A Bell Labs for privacy

What Bell Labs taught us about orchestrating breakthroughs, and how we can use those lessons to push back against surveillance today.

Published September 13, 2025 – By Naomi Brockwell

I’ve been reading The Idea Factory by Jon Gertner, and it’s fascinating. It tells the story of Bell Labs, the research arm of AT&T, and a singular moment in history when a small community of scientists and engineers played a huge role in inventing much of the modern world. From the transistor to information theory, from lasers to satellites, a staggering number of breakthroughs can trace their origins from this one place.

The book asks: what made this possible?

It wasn’t luck. It was a deliberate design. Bell Labs proved that invention could be engineered: You can create the right environment to deliberately make breakthroughs more likely. With the right structure, culture, and incentives, it’s possible to give technological progress its best possible chance.

And this got me thinking: what’s the most effective way to move privacy and decentralized tech forward? Perhaps the internet itself taken on the role Bell Labs once played, and become the shared space where ideas collide, disciplines mix, and breakthroughs emerge? If so, how do we best harness this potential?

A factory for ideas

After World War II, Mervin Kelly, Bell Labs’ president, asked a radical question: could invention itself be systematized? Instead of waiting for breakthroughs, could he design an environment that produced them more reliably?

He thought the answer was yes, and reorganized Bell Labs accordingly. Metallurgists worked alongside chemists, physicists with mathematicians, engineers with theorists. Kelly believed the greatest advances happened at the intersections of fields.

There were practical reasons for cross-disciplinary teams too. When you put a theorist beside an experimentalist or engineer, hidden constraints surface early, vague ideas become testable designs, bad ideas die faster, and good ones escape notebooks and turn into working devices.

Bell Labs organized its work into a three-stage pipeline for innovation:

  1. Basic research: scientists exploring fundamental questions in physics, chemistry, and mathematics. This was the source of radical, sometimes “impractical” ideas that might not have an immediate use but expanded the frontier of knowledge.
  2. Applied research: engineers and theorists who asked which discoveries could actually be applied to communication technology. Their role was to translate abstract science into potential uses for AT&T’s vast network.
  3. Development and systems engineering: practical engineering teams who built the devices, refined the systems, and integrated them into the company’s infrastructure so they could work at scale in the real world.

This pipeline meant that raw science didn’t just stay theoretical. It became transistors in radios, satellites in orbit, and digital switching systems that powered the modern telephone network.

Bell Labs’ building architecture was designed to spark invention as well. At the Murray Hill campus, famously long corridors linked departments to trigger chance encounters. A physicist might eat lunch with a metallurgist. A chemist might bump into an engineer puzzling over a problem. And there was a cultural rule: if a colleague came to your door for help, you didn’t turn them away.

Causation is hard to prove, but the lab’s track record in the years that followed was remarkable:

  • The transistor (1947): John Bardeen, Walter Brattain, and William Shockley replaced bulky vacuum tubes and launched the electronics age.
  • Information theory (1948): Claude Shannon created the mathematics of communication, the foundation of everything from the internet to data encryption.
  • And much more: semiconductor and silicon device advances; laser theory and early lasers (including a 1960 continuous-wave gas laser); the first practical silicon solar cell (1954); major contributions to digital signal processing and digital switching; Telstar satellite communications (1962). The list goes on.

The Secret Sauce… it’s not what you think

Some people may argue that Bell Labs succeeded for other reasons. They point to government protection, a regulated market, defense contracts, and deep pockets. Those things were real, but they are not a sufficient explanation. Plenty of money is poured into research that goes nowhere. And protected monopolies often stagnate, because protection reduces the incentive to improve.

What Bell Labs’ resources did buy was proximity. Kelly’s goal was to gather great talent under one roof, and strategically try to increase the chances they would interact and work together. He built a serendipity machine.

The real lesson to take away from Bell Labs isn’t about money. It’s about collaboration and chance encounters.

By seating different disciplines side by side, they could connect, collaborate, and share insights directly. Building on one another’s ideas and sparking new ones led to a staggering array of advances at Bell Labs in the post-war decade.

Now in Kelly’s day, the best ways to give cross-pollination a real chance was to get people together in person, and that took a large amount of money from a behemoth corporation like AT&T.

