<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Sovereignty Strategies]]></title><description><![CDATA[Anons gather here to level up.]]></description><link>https://letters.empiresec.co</link><image><url>https://substackcdn.com/image/fetch/$s_!orja!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9954af4-0ac7-424f-8c9f-76535115d218_399x399.jpeg</url><title>Sovereignty Strategies</title><link>https://letters.empiresec.co</link></image><generator>Substack</generator><lastBuildDate>Sun, 19 Apr 2026 01:37:19 GMT</lastBuildDate><atom:link href="https://letters.empiresec.co/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Securitybrahh]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[securitybrahh@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[securitybrahh@substack.com]]></itunes:email><itunes:name><![CDATA[Sovereign Shadow]]></itunes:name></itunes:owner><itunes:author><![CDATA[Sovereign Shadow]]></itunes:author><googleplay:owner><![CDATA[securitybrahh@substack.com]]></googleplay:owner><googleplay:email><![CDATA[securitybrahh@substack.com]]></googleplay:email><googleplay:author><![CDATA[Sovereign Shadow]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[We are but protocols]]></title><description><![CDATA[Language is a protocol]]></description><link>https://letters.empiresec.co/p/we-are-but-protocols</link><guid isPermaLink="false">https://letters.empiresec.co/p/we-are-but-protocols</guid><dc:creator><![CDATA[Sovereign Shadow]]></dc:creator><pubDate>Fri, 17 Apr 2026 13:36:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!orja!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9954af4-0ac7-424f-8c9f-76535115d218_399x399.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Language is a protocol</p><p>Culture is a bunch of protocols</p><p>We can&#8217;t think outside the protocol</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;f1081c09-5e47-4f17-b863-86961c998230&quot;,&quot;caption&quot;:&quot;Its not, that the people don't care about privacy,&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;What are we?&quot;,&quot;publishedBylines&quot;:[],&quot;post_date&quot;:&quot;2024-09-26T07:14:05.821Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b92f0b9e-f9d7-414b-a390-a704f91ffbe8_683x1024.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://letters.empiresec.co/p/what-are-we&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:147825240,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:1,&quot;comment_count&quot;:1,&quot;publication_id&quot;:1944197,&quot;publication_name&quot;:&quot;Sovereignty Strategies&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!orja!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9954af4-0ac7-424f-8c9f-76535115d218_399x399.jpeg&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div>]]></content:encoded></item><item><title><![CDATA[On using Amazon & other online stores]]></title><description><![CDATA[Disinformation is the way]]></description><link>https://letters.empiresec.co/p/on-using-amazon-and-other-online</link><guid isPermaLink="false">https://letters.empiresec.co/p/on-using-amazon-and-other-online</guid><dc:creator><![CDATA[Sovereign Shadow]]></dc:creator><pubDate>Wed, 18 Mar 2026 14:55:40 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/e4ccbcf0-4422-4490-a84f-b8f3dc7537d1_5328x4000.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Please consider supporting me by buying stuff from <a href="https://store.empiresec.co">store.empiresec.</a>co</p><p>You probably should buy stuff from your local stores, but if you use amazon, use it this way:</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://letters.empiresec.co/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Sovereignty Strategies is a reader-supported publication. To receive new posts and support , consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Use email alias</p><p>Don't use your legal name, use an alter ego, tell your family that your alter ego is getting the package</p><p>Use strong password</p><p>Enable 2FA</p><p>Use smspool.net for phone verification</p><p>Jig your address a little, use a central pincode not your real zip code. Adjacent pincode also works.</p><p>Use your country's capital as your default address especially if you don't live there.</p><p>Basically a human should understand your address so that he can deliver it, a machine shouldn't be able to read your address.</p><p>Club words etc. 1234BelmontAve for eg. </p><p>Consider using alias payment cards like PST.net, fluz.app etc</p><p></p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://letters.empiresec.co/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Sovereignty Strategies is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[So Anyone can Hack your phone number, know your location, intercept your calls and sms, Here is what you can do]]></title><description><![CDATA[In the current global carrier system (as of 2026), traditional mobile phone numbers remain vulnerable to serious threats.]]></description><link>https://letters.empiresec.co/p/mobile</link><guid isPermaLink="false">https://letters.empiresec.co/p/mobile</guid><dc:creator><![CDATA[Sovereign Shadow]]></dc:creator><pubDate>Sun, 01 Mar 2026 07:07:13 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!orja!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9954af4-0ac7-424f-8c9f-76535115d218_399x399.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In the current global carrier system (as of 2026), traditional mobile phone numbers remain vulnerable to serious threats. Attackers can exploit legacy protocols like SS7 (Signaling System 7) to intercept SMS (including 2FA codes), eavesdrop on calls, track real-time location via cell towers, or perform SIM swaps through social engineering or insider access. These issues persist because SS7&#8212;designed decades ago without strong authentication or encryption&#8212;is still widely used for roaming, SMS routing, and fallback in many networks, even as 4G/5G roll out. Recent reports from 2025&#8211;2026 confirm ongoing exploits: attackers bypass firewalls, intercept banking OTPs, and drain accounts, especially in regions with incomplete upgrades.PSTN (the old copper-based plain-text phone network) adds another layer of risk for voice/SMS routing&#8212;anyone with access to signaling data can snoop if they know your E.164 number. While many countries are phasing it out (e.g., UK full shutdown targeted for January 2027, Spain completed copper closure in 2025, France ongoing to 2030, Netherlands/Germany/Estonia already largely IP-based), it&#8217;s not universal yet, so interception risks linger where legacy infrastructure remains.Practical Mitigations: Build a Privacy-Focused SetupThe goal is to minimize ties to your real identity, avoid carrier-level tracking, and shift to encrypted channels. Here&#8217;s a realistic, up-to-date strategy:</p><ol><li><p>Ditch or Minimize Traditional SIMs for Voice/SMS</p><ul><li><p>Use VoIP numbers as a bridge for services requiring SMS verification (banks, gov, etc.). They bypass local Stingray/IMSI-catcher attacks and most SIM-swap social engineering since reputable no-KYC providers don&#8217;t hold/verify your PII.</p></li><li><p>Top recommendation: jmp.chat</p><ul><li><p>Offers US, Canadian (and some European) numbers without KYC.</p></li><li><p>Payments via Bitcoin (privacy-friendly).</p></li><li><p>Strong Android integration via Cheogram (XMPP-based, open-source, F-Droid).</p></li><li><p>Calls/SMS encrypted from your device to their servers (far better than plain carrier).</p></li><li><p>Premium/&#8221;plus&#8221; numbers often evade VoIP blocks on picky services&#8212;contact support for help.</p></li><li><p>Caveat: Some platforms detect/block VoIP; test your key accounts.</p></li></ul></li><li><p>Alternatives: Check crowdsourced lists for country-specific no-KYC options. Privacy communities (e.g., Privacy Guides, GrapheneOS forums) still rate jmp.chat highly for long-term reliability in 2026.</p></li></ul></li><li><p>Use Multiple Numbers for Compartmentalization</p><ul><li><p>3-number rule (excellent opsec):</p><ul><li><p>#1: Banking/financial (high-security, rarely shared).</p></li><li><p>#2: Government/ID/official (tied to legal identity if needed).</p></li><li><p>#3: Everyday/social (give this out freely; low blast radius if compromised).</p></li></ul></li><li><p>This buys time to detect/react if one leaks, and keeps financial/gov access isolated.</p></li></ul></li><li><p>Switch to E2EE for All Real Communication</p><ul><li><p>Signal &#8594; Best default for calls, messaging (full E2EE, minimal metadata).</p></li><li><p>Alternatives: iMessage/FaceTime (E2EE in Apple ecosystem), WhatsApp (E2EE content, but Meta collects metadata), or booth.video for video calls.</p></li><li><p>Avoid plain SMS/voice entirely when possible&#8212;anything over data + E2EE beats PSTN/SS7 routing.</p></li></ul></li><li><p>Mobile Internet Without Carrier Tracking</p><ul><li><p>Ideal: Airplane mode + WiFi only (no cell modem active &#8594; no tower pings/location leaks).</p><ul><li><p>Connect via public/cafe WiFi + strong VPN.</p></li><li><p>Obscura VPN stands out for privacy decoupling: Two-party design (Obscura sees your IP but not destinations; Mullvad exit sees traffic but not you). No-logs by architecture, Lightning/Bitcoin/Monero payments. Great for censorship resistance and true separation.</p></li></ul></li><li><p>For mobile data: Data-only eSIMs (no voice/SMS to intercept).</p><ul><li><p>silent.link &#8594; Gold standard for no-KYC/privacy.</p><ul><li><p>Zero personal data (no email/ID/signup).</p></li><li><p>Crypto payments (Bitcoin, Lightning, Monero, USDT).</p></li><li><p>160+ countries, pay-as-you-go (balance never expires; $9 one-off for DATA.PLUS plan with initial credit).</p></li><li><p>Data-only (outbound SMS blocked to prevent abuse); works in restricted places (China firewall, UAE VoIP blocks).</p></li><li><p>Premium but reliable; strong rep in privacy circles.</p></li></ul></li><li><p>Other contenders: PikaSim, ZeroID, LNVPN (compare coverage/pricing; silent.link often wins for no-expiry + anonymity).</p></li></ul></li></ul></li><li><p>Extra Layers for Travelers/Frequent Movers</p><ul><li><p>Data-only global eSIMs shine here&#8212;no roaming SIM swaps or carrier logs tying to identity.</p></li><li><p>Public WiFi rotation + Obscura keeps things fluid.</p></li></ul></li></ol><p>This setup isn&#8217;t perfect (VoIP needs internet; some services block it; travel requires planning), but it dramatically reduces risks from SS7 exploits, local interception, SIM swaps, and carrier surveillance. Far safer than a plain carrier number in 2026.If you&#8217;re building/testing this (e.g., updating your VoIP database), share any new provider findings&#8212;the community appreciates it. Stay vigilant! </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mbcZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25ee63f5-93fe-4106-b1c3-057910027cc5_16x16.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mbcZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25ee63f5-93fe-4106-b1c3-057910027cc5_16x16.png 424w, https://substackcdn.com/image/fetch/$s_!mbcZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25ee63f5-93fe-4106-b1c3-057910027cc5_16x16.png 848w, https://substackcdn.com/image/fetch/$s_!mbcZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25ee63f5-93fe-4106-b1c3-057910027cc5_16x16.png 1272w, https://substackcdn.com/image/fetch/$s_!mbcZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25ee63f5-93fe-4106-b1c3-057910027cc5_16x16.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mbcZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25ee63f5-93fe-4106-b1c3-057910027cc5_16x16.png" width="16" height="16" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/25ee63f5-93fe-4106-b1c3-057910027cc5_16x16.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:16,&quot;width&quot;:16,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!mbcZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25ee63f5-93fe-4106-b1c3-057910027cc5_16x16.png 424w, https://substackcdn.com/image/fetch/$s_!mbcZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25ee63f5-93fe-4106-b1c3-057910027cc5_16x16.png 848w, https://substackcdn.com/image/fetch/$s_!mbcZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25ee63f5-93fe-4106-b1c3-057910027cc5_16x16.png 1272w, https://substackcdn.com/image/fetch/$s_!mbcZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25ee63f5-93fe-4106-b1c3-057910027cc5_16x16.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://letters.empiresec.co/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Sovereignty Strategies is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The Post-Bitcoin Jurisdiction]]></title><description><![CDATA[or how will we govern outselves]]></description><link>https://letters.empiresec.co/p/the-post-bitcoin-jurisdiction</link><guid isPermaLink="false">https://letters.empiresec.co/p/the-post-bitcoin-jurisdiction</guid><dc:creator><![CDATA[Sovereign Shadow]]></dc:creator><pubDate>Tue, 23 Dec 2025 05:18:19 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/4891ea6d-c640-4255-b972-fcf31d2dd271_4608x3072.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The communities formed online have their own policies, they Ofcourse are subjected to their country&#8217;s laws, but they are the first look into what the future jurosdictions will look like after bitcoin becomes money.</p><p>Either world governments will charge minimal tax for public security or some one else will come up with solutions to the public security problem, I think governments around the world will figure out that they can&#8217;t track their subject&#8217;s wealth.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;03af267a-a0a8-4f6a-899a-1d7da9e710cd&quot;,&quot;caption&quot;:&quot;In USA the Jails are already privatized and I think the world will follow. The governments around the world will go bankrupt (as bitcoin will become money) hence won&#8217;t be able to fund the jails.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The Post-Bitcoin legal System&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:327901752,&quot;name&quot;:&quot;Sovereign Shadow&quot;,&quot;bio&quot;:&quot;Teaching ppl how to stay anon since 1984. Privacy Plumber. Constructing Secure Digital Empires. DM's open. Not Security Advice. Breaker of Chains. Ecopolitica.