Anonymity Is No Longer Optional

by | Jan 20, 2020

Anonymity Is No Longer Optional

by | Jan 20, 2020

Mechanic: Lemme tell you what you want. You wanna come and go like the wind. Invincible, invulnerable, invisible.

Customer: And I want it Thursday at nine.

~ Running Scared, film, 1986 

You want to be free. You want to have your property safe from thieves. You want your communications safe from spies. You want your family safe from outrage. You want to be left alone and not be bothered by bullies or hoodlums or busybodies. 

During the same period that the Internet was coming together there were two growing movements. One was open source software: better and thoroughly verified software that does exactly what the user wants. The other was public key cryptography, taking enormous strides toward communications privacy. Then, eleven years ago, came Bitcoin, combining these technologies. 

These things brought the promise of financial autonomy, meaningful privacy, and real alternatives to the “trusted intermediary” model. We see from the proliferation of hundreds of billions of dollars worth of market capitalization in crypto-currencies, and the designs of many new currencies, that a great deal of work has been done. We can also see that the promise has not been met. 

Surveillance technologies are very powerful. Chain analysis technologies combine “big data” with traffic analysis and careful examination of information included in transactions. Combined, these blow right through your privacy. 

Privacy coins have developed to address parts of this problem, especially by mixing small transactions. But as long as your connection to the Internet reveals your location, you have no privacy. 

Google Sits Athwart Your Web Browsing You may not use Google search, and you may have a private email address that isn’t served by Google Suite. These are good choices on your part. But did you know that millions of web sites are built with Google tools? Even web portals dedicated to individual freedom have Google scripts embedded in their pages. Here’s an example. 

The upper right part of this screen capture above shows dialogue from NoScript. You can see that a Google-related site and a Stripe site are involved. Loading the page with all of the scripts means that your web browsing activity is connected directly to Google. And we know (from WikiLeaks, Edward Snowden and others) that Google and other tech companies sell their data to corporations and governments world-wide. 

The people who buy the data sets from Microsoft, Google, Apple, Amazon, Facebook, Twitter, and others know everything about you: Which sibling you communicate with most often, what you really think of your boss and more. Everything you say, everything you see, everything you buy, everything you do online can be monitored if you browse directly through a normal connection. And the companies that buy your data wouldn’t part with their money unless they meant to use it in ways you wouldn’t. 

You Can Be Anonymous Since privacy, even with encrypted communications, is compromised when your communications are associated with your identity, what you need is anonymity. You really can’t be free without it. 

How do you get it? With a multi-hop, multiple-jurisdiction virtual privacy network… with an anonymous VPN

Multi-hop means two or more hops, so there is no direct tunneling. (A direct tunnel is a kind of VPN, but not a very effective one.) Two or more hops allow for traffic mixing and actual anonymity. Having the hops go through more than one jurisdiction makes tracing communications much more operationally complex. 

A company which has provided effective multi-hop, multi-jurisdiction VPN services for many years is 

Cryptohippie.com. Their system is jurisdictionally aware and they have service options for both individuals and businesses. 

Yes, there is “the onion router,” or TOR, but it simply isn’t usable for general surfing. You can try it yourself and see. 

If you want to be free you need anonymity; encryption alone is not enough. You can have private Internet communications only with anonymous access. 

==== Jim Davidson sent his first email in 1978, started posting on USEnet in 1982, and has studied, used, and taught encryption since 1992. He has traveled in Europe, Asia, Africa, and North America, and is one of the few voluntaryists who has lived in Somalia. You can connect with Jim at flote.app/planetaryjim and elsewhere online such as KanehCN3.com 

About Jim Davidson

Jim Davidson is a speaker, teacher, consultant, forensic accountant, author, actor, and entrepreneur with thirty years experience in estate planning, financial planning, and trusts. Currently the chief financial officer of three start-ups and vision director of Houston Space Society, Jim has been the founder and chancellor of Individual Sovereign University since 2009. He has worked since 1983 in banking, aerospace, financial planning, trusts, estate planning, real estate, entertainment, software development, finance, health practice management, management consulting, free port development, toll road development, fishing fleet development, digital gold currency exchange operations, private venture capital stock exchange operations, gold and silver coin sales, museum acquisitions, private equity, crypto-currency technology development, and university development. He is a published author of four books and hundreds of essays and articles. He has been involved in digital currencies since 1998. Starting at age 8 in the recycling business, Jim has owned and operated 17 businesses in various industries. He advanced rapidly in his term-time banking career while in college, and began writing business plans in 1986. He has been involved in business planning and financing for over 200 small businesses, which collectively raised in excess of $600 million with his involvement. His aerospace career included launch vehicle systems development, launch vehicle logistics management, voice of launch control, publicity, marketing, satellite launch sales, and a pioneering role in space tourism in 1991. His work in real estate included the development of $250 million in single family homes in Friendswood, Texas including road design, lot preparation, and housing contractor management. In software development he built database software, practice management software for chiropractors and medical doctors, and provided documentation expertise for enterprise encrypted storage software. Jim's management consulting practice began in 1995 with clients in the United States, Europe, Africa, and Asia. Beginning in 1978, Jim worked as a teacher including private tutoring, public community college and private school settings. He has taught mathematics, European and American history, office application software, database development, economics, Somali studies, space settlement systems development, business planning, encryption software operation, and a survey on cyber-security. Jim was educated at the University of Kansas, Columbia University in the City of New York, Rice University's Jesse H. Jones graduate school of business administration, and Individual Sovereign University. He has an MBA in marketing and entrepreneurship (Rice 1987) and a bachelors degree in history (Columbia 1985). He won several trophies in debate, studied the violin, drama, and martial arts. He's acted on stage and screen and has travelled extensively in Africa, Asia, Europe, and North America. His honours include the National Distillers Association's National Merit Scholarship (1981); the degree of distinction in the Natoinal Forensic League (1980); John Jay scholarships (1981-82); Kansas scholar; and membership in the Dayton Friends Meeting. +1-937-853-6986 jim@resilientways.net www.eldarcapital.com

Our Books

latest book lineup.

Related Articles

Related

TGIF: Spooner versus bin Laden

TGIF: Spooner versus bin Laden

In his 2002 letter to America justifying the savage 9/11 attacks, al Qaeda leader Osama bin Laden (himself killed in 2011) wrote after listing his grievances against the U.S. government: You may then dispute that all the above does not justify aggression against...

read more
What Killed the Peace Talks in Ukraine?

What Killed the Peace Talks in Ukraine?

The accepted Western narrative is that, in February 2022, Russia launched a full-scale invasion of Ukraine with the intent of conquering the entire country. But there is a competing narrative that is compelling enough to be worthy of consideration. Following the...

read more
America is a Democracy (That’s the Problem)

America is a Democracy (That’s the Problem)

Our rulers constantly talk about “our democracy,” often while justifying doing things which are profoundly anti-democratic. A common midwit response is, “America is not a democracy, it is a republic.” While your ninth grade history teacher may have felt smart telling...

read more
April 20, 2024: Final Nail in America’s Coffin?

April 20, 2024: Final Nail in America’s Coffin?

When future historians go searching for the final nail in the U.S. coffin, they may well settle on the date April 20, 2024. On that day Congress passed legislation to fund two and a half wars, hand what’s left of our privacy over to the CIA and NSA, and give the U.S....

read more