Sunday, June 1, 2025

Polaris of Enlightenment

What I wish I knew about privacy sooner

The hard truths no one warned me about.

Published 22 March 2025
– By Naomi Brockwell

I’ve been deep in the privacy world for years, but I wasn’t always this way. If I could go back, I’d grab my younger self by the shoulders and say: “Wake up. The internet is a battlefield of people fighting for your attention, and many of them definitely don’t have your best interests at heart”.

I used to think I was making my own decisions—choosing what platforms to try, what videos to watch, what to believe. I didn’t realize I was part of a system designed to shape my behavior. Some just wanted to sell me things I didn’t need—or even things that actively harm me. But more importantly, some were paying to influence my thoughts, my votes, and even who I saw as the enemy.

There is a lot at stake when we lose the ability to make choices free from manipulation. When our digital exhaust—every click, every pause, every hesitation—is mined and fed into psychological experiments designed to drive behavior, our ability to think independently is undermined.

No one warned me about this. But it’s not too late—not for you. Here are the lessons I wish I had learned sooner—and the steps you can take now, before you wish you had.

1. Privacy mistakes compound over time—like a credit score, but worse

Your digital history doesn’t reset—once data is out there, it’s nearly impossible to erase.

The hard truth:

  • Companies connect everything—your new email, phone number, or payment method can be linked back to your old identity through data brokers, loyalty programs, and behavioral analysis.
  • Switching to a new device or platform doesn’t give you a blank slate—it just gives companies another data point to connect.

What to do:

  • Break the chain before it forms. Use burner emails, aliases, and virtual phone numbers.
  • Change multiple things at once. A new email won’t help if you keep the same phone number and credit card.
  • Be proactive, not reactive. Once a profile is built, you can’t undo it—so prevent unnecessary links before they happen.

2. You’re being tracked—even when you’re not using the internet

Most people assume tracking only happens when they’re browsing, posting, or shopping—but some of the most invasive tracking happens when you’re idle. Even when you think you’re being careful, your devices continue leaking data, and websites have ways to track you that go beyond cookies.

The hard truth:

  • Your phone constantly pings cell towers, creating a movement map of your location—even if you’re not using any apps.
  • Smart devices send data home at all hours, quietly updating manufacturers without your consent.
  • Websites fingerprint you the moment you visit, using unique device characteristics to track you, even if you clear cookies or use a VPN.
  • Your laptop and phone make hidden network requests, syncing background data you never approved.
  • Even privacy tools like incognito mode or VPNs don’t fully protect you. Websites use behavioral tracking to identify you based on how you type, scroll, or even the tilt of your phone.
  • Battery percentage, Bluetooth connections, and light sensor data can be used to re-identify you after switching networks.

What to do:

  • Use a privacy-focused browser like Mullvad Browser or Brave Browser.
  • Check how unique your device fingerprint is at coveryourtracks.eff.org.
  • Monitor hidden data leaks with a reverse firewall like Little Snitch (for Mac)—you’ll be shocked at how much data leaves your devices when you’re not using them.
  • Use a VPN like Mullvad to prevent network-level tracking, but don’t rely on it alone.
  • Break behavioral tracking patterns by changing your scrolling, typing, and browsing habits.

3. Your deleted data isn’t deleted—it’s just hidden from you

Deleting a file, message, or account doesn’t mean it’s gone.

The hard truth:

  • Most services just remove your access to data, not the data itself.
  • Even if you delete an email from Gmail, Google has already analyzed its contents and added what it learned to your profile.
  • Companies don’t just store data—they train AI models on it. Even if deletion were possible, what they’ve learned can’t be undone.

What to do:

  • Use services that don’t collect your data in the first place. Try ProtonMail instead of Gmail, or Brave instead of Google Search.
  • Assume that if a company has your data, it may never be deleted—so don’t hand it over in the first place.

4. The biggest privacy mistake: Thinking privacy isn’t important because “I have nothing to hide”

Privacy isn’t about hiding—it’s about control over your own data, your own life, and your own future.

The hard truth:

  • Data collectors don’t care who you are—they collect everything. If laws change, or you become notable, your past is already logged and available to be used against you.
  • “I have nothing to hide” becomes “I wish I had hidden that.” Your past purchases, social media comments, or medical data could one day be used against you.
  • Just because you don’t feel the urgency of privacy now doesn’t mean you shouldn’t be choosing privacy-focused products. Every choice you make funds a future—you’re either supporting companies that protect people or ones that normalize surveillance. Which future are you contributing to?
  • Anonymity only works if there’s a crowd. The more people use privacy tools, the safer we all become. Even if your own safety doesn’t feel like a concern right now, your choices help protect the most vulnerable members of society by strengthening the privacy ecosystem.