If we wanted to manufacture the same kind of world-changing collaboration to push the privacy movement forward today, would we need AT&T-level resources?

Not necessarily. The internet can’t replicate everything Bell Labs offered, but it does mimic a lot of the value. Above all, it gives us the most powerful tools for connection the world has ever seen. And if we use those tools with intent, it’s possible to drive the same kind of serendipity and collaboration that once made Bell Labs extraordinary.

A decentralized Bell Labs

Kelly emphasized that casual, in-person encounters were irreplaceable.

A phone call didn’t suffice because it was usually scheduled, purposeful, and limited.

What he engineered was serendipity, like bumping into someone, overhearing a problem, and having an impromptu brainstorm.

Today, the internet in many ways mimics similar chance encounters. What once required hundreds of millions of dollars and government contracts can now be achieved with a laptop and an internet connection.

  1. Open work in public: GitHub issues, pull requests, and discussions can now be visible to anyone. A stranger can drop a comment, file a bug, or propose a fix. This is the digital version of overhearing a whiteboard session and joining in.
  2. Frictionless publishing: Research papers, blog posts, repos, and demos can go live in minutes and reach millions. People across disciplines can react the same day with critiques, code, or data.
  3. Shared problem hubs: Kaggle competitions, open benchmarks, and Gitcoin-style bounties concentrate diverse talent on the same challenge. Remote hackathons add the social, time-bound pressure that sparks rapid collaboration, like at Bell Labs where clusters of scientists would swarm the same puzzle, debate approaches in real time, and push each other toward breakthroughs. At Bell Labs, Kelly deliberately grouped many of the smartest people around the same hard problem to force progress.
  4. Topic subscriptions, not just people: Following tags, keywords, or RSS feeds brings in ‘weak-tie’ expertise from outside your circle. ‘Weak ties’ comes from social network theory: ‘strong ties’ are your close friends and colleagues, and you often share the same knowledge. ‘Weak ties’ are acquaintances, distant colleagues, or people in other fields, and they’re more likely to introduce new information or perspectives you don’t already have. So when you follow topics (like ‘post-quantum cryptography’ or ‘homomorphic encryption’) instead of just following individual people, you start seeing insights from strangers in different circles. That’s where fresh breakthroughs often come from -- not the people closest to you, but the weak ties on the edges of your network.
  5. Remixes and forks: On places like GitHub, instead of just commenting on someone’s work, you can copy it, modify it, and publish your own version. That architecture encourages people to extend ideas. It’s like in a Bell Labs meeting where instead of only talking, someone picks up the chalk and adds to the equation on the board.
  6. Chance discovery: Digital town halls expose you to reposts, recommendations, and trending threads you might never have gone looking for. Maybe someone tags you in a post they think you’d find useful, or you have cultivated a “list”, where you follow a group of accounts that consistently have interesting thoughts. These small nudges can create a digital form of the ‘hallway collision’ Kelly tried to design into Bell Labs.
  7. Cross-linking and citation trails: Hyperlinks, related-paper tools, and citation networks help you move from one idea to another, revealing useful work you did not know to look for. It’s like walking past ten doors you didn’t know you needed to knock on.
  8. Lightweight face time: AMAs, livestream chats, and open office hours give people a simple way to drop in, ask questions, and get unstuck, and are the digital equivalent of popping by someone’s desk.

Now, anyone can tap into a global brain trust. A metallurgist in Berlin, a cryptographer in San Francisco, and a coder in Bangalore can share code, publish findings, and collaborate on the same project in real time. Open-source repositories let anyone contribute improvements. Mailing lists and forums connect obscure specialists instantly. Digital town squares recreate the collisions Kelly once designed into Murray Hill.

What once depended on geography and monopoly rents has been democratized. And we already have proof this model works. For example, Linux powers much of the internet today, and it is the product of a largely decentralized, voluntary collaboration across borders. It is a commons built by thousands of contributors.

The internet is nothing short of a miracle. It is the infrastructure that makes planetary-scale cross-pollination possible.

The question now is: what are the great challenges of our time, and how can we deliberately accelerate progress on them by applying the lessons Bell Labs taught us?