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fb35ef7f-d822-46f7-9f84-7c743dd4c342_400x400.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-12-22T07:16:10.057Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c16253b0-f2a7-44d8-b909-8b7df80191a0_3698x5547.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://letters.empiresec.co/p/the-post-bitcoin-legal-system&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:181022768,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1944197,&quot;publication_name&quot;:&quot;Sovereignty Strategies&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!orja!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9954af4-0ac7-424f-8c9f-76535115d218_399x399.jpeg&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>For the most of us (who don&#8217;t have cases running in the apex courts) the Jurisdiction that applies is the local one which is not the Police Office but your Company&#8217;s or School Office.</p><p>If Police have to pickup a student from the University, they have to ask permission from the Pricipal. Same with the employer&#8217;s. So in this age, the ultimate authorities are double fold, the education system and the Company structures.</p><p>The power of the corporations is two fold, the Distribution/Network &amp; the cashflow. The moment when the bitcoin start to become money (sooner that you think, xoxo lightning), the Companies will start operating in Bitcoin and the government&#8217;s authority will be shaken as government schemes will start to change when the Tax money stop flowing in.</p><p>Emergency services like the fire department, the paramedics, water, electricity will all be privatised.</p><p>The communities formed by forums online and Elsewhere will decide which product and services be good for them, and marketing will just mean communication to these communities. </p><p>Now the land is allotted by governments, I think future communities will look like what this free cities white paper says:</p><p><a href="https://free-cities.org/free-private-cities-whitepaper/">https://free-cities.org/free-private-cities-whitepaper/</a></p><h2>Social Welfare</h2><p>Free private chattered cities and towns will emerge and take care of public welfare. </p><h2>Post Office</h2><p>The PO networks are probably the best thing governments did, soon they will hike up the prices and charge the invoices in lightning.</p><p>Useful services and products like these will loose government subsidies and will likely be the alternate to sales and indirect taxes. </p><h2>The oil and the factories</h2><p>Some new stuff is discovered or invented, it gains traction and eventually governments regulate via laws and taxes (sales, excise, cess, customs etc).</p><p>But once the governments treasuries loose the tax money, it will become difficult to inflict direct and indirect taxes.</p><h1>Online communities will buy land and form communes</h1><p>We do a lot of stuff via internet and a lot has been decentralized but we still do offline conferences, there is some wisdom there probably.</p><h2>Further reading</h2><p></p>
      <p>
          <a href="https://letters.empiresec.co/p/the-post-bitcoin-jurisdiction">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The Post-Bitcoin legal System]]></title><description><![CDATA[or how will we keep the people who deserve to be in jails, in jail.]]></description><link>https://letters.empiresec.co/p/the-post-bitcoin-legal-system</link><guid isPermaLink="false">https://letters.empiresec.co/p/the-post-bitcoin-legal-system</guid><dc:creator><![CDATA[Sovereign Shadow]]></dc:creator><pubDate>Mon, 22 Dec 2025 07:16:10 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/c16253b0-f2a7-44d8-b909-8b7df80191a0_3698x5547.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In USA the Jails are already privatized and I think the world will follow. The governments around the world will go bankrupt (as bitcoin will become money) hence won&#8217;t be able to fund the jails.</p><p>The only authority the governments will have, will be because the private security won&#8217;t be able to solve the public security problem.</p><p>Wealthy individuals have private security already but whoever will come up to safeguard the public will become the government.</p><p>Pre Word War 2, Gangs gave protection not the government, it will be something like that only, criminal syndicates are already using monero and will eventually shift to lightning.</p><p>But who will decide the laws and how will we construct the constitutions?</p><p>The narratives are increasingly being controlled by individuals through youtube and podcasts (RSS), Ofcourse governments have their own IT cells to keep their own narrative relevant but it would become more and more difficult as the tax money swindles.</p><p>Communities formed by reddit and other forums on the clear web and the onion web have their own set of rules, guidelines and policies. We are in an age of violence through words. Code is the free speech. </p><p>We have seen open protocols that have open platforms, like World Wide Web (<a href="https://www.ietf.org/process/rfcs/">RFC&#8217;s</a>), nostr (<a href="https://github.com/nostr-protocol/nips">NIP</a>&#8217;s), email (<a href="https://www.rfc-editor.org/rfc/rfc5321">SMTP</a>/IMAP), <a href="https://www.rssboard.org/rss-specification">RSS</a> etc</p><p>But how will we able to solve public security and how we will construct security through new laws and regimes that is the question.</p><h1>Further Reading</h1>
      <p>
          <a href="https://letters.empiresec.co/p/the-post-bitcoin-legal-system">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Mailing Address: Necessery Evil]]></title><description><![CDATA[Don't have an home address]]></description><link>https://letters.empiresec.co/p/address</link><guid isPermaLink="false">https://letters.empiresec.co/p/address</guid><dc:creator><![CDATA[Sovereign Shadow]]></dc:creator><pubDate>Fri, 14 Nov 2025 07:46:50 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/11ab3dae-ed16-4e54-ad91-55fa5a55bf36_3500x2333.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Ideally nobody should have an address that they give out to instiutions. But we do not yet live in that world so I have come up with some tricks</p><h2>Letters</h2><p>For letters like things I always recommend Anytime Mailbox, you should ensure the address is a &#8220;residential&#8221; one, if you are an americanyou can look up options here:</p><p><a href="https://community.nomadgate.com/t/the-ultimate-guide-to-virtual-mailboxes-for-us-banking-purposes-nomad-gate/60741">https://community.nomadgate.com/t/the-ultimate-guide-to-virtual-mailboxes-for-us-banking-purposes-nomad-gate/60741</a></p><p>I would recommend everyone to go to google street view and seeing if the address is actually a residential one</p><p>I have written why everyone should have an American address here:</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;b4b0b10e-9802-4ee9-9225-3093dd0fb52a&quot;,&quot;caption&quot;:&quot;If you think about what essentially make your identity &#8220;real&#8221; to the state, its your name, address and phone number.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;\&quot;Real\&quot; Numbers, Addresses &quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:168357718,&quot;name&quot;:&quot;Sovereign Shadow&quot;,&quot;bio&quot;:&quot;Be the best anon there is. Live a secure digital life that's well connected to the ground. private digital infra. Cybersec Plumber.&quot;,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7816084-b622-41af-80f4-d413e2bf3115_400x400.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2023-11-22T14:07:32.809Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0301ef59-8279-47c1-9248-caa3063b9520_3456x5184.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://letters.empiresec.co/p/identity-buffer&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:139055423,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:3,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1944197,&quot;publication_name&quot;:&quot;Sovereignty Strategies&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!orja!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9954af4-0ac7-424f-8c9f-76535115d218_399x399.jpeg&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><h2>Parcel</h2><p>If it&#8217;s a parcel type or box type kinda thing I would recommend getting local PO Box.</p><h2>Notes on Amazon</h2><p>We all use amazon as it&#8217;s efficient but here are some tricks to use it privately and securely. </p><p>amazon profile locks, video locks, address mangering, alias name, gift card balance, alias email, smspool.net number, I will always eat the cake and have it. Always</p><p>Name - change the letters a bit </p><p>And change pincode</p><p>Account pin and profile locks.</p><p>Parental controls, rating &amp; viewing restrictions.</p><p>Names of account, profiles, name on address, number on account, 2fa, number on profile for lock pin.</p><p>Jig your address a little</p><p>ext step is to get some proxies, proxies essentialy make amazon think you have a different Internet Address.</p><p>I have been testing nodemaven proxies for Amazon, it works very well!</p><p>Create a new account through my affiliate link </p><p>https://go.nodemaven.com/bowtiedanon</p><p>&amp; apply coupon &#8220;ANON&#8221; to get 2GB extra bandwidth on any package (except trial)</p><p>The last step of preparation is to get comfortable using a multi accounting browser. This helps segregating and organizing different accounts.</p><p>For amazon, Incogniton does the job pretty well.</p><p>Use my aff for karma: https://incogniton.com/aff/1113618/</p><p>1. Get a new SIM</p><p>2. Get an alias email from simple login or anon addy.</p><p>4. Get proxy from rain proxy or use a cafe wifi or any public wifi.</p><p>5. Create new profile in incogniton</p><p>6. Run browser</p><p>7. Go to amazon.</p><p>8. Signup with that new number</p><p>9. Add email in amazon settings</p><p>10. Switch on 2FA.</p><p>At this current moment ironvest is </p><p>So use your own payment method</p><p>After a month of orders,</p><p>What if you get an email show proof that </p><p>Just give them proof that the payment mwthod is yours indeed.</p><p>Within 7 days you should get the account re enacted. </p><p>Amazon mainly want to verify that the payment methods that you are using are yours and you are not abusing quantity limits.</p><p>Amazon trust a new account the least and the orders in the first month will have the most scrutiny.</p><h2>Further reading</h2><p>https://x.com/AnonIndustries_</p><p>Anonshop.app</p><p>Peershop.app</p>]]></content:encoded></item><item><title><![CDATA[When should you use Email Aliases?]]></title><description><![CDATA[Simplelogin v. Anonaddy v. Forwardemail v. self hosted]]></description><link>https://letters.empiresec.co/p/aliases</link><guid isPermaLink="false">https://letters.empiresec.co/p/aliases</guid><dc:creator><![CDATA[Sovereign Shadow]]></dc:creator><pubDate>Wed, 05 Nov 2025 02:46:15 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/9be5c25b-3f2e-4941-9889-33151fd0c87c_3877x5815.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Sharing your primary email is like sharing your home address, the more places that it ends up at, more spam (or worse) you gonna get.</p><p>I always recommend atleast having different email for finances, and proton mail fits the bill. Mostly for the UX, you don't want to miss important mails. </p><p>Public newsletters should not have your primary email as they can sell it to somebody else, then you will start getting stuff you don't want, and clutter your inbox.</p><p>If you just want to get something that requires an email and you don't want to have a relationship with them there after, use temp mails, just brave search, use whichever service works.</p><p>Aliases can be used other way around, you want to send an email to someone but doesn't want to reveal your primary email yet.</p><p>Imagine you want to interact with a service provider but you don't know how much crap they gonna send your way. So you use an alias, if they seem spammy after a while you can just switch off that alias and you won't be getting any emails from them. </p><p>Unsubscribing is an option but you never know if the other party will oblige.</p><h2>Multiple Inboxes</h2><p>Your every identity should start with a good email provider like Tuta or proton, then you can use something like forward email to setup custom domain and vanity domains.</p><p>Then even after that, setup email aliases with simple login and anon Addy to further the layer of protection.</p><p>This helps to organise multiple inboxes in one inbox without relying on gmail tools for eg.</p><h2>Identity &amp; purpose</h2><p>Your email is your identity, you should be very clear about that, when you share your email, you are sharing your identity and that should be with a particular purpose not just a knee jerk reaction to an email inbox.</p><h2>Fabricated History</h2><p>The conversation you have with a newsletter or someone through emails is a history and an archive.</p><p>Aliases help to organise histories and fabricate them if need be.</p><h2>Unsubscribe, delete Account or disable alias?</h2><p>Unsubsribing mostly ensures that your email is deleted from their database but if you created an account, then you should delete the account instead.</p><p>Disabling alias does not ensure that the stuff related to the account is deleted from the site. </p><h2>Anonaddy &amp; SimpleLogin</h2><p>SimpleLogin has unlimited bandwidth so you should segregate newsletters, letters, important stuff, specific emails for specific social media accounts, etc into multiple sub domains aka aliases.</p><p>Anonaddy has sort of unlimited aliases, so you should use that for creating new emails and giving out to potential spammers and disable them whenever need be, their paid plan is reasonable and can be used for replying as well.</p><h2>Titles &amp; Threads</h2><p>We often organize and find relevant emails in our inboxes through title searches, when using alieases you go one step further by segregating different categories of emails.</p><p>Reply, reply all, CC, bcc, is how we organize emails in our inboxes.</p><h2>Alias Description and tags</h2><p>In an alias app like simpleloggin and anon addy, you use description and tags to remember for what purpose you gave the email away.</p><p>So write the tags and description vigilently. </p><h2>When not to use them?