with traffic analysis and careful examination of information included in transactions. Combined, these blow right through your privacy. 

Privacy coins have developed to address parts of this problem, especially by mixing small transactions. But as long as your connection to the Internet reveals your location, you have no privacy. 

Google Sits Athwart Your Web Browsing You may not use Google search, and you may have a private email address that isn’t served by Google Suite. These are good choices on your part. But did you know that millions of web sites are built with Google tools? Even web portals dedicated to individual freedom have Google scripts embedded in their pages. Here’s an example. 

  • Facebook
  • Twitter
  • Pinterest
  • reddit
  • LinkedIn
  • Buffer

The upper right part of this screen capture above shows dialogue from NoScript. You can see that a Google-related site and a Stripe site are involved. Loading the page with all of the scripts means that your web browsing activity is connected directly to Google. And we know (from WikiLeaks, Edward Snowden and others) that Google and other tech companies sell their data to corporations and governments world-wide. 

The people who buy the data sets from Microsoft, Google, Apple, Amazon, Facebook, Twitter, and others know everything about you: Which sibling you communicate with most often, what you really think of your boss and more. Everything you say, everything you see, everything you buy, everything you do online can be monitored if you browse directly through a normal connection. And the companies that buy your data wouldn’t part with their money unless they meant to use it in ways you wouldn’t. 

You Can Be Anonymous Since privacy, even with encrypted communications, is compromised when your communications are associated with your identity, what you need is anonymity. You really can’t be free without it. 

How do you get it? With a multi-hop, multiple-jurisdiction virtual privacy network… with an anonymous VPN

Multi-hop means two or more hops, so there is no direct tunneling. (A direct tunnel is a kind of VPN, but not a very effective one.) Two or more hops allow for traffic mixing and actual anonymity. Having the hops go through more than one jurisdiction makes tracing communications much more operationally complex. 

A company which has provided effective multi-hop, multi-jurisdiction VPN services for many years is Their system is jurisdictionally aware and they have service options for both individuals and businesses. 

Yes, there is “the onion router,” or TOR, but it simply isn’t usable for general surfing. You can try it yourself and see. 

If you want to be free you need anonymity; encryption alone is not enough. You can have private Internet communications only with anonymous access. 

==== Jim Davidson sent his first email in 1978, started posting on USEnet in 1982, and has studied, used, and taught encryption since 1992. He has traveled in Europe, Asia, Africa, and North America, and is one of the few voluntaryists who has lived in Somalia. You can connect with Jim at and elsewhere online such as 

About Jim Davidson

Jim Davidson is a speaker, teacher, consultant, forensic accountant, author, actor, and entrepreneur with thirty years experience in estate planning, financial planning, and trusts. Currently the chief financial officer of three start-ups and vision director of Houston Space Society, Jim has been the founder and chancellor of Individual Sovereign University since 2009. He has worked since 1983 in banking, aerospace, financial planning, trusts, estate planning, real estate, entertainment, software development, finance, health practice management, management consulting, free port development, toll road development, fishing fleet development, digital gold currency exchange operations, private venture capital stock exchange operations, gold and silver coin sales, museum acquisitions, private equity, crypto-currency technology development, and university development. He is a published author of four books and hundreds of essays and articles. He has been involved in digital currencies since 1998. Starting at age 8 in the recycling business, Jim has owned and operated 17 businesses in various industries. He advanced rapidly in his term-time banking career while in college, and began writing business plans in 1986. He has been involved in business planning and financing for over 200 small businesses, which collectively raised in excess of $600 million with his involvement. His aerospace career included launch vehicle systems development, launch vehicle logistics management, voice of launch control, publicity, marketing, satellite launch sales, and a pioneering role in space tourism in 1991. His work in real estate included the development of $250 million in single family homes in Friendswood, Texas including road design, lot preparation, and housing contractor management. In software development he built database software, practice management software for chiropractors and medical doctors, and provided documentation expertise for enterprise encrypted storage software. Jim's management consulting practice began in 1995 with clients in the United States, Europe, Africa, and Asia. Beginning in 1978, Jim worked as a teacher including private tutoring, public community college and private school settings. He has taught mathematics, European and American history, office application software, database development, economics, Somali studies, space settlement systems development, business planning, encryption software operation, and a survey on cyber-security. Jim was educated at the University of Kansas, Columbia University in the City of New York, Rice University's Jesse H. Jones graduate school of business administration, and Individual Sovereign University. He has an MBA in marketing and entrepreneurship (Rice 1987) and a bachelors degree in history (Columbia 1985). He won several trophies in debate, studied the violin, drama, and martial arts. He's acted on stage and screen and has travelled extensively in Africa, Asia, Europe, and North America. His honours include the National Distillers Association's National Merit Scholarship (1981); the degree of distinction in the Natoinal Forensic League (1980); John Jay scholarships (1981-82); Kansas scholar; and membership in the Dayton Friends Meeting. +1-937-853-6986

Our Books

9 libooksjuly2023sm

Related Articles


Someone Wants ‘the War to Continue’

Someone Wants ‘the War to Continue’

At times, Ukraine has been unwilling to negotiate an end to the ongoing war with Russia. Ukrainian President Volodymyr Zelensky has gone so far as to issue a decree banning negotiations with Russian President Vladimir Putin. At other times, Russia has given up on...

read more
Losing a Plane? Try Losing a Nuke

Losing a Plane? Try Losing a Nuke

Recently, the U.S. Marine Corps lost (and later found) an F-35 aircraft. The circumstances are mostly undisclosed or rumor based, though that is to be expected in regards to such a sensitive matter. While it has become a comical example of incompetence, it’s not the...

read more
TGIF: Limited Government’s Bait and Switch

TGIF: Limited Government’s Bait and Switch

In a fundamental respect, libertarian minarchism (minimal, or limited, government) and market anarchism (or anarcho-capitalism) have something important in common: neither can guarantee individual rights. But there's a big difference: unlike market anarchism,...

read more

Pin It on Pinterest

Share This