The privacy problem

Of all the challenges we face, privacy is among the most urgent. Surveillance is no longer the exception, it is the norm.

The stakes for advancing privacy in our everyday lives are high: surveillance is growing day by day, with governments buying massive databases from brokers, and corporations tracking our every move. The result is a chilling effect on human potential. Under constant observation people self-censor, conform, and avoid risk; creativity fades and dissent weakens.

Privacy reverses that. It creates the conditions for free thought and experimentation. In private, people can test controversial ideas, take risks, and fail without fear of judgment. That freedom is the soil in which innovation grows.

Privacy also safeguards autonomy. Without control over what we reveal and to whom, our decisions are subtly manipulated by those who hold more information about us than we hold about them. Privacy rebalances that asymmetry, letting us act on our own terms.

At a societal level, privacy prevents conformity from hardening into tyranny. If every action and association is observed, the boundaries of what is acceptable shrink to the lowest common denominator. Innovation, whether in science, art, or politics, requires the breathing room of privacy to flourish.

In short, privacy is not just a shield. It is a precondition for human flourishing, and for the breakthroughs that push civilization forward.

If we want freedom to survive in the digital age, we must apply the Bell Labs model to accelerate privacy innovation with the same deliberate force that once created the transistor and the laser.

Just as Bell Labs once directed its collective genius toward building the information age, we must now harness the internet’s collaborative power to advance the lived privacy of billions across the globe.

The call to build

Kelly’s insight was that breakthroughs do not have to be random. They can be nurtured, given structure, and accelerated. That is exactly what we need in the privacy space today.

The internet already gives us the structure for invention at a global scale. But privacy has lagged, because surveillance has stronger incentives: data is profitable, governments demand back doors, and convenience keeps people locked in. The internet is not a cure-all either: it produces noise, and unlike Bell Labs, there is no Kelly steering the ship. It’s up to us to curate what matters, chart our own course, and use these tools deliberately if we want them to move privacy forward.

The best future is not one of mass surveillance. It is one where people are free to think, create, and dissent without fear. Surveillance thrives because it is organized. Privacy must be too.

The future will not hand us freedom. We have to build it.

 

Yours in Privacy,
Naomi

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Rumble.

TNT is truly independent!

We don’t have a billionaire owner, and our unique reader-funded model keeps us free from political or corporate influence. This means we can fearlessly report the facts and shine a light on the misdeeds of those in power.

Consider a donation to keep our independent journalism running…

Watch as Russia’s AI robot falls on stage

Published November 13, 2025 – By Editorial staff

Russia's first humanoid AI robot fell on stage during its official launch in Moscow this week. Staff rushed forward to shield the damaged robot while attempting to fix the malfunction.

What was meant to be a grand launch of Russia's venture into humanoid robotics ended in embarrassment. To the sounds from the Rocky film, the robot AIdol was led onto the stage by two staff members at a technology event in the Russian capital.

But the presentation ended in chaos when the robot lost its balance and crashed to the ground. Several parts came loose and staff hurried to pull the machine away and hide it behind a screen.

Behind the project is the Russian robotics company Idol, led by Vladimir Vitukhin. According to the company, AIdol is an advanced robot built mostly from domestic components.

Vitukhin explained the fall as a calibration problem and emphasized that the robot is still in the testing phase.

This is real-time learning, when a good mistake turns into knowledge, and a bad mistake turns into experience, Vitukhin said, according to Newsweek.

Despite the company's attempts to downplay the incident, criticism has been massive on Russian tech forums and social media. Many question the decision to showcase an obviously unfinished prototype.

AIdol is powered by a 48-volt battery that provides up to six hours of operation. The machine is equipped with 19 servo motors and a silicon skin designed to recreate human facial expressions.

The robot can smile, think, and be surprised – just like a person, Vitukhin said.

According to reports, AIdol consists of 77 percent Russian-produced components. After the fall, developers have withdrawn the machine while engineers examine the balance systems.

Italian political consultant became victim of spyware program

Totalitarianism

Published November 11, 2025 – By Editorial staff
Francesco Nicodemo.