</h2><p>Sensitive stuff, stuff not related to the email it was created for. </p><p>For eg if you created an alias for a particular purchase and communication from a particular seller, then that's fine, if you create an email for amazon, just use it for amazon.</p><p>But don&#8217;t mix and mingle, don&#8217;t use an alias email for finance stuff, just use a primary email from Tuta or proton.</p><p>Forward email is zero access encrypted so are it's MX records, I am not sure about SL or AD.</p><p>Proton and Tuta are the last defenses.</p><h2>Further reading</h2><p>https://discuss.privacyguides.net/t/email-alias-strategy/21522/10</p><div id="youtube2-buJHg7HRHPc" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;buJHg7HRHPc&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/buJHg7HRHPc?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>https://www.reddit.com/r/Simplelogin/comments/18ojxkl/to_those_that_have_multiple_aliases_what_are_your/</p><p>08:50 - 14:44</p><p>youtube.com/watch?v=8YWqCaufWv8</p>]]></content:encoded></item><item><title><![CDATA[Privacy is not Seclusion, wtf is it then?]]></title><description><![CDATA[Privacy is the power of an individual over its own stuff in relation to its environment]]></description><link>https://letters.empiresec.co/p/privacy</link><guid isPermaLink="false">https://letters.empiresec.co/p/privacy</guid><dc:creator><![CDATA[Sovereign Shadow]]></dc:creator><pubDate>Mon, 20 Oct 2025 03:00:04 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/c378d70e-7771-44cd-b01d-efbd39007511_4480x6720.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>There is a growing support for privacy across the world. And there is a growing debate across the world about constitutional rights to privacy. In a lot of cases, after interpretations of the law, the people conclude, that violating privacy is non-constitional.</p><p><a href="https://www.youtube.com/watch?v=QvejiwkPRO8">4th amendment</a> of the USA constitution (all constitutions are based on this) is this:</p><blockquote><p>The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, </p><p>and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.</p></blockquote><p>Right to privacy is a fundamental right under this amendment that ensures personal liberty.</p><p>In 1973, there was a <a href="https://constitutioncenter.org/the-constitution/supreme-court-case-library/roe-v-wade">pivotal supreme court judgment</a>. Roe v. Wade affirmed that the right to privacy, protected under the Due Process Clause of the Fourteenth Amendment, encompasses a woman&#8217;s decision to terminate her pregnancy.</p><p><a href="https://en.wikipedia.org/wiki/Third-party_doctrine">Third party doctrine </a>is something the Americans should be scared of. </p><p>The doctribe is the evolution of the Katz definition of privacy to modern facts: if you disclose something to a third party, you no longer have a reasonable expectation of privacy.</p><p>The gov only needs a warrant to &#8220;search&#8221; places where you have a reasonable expectation of privacy. </p><p>For eg. Prosecutors often use cell tower data in criminal cases. Government never subpeona the big tech, they just have backdoor access to them because of this doctrine. </p><blockquote><p>The expectation of privacy is a legal test, originated from Katz v. United States and is a key component of Fourth Amendment analysis. The Fourth Amendment protects people from warrantless searches of places or seizures of persons or objects, in which they have a subjective expectation of privacy that is deemed reasonable. The test determines whether an action by the government has violated an individual&#8217;s reasonable expectation of privacy.</p></blockquote><p>The Reasonable Expectation of Privacy Test</p><blockquote><p>In Katz, Justice Harlan created the Reasonable Expectation of Privacy Test in his concurring opinion. Although it was not formulated by the majority, this test has been the main takeaway of the case. Justice Harlan created a two-part test:</p></blockquote><ol><li><p>The individual has exhibited an actual (subjective) expectation of privacy.</p></li><li><p>The expectation is one that society is prepared to recognize as reasonable.</p></li></ol><blockquote><p>If both requirements have been met, and the government has taken an action which violates this &#8220;expectation,&#8221; then the government&#8217;s action has violated the individual&#8217;s Fourth Amendment rights.</p></blockquote><p>Article 21<code> </code>of the Indian (largest democracy) constitution goes like this:</p><blockquote><ol start="21"><li><p>Protection of life and personal liberty</p></li></ol><p>No person shall be deprived of his life or personal liberty except according to procedure established by law.</p></blockquote><p>In the landmark case of Supreme Court of India,<a href="https://indiankanoon.org/doc/91938676/"> K.S. Puttaswamy v. Union of India (2017) </a>established the right to privacy as a fundamental right under the Constitution.</p><p>American Express <a href="https://rbi.org.in/Scripts/NotificationUser.aspx?Id=11244&amp;Mode=0">was denied</a> access to the Indian market until they store Indian citizens&#8217; data in the country itself which was <a href="https://rbi.org.in/scripts/BS_PressReleaseDisplay.aspx?prid=54253">lifted</a> on Aug 24, 2022</p><p>In the UK (the country where the contemporary law began), the right to privacy is protected under common law and the Human Rights Act, specifically through the Article 8 of the European Convention on Human Rights: </p><blockquote><p>1. Everyone has the right to respect for his [or her] private and family life, his [or her] home and his [or her] correspondence.</p><p>2. There shall be no interference by a public authority with the exercise of this right except such as is in accordance with the law and is necessary in a democratic society in the interests of national security, public safety or the economic well-being of the country, for the prevention of disorder or crime, for the protection of health or morals, or for the protection of the rights and freedoms of others.</p></blockquote><p>And so on... </p><p>Therefore violating the right to privacy is non constitutional many of the countries but then again, big tech and the governments &amp; law enforcement themselves often do activities that we consider violations of privacy. Why is this happening? </p><p>The fact of the matter is, we don't really have a neat or a clear defination of the word &#8220;privacy&#8221;. It's not just the act of leaving someone alone. It's not individualism (having the liberty to think and do things without the interference from the people around). It's not just about private property - the whole bitcoin debate is about private property, much of the discussion is about privacy.</p><p>Indian wives often have this habit of saving money and hiding it from the husband for the good of the family (consider it, a rainy day fund), but when the unfortunate <a href="https://en.wikipedia.org/wiki/2016_Indian_banknote_demonetisation">demonitization</a> of 500 and 1000 Indian currency notes happened, the money that the wife saved over the years suddenly became worthless and had to be revealed out in the open so that it could be exchanged for the new legal notes. The privacy of those wives was violated.</p><p>People say that privacy is important only for those that have something of value / are rich but I would argue, the wealth of the individual has nothing to do with their need for privacy.</p><p>Homeless people in the United States feel violated if their meagre possesions are searched, feel violated if you barge into their tents etc. How much money may give you the power to increase your privacy and security but it definately has nothing to do with the want of every Indidual for privacy, it is a fundamental right and the people who do stuff (the executive) have overstepped the legislature (two of the four pillars of democracy have been unbalanced) </p><p>Privacy is the extent of the power of an individual that he/she can exercise when the immediate environment violates their possessions (in the digital context - data). And it is also the extent of the default protection the stuff has. What takes priority, privacy or security? - that I think is the wrong question, the right question to ask is this - if all the privacy is taken from you, will there be any security left?</p><p>As a society we consider asking for consent as a foundational paradigm that we live by. In medical practice, we go as far as saying a misinformed consent is not a consent. Consent without revealing every detail of the procedure is not a consent at all. So if possesions are taken away or in the case of data, it is collected without consent, it's not consensual, in all seriousness, its rape. The defaults of the web matter the most, opted out should be the default, not opted in. And Ofcourse without informed consent, there is no such thing as opting in.</p><p>I would argue (this will be highly controversial in privacy circles) that Google is private because it gives you - the user the power over your data, you can clearly see what all data is collected in your personal dashboard and you can export it and delete it if you chose to and Google has atleast been always honest about collecting data, unlike apple, which in their ads - flaunt that their devices private but in fact, are not. </p><p>But Google is not secure because the central collection of the data and Google analytics tracking individuals across web pages (even anonymised) is a vulnerability bad actors can exploit.</p><p>Security is also not neatly defined as well, I&#8217;d like to define security as the likelihood of harm to the individual in the context of its environment.</p><p><a href="https://letters.empiresec.co/p/trust">Previously</a>, I argued that threat modelling is a wrong approach to security, instead what we should be doing is, trust modelling - evaluating the things in your environment as trustworthy or not, discarding those that breaks your trust, not fully trusting services and products initally, approaching them with caution and slowly increasing the trust as you have more information and experience with it.</p><p>It would be a disgrace if I didn't comment on anonymity when I am writing a thesis on privacy. We often think about what other people would think, about our actions and tastes. And it often strangles us, limits our thinking and our actions. </p><p>People from all around the world having all kinds of backgrounds and cultures come to New York, walking through the city center is quite liberating, you are anonymous even if you wear a very different clothing because there is no judgement, and that is what liberates you. That my friends is anonymity. Identity without judgement.</p><h2>Snowden</h2>
      <p>
          <a href="https://letters.empiresec.co/p/privacy">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The Gentleperson's Guide To Forum Spies (spooks, feds, etc.) ]]></title><description><![CDATA[orignally postes on cryptome, adding it here for access to the community.]]></description><link>https://letters.empiresec.co/p/infiltrate</link><guid isPermaLink="false">https://letters.empiresec.co/p/infiltrate</guid><dc:creator><![CDATA[Sovereign Shadow]]></dc:creator><pubDate>Sat, 28 Jun 2025 16:19:17 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/62bce66f-15e2-457f-bb6f-48a2fe5dddbf_1073x1024.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>1. COINTELPRO Techniques for dilution, misdirection and control of a internet forum</p><p>2. Twenty-Five Rules of Disinformation</p><p>3. Eight Traits of the Disinformationalist</p><p>4. How to Spot a Spy (Cointelpro Agent)</p><p>5. Seventeen Techniques for Truth Suppression</p><p>______________________________________________________________________________________</p><p>COINTELPRO Techniques for dilution, misdirection and control of a internet forum..</p><p>There are several techniques for the control and manipulation of a internet forum no matter what, or who is on it. We will go over each technique and demonstrate that only a minimal number of operatives can be used to eventually and effectively gain a control of a 'uncontrolled forum.'</p><p>Technique #1 - 'FORUM SLIDING'</p><p>If a very sensitive posting of a critical nature has been posted on a forum - it can be quickly removed from public view by 'forum sliding.' In this technique a number of unrelated posts are quietly prepositioned on the forum and allowed to 'age.' Each of these misdirectional forum postings can then be called upon at will to trigger a 'forum slide.' The second requirement is that several fake accounts exist, which can be called upon, to ensure that this technique is not exposed to the public. To trigger a 'forum slide' and 'flush' the critical post out of public view it is simply a matter of logging into each account both real and fake and then 'replying' to prepositined postings with a simple 1 or 2 line comment. This brings the unrelated postings to the top of the forum list, and the critical posting 'slides' down the front page, and quickly out of public view. Although it is difficult or impossible to censor the posting it is now lost in a sea of unrelated and unuseful postings. By this means it becomes effective to keep the readers of the forum reading unrelated and non-issue items.</p><p>Technique #2 - 'CONSENSUS CRACKING'</p><p>A second highly effective technique (which you can see in operation all the time at www.abovetopsecret.com) is 'consensus cracking.' To develop a consensus crack, the following technique is used. Under the guise of a fake account a posting is made which looks legitimate and is towards the truth is made - but the critical point is that it has a VERY WEAK PREMISE without substantive proof to back the posting. Once this is done then under alternative fake accounts a very strong position in your favour is slowly introduced over the life of the posting. It is IMPERATIVE that both sides are initially presented, so the uninformed reader cannot determine which side is the truth. As postings and replies are made the stronger 'evidence' or disinformation in your favour is slowly 'seeded in.' Thus the uninformed reader will most like develop the same position as you, and if their position is against you their opposition to your posting will be most likely dropped. However in some cases where the forum members are highly educated and can counter your disinformation with real facts and linked postings, you can then 'abort' the consensus cracking by initiating a 'forum slide.'