What to do:

  • Support privacy-friendly companies.
  • Normalize privacy tools in your circles. The more people use them, the less suspicious they seem.
  • Act now, not when it’s too late. Privacy matters before you need it.

5. You’re never just a customer—you’re a product

Free services don’t serve you—they serve the people who pay for your data.

The hard truth:

  • When I first signed up for Gmail, I thought I was getting a free email account. In reality, I was handing over my private conversations for them to scan, profile, and sell.
  • Even paid services can sell your data. Many “premium” apps still track and monetize your activity.
  • AI assistants and smart devices extract data from you. Be intentional about the data you give them, knowing they are mining your information.

What to do:

  • Ask: “Who profits from my data?”
  • Use privacy-respecting alternatives.
  • Think twice before using free AI assistants that explicitly collect your data, or speaking near smart devices.

Final thoughts: The future isn’t written yet

Knowing what I know now, I’d tell my younger self this: you are not powerless. The tools you use, the services you fund, and the choices you make shape the world we all live in.

Take your first step toward reclaiming your privacy today. Because every action counts, and the future isn’t written yet.

 

Yours in privacy,
Naomi

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Youtube.

TNT is truly independent!

We don’t have a billionaire owner, and our unique reader-funded model keeps us free from political or corporate influence. This means we can fearlessly report the facts and shine a light on the misdeeds of those in power.

Consider a donation to keep our independent journalism running…

KYC is the crime

The Coinbase hack shows how state-mandated surveillance is putting lives at risk.

Published yesterday 7:36
– By Naomi Brockwell

Last week, Coinbase got hacked.

Hackers demanded a $20 million ransom after breaching a third-party system. They didn’t get passwords or crypto keys. But what they did get will put lives at risk:

  • Names
  • Home addresses
  • Phone numbers
  • Partial Social Security numbers
  • Identity documents
  • Bank info

That’s everything someone needs to impersonate you, blackmail you, or show up at your front door.

This isn’t hypothetical. There’s a growing wave of kidnappings and extortion targeting people with crypto exposure. Criminals are using leaked identity data to find victims and hold them hostage.

Let’s be clear: KYC doesn’t just put your data at risk. It puts people at risk.

Naturally, people are furious at any company that leaks their information.

But here’s the bigger issue:
No system is unhackable.
Every major institution, from the IRS to the State Department, has suffered breaches.
Protecting sensitive data at scale is nearly impossible.

And Coinbase didn’t want to collect this data.
Many companies don’t. It’s a massive liability.
They’re forced to, by law.

A new, dangerous normal

KYC, Know Your Customer, has become just another box to check.

Open a bank account? Upload your ID.
Use a crypto exchange? Add your selfie and utility bill.
Sign up for a payment app? Same thing.

But it wasn’t always this way.

Until the 1970s, you could walk into a bank with cash and open an account. Your financial life was private by default.

That changed with the Bank Secrecy Act of 1970, which required banks to start collecting and reporting customer activity to the government. Still, KYC wasn’t yet formalized. Each bank decided how well they needed to know someone. If you’d been a customer since childhood, or had a family member vouch for you, that was often enough.

Then came the Patriot Act, which turned KYC into law. It required every financial institution to collect, verify, and store identity documents from every customer, not just for large or suspicious transactions, but for basic access to the financial system.

From that point on, privacy wasn’t the default. It was erased.

The real-world cost

Today, everyone is surveilled all the time.
We’ve built an identity dragnet, and people are being hurt because of it.

Criminals use leaked KYC data to find and target people, and it’s not just millionaires. It’s regular people, and sometimes their parents, partners, or even children.

It’s happened in London, Buenos Aires, Dubai, Lagos, Los Angeles, all over the world.
Some are robbed. Some are held for ransom.
Some don’t survive.

These aren’t edge cases. They’re the direct result of forcing companies to collect and store sensitive personal data.

When we force companies to hoard identity data, we guarantee it will eventually fall into the wrong hands.

There are two types of companies, those that have been hacked, and those that don’t yet know they’ve been hacked” – former Cisco CEO, John Chambers

What KYC actually does

KYC turns every financial institution into a surveillance node.
It turns your personal information into a liability.

It doesn’t just increase risk — It creates it.