An Italian political advisor who worked for center-left parties has gone public about being hacked through an advanced Israeli-developed spyware program. Francesco Nicodemo is the latest in a growing list of victims in a spyware scandal that is shaking Italy and raising questions about how intelligence services use surveillance technology.

Francesco Nicodemo, who works as a consultant for left-leaning politicians in Italy, waited ten months before publicly disclosing that he had been targeted by the Paragon spyware program. On Thursday, he chose to break his silence in a post on Facebook.

Nicodemo explained that he had previously not wanted to publicize his case because he "didn't want to be used for political propaganda," but that "the time has now come".

"It's time to ask a very simple question: Why? Why me? How is it possible that such a sophisticated and complex tool was used to spy on a private citizen, as if he were a drug dealer or a subversive threat to the country?", Nicodemo wrote. "I have nothing more to say. More people must speak out. Others must explain what happened".

Extensive scandal grows

Nicodemo's revelation once again expands the scope of the ongoing spyware scandal in Italy. Among those affected are several journalists, migration activists, prominent business leaders, and now a political consultant with a history of working for the center-left party Partito Democratico and its politicians.

The online publication Fanpage reported first that Nicodemo was among the people who received a notification from WhatsApp in January that they had been targeted by the spyware program.

Questions about usage

Governments and spyware manufacturers have long claimed that their surveillance products are used against serious criminals and terrorists, but recent cases show that this is not always the case.

— The Italian government has provided certain spyware victims with clarity and explained the cases. But others remain disturbingly unclear, says John Scott-Railton, a senior researcher at The Citizen Lab who has investigated spyware companies and their abuses for years.

None of this looks good for Paragon, or for Italy. That's why clarity from the Italian government is so essential. I believe that if they wanted to, Paragon could give everyone much more clarity about what's going on. Until they do, these cases will remain a burden on their shoulders, adds Scott-Railton, who confirmed that Nicodemo received the notification from WhatsApp.

Intelligence services' involvement

It is still unclear which of Paragon's customers hacked Nicodemo, but an Italian parliamentary committee confirmed in June that some of the victims in Italy were hacked by Italian intelligence services, which report to Prime Minister Giorgia Meloni's government.

In February, following revelations about the first victims in Italy, Paragon severed ties with its government customers in the country, specifically the intelligence services AISE and AISI.

The parliamentary committee COPASIR later concluded in June that some of the publicly identified Paragon victims, namely the migration activists, had been legally hacked by Italian intelligence services. However, the committee found no evidence that Francesco Cancellato, editor of the news site Fanpage.it which had investigated the youth organization of Meloni's governing party, had been hacked by the intelligence services.

Paragon, which has an active contract with the U.S. Immigration and Customs Enforcement agency, states that the U.S. government is one of its customers.

FACTS: Paragon

Paragon Solutions is an Israeli cybersecurity company that develops advanced spyware for intelligence services and law enforcement agencies. The software can be used to monitor smartphones and other digital devices.

The company was acquired by American private equity giant AE Industrial and has since been merged with cybersecurity firm REDLattice. Paragon's clients include the US government, including the Immigration and Customs Enforcement (ICE) agency.

In February 2024, Paragon terminated its contracts with Italian intelligence services AISE and AISI after several Italian citizens, including journalists and activists, were identified as victims of the company's spyware.

Paragon is marketed as a tool against serious crime and terrorism, but its use in Italy has raised questions about whether the spyware is also being used against political opponents and journalists.

Email was never built for privacy

Mass surveillance

How Proton makes email privacy simple.

Published November 8, 2025 – By Naomi Brockwell

Email was never built for privacy. It’s closer to a digital postcard than a sealed letter, bouncing through and sitting on servers you don’t control, and mainstream providers like Gmail read and analyze everything that is inside.

Email isn’t going anywhere in our society, it’s baked into how the digital world communicates. But luckily there are ways to make your emails more private. One tool that you can use is PGP, which stands for “Pretty Good Privacy”.

PGP is one of the oldest and most powerful tools for email privacy. It takes your message and locks it with the recipient’s public key, so only they can unlock it with their private key. That means even if someone intercepts the email, whether it’s a hacker, your ISP, or a government agency, they see only scrambled text.

Unfortunately it is notoriously complicated. Normally, you’d have to install command-line tools, generate keys manually, and run cryptic commands just to send an encrypted email.