</p><p>Technique #3 - 'TOPIC DILUTION'</p><p>Topic dilution is not only effective in forum sliding it is also very useful in keeping the forum readers on unrelated and non-productive issues. This is a critical and useful technique to cause a 'RESOURCE BURN.' By implementing continual and non-related postings that distract and disrupt (trolling ) the forum readers they are more effectively stopped from anything of any real productivity. If the intensity of gradual dilution is intense enough, the readers will effectively stop researching and simply slip into a 'gossip mode.' In this state they can be more easily misdirected away from facts towards uninformed conjecture and opinion. The less informed they are the more effective and easy it becomes to control the entire group in the direction that you would desire the group to go in. It must be stressed that a proper assessment of the psychological capabilities and levels of education is first determined of the group to determine at what level to 'drive in the wedge.' By being too far off topic too quickly it may trigger censorship by a forum moderator.</p><p>Technique #4 - 'INFORMATION COLLECTION'</p><p>Information collection is also a very effective method to determine the psychological level of the forum members, and to gather intelligence that can be used against them. In this technique in a light and positive environment a 'show you mine so me yours' posting is initiated. From the number of replies and the answers that are provided much statistical information can be gathered. An example is to post your 'favourite weapon' and then encourage other members of the forum to showcase what they have. In this matter it can be determined by reverse proration what percentage of the forum community owns a firearm, and or a illegal weapon. This same method can be used by posing as one of the form members and posting your favourite 'technique of operation.' From the replies various methods that the group utilizes can be studied and effective methods developed to stop them from their activities.</p><p>Technique #5 - 'ANGER TROLLING'</p><p>Statistically, there is always a percentage of the forum posters who are more inclined to violence. In order to determine who these individuals are, it is a requirement to present a image to the forum to deliberately incite a strong psychological reaction. From this the most violent in the group can be effectively singled out for reverse IP location and possibly local enforcement tracking. To accomplish this only requires posting a link to a video depicting a local police officer massively abusing his power against a very innocent individual. Statistically of the million or so police officers in America there is always one or two being caught abusing there powers and the taping of the activity can be then used for intelligence gathering purposes - without the requirement to 'stage' a fake abuse video. This method is extremely effective, and the more so the more abusive the video can be made to look. Sometimes it is useful to 'lead' the forum by replying to your own posting with your own statement of violent intent, and that you 'do not care what the authorities think!!' inflammation. By doing this and showing no fear it may be more effective in getting the more silent and self-disciplined violent intent members of the forum to slip and post their real intentions. This can be used later in a court of law during prosecution.</p><p>Technique #6 - 'GAINING FULL CONTROL'</p><p>It is important to also be harvesting and continually maneuvering for a forum moderator position. Once this position is obtained, the forum can then be effectively and quietly controlled by deleting unfavourable postings - and one can eventually steer the forum into complete failure and lack of interest by the general public. This is the 'ultimate victory' as the forum is no longer participated with by the general public and no longer useful in maintaining their freedoms. Depending on the level of control you can obtain, you can deliberately steer a forum into defeat by censoring postings, deleting memberships, flooding, and or accidentally taking the forum offline. By this method the forum can be quickly killed. However it is not always in the interest to kill a forum as it can be converted into a 'honey pot' gathering center to collect and misdirect newcomers and from this point be completely used for your control for your agenda purposes.</p><p>CONCLUSION</p><p>Remember these techniques are only effective if the forum participants DO NOT KNOW ABOUT THEM. Once they are aware of these techniques the operation can completely fail, and the forum can become uncontrolled. At this point other avenues must be considered such as initiating a false legal precidence to simply have the forum shut down and taken offline. This is not desirable as it then leaves the enforcement agencies unable to track the percentage of those in the population who always resist attempts for control against them. Many other techniques can be utilized and developed by the individual and as you develop further techniques of infiltration and control it is imperative to share then with HQ.</p><p>______________________________________________________________________________________</p><p>Twenty-Five Rules of Disinformation</p><p>Note: The first rule and last five (or six, depending on situation) rules are generally not directly within the ability of the traditional disinfo artist to apply. These rules are generally used more directly by those at the leadership, key players, or planning level of the criminal conspiracy or conspiracy to cover up.</p><p>1. Hear no evil, see no evil, speak no evil. Regardless of what you know, don't discuss it -- especially if you are a public figure, news anchor, etc. If it's not reported, it didn't happen, and you never have to deal with the issues.</p><p>2. Become incredulous and indignant. Avoid discussing key issues and instead focus on side issues which can be used show the topic as being critical of some otherwise sacrosanct group or theme. This is also known as the 'How dare you!' gambit.</p><p>3. Create rumor mongers. Avoid discussing issues by describing all charges, regardless of venue or evidence, as mere rumors and wild accusations. Other derogatory terms mutually exclusive of truth may work as well. This method which works especially well with a silent press, because the only way the public can learn of the facts are through such 'arguable rumors'. If you can associate the material with the Internet, use this fact to certify it a 'wild rumor' from a 'bunch of kids on the Internet' which can have no basis in fact.</p><p>4. Use a straw man. Find or create a seeming element of your opponent's argument which you can easily knock down to make yourself look good and the opponent to look bad. Either make up an issue you may safely imply exists based on your interpretation of the opponent/opponent arguments/situation, or select the weakest aspect of the weakest charges. Amplify their significance and destroy them in a way which appears to debunk all the charges, real and fabricated alike, while actually avoiding discussion of the real issues.</p><p>5. Sidetrack opponents with name calling and ridicule. This is also known as the primary 'attack the messenger' ploy, though other methods qualify as variants of that approach. Associate opponents with unpopular titles such as 'kooks', 'right-wing', 'liberal', 'left-wing', 'terrorists', 'conspiracy buffs', 'radicals', 'militia', 'racists', 'religious fanatics', 'sexual deviates', and so forth. This makes others shrink from support out of fear of gaining the same label, and you avoid dealing with issues.</p><p>6. Hit and Run. In any public forum, make a brief attack of your opponent or the opponent position and then scamper off before an answer can be fielded, or simply ignore any answer. This works extremely well in Internet and letters-to-the-editor environments where a steady stream of new identities can be called upon without having to explain criticism, reasoning -- simply make an accusation or other attack, never discussing issues, and never answering any subsequent response, for that would dignify the opponent's viewpoint.</p><p>7. Question motives. Twist or amplify any fact which could be taken to imply that the opponent operates out of a hidden personal agenda or other bias. This avoids discussing issues and forces the accuser on the defensive.</p><p>8. Invoke authority. Claim for yourself or associate yourself with authority and present your argument with enough 'jargon' and 'minutia' to illustrate you are 'one who knows', and simply say it isn't so without discussing issues or demonstrating concretely why or citing sources.</p><p>9. Play Dumb. No matter what evidence or logical argument is offered, avoid discussing issues except with denials they have any credibility, make any sense, provide any proof, contain or make a point, have logic, or support a conclusion. Mix well for maximum effect.</p><p>10. Associate opponent charges with old news. A derivative of the straw man -- usually, in any large-scale matter of high visibility, someone will make charges early on which can be or were already easily dealt with - a kind of investment for the future should the matter not be so easily contained.) Where it can be foreseen, have your own side raise a straw man issue and have it dealt with early on as part of the initial contingency plans. Subsequent charges, regardless of validity or new ground uncovered, can usually then be associated with the original charge and dismissed as simply being a rehash without need to address current issues -- so much the better where the opponent is or was involved with the original source.</p><p>11. Establish and rely upon fall-back positions. Using a minor matter or element of the facts, take the 'high road' and 'confess' with candor that some innocent mistake, in hindsight, was made -- but that opponents have seized on the opportunity to blow it all out of proportion and imply greater criminalities which, 'just isn't so.' Others can reinforce this on your behalf, later, and even publicly 'call for an end to the nonsense' because you have already 'done the right thing.' Done properly, this can garner sympathy and respect for 'coming clean' and 'owning up' to your mistakes without addressing more serious issues.</p><p>12. Enigmas have no solution. Drawing upon the overall umbrella of events surrounding the crime and the multitude of players and events, paint the entire affair as too complex to solve. This causes those otherwise following the matter to begin to lose interest more quickly without having to address the actual issues.</p><p>13. Alice in Wonderland Logic. Avoid discussion of the issues by reasoning backwards or with an apparent deductive logic which forbears any actual material fact.</p><p>14. Demand complete solutions. Avoid the issues by requiring opponents to solve the crime at hand completely, a ploy which works best with issues qualifying for rule 10.</p><p>15. Fit the facts to alternate conclusions. This requires creative thinking unless the crime was planned with contingency conclusions in place.</p><p>16. Vanish evidence and witnesses. If it does not exist, it is not fact, and you won't have to address the issue.</p><p>17. Change the subject. Usually in connection with one of the other ploys listed here, find a way to side-track the discussion with abrasive or controversial comments in hopes of turning attention to a new, more manageable topic. This works especially well with companions who can 'argue' with you over the new topic and polarize the discussion arena in order to avoid discussing more key issues.</p><p>18. Emotionalize, Antagonize, and Goad Opponents. If you can't do anything else, chide and taunt your opponents and draw them into emotional responses which will tend to make them look foolish and overly motivated, and generally render their material somewhat less coherent. Not only will you avoid discussing the issues in the first instance, but even if their emotional response addresses the issue, you can further avoid the issues by then focusing on how 'sensitive they are to criticism.'</p><p>19. Ignore proof presented, demand impossible proofs. This is perhaps a variant of the 'play dumb' rule. Regardless of what material may be presented by an opponent in public forums, claim the material irrelevant and demand proof that is impossible for the opponent to come by (it may exist, but not be at his disposal, or it may be something which is known to be safely destroyed or withheld, such as a murder weapon.) In order to completely avoid discussing issues, it may be required that you to categorically deny and be critical of media or books as valid sources, deny that witnesses are acceptable, or even deny that statements made by government or other authorities have any meaning or relevance.</p><p>20. False evidence. Whenever possible, introduce new facts or clues designed and manufactured to conflict with opponent presentations -- as useful tools to neutralize sensitive issues or impede resolution. This works best when the crime was designed with contingencies for the purpose, and the facts cannot be easily separated from the fabrications.</p><p>21. Call a Grand Jury, Special Prosecutor, or other empowered investigative body. Subvert the (process) to your benefit and effectively neutralize all sensitive issues without open discussion. Once convened, the evidence and testimony are required to be secret when properly handled. For instance, if you own the prosecuting attorney, it can insure a Grand Jury hears no useful evidence and that the evidence is sealed and unavailable to subsequent investigators. Once a favorable verdict is achieved, the matter can be considered officially closed. Usually, this technique is applied to find the guilty innocent, but it can also be used to obtain charges when seeking to frame a victim.</p><p>22. Manufacture a new truth. Create your own expert(s), group(s), author(s), leader(s) or influence existing ones willing to forge new ground via scientific, investigative, or social research or testimony which concludes favorably. In this way, if you must actually address issues, you can do so authoritatively.