KYC is part of a global surveillance infrastructure. It feeds into databases governments share and query without your knowledge. It creates chokepoints where access to basic services depends on surrendering your privacy. And it deputizes companies to collect and hold sensitive data they never wanted.

If you’re trying to rob a vault, you go where the gold is.
If you’re trying to target people, you go where the data lives.

KYC creates those vaults, legally mandated, poorly secured, and irresistible to attackers.

Does it even work?

We’re told KYC is necessary to stop terrorism and money laundering.

But the top reasons banks file “suspicious activity reports” are banal, like someone withdrawing “too much” of their own money.

We’re told to accept this surveillance because it might stop a bad actor someday.

In practice, it does more to expose innocent people than to catch criminals.

KYC doesn’t prevent crime.
It creates the conditions for it.

A Better Path Exists

We don’t have to live like this.

Better tools already exist, tools that allow verification without surveillance:

  • Zero-Knowledge Proofs (ZKPs): Prove something (like your age or citizenship) without revealing documents
  • Decentralized Identity (DID): You control what gets shared, and with whom
  • Homomorphic Encryption: Allows platforms to verify encrypted data without ever seeing it

But maybe it’s time to question something deeper.
Why is centralized, government-mandated identity collection the foundation of participation in financial life?

This surveillance regime didn’t always exist. It was built.

And just because it’s now common doesn’t mean we should accept it.

We didn’t need it before. We don’t need it now.

It’s time to stop normalizing mass surveillance as a condition for basic financial access.

The system isn’t protecting us.
It’s putting us in danger.

It’s time to say what no one else will

KYC isn’t a necessary evil.
It’s the original sin of financial surveillance.

It’s not a flaw in the system.
It is the system.

And the system needs to go.

Takeaways

  • Check https://HaveIBeenPwned.com to see how much of your identity is already exposed
  • Say no to services that hoard sensitive data
  • Support better alternatives that treat privacy as a baseline, not an afterthought

Because safety doesn’t come from handing over more information.

It comes from building systems that never need it in the first place.

 

Yours in privacy,
Naomi

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Youtube.

Wallenberg and Nvidia to build “cutting-edge” AI center in Sweden

Published 27 May 2025
– By Editorial Staff
Marcus Wallenberg believes that the AI initiative is absolutely crucial for Swedish industry.

US chip manufacturer Nvidia is establishing a new AI center in Sweden in collaboration with the Wallenberg sphere and several major Swedish companies, including Astra Zeneca, Ericsson, Saab, and SEB.

The aim of the initiative is to strengthen Sweden’s position in artificial intelligence by building the country’s first AI supercomputer for business. The center will be run by a joint venture formed by the parties involved.

– Investing in cutting-edge AI infrastructure is a crucial step toward accelerating the development and adoption of AI across Swedish industry, said Marcus Wallenberg, chairman of Wallenberg Investments, in a statement, adding:

– We believe this initiative will generate valuable spillover effects – by enabling upskilling, fostering new collaborations, and strengthening the broader national AI ecosystem.

The initiative was announced during a visit to Sweden by Nvidia CEO Jensen Huang. During his visit, he was also awarded an honorary doctorate at Linköping University.

– As electricity powered the industrial age and the Internet fueled the digital age, AI is the engine of the next industrial revolution. Through the visionary initiative of Wallenberg Investments and Sweden’s industry leaders, the country is building its first AI infrastructure – laying the foundation for breakthroughs across science, industry, and society, and securing Sweden’s place at the forefront of the AI era, argues Nvidia’s CEO.

AI-driven drug development

And the players have clear ambitions for the initiative. Pharmaceutical giant AstraZeneca will use the system for AI-driven breakthroughs in drug development, with advanced models and data processing.

Ericsson wants to develop AI models to improve performance, efficiency, and customer experiences, as well as enable new business models.

Saab will invest in AI to accelerate the development of advanced defense capabilities in its leading systems, and SEB will integrate AI for increased productivity, new customer offerings, and long-term competitiveness, with a focus on critical infrastructure.

The ambition with this initiative is to establish a next generation AI compute infrastructure that is both a production facility and at the same time serves as a reference installation, unlocking new possibilities for AI adoption”, the companies said.

One in two young Brits long for a world without the internet

Published 26 May 2025
– By Editorial Staff
In recent years, there have been a number of reports and alerts showing that social media has a very negative impact on young people's mental health.

A new survey from the British Standards Institution mapping young people’s relationship with social media and digital life reveals that nearly half of young Brits wish they had grown up without the internet.

