Skip to main content

Security Layers

First, the bad news. You can't do anything about the top layer. The secret services, spy agencies, Deep State, will always know everything about you. They have access to the databases, to the hardware unique identifiers, to the network operators metadata, to the cloud data centers, to the on premises servers backdoors… So they can cross all the data and catch you. And if you are really threatening them or their interests, they will just bomb your house with a drone and blame it on a domestic gas explosion. This is where our Big Money overlords rule and you can't escape their power.

Now, the good news. You can do something about the two bottom layers. You must have digital hygiene, discipline and be proactive to achieve it though. First, imagine if a cop or border agent stops you and asks for your phone, unlocked. You can always refuse of course but through violence, and even torture, they can indeed get the accesses they want from you. So you mustn't have any application or data in your phone that compromises you. Always prefer the web mobile pages and not the applications. If you have an email, archive the important emails in an offline storage, delete the others and always have only the absolutely essential emails that you need. The same thing for your photos or digital documents. If you have accounts in Big Tech like Twitter or Facebook, always have an official account, connected to your personal email and phone, but where you keep it to the bare minimum. Consider it your fake "good boy" persona. Open different accounts with different alias, using random phone numbers that you bought only for this purpose, where you join political and other groups, and leave your opinions. This accounts are disposable and you should regularly open new ones and forget about the old ones.

In a Age where Big Media and Big Tech in the Western world impose a political and social ideology, you have to be extra careful if you don't follow their mantras. Even you if don't bring your phone in your travels or when you go out take a coffee, don't forget that the Justice system of your country can demand your information from Big Tech anytime, and without any justification. The fight against terrorism or "hate speech" have created many loopholes. So, also change regularly your official accounts, change your email, change your phone and delete the accounts. When you delete a Google account you aren't only deleting the data but also your shadow, the AI algorithm that Google and others created to ask and receive questions about you. Everything about you.

Comments

Popular posts from this blog

The Domains

The building blocks required to achieve success in a business domain and differentiate the company from its competitors:  Core domains : The interesting problems. These are the in-house activities the company is performing differently from its competitors and from which it gains its competitive advantage.  Generic domains : The solved problems. These are the things all companies are doing in the same way. There is no room or need for innovation here; rather than creating in-house implementations, it’s more cost-effective to adopt \ buy existing solutions. Supporting domains: The problems with obvious solutions. These are the activities the company likely has to implement in-house or outsourced, but that do not provide any competitive advantage. Domain experts are subject matter experts who know all the intricacies of the business that we are going to model and implement in code. In other words, domain experts are knowledge authorities in the software’s business domain. T

Meaning

Of all the information that every second flows into our brains from our sensory organs, only a fraction arrives in our consciousness: the ratio of the capacity of perception to the capacity of apperception is at best a million to one. A million times more bits enter our heads than consciousness perceives. Consciousness lags behind what we call reality. It takes half a second to become conscious of something, though that is not how we perceive it. Outside our conscious awareness, an advanced illusion rearranges events in time. Our consciousness lags behind because it has to present us with a picture of the surrounding world that is relevant. But it is precisely a picture of the surrounding world it presents us with, not a picture of all the superb work the brain does. The sequence is: sensation, simulation, experience. But it is not relevant to know about the simulation, so that is left out of our experience, which consists of an edited sensation that we experience as unedited. What we

The Evolution of Cooperation

The Tragedy of the Commons occurs when a group’s individual incentives lead them to take actions which, in aggregate, lead to negative consequences for all group members. It is a multi-player version of the Prisoner’s Dilemma. In the version of the game from which it got its name, the players are two prisoners, held in separate cells. Each has to choose between “cooperating” with the other (keeping quiet) or “defecting” (giving evidence against the other). Each makes the choice without knowing what the other will do. If both prisoners keep quiet, they are each sentenced to one year in prison. If one rats on the other, he or she goes free and the other gets 10 years. If they both rat on each other, they each get 5 years. The problem arises because whatever your opponent does, defecting gives you a higher payoff than cooperating.  In 1984 Robert Axelrod published a book called The Evolution of Cooperation, which contained a surprising reflection: if you play a Prisoner’s Dilemma game, n