But Proton Mail makes all of that easy, and builds PGP right into your inbox.

How Proton makes PGP simple

Proton is a great, privacy-focused email provider (and no they’re not sponsoring this newsletter, they’re simply an email provider that I like to use).

If you email someone within the Proton ecosystem (ie send an email from one Proton user to another Proton user), your email is automatically end-to-end encrypted using PGP.

But what if you email someone outside of the Proton ecosystem?

Here’s where it would usually get tricky.

First, you’d need to install a PGP client, which is a program that lets you generate and manage your encryption keys.

Then you’d run command-line prompts, choosing the key type, size, expiration, associating the email you want to use the key with, and you’d export your public key. It’s complicated.

But if you use Proton, they make using PGP super easy.

Let’s go through how to use it.

Automatic search for public PGP key

First of all, when you type an email address into the “To” field in Proton Mail, it automatically searches for a public PGP key associated with that address. Proton checks its own network, your contact list, and Web Key Directory (WKD) on the associated email domain.

WKD is a small web‑standard that allows someone to publish their public key at their domain in a way that makes it easily findable for an email app. For example if Proton finds a key for a certain address at the associated domain, Proton will automatically encrypt a message with it.

If they find a key, you’ll see a green lock next to the recipient in the ‘To’ field, indicating the message will be encrypted.

You don’t need to copy, paste, or import anything. It just works.

Great, your email has been automatically encrypted using PGP, and only the recipient of the email will be able to use their private key to decrypt it.

Manually uploading someone’s PGP key

What if Proton doesn’t automatically find someone’s PGP key? You can hunt down the key manually and import it. Some people will have their key available on their website, either in plain text, or as a .asc file. Proton allows you to save this PGP key in your contacts.

To add one manually, first you type their email address in the “to” field.

Then right-click on that address, and select “view contact details”

Then click the settings wheel to go to email settings, and select “show advanced PGP settings”

Under “public keys”, select “upload” and upload their public key in an .asc format.

Once the key is uploaded, the “encrypt emails” toggle will automatically switch on, and all future emails to that contact will automatically be protected with PGP. You can turn that off at any time, and also remove or replace the public key.

How do others secure emails to you using PGP?

Super! So you’ve sent an encrypted email to someone using their PGP key. What if they want to send you an email back, will that be automatically end-to-end encrypted (E2EE) using PGP? Not necessarily.

In order for someone to send you an end-to-end encrypted email, they need your public PGP key.

Download your public-private key pair inside Proton

Proton automatically generates a public-private key pair for each address that you have configured inside Proton Mail, and manages encryption inside its own network.

If you want people outside Proton to be able to encrypt messages to you, the first step is to export your public key from your Proton account so you can share it with them.

To do this:

  • Go to Setting
  • Click “All settings”
  • Select “encryption and keys”
  • Under “email encryption keys” you’ll have a dropdown menu of all your email addresses associated with your Proton account. Select the address that you want to export the public key for.
  • Under the “action” column, click “export public key”

It will download as an .asc file, and ask you where you want to save the file.

Normally a PGP key is written in 1s and 0s that your computer can read. The .asc file takes that key and wraps it in readable characters, and it ends up in a format that looks something like this:

Sharing your public key

Now that you’ve downloaded the public key, how do you share it with people so that they can contact you privately? There are several ways.

For @proton.me and @protonmail.com addresses, Proton publishes your public key in its WKD automatically. You don’t have to do anything.

For custom domains configured in Proton Mail, Proton doesn’t host WKD for you. You can publish WKD yourself on your own domain by serving it at a special path on your website. Or you can delegate WKD to a managed service. Or if you don’t want to use WKD at all, you can upload your key to a public keyserver like keys.openpgp.org, which provides another way for mail apps to discover it.

We’re not going to cover those setups in this article. Instead here are simpler ways to share your public key:

1) You can send people your .asc file directly if you want them to be able to encrypt emails to you (be sure to let them know which email address is associated with this key), or you can host this .asc file on your website for people to download.

2) You can open the .asc file in a text editor and copy and paste the key, and then send people this text, or upload the text on your website. This is what I have done:

This way if anyone wants to send me an email more privately, they can do so.