Of the 1,293 respondents aged 16 to 21, 46% said they would prefer to be young in a world where the internet did not exist. Almost 70% said they felt worse and had lower self-esteem after using social media, with 68% saying their time online had been directly detrimental to their mental health.

A quarter of respondents spent four hours or more a day on social media. Of these, 42% admitted to lying to parents or guardians about their online use. The same number said they had lied about their age online at some point, while 40% used so-called “burner” accounts – hidden or alternative profiles. 27% had even pretended to be a completely different person and the same number had shared their location information with strangers online.

The survey was conducted in the aftermath of coronavirus-related restrictions during the lockdown policy, a period which, according to three-quarters of participants, led to a marked increase in screen time.

Experts don’t believe in “digital curfew”

Against this backdrop, the UK’s technology minister, Peter Kyle, has recently opened the door to introducing mandatory digital “curfews” – i.e. blocking certain apps, such as TikTok and Instagram, after a certain time in the evening. Although critics have dismissed the proposal as repressive, it is gaining some support among young people: half of those surveyed, 50%, said they would support a digital curfew after 22:00.

However, several experts, including Rani Govender, policy manager for children’s online safety at the NSPCC, say the proposed restrictions are not enough.

We need to make clear that a digital curfew alone is not going to protect children from the risks they face online. They will be able to see all these risks at other points of the day and they will still have the same impact

She added that the focus should instead be on making the online environment safer and less addictive for children and young people, and preventing them from visiting obviously harmful sites and apps.

“Rabbit holes of harmful material”

Andy Burrows, CEO of the Molly Rose Foundation, also highlights the need for legislation to protect young people from harmful content:

– It’s clear that young people are aware of the risks online and, what’s more, they want action from tech companies to protect them.

He points out that algorithms often display content that can quickly lead young people into destructive flows and spirals:

– Algorithms can quickly spiral and take young people down rabbit holes of harmful and distressing material through no fault of their own.

Burrows calls for new laws to force a “safe by design” approach that puts the needs of children and society ahead of corporate profits.

This isn’t the internet we were promised

But decentralized tech is breaking the chains of control and giving you back your digital freedom.

Published 24 May 2025
– By Naomi Brockwell

Let’s get one thing straight:

Decentralization is not the goal.

The goal is freedom. The goal is autonomy. The goal is human dignity in the digital age.

Decentralization is just one way, often the best way right now, to get us closer to those outcomes.

In a perfect world, we wouldn’t need decentralized systems. If governments weren’t able to pressure companies into silence, or force them to hand over your private data… if corporations weren’t constantly monetizing your every move… if centralized platforms could be trusted to operate in the interest of users… then maybe centralized systems would be fine.

They’re efficient. They reduce friction.

There’s no denying the impact these platforms have had. They connected the world. They brought billions of people online, enabled global communication, and revolutionized how we share ideas and build movements.

But they also created new dangers.

We now live in a world where control over your data is a leverage point for power. Where a single company can unilaterally decide what speech is acceptable. Where massive data breaches happen regularly because your life is stored in one convenient server.

Centralized systems have become centralized vulnerabilities.

And so, decentralization has emerged, not as an ideology, but as a solution. A way to take some of that power back. A way to distribute risk, enable resilience, and restore individual choice.

A brief history of the web

We’ve lived through three major internet eras so far:

  • Web 1.0: The early internet was made up of static websites, self-hosted pages, and personal blogs. There were no algorithms deciding what you saw. Just raw HTML and a whole lot of freedom. It was gloriously messy, decentralized, and user-owned.
  • Web 2.0: Then came the rise of centralized platforms. Facebook, YouTube, and X (formerly Twitter) made publishing easy and social. These platforms helped bring billions of people online, but at a cost. In exchange for convenience, we gave up control. Our data became trapped in platforms we couldn’t leave. Surveillance and censorship scaled. Cloud storage followed the same trend: easy access, but centralized vulnerability.
  • Web 3.0: Now we’re entering a new era. One that takes the best of both worlds. We’re combining the usability and scale of the modern internet with decentralized protocols that restore individual control. We no longer need to be locked into platforms or ecosystems. We can own our data, preserve our identity, and move freely between services. This isn’t just a return to the past. It’s a leap forward. A better model is finally being built.