</p><p>23. Create bigger distractions. If the above does not seem to be working to distract from sensitive issues, or to prevent unwanted media coverage of unstoppable events such as trials, create bigger news stories (or treat them as such) to distract the multitudes.</p><p>24. Silence critics. If the above methods do not prevail, consider removing opponents from circulation by some definitive solution so that the need to address issues is removed entirely. This can be by their death, arrest and detention, blackmail or destruction of their character by release of blackmail information, or merely by destroying them financially, emotionally, or severely damaging their health.</p><p>25. Vanish. If you are a key holder of secrets or otherwise overly illuminated and you think the heat is getting too hot, to avoid the issues, vacate the kitchen.</p><p>______________________________________________________________________________________</p><p>Eight Traits of the Disinformationalist</p><p>1) Avoidance. They never actually discuss issues head-on or provide constructive input, generally avoiding citation of references or credentials. Rather, they merely imply this, that, and the other. Virtually everything about their presentation implies their authority and expert knowledge in the matter without any further justification for credibility.</p><p>2) Selectivity. They tend to pick and choose opponents carefully, either applying the hit-and-run approach against mere commentators supportive of opponents, or focusing heavier attacks on key opponents who are known to directly address issues. Should a commentator become argumentative with any success, the focus will shift to include the commentator as well.</p><p>3) Coincidental. They tend to surface suddenly and somewhat coincidentally with a new controversial topic with no clear prior record of participation in general discussions in the particular public arena involved. They likewise tend to vanish once the topic is no longer of general concern. They were likely directed or elected to be there for a reason, and vanish with the reason.</p><p>4) Teamwork. They tend to operate in self-congratulatory and complementary packs or teams. Of course, this can happen naturally in any public forum, but there will likely be an ongoing pattern of frequent exchanges of this sort where professionals are involved. Sometimes one of the players will infiltrate the opponent camp to become a source for straw man or other tactics designed to dilute opponent presentation strength.</p><p>5) Anti-conspiratorial. They almost always have disdain for 'conspiracy theorists' and, usually, for those who in any way believe JFK was not killed by LHO. Ask yourself why, if they hold such disdain for conspiracy theorists, do they focus on defending a single topic discussed in a NG focusing on conspiracies? One might think they would either be trying to make fools of everyone on every topic, or simply ignore the group they hold in such disdain.Or, one might more rightly conclude they have an ulterior motive for their actions in going out of their way to focus as they do.</p><p>6) Artificial Emotions. An odd kind of 'artificial' emotionalism and an unusually thick skin -- an ability to persevere and persist even in the face of overwhelming criticism and unacceptance. This likely stems from intelligence community training that, no matter how condemning the evidence, deny everything, and never become emotionally involved or reactive. The net result for a disinfo artist is that emotions can seem artificial.</p><p>Most people, if responding in anger, for instance, will express their animosity throughout their rebuttal. But disinfo types usually have trouble maintaining the 'image' and are hot and cold with respect to pretended emotions and their usually more calm or unemotional communications style. It's just a job, and they often seem unable to 'act their role in character' as well in a communications medium as they might be able in a real face-to-face conversation/confrontation. You might have outright rage and indignation one moment, ho-hum the next, and more anger later -- an emotional yo-yo.</p><p>With respect to being thick-skinned, no amount of criticism will deter them from doing their job, and they will generally continue their old disinfo patterns without any adjustments to criticisms of how obvious it is that they play that game -- where a more rational individual who truly cares what others think might seek to improve their communications style, substance, and so forth, or simply give up.</p><p>7) Inconsistent. There is also a tendency to make mistakes which betray their true self/motives. This may stem from not really knowing their topic, or it may be somewhat 'freudian', so to speak, in that perhaps they really root for the side of truth deep within.</p><p>I have noted that often, they will simply cite contradictory information which neutralizes itself and the author. For instance, one such player claimed to be a Navy pilot, but blamed his poor communicating skills (spelling, grammar, incoherent style) on having only a grade-school education. I'm not aware of too many Navy pilots who don't have a college degree. Another claimed no knowledge of a particular topic/situation but later claimed first-hand knowledge of it.</p><p>8) Time Constant. Recently discovered, with respect to News Groups, is the response time factor. There are three ways this can be seen to work, especially when the government or other empowered player is involved in a cover up operation:</p><p>a) ANY NG posting by a targeted proponent for truth can result in an IMMEDIATE response. The government and other empowered players can afford to pay people to sit there and watch for an opportunity to do some damage. SINCE DISINFO IN A NG ONLY WORKS IF THE READER SEES IT - FAST RESPONSE IS CALLED FOR, or the visitor may be swayed towards truth.</p><p>b) When dealing in more direct ways with a disinformationalist, such as email, DELAY IS CALLED FOR - there will usually be a minimum of a 48-72 hour delay. This allows a sit-down team discussion on response strategy for best effect, and even enough time to 'get permission' or instruction from a formal chain of command.</p><p>c) In the NG example 1) above, it will often ALSO be seen that bigger guns are drawn and fired after the same 48-72 hours delay - the team approach in play. This is especially true when the targeted truth seeker or their comments are considered more important with respect to potential to reveal truth. Thus, a serious truth sayer will be attacked twice for the same sin.</p><p>______________________________________________________________________________________</p><p>How to Spot a Spy (Cointelpro Agent)</p><p>One way to neutralize a potential activist is to get them to be in a group that does all the wrong things. Why?</p><p>1) The message doesn't get out.</p><p>2) A lot of time is wasted</p><p>3) The activist is frustrated and discouraged</p><p>4) Nothing good is accomplished.</p><p>FBI and Police Informers and Infiltrators will infest any group and they have phoney activist organizations established.</p><p>Their purpose is to prevent any real movement for justice or eco-peace from developing in this country.</p><p>Agents come in small, medium or large. They can be of any ethnic background. They can be male or female.</p><p>The actual size of the group or movement being infiltrated is irrelevant. It is the potential the movement has for becoming large which brings on the spies and saboteurs.</p><p>This booklet lists tactics agents use to slow things down, foul things up, destroy the movement and keep tabs on activists.</p><p>It is the agent's job to keep the activist from quitting such a group, thus keeping him/her under control.</p><p>In some situations, to get control, the agent will tell the activist:</p><p>"You're dividing the movement."</p><p>[Here, I have added the psychological reasons as to WHY this maneuver works to control people]</p><p>This invites guilty feelings. Many people can be controlled by guilt. The agents begin relationships with activists behind a well-developed mask of "dedication to the cause." Because of their often declared dedication, (and actions designed to prove this), when they criticize the activist, he or she - being truly dedicated to the movement - becomes convinced that somehow, any issues are THEIR fault. This is because a truly dedicated person tends to believe that everyone has a conscience and that nobody would dissimulate and lie like that "on purpose." It's amazing how far agents can go in manipulating an activist because the activist will constantly make excuses for the agent who regularly declares their dedication to the cause. Even if they do, occasionally, suspect the agent, they will pull the wool over their own eyes by rationalizing: "they did that unconsciously... they didn't really mean it... I can help them by being forgiving and accepting " and so on and so forth.</p><p>The agent will tell the activist:</p><p>"You're a leader!"</p><p>This is designed to enhance the activist's self-esteem. His or her narcissistic admiration of his/her own activist/altruistic intentions increase as he or she identifies with and consciously admires the altruistic declarations of the agent which are deliberately set up to mirror those of the activist.</p><p>This is "malignant pseudoidentification." It is the process by which the agent consciously imitates or simulates a certain behavior to foster the activist's identification with him/her, thus increasing the activist's vulnerability to exploitation. The agent will simulate the more subtle self-concepts of the activist.</p><p>Activists and those who have altruistic self-concepts are most vulnerable to malignant pseudoidentification especially during work with the agent when the interaction includes matter relating to their competency, autonomy, or knowledge.</p><p>The goal of the agent is to increase the activist's general empathy for the agent through pseudo-identification with the activist's self-concepts.</p><p>The most common example of this is the agent who will compliment the activist for his competency or knowledge or value to the movement. On a more subtle level, the agent will simulate affects and mannerisms of the activist which promotes identification via mirroring and feelings of "twinship". It is not unheard of for activists, enamored by the perceived helpfulness and competence of a good agent, to find themselves considering ethical violations and perhaps, even illegal behavior, in the service of their agent/handler.</p><p>The activist's "felt quality of perfection" [self-concept] is enhanced, and a strong empathic bond is developed with the agent through his/her imitation and simulation of the victim's own narcissistic investments. [self-concepts] That is, if the activist knows, deep inside, their own dedication to the cause, they will project that onto the agent who is "mirroring" them.</p><p>The activist will be deluded into thinking that the agent shares this feeling of identification and bonding. In an activist/social movement setting, the adversarial roles that activists naturally play vis a vis the establishment/government, fosters ongoing processes of intrapsychic splitting so that "twinship alliances" between activist and agent may render whole sectors or reality testing unavailable to the activist. They literally "lose touch with reality."</p><p>Activists who deny their own narcissistic investments [do not have a good idea of their own self-concepts and that they ARE concepts] and consciously perceive themselves (accurately, as it were) to be "helpers" endowed with a special amount of altruism are exceedingly vulnerable to the affective (emotional) simulation of the accomplished agent.</p><p>Empathy is fostered in the activist through the expression of quite visible affects. The presentation of tearfulness, sadness, longing, fear, remorse, and guilt, may induce in the helper-oriented activist a strong sense of compassion, while unconsciously enhancing the activist's narcissistic investment in self as the embodiment of goodness.</p><p>The agent's expresssion of such simulated affects may be quite compelling to the observer and difficult to distinguish from deep emotion.</p><p>It can usually be identified by two events, however:</p><p>First, the activist who has analyzed his/her own narcissistic roots and is aware of his/her own potential for being "emotionally hooked," will be able to remain cool and unaffected by such emotional outpourings by the agent.</p><p>As a result of this unaffected, cool, attitude, the Second event will occur: The agent will recompensate much too quickly following such an affective expression leaving the activist with the impression that "the play has ended, the curtain has fallen," and the imposture, for the moment, has finished. The agent will then move quickly to another activist/victim.</p><p>The fact is, the movement doesn't need leaders, it needs MOVERS. "Follow the leader" is a waste of time.</p><p>A good agent will want to meet as often as possible. He or she will talk a lot and say little. One can expect an onslaught of long, unresolved discussions.</p><p>Some agents take on a pushy, arrogant, or defensive manner:</p><p>1) To disrupt the agenda</p><p>2) To side-track the discussion</p><p>3) To interrupt repeatedly</p><p>4) To feign ignorance</p><p>5) To make an unfounded accusation against a person.</p><p>Calling someone a racist, for example. This tactic is used to discredit a person in the eyes of all other group members.</p><p>Saboteurs</p><p>Some saboteurs pretend to be activists. She or he will ....</p><p>1) Write encyclopedic flyers (in the present day, websites)</p><p>2) Print flyers in English only.</p><p>3) Have demonstrations in places where no one cares.</p><p>4) Solicit funding from rich people instead of grass roots support</p><p>5) Display banners with too many words that are confusing.</p><p>6) Confuse issues.</p><p>7) Make the wrong demands.</p><p>Cool Compromise the goal.</p><p>9) Have endless discussions that waste everyone's time. The agent may accompany the endless discussions with drinking, pot smoking or other amusement to slow down the activist's work.</p><p>Provocateurs</p><p>1) Want to establish "leaders" to set them up for a fall in order to stop the movement.</p><p>2) Suggest doing foolish, illegal things to get the activists in trouble.</p><p>3) Encourage militancy.</p><p>4) Want to taunt the authorities.</p><p>5) Attempt to make the activist compromise their values.