But Proton makes it even easier to share your PGP key: you can opt to automatically attach your public key to every email.

To turn this on:

  1. Go to Settings → Encryption & keys → External PGP settings
  2. Enable
    • Sign external messages
    • Attach public key

Once this is on, every email you send will automatically include your public key file, as a small .asc text file.

This means anyone using a PGP-capable mail client (like Thunderbird, Mailvelope, etc.) can import it immediately, with no manual steps required.

Password-protected emails

Proton also lets you send password-protected emails, so even if the other person doesn’t use PGP you can still keep the contents private. This isn’t PGP -- Proton encrypts the message and attachments in your browser and the recipient gets a link to a secure viewing page. They enter a password you share separately to open it. Their provider (like Gmail) only sees a notification email with a link, not the message itself. You can add a password hint, and the message expires after a set time (28 days by default).

The bottom line

Email privacy doesn’t have to be painful. Proton hides the complexity by adding a password option, or automating a lot of the PGP process for you: it automatically looks up recipients’ keys, encrypts your messages, and makes your key easy for others to use when they reply.

As Phil Zimmermann, the creator of PGP, explained in Why I Wrote PGP:

“PGP empowers people to take their privacy into their own hands. There has been a growing social need for it. That’s why I wrote it".

We’re honored to have Mr. Zimmermann on our board of advisors at Ludlow Institute.

Pioneers like him fought hard so we could protect our privacy. It’s on us to use the tools they gave us.

 

Yours in privacy,
Naomi

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Rumble.

Swedish police secretly using Palantir’s surveillance system for years

Mass surveillance

Published November 4, 2025 – By Editorial staff
Palantir Technologies headquarters in Silicon Valley.

The Swedish Police Authority has for at least five years been using an AI-based analysis tool from the notorious American security company Palantir.

The program, which has been specially adapted for Swedish conditions, can within seconds compile comprehensive profiles of individuals by combining data from various registers.

Behind the system stands the American tech company Palantir, which is internationally controversial and has been accused of involvement in surveillance activities. This summer, the company was identified in a UN report as complicit in genocide in Gaza.

The Swedish version of Palantir's Gotham platform is called Acus and uses artificial intelligence to compile, analyze and visualize large amounts of information. According to an investigation by the left-wing newspaper Dagens ETC, investigators using the system can quickly obtain detailed personal profiles that combine data from surveillance and criminal registers with information from Bank-id (Sweden's national digital identification system), mobile operators and social media.

A former analyst employed by the police, who chooses to remain anonymous, describes to the newspaper how the system was surrounded by great secrecy:

— There was very much hush-hush around that program.

Rejection of document requests

When the newspaper requested information about the system and how it is used, they were met with rejection. The Swedish Police Authority cited confidentiality and stated that they can neither "confirm nor deny relationships with Palantir" citing "danger to national security".

This is not the first time Palantir's tools have been used in Swedish law enforcement. In the high-profile Operation Trojan Shield, the FBI, with support from Palantir's technology, managed to infiltrate and intercept the encrypted messaging app Anom.

The operation led to the arrest of a large number of people connected to serious crime, both in Sweden and internationally. The FBI called the operation "a shining example of innovative law enforcement".

But the method has also received criticism. Attorney Johan Grahn, who has represented defendants in several Anom-related cases, is critical of the approach.

— In these cases, it has been indiscriminate mass surveillance, he states.

Mapping dissidents

Palantir has long sparked debate due to its assignments and methods. The company works with both American agencies and foreign security services.

In the United States, the surveillance company's systems are used to map undocumented immigrants. In the United Kingdom, British police have been criticized for using the company's technology to build registers of citizens' sex lives, political views, religious affiliation, ethnicity and union involvement – information that according to observers violates fundamental privacy principles.

This summer, a UN report also identified Palantir as co-responsible for acts of genocide in Gaza, after the company's analysis tools were allegedly used in attacks where Palestinian civilians were killed.

How extensive the Swedish police's use of the system is, and what legal frameworks govern the handling of Swedish citizens' personal data in the platform, remains unclear as long as the Swedish Police Authority chooses to keep the information classified.