Why decentralization matters

It’s not that decentralization is inherently good — it’s that centralization has made us vulnerable. The Web2 world comes with serious problems:

  • Targeted control: A government only needs to pressure one company to censor millions.
  • Censorship: Say the wrong thing and get kicked off a platform. Poof, your voice disappears.
  • Data monopolies: Corporations collect and sell your personal information because they control the servers and the systems. This includes cloud storage. Your private documents, photos, and messages are often just a policy change or government request away from being inaccessible.
  • Lock-in: Your content and identity are trapped on whatever platform you chose. You don’t own anything.

Decentralized systems distribute that risk.

They make it harder to shut things down. Harder to surveil everyone at once. Easier to move, fork, remix, or migrate without losing everything in the process.

They don’t guarantee freedom, but they make it harder to take freedom away.

The protocols powering the shift

The movement toward decentralization is about changing the foundation of how the internet works. Here are some tools leading the way:

Decentralized storage: Keeping files online without a single gatekeeper

Right now, most of our files — photos, documents, backups — live in cloud services owned by a handful of big companies. That means those companies decide how long your files stay online, who gets access to them, and whether they get deleted, censored, or handed over to someone else.

Decentralized storage flips that model.

Instead of uploading your files to a single company’s server, decentralized storage lets you store data across a network of independent operators. Sometimes your file is split up and distributed across many nodes. Other times, it’s stored as a whole on a specific server, but that server is part of a peer-to-peer network, not a centralized platform. Either way, no single company controls access to everyone’s data, which makes your data more resilient and less vulnerable to censorship or loss.

  • IPFS helps you share files in a way that doesn’t depend on one website or server. If anyone on the network has a copy of the file, you can still access it.
  • Filecoin is a network where people get paid to store your files securely. You choose how long your files should be kept, and the system ensures they’re really there.
  • Arweave is focused on long-term storage. You pay once, and the goal is to keep your data online for decades. It’s especially useful for archiving important documents and creative work that needs to be preserved.

Decentralized social media: You keep your identity, even if the app changes

Traditional social media apps own everything: your account, your posts, your followers. If they ban you or shut down, everything’s gone.

Decentralized social platforms are trying to change that. They separate your identity and content from the app you use. That way, if one app disappears or kicks you off, you can just log into another app and pick up where you left off.

  • Mastodon is like Twitter, but instead of one giant site, it’s made up of many smaller communities. Each one sets its own rules, but they all talk to each other.
  • Bluesky is building a system where your posts and followers stay with you, not the platform. If you don’t like the app you’re using, you can switch without losing anything.
  • Nostr is a protocol that’s decentralized by design. It uses cryptographic keys instead of usernames, and many apps integrate with Bitcoin’s Lightning Network for tipping.

This is just the beginning: There’s decentralized finance, decentralized search, decentralized governance, even decentralized AI. This new world of possibilities is just opening up. And the more we explore what it has to offer, the better it becomes.

We may be frustrated at the current state of the internet, but we’re entering an entirely new era. And I think things can become radically different. We have to keep exploring, building, and supporting this tech.

Beyond storage and social

It’s not just your files or your feeds. Trust in centralized systems is eroding everywhere.

From messaging apps quietly backdoored, to identity systems that can cut you off without appeal, to governments and corporations that leak your most personal data into the hands of criminals, it’s no surprise people are looking for alternatives.

We’ve seen government ID databases, health systems, and credit agencies breached, with entire identities dumped onto the dark web. Names, locations, biometrics. Everything needed for fraud. Lost because it was all stored in one convenient place.

That’s why decentralized tools have gained momentum. They don’t promise perfection, but they offer a way to reduce risk, reclaim control, and opt out of systems that keep failing us.

Encrypted messaging. Self-owned identities. Private money. Anonymous search. Community-led governance.

People aren’t waiting for permission. They’re choosing systems that put them back in charge.

Takeaways

  • Decentralization is not a rejection of structure. It’s a rebalancing of control.
  • The goal isn’t to replace everything. It’s to diversify what’s possible.
  • You don’t have to go all in. You can start with just one tool, one switch.
  • Sometimes the most powerful thing is knowing how something works, and choosing better.

Dive in and try out some of these bourgeoning systems. A lot of them a really early stages — We may not get everything right on the first try, but if we keep moving forward, we can build a radically different internet.

 

Yours in privacy,
Naomi

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Youtube.

Our independent journalism needs your support!
We appreciate all of your donations to keep us alive and running.

Our independent journalism needs your support!
Consider a donation.

You can donate any amount of your choosing, one-time payment or even monthly.
We appreciate all of your donations to keep us alive and running.

Dont miss another article!

Sign up for our newsletter today!

Take part of uncensored news – free from industry interests and political correctness from the Polaris of Enlightenment – every week.