</p><p>6) Attempt to instigate violence. Activisim ought to always be non-violent.</p><p>7) Attempt to provoke revolt among people who are ill-prepared to deal with the reaction of the authorities to such violence.</p><p>Informants</p><p>1) Want everyone to sign up and sing in and sign everything.</p><p>2) Ask a lot of questions (gathering data).</p><p>3) Want to know what events the activist is planning to attend.</p><p>4) Attempt to make the activist defend him or herself to identify his or her beliefs, goals, and level of committment.</p><p>Recruiting</p><p>Legitimate activists do not subject people to hours of persuasive dialog. Their actions, beliefs, and goals speak for themselves.</p><p>Groups that DO recruit are missionaries, military, and fake political parties or movements set up by agents.</p><p>Surveillance</p><p>ALWAYS assume that you are under surveillance.</p><p>At this point, if you are NOT under surveillance, you are not a very good activist!</p><p>Scare Tactics</p><p>They use them.</p><p>Such tactics include slander, defamation, threats, getting close to disaffected or minimally committed fellow activists to persuade them (via psychological tactics described above) to turn against the movement and give false testimony against their former compatriots. They will plant illegal substances on the activist and set up an arrest; they will plant false information and set up "exposure," they will send incriminating letters [emails] in the name of the activist; and more; they will do whatever society will allow.</p><p>This booklet in no way covers all the ways agents use to sabotage the lives of sincere an dedicated activists.</p><p>If an agent is "exposed," he or she will be transferred or replaced.</p><p>COINTELPRO is still in operation today under a different code name. It is no longer placed on paper where it can be discovered through the freedom of information act.</p><p>The FBI counterintelligence program's stated purpose: To expose, disrupt, misdirect, discredit, and otherwise neutralize individuals who the FBI categorize as opposed to the National Interests. "National Security" means the FBI's security from the people ever finding out the vicious things it does in violation of people's civil liberties.</p><p>______________________________________________________________________________________</p><p>Seventeen Techniques for Truth Suppression</p><p>Strong, credible allegations of high-level criminal activity can bring down a government. When the government lacks an effective, fact-based defense, other techniques must be employed. The success of these techniques depends heavily upon a cooperative, compliant press and a mere token opposition party.</p><p>1. Dummy up. If it's not reported, if it's not news, it didn't happen.</p><p>2. Wax indignant. This is also known as the "How dare you?" gambit.</p><p>3. Characterize the charges as "rumors" or, better yet, "wild rumors." If, in spite of the news blackout, the public is still able to learn about the suspicious facts, it can only be through "rumors." (If they tend to believe the "rumors" it must be because they are simply "paranoid" or "hysterical.")</p><p>4. Knock down straw men. Deal only with the weakest aspects of the weakest charges. Even better, create your own straw men. Make up wild rumors (or plant false stories) and give them lead play when you appear to debunk all the charges, real and fanciful alike.</p><p>5. Call the skeptics names like "conspiracy theorist," "nutcase," "ranter," "kook," "crackpot," and, of course, "rumor monger." Be sure, too, to use heavily loaded verbs and adjectives when characterizing their charges and defending the "more reasonable" government and its defenders. You must then carefully avoid fair and open debate with any of the people you have thus maligned. For insurance, set up your own "skeptics" to shoot down.</p><p>6. Impugn motives. Attempt to marginalize the critics by suggesting strongly that they are not really interested in the truth but are simply pursuing a partisan political agenda or are out to make money (compared to over-compensated adherents to the government line who, presumably, are not).</p><p>7. Invoke authority. Here the controlled press and the sham opposition can be very useful.</p><p>8. Dismiss the charges as "old news."</p><p>9. Come half-clean. This is also known as "confession and avoidance" or "taking the limited hangout route." This way, you create the impression of candor and honesty while you admit only to relatively harmless, less-than-criminal "mistakes." This stratagem often requires the embrace of a fall-back position quite different from the one originally taken. With effective damage control, the fall-back position need only be peddled by stooge skeptics to carefully limited markets.</p><p>10. Characterize the crimes as impossibly complex and the truth as ultimately unknowable.</p><p>11. Reason backward, using the deductive method with a vengeance. With thoroughly rigorous deduction, troublesome evidence is irrelevant. E.g. We have a completely free press. If evidence exists that the Vince Foster "suicide" note was forged, they would have reported it. They haven't reported it so there is no such evidence. Another variation on this theme involves the likelihood of a conspiracy leaker and a press who would report the leak.</p><p>12. Require the skeptics to solve the crime completely. E.g. If Foster was murdered, who did it and why?</p><p>13. Change the subject. This technique includes creating and/or publicizing distractions.</p><p>14. Lightly report incriminating facts, and then make nothing of them. This is sometimes referred to as "bump and run" reporting.</p><p>15. Baldly and brazenly lie. A favorite way of doing this is to attribute the "facts" furnished the public to a plausible-sounding, but anonymous, source.</p><p>16. Expanding further on numbers 4 and 5, have your own stooges "expose" scandals and champion popular causes. Their job is to pre-empt real opponents and to play 99-yard football. A variation is to pay rich people for the job who will pretend to spend their own money.</p><p>17. Flood the Internet with agents. This is the answer to the question, "What could possibly motivate a person to spend hour upon hour on Internet news groups defending the government and/or the press and harassing genuine critics?" Don t the authorities have defenders enough in all the newspapers, magazines, radio, and television? One would think refusing to print critical letters and screening out serious callers or dumping them from radio talk shows would be control enough, but, obviously, it is not.</p><h2>Source</h2><div class="paywall-jump" data-component-name="PaywallToDOM"></div><p>https://cryptome.org/2012/07/gent-forum-spies.htm</p>]]></content:encoded></item><item><title><![CDATA[Trust Modelling]]></title><description><![CDATA[You shouldn't model the threat, rather have the highest security baseline you can have (including physical, especially that), consentual digital privacy, and pseudonomity for projects that matter.]]></description><link>https://letters.empiresec.co/p/trust</link><guid isPermaLink="false">https://letters.empiresec.co/p/trust</guid><dc:creator><![CDATA[Sovereign Shadow]]></dc:creator><pubDate>Tue, 24 Jun 2025 10:37:57 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/55d60e10-6be5-4694-9897-67043796e642_1024x1024.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I always had this fealing that, threat modelling is a wrong way to think about security.</p><p>I mean, ideally wouldn't you want to be maximally secured? </p><p>The counter argument ofcourse is that, we have limited resources - money, time etc. </p><p>But</p><p>I am gonna make a very big claim, security is cheap, as in, it won't cost you much to set it up, its just practice, and once setup is done, it doesn't need much time and you would be secured against most vulnerabilities. </p><p>By stating that, your threat model allows a certain vulnerability to be out of scope of your preparation against an adversery, you lost wayyy before even thinking about starting the fight. </p><div class="pullquote"><p>&#8220;The supreme art of war is to subdue the enemy without fighting.&#8221; - Sun Tzu</p></div><p>Even state actors can't break maths (If they could, I know a lot of people, in a lot of jurisdictions that would have ended up behind bars) </p><p>The worst state actors can do, is infiltrate via social/cultural programming/subversion (Hence I will have a section on COGSEC in bible 2025) - also study how <a href="https://x.com/fr0gger_/status/1774342248437813525">xz backdoor </a>played out. </p><p>Today I propose to you a different approach to security which I don't think anyone on the interwebz has codified, but its very intuitive to us, physically, somewhat less digitally, like how privacy is intuitive to most people when they buy the curtains for their windows but not when they post on Insta or sell their DNA sequence to a bankrupt organisation. </p><p>Trust is something we all understand, its something that is ingrained in a personality that you don't know all the complexities of, but after certain encounters with said personality, you develop almost an instinct to judge it, hence decide to trust them on some spectrum.</p><p>Physically we always do this intuitively, slowly allowing a stranger into our lives untill we know how trustworthy, the individual is. We don't share everything, to everyone, all at once - same should be applied to everything digital, trust should be given in layers. </p><p>Services and products, have a personality, brands have a personality, heck substances that we use and abuse have personalities. </p><p>Threat modelling is a waste of time, most security is free because code is free speach, and we all have right to speak anything we like, once we have adequate security.</p><h2>Refutation to CounterProductive Argument</h2><p>The argument goes something like this &#8220;If you don&#8217;t even know what you&#8217;re defending against then you&#8217;re liable to do things that are useless or even counterproductive&#8221;</p><p>For the time being, I can only say this: </p><p>Having maximal Security Baseline isn't counterproductive. </p><h2>Usability</h2><p>maximum privacy is tails os? </p><p>Not really. </p><p>Macbook m series with obscura, is maximum usability + more or less same privacy. </p><h2>Opsec &amp; CogSec</h2><p>Cognitive security is your habits and behavioural conduct in your immediate physical and digital environments. </p><h2>The Action Plan</h2>
      <p>
          <a href="https://letters.empiresec.co/p/trust">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Research v. Education v. Reporting]]></title><description><![CDATA[Vs Entertainment]]></description><link>https://letters.empiresec.co/p/educate</link><guid isPermaLink="false">https://letters.empiresec.co/p/educate</guid><dc:creator><![CDATA[Sovereign Shadow]]></dc:creator><pubDate>Thu, 01 May 2025 03:49:11 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/2353a75d-7458-4022-b387-282a4b4a3671_1536x1024.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>When I started creating online, I always wondered what it means, to write words out of thin air. When you look at the internet, even the supposedly front pages (old.reddit.com, consumer reports, forums, youtube, twitter/X, nostr / stacker.news etc) and search engines, spam is omnipotent. AI is fixing some spam issues but marketers, as always will find new ways to control the narrative. </p><p>I have been thinking of what post-AI content will look like, and imo AI will replace search &amp; entry lvl coding. AI agents will create new IDE's and <a href="https://youtube.com/watch?v=EADTYuk3pnc">interfaces</a> (to reallity itself). </p><p>AI will kill most &#8220;<a href="https://docs.bearblog.dev/seo/">SEO</a>&#8221; - content which is spam (i.e. strongarm marketers into thinking more), as in, what would have been a sentence rather than a Table of Contents, will be a sentence. </p><p>If you want a recipie, you will get one! not long ass articles with SEO slop. (think<a href="https://based.cooking"> based.cooking</a> like answers) </p><p>I think its important look at content through thre lens of research, reporting (journalism) &amp; education. </p><p>Research is synthesis of new information, new insights, new lines that connects the dots, and shows you new ways that previously didn't existed. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eC2A!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F738a367f-f334-43db-b3b3-001c1e3d1c3e_640x722.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eC2A!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F738a367f-f334-43db-b3b3-001c1e3d1c3e_640x722.jpeg 424w, https://substackcdn.com/image/fetch/$s_!eC2A!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F738a367f-f334-43db-b3b3-001c1e3d1c3e_640x722.jpeg 848w, https://substackcdn.com/image/fetch/$s_!eC2A!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F738a367f-f334-43db-b3b3-001c1e3d1c3e_640x722.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!eC2A!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F738a367f-f334-43db-b3b3-001c1e3d1c3e_640x722.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eC2A!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F738a367f-f334-43db-b3b3-001c1e3d1c3e_640x722.jpeg" width="640" height="722" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/738a367f-f334-43db-b3b3-001c1e3d1c3e_640x722.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:722,&quot;width&quot;:640,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:86031,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://letters.empiresec.co/i/162336794?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F738a367f-f334-43db-b3b3-001c1e3d1c3e_640x722.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!eC2A!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F738a367f-f334-43db-b3b3-001c1e3d1c3e_640x722.jpeg 424w, https://substackcdn.com/image/fetch/$s_!eC2A!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F738a367f-f334-43db-b3b3-001c1e3d1c3e_640x722.jpeg 848w, https://substackcdn.com/image/fetch/$s_!eC2A!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F738a367f-f334-43db-b3b3-001c1e3d1c3e_640x722.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!eC2A!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F738a367f-f334-43db-b3b3-001c1e3d1c3e_640x722.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><a href="https://medium.com/future-literacy/zeroth-principles-thinking-9376d0b7e7f5">https://medium.com/future-literacy/zeroth-principles-thinking-9376d0b7e7f5</a></p><p>Indoctrinization is NOT education (DM bowtiedqueenbee on X, she will tell you), its opening up the minds of the educatee, challenging their axioms and revealing the underlining assumptions and &#8220;myth&#8221; busting to create better maps of the world so that they take better actions. </p><p>Reporting vis-a-vis journalism is narrative building, getting a crowd on the same page to do awesome stuff ideally.  (imo good marketers don't create mobs but cults)</p><p><em><strong>Narrative building is selling the discovery of the inventions.</strong></em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hIi2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d6e2b6e-b0a4-4b11-a02e-c09291e29bbd_576x1024.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hIi2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d6e2b6e-b0a4-4b11-a02e-c09291e29bbd_576x1024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!hIi2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d6e2b6e-b0a4-4b11-a02e-c09291e29bbd_576x1024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!hIi2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d6e2b6e-b0a4-4b11-a02e-c09291e29bbd_576x1024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!hIi2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d6e2b6e-b0a4-4b11-a02e-c09291e29bbd_576x1024.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hIi2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d6e2b6e-b0a4-4b11-a02e-c09291e29bbd_576x1024.jpeg" width="576" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7d6e2b6e-b0a4-4b11-a02e-c09291e29bbd_576x1024.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:576,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:54552,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://letters.empiresec.co/i/162336794?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d6e2b6e-b0a4-4b11-a02e-c09291e29bbd_576x1024.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hIi2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d6e2b6e-b0a4-4b11-a02e-c09291e29bbd_576x1024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!hIi2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d6e2b6e-b0a4-4b11-a02e-c09291e29bbd_576x1024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!hIi2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d6e2b6e-b0a4-4b11-a02e-c09291e29bbd_576x1024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!hIi2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7d6e2b6e-b0a4-4b11-a02e-c09291e29bbd_576x1024.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I educate through my research. I don't do reporting. If my work interests you, it entertains you. </p><p>A researcher brings new information, an educator imparts it, a reporter contextalizes it.</p><p>Truth, Wisdom &amp; Tech Savviness</p><p>Securitybrahh | The Sovereign Shadow</p><h2>Further reading</h2><div class="paywall-jump" data-component-name="PaywallToDOM"></div><p><a href="https://blog.kagi.com/kagi-ai-search">https://blog.kagi.com/kagi-ai-search</a></p><p><a href="https://blog.kagi.com/age-pagerank-over">https://blog.kagi.com/age-pagerank-over</a></p>]]></content:encoded></item><item><title><![CDATA[what Monero is !?]]></title><description><![CDATA[a currency is NOT a store of value]]></description><link>https://letters.empiresec.co/p/monero-is-cash</link><guid isPermaLink="false">https://letters.empiresec.co/p/monero-is-cash</guid><dc:creator><![CDATA[Sovereign Shadow]]></dc:creator><pubDate>Tue, 03 Dec 2024 10:33:29 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/6d9a9a39-ce86-4b87-8b22-5b4fab34586a_683x1024.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In my previous post, I made a case for bitcoin, today I will be making a case for monero. I have been in the crypto space since it was called cryptography not shitcoins. I have looked into crypto trading and <a href="https://letters.empiresec.co/p/griptoe">concluded</a>, it is infact a casino, and not an exchange. You can try to win. And you should try&#8230; and Win. but the thing is, the House always wins.</p><p>The only &#8220;crypto&#8221; that matters is, bitcoin because, we are fixing money FIRST And everything else can wait, Because fixing the corruption of money will take care of everything else. But, </p><p>Today I am not talking about money but cash. </p><p>Because like money, cash is a problem with similar importantance, if not more.</p><p>Bitcoin is not fungible, what that means is, you can distinguish 1 bitcoin from another, hence <a href="https://sethforprivacy.com/posts/fungibility-graveyard/">authorities</a> can identify where the bitcoin came from &amp; hence block it. </p><p>Note, There maybe an increase in fungibility of bitcoin in the coming future but its only a hope right now (see Appendix A), </p><h2>Monero is not money</h2><p>Bitcoin is money, because for some asset, to be money, it needs governments and central banks to hold it, even if they don't like, holding it. </p><p>And even if its not a &#8220;legal&#8221; tender, if people use it, its money. And that has been <a href="https://x.com/Dennis_Porter_">acheived</a> and we shouldn&#8217;t remake the wheel.</p><p>So BTC is money, Monero is cash, try to remember that.</p><p>Even though txn fees and tail emissions (see Appendix B) make us feel that monero can behave as money but as noted by me, above, we should'nt remake the wheel.</p><h2>Monero is not an Asset</h2><p>Taleb in his bitcoin &#8220;blackpaper&#8221; assumed that the interest in bitcoin will not be sustained. </p><p>But I have many reasons to beleive that assumption is wrong, it will be sustained because mining gives reward &amp; money is a promise, not an &#8220;interest&#8221;. </p><p>Gold is maintenence free, but you still need to mine it physically and its not digital, hence can't serve the needs of the internet anyhow. </p><h2>Monero is not Price</h2><p>Either tail emissions is keeping the monero price against USD stable (even flat) or people don't want to &#8220;accumulate&#8221; it. </p><p>Hence people are mostly using monero as cash. </p><p>Speculative price appreciation of Bitcoin in USD terms makes us feel that we can't use btc as money yet, hence we must use monero as cash. </p><h2>Why we need monero?</h2><p>Lightning can be cash (I am not sure yet), lightning is mostly (https://lightningprivacy.com/en/introduction) private &amp; fees are very low there (for now, and maybe forever), and settlement times a are quick like Visa, then why do we need monero? </p><p>It may take us <a href="https://x.com/JohnCantrell97/status/1478794696935751682">forever</a> to adopt lightning QR codes and point of Sales. Hence we have to rely on monero first, maybe lightning will never replace monero, but time can only tell. </p><h2>Does Mining &#8220;profitabliy&#8221; decreases security of monero?</h2><p>Mining monero is not &#8220;profitable&#8221; by design as you can't use fast machines to mine it to prevent centralization of hashrate (see Appendix B) </p><p>I may have miscalculated this, but with current highest CPU powers, we can't really make &#8220;money&#8221; on monero. </p><p>And the most interesting thing about monero is, when it was delisted from exchanges, the currency actually strengthened, and also when China banned monero mining. </p><h2>Monero FUD debunking</h2><blockquote><p>The Basics</p><p>Monero block rewards will never drop to zero. Block rewards gradually dropped until tail emission commenced at the end of May 2022. At this point, rewards will stay fixed at 0.6 XMR or less* per block.</p><p>Due to block size penalties.</p><p>Why</p><p>Miners need an incentive to mine. Because of the dynamic blocksize, competition between miners will cause fees to decrease. If mining is not profitable due to a high cost and low reward, miners lose their incentive and will stop mining, reducing the security of the network.</p><p>Tail emission ensures that a dynamic block size and fee market can develop.</p></blockquote><p><a href="https://www.getmonero.org/resources/moneropedia/tail-emission.html">https://www.getmonero.org/resources/moneropedia/tail-emission.html</a></p><blockquote><p><br>This tail emission enables two key features in Monero</p><p>A lower bound of network security forever (miners will always be able to rely on 0.6XMR per block, no matter the fee market)</p><p>A dynamic block size (Monero&#8217;s blocks can grow/shrink to adapt to short-term increases in usage, with a penalty to mining rewards during these times).</p></blockquote><p><a href="https://sethforprivacy.com/posts/dispelling-monero-fud/">https://sethforprivacy.com/posts/dispelling-monero-fud/</a></p><h2>&#8220;Bitcoin is not money yet, so expecting volatility to be low is illogical.&#8221;</h2><blockquote><p>Price volatility does not reflect the progress of Bitcoin adoption.</p><p>How else does a free-market money evolve?</p><p>If a new economic unit came into existence, and over time, without the assistance of government or central authority, is destined to overcome all obstacles and dominate the entire world as its preferred money and unit of account &#8211; what would that look like at the start? Would its price be volatile?</p><p>Absolutely it would be volatile. It certainly can&#8217;t be stable, it isn&#8217;t money and not everyone values it to be so at the start, and not everyone will accept it as payment.</p><p>This hypothetical example describes BITCOIN. The point to debate is not its current volatility, but whether it is destined to be the world&#8217;s money in the future. The volatility at the start is not an indication one way or the other if it will succeed, so please, stop mentioning it as a criticism.&#8221;</p><p>Only a money by decree (fiat) can be non-volatile to begin with, and even then it is because it is pegged by the government (with an IOU) to stable money (gold). New money arising from nowhere with no pegging is GOING to be volatile!</p></blockquote><p><a href="https://armantheparman.com/volatile/">https://armantheparman.com/volatile/</a></p><h2>Social Properties</h2><p>&#8220;The number of people using it (Metcalfe&#8217;s Law: the value of a communications network is proportional to the square of the number of its users)</p><p>Fair (created without a pre-mine &#8211; ie the founders did not enrich themselves)</p><p>No central control</p><p>Sufficiently distributed with a tendency to further distribute (note: even distribution is impossible to begin with)&#8221;</p><p><a href="https://armantheparman.com/volatile/">https://armantheparman.com/volatile/</a></p><h2>Schelling Point</h2><p>When will bitcoin become money, and when will monero become cash? </p><p>The thing is, monero was cash on day 1, You don&#8217;t need timeframes for cash.</p><p>&#8220;Money&#8221; needs time to become money, and that time period is acheived as I have some reason to believe that states have private keys to hold bitcoin in their bags, hence the chasm has been crossed, bitcoin has successdully become money.</p><p>Tell parman that, he would be happy.</p><h2>Appendix A: How will bitcoin become fungible?</h2><p>joinstr.xyz provides fungibility despite soft forks, as it mixes PSBT's via nostr, it can be automated, via mobile-light nodes  (https://github.com/lightninglabs/neutrino)</p><p>opCTV vs opCAT pools</p><p>https://github.com/taproot-wizards/purrfect_vault/issues/1#issuecomment-2513445570</p><h2>Appendix B: Fungibility via Lightning</h2><p>A <a href="https://youtube.com/.watch?v=sRwSqM0YBto">video</a> trying to explain why monero is not a shitcoin.</p><p>https://www.getmonero.org/resources/moneropedia/randomx.html</p><p>https://github.com/SChernykh/p2pool</p><p>I right now think that sender privacy with lightning is possible if you trust the channel (possibly node), the sender is on. </p><p>Also silent payments will make reciever privacy a thing. </p><h2>References</h2><p>https://www.fooledbyrandomness.com/BTC-QF.pdf</p><p>https://www.fooledbyrandomness.com/BTC-QF-appendix.pdf</p><p>P. S. remember to support me, </p><p>lifetime subsciption to this substack is the sweatest deal as you get access to my telegram group and get textual suport from me, and the OPSEC bible for free (with free lifetime updates). </p>]]></content:encoded></item><item><title><![CDATA[Where Monero Shines]]></title><description><![CDATA[And the case against it.]]></description><link>https://letters.empiresec.co/p/monero</link><guid isPermaLink="false">https://letters.empiresec.co/p/monero</guid><dc:creator><![CDATA[Sovereign Shadow]]></dc:creator><pubDate>Tue, 26 Nov 2024 11:52:03 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/71e9120c-c52c-4ae6-9b92-0863664cdc1c_1024x684.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>As a privacy advocate you can&#8217;t unsee the public nature of the bitcoin transactions that&#8217;s why the privacy narrative of monero is attractive but bitcoin has to learn from monero &amp; implement new useful stuff and I have to make a case against storing wealth in xmr.</p><p>As security of monero chain is compromised, your wealth if stored in it will erode.</p><p>Bitcoin transactions even boosted are slow, and block confirmations feels to take ages when we are accustomeed to instant settlements to the likes of visa networks. Monero is faster than bitcoin in this sense.</p><p>The consensus algo (the rules by which bitcoin exists) makes sure that bitcoin&#8217;s ultimate supply is capped at 21 million coins which means its scarce, hence has value. But just scarcity means nothing alone, we have to transact in it and we have to store our wealth in it. (collective hunger for a scarce something makes it valuable)</p><p>Monero has no such scarcity. I have yet to hear any argument of why that scarcity is not needed or how the chain enforces scarcity, if it does it in any way, I am not accustomed to.</p><p>1 xmr = 1 xmr, monero is fungible, this is not true for bitcoin, because of soft forks and where the coin originally came from (what I call taintness) due to the public nature of the chain. Each bitcoin is not equal to the other.</p><p>Monero&#8217;s price is stable (almost flat) because people are not keeping it, hence we can transact in it without feeling uncertain &amp; without the untrustworthiness of the volitlity. (Anxiety of future value, makes buying stuff with a currency difficult)</p><p>By my calculations, monero mining is not profitable even when you price the whole equation of inputs and outputs in the coin itself, hence security of the chain is compromised.</p><p>Monero only has one consumer friendly self custodial mobile wallet I could find that is well maintained - monero.com by cakewallet.</p><p>Monero has had regular hard forks to maintain the privacy and since inception of it, the node operators have no choice but to obey.</p><p>Bitcoin core is gradually adopted and each node operator can decide to upgrade or not. There is no abononment in bitcoin, while monero hard forks makes the previous versions of the chain obselete hence any node operator that decides to keep that version will have numbers that mean nothing.</p><p>One should study Zimbabwe hyperinflation, the government has tried to introduce time and time again &#8220;new&#8221; legal tendors, but those bills have lost value faster than they were printed, because people refuse to transact in it and refuse to store wealth in it, as they don't trust it. </p><p>Dollar bills became famous there as a result.</p><p>This will happen to monero eventually, the privacy narrative is attractive and I use monero from time to time but I never store more than anything that I can not afford to loose.</p><h2>Solution?</h2><p>Solution is ofcourse using bitcoin, but in the current state, you have to follow certain habits to maintain hygiene, below I lay down the exact things to keep in mind.</p>
      <p>
          <a href="https://letters.empiresec.co/p/monero">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Multi Grid]]></title><description><![CDATA[not Off Grid, agorism not anarchism.]]></description><link>https://letters.empiresec.co/p/multi-grid</link><guid isPermaLink="false">https://letters.empiresec.co/p/multi-grid</guid><dc:creator><![CDATA[Sovereign Shadow]]></dc:creator><pubDate>Sun, 20 Oct 2024 05:01:35 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/a37f1309-56c8-49c7-a6ce-ab49d966718d_1024x683.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Idea of off griding, is opting out of everything.</p><p>I think that's inhumane, what you rather want to, is have:</p><p>1. Your own grid (mostly as a backup)</p><p>2. Local grid (community)</p><p>3. "Offshore" grids. (National (state) as well as international - one step at a time)</p><p>Remember</p><p>Lone wolf dies, the pack survives.</p><p>Sovereignty is not about going in the woods and dieing alone, its about optionailty.</p><p>Creating resources that you can rely on if the time comes, only when the time comes.</p><p>Humans alone as individuals are nothing, its how we coordinate is, what makes us stronger. </p><p>Sovereignty is about acquiring the strength to quit toxic relationships and bravery to create new ones.</p>]]></content:encoded></item><item><title><![CDATA[It's about optionality than anything else]]></title><description><![CDATA[Ability to chose, is what we are after]]></description><link>https://letters.empiresec.co/p/copy-its-about-optionality-than-anything</link><guid isPermaLink="false">https://letters.empiresec.co/p/copy-its-about-optionality-than-anything</guid><pubDate>Sun, 29 Sep 2024 11:04:35 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!orja!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9954af4-0ac7-424f-8c9f-76535115d218_399x399.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The goal isn't to become some kind of a hermit that has no idientity irl or otherwise, the goal is to minimise the social exposure so that you have a choice to whom you reveal how much of yourself.</p>
      <p>
          <a href="https://letters.empiresec.co/p/copy-its-about-optionality-than-anything">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[What are we?]]></title><description><![CDATA[Information is all there is]]></description><link>https://letters.empiresec.co/p/what-are-we</link><guid isPermaLink="false">https://letters.empiresec.co/p/what-are-we</guid><pubDate>Thu, 26 Sep 2024 07:14:05 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/b92f0b9e-f9d7-414b-a390-a704f91ffbe8_683x1024.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Its not, that the people don't care about privacy, </p><p>its just that, they don't know,</p><p>they are giving away their rights to it, when they go about, on the internet.</p><p>Once people realize, posting their entire lives on Instagram can become quite dangerous and has real life consequences, fear often creaps in and then, they hurry to youtube channels like Techlore and the like.</p><p>The right to privacy is litterelly the 4th amendment of the consitution of United States.</p><p>One can debate whether the legal system was a bad invention or not but it definately protects us from the worst of human nature. </p><p>It was indeed the best invention, at that time, THE founding fathers were no fools.</p><p>All costitutions are based on USA's, so if you haven't read it, you should, its litterly just <a href="https://constitutioncenter.org/media/files/constitution.pdf">19 pages</a>, all others have their countries' context in them, </p><p>You should be familiar with the structure of yours as well, other than that of USA, all else are somewhat bloated or corrupted by bribery / European / Anglosaxon Feudalism, and of course follow some landmark cases &amp; bills in the subject if your chosing.</p><p>We are </p><p>stories of data, </p><p>our identity and personailty defines us.</p><p>Even in villages and close knit communities we STILL like to have privacy. You don't want to share, your most intimate moments with everyone.</p><p>We learn by making mistakes, once we know that we are being watched, we tend to be more cautious, and try to make way less mistakes, and hence don't learn nor innovate.</p><p>Why is that, we feel creeped out, once we realize someone is stalking us? </p><p>Why are we so addamant to want, to protect our data &amp; privacy?</p><p>The answer is very simple yet, not so clear, when you think about it.</p><h2>The why</h2>
      <p>
          <a href="https://letters.empiresec.co/p/what-are-we">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Data Removal Services?]]></title><description><![CDATA[Fear Corn mostly.]]></description><link>https://letters.empiresec.co/p/data-removal-services</link><guid isPermaLink="false">https://letters.empiresec.co/p/data-removal-services</guid><dc:creator><![CDATA[Sovereign Shadow]]></dc:creator><pubDate>Wed, 11 Sep 2024 18:17:59 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/476e7ba1-057c-49a2-a89a-88d6f2f976c2_1024x683.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I personally don't like these services, you give a lot of info to send silly little emails and to fill forms, that is often outsourced to click farms in places like Bangladesh. </p><p>More often than not, websites agree to these removal requests, but in the process, you increased your exposure instead of decreasing it, as you trusted the parties that do not deserve anyone&#8217;s trust to begin with.</p><p>The first step is always to google / brave search your name and delete accounts you may not even remember creating. You should replace the personal data with fake info before deletion.</p><p>If you do this till page 4 or so, you will be lot less exposed and your future self will thank you for it.</p><p>And then, there are these entities that go by titles like &#8220;data broker&#8221;, they collaborate and collect info that you may not even remember providing.</p><p>Almost every &#8220;privacy&#8221; company is launching their version of data removal service these days, but I don't think they are approaching this problem from the right angle.</p><p>The correct approach is to build an app that runs locally on your device and programmatically sends the DMCA's and fill opt-out forms. (hence your data never leaves your personal device)</p><p>People at redact.dev are working on something like this, and their ceo, Dan plans to launch the beta at the end of this month. </p><p>He told me, it would be somewhat similar to what DDG <a href="https://duckduckgo.com/duckduckgo-help-pages/privacy-pro/personal-information-removal/getting-started/">provides</a>, but far better and more comprehensive. (personally I haven't used what DDG provides nor do I like the search engine, nor the company)</p><p>I like redact.dev's redacting service as it is, this would be icing on the cake.</p><p>I will lay down in the next few sections what tools and forms you should use, to find the places where your data shouldn't have been, and where to file for its removal.</p><p>DIY is the most comprehensive aproach and even if you use a service, you should DIY from time to time; because when push comes to shove, its not humans vs machines, its humans &amp; machines.</p><h2>Seal the Data Leaks</h2>
      <p>
          <a href="https://letters.empiresec.co/p/data-removal-services">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Security is Web 3.0, not "crypto"]]></title><description><![CDATA[Cypherpunks know]]></description><link>https://letters.empiresec.co/p/web3</link><guid isPermaLink="false">https://letters.empiresec.co/p/web3</guid><dc:creator><![CDATA[Sovereign Shadow]]></dc:creator><pubDate>Sat, 17 Aug 2024 12:28:03 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/47a6a0b0-633b-4b1c-adb9-0bad91580eb5_1024x819.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I have been in this space since crypto was a short hand for cryptography not shitcoins.</p><p>Cryptography is a mathematical wizardry by which you can keep your digital memories <a href="https://en.wikipedia.org/wiki/Symmetric-key_algorithm">safe</a> from prying eyes, <a href="https://en.wikipedia.org/wiki/Public-key_cryptography">share</a> secrets across different channels without meeting in the first place, give proof of something you have <a href="https://en.wikipedia.org/wiki/Zero-knowledge_proof">without</a> revealing what that thing is, be a <a href="https://crypto.stackexchange.com/questions/40436/what-is-the-difference-between-honest-verifier-zero-knowledge-and-zero-knowledge">witness</a> of the proof &amp; even apparently <a href="https://en.wikipedia.org/wiki/Kyber">beat</a> quantum computers.</p><p>You think VPN's protect you? well kinda, base layers of the internet is encrypted <em>by default </em>by something called <a href="https://en.wikipedia.org/wiki/Kyber">TLS</a>, so thank <s>god</s> cryptographers for that. VPN protect you from the malicious upper layers, at least when you choose a good provider. </p><p>(btw that malicious upper layers are the apps you love)</p><p>But all in all, its plain simple (albeit hard) maths that you probably won't use when buying a coffee, but well again, thank god for those wonderful people who gave their sweat and blood for this beauty called maths.</p><p>The thing is, internet and our devices were made by keeping efficiency in mind, not security, but once efficiency got achieved, we got plagued with shareholder greed taking over.</p><p>Web 1.0 was a read only environment meaning you can only consume information, Web 2.0 is read/write environment meaning you can interact with the information and Web 3.0 is first and foremost a secure environment.</p><p>Once Web 3.0 has been achieved, we can then move on to adopting <a href="https://lightningprivacy.com/en/introduction">lightning</a> or quite possibly <a href="https://www.getmonero.org/resources/moneropedia/openalias.html">monero</a> as our medium of exchange, as cash &amp; digital bank accounts is controlled by Tyrannical governments and their institutions which degrade the value of our collective productivity. </p><p>Just to beat inflation we have to think about investments rather than focusing on what we do best - our work.</p><p>While Bitcoin can serve as a unit of account, as its optimized for <a href="https://www.baeldung.com/cs/distributed-systems-the-byzantine-generals-problem">verifiability</a> not privacy or scale.</p><p>So anons, now that I have cleared this big misconception that web 3.0 is not about infecting every piece of humanity with casino shitcoins but <em>securityyy</em>, what you gonna do with this information?</p><p>This is the question you can only answer.</p><p>Love, Wisdom &amp; Tech Savviness</p><p>Yours only</p><p>securitybrahh | The Sovereign Shadow</p>]]></content:encoded></item><item><title><![CDATA[Time Delta]]></title><description><![CDATA[#0 rule of OPSEC, and anything in life really]]></description><link>https://letters.empiresec.co/p/time</link><guid isPermaLink="false">https://letters.empiresec.co/p/time</guid><dc:creator><![CDATA[Sovereign Shadow]]></dc:creator><pubDate>Sun, 28 Jul 2024 15:22:57 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/45541009-7be7-4f96-a5e7-074368bf06f5_1024x683.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Everything gets outdated.</p><p>The edge changes, the reality shifts.</p><p>You are in between that reality.</p><p>You are not &#8220;in&#8221; the present, nor in the future nor in the past.</p><p>You ARE the present.</p><p>Time is all there is.</p><p>Hence change, adapt.</p><p>The enemy won't know where you are, because its not where, it's when.</p><p>Plausable deniability &amp; pleading negligence is alpha.</p><p>Reality isn't what they tell you, it's what you tell them.</p><p>Time is on your side only when you believe it doesn't exist. </p><p>Love, Wisdom &amp; Tech Savviness,</p><p>SecurityBrahh | The Sovereign Shadow</p><p></p>]]></content:encoded></item><item><title><![CDATA[PSA: I will remove uninterested ppl]]></title><description><![CDATA[My email list is a sanctuary.]]></description><link>https://letters.empiresec.co/p/emails-sanctuary</link><guid isPermaLink="false">https://letters.empiresec.co/p/emails-sanctuary</guid><dc:creator><![CDATA[Sovereign Shadow]]></dc:creator><pubDate>Wed, 24 Jul 2024 02:30:45 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/1108987b-a039-4ccc-a116-9e59dcd1d0b6_4608x3072.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Hi,</p><p>I have been noticing that only 40% of people are opening my emails, I like to keep the quality of my emails list high.</p><p>So after 10 hours or so, I will be removing the other 60% (maybe they sub&#8217;ed by mistake or have no interest etc)</p><p>Thanks for being a reader, I get immense value from you being engaged and your feedback/comments.</p><p>Truth, Wisdom &amp; Tech Savviness.</p><p>Yours only,</p><p>Security Brahh.</p>]]></content:encoded></item></channel></rss>