Saturday, April 19, 2025

Polaris of Enlightenment

Ad:

Linux continues to grow in popularity – running on over 3% of personal computers

Published 24 July 2023
– By Editorial Staff

The freer and more secure Linux operating system has reached another milestone in the computer market and now has more than 3% of the market share for mainstream computers, according to data from online statistics firm Statcounter.

Windows still has the largest share of the market but has dropped to 68.15%, while MacOS has 21.38%. The Google-developed Chrome OS, based on Linux, has a share of 4.15 percent, bringing the total market share of Linux-based systems to 7.23 percent.

While the share may seem small, it shows a continued steady direction with the highest ever listing for the operating system in the personal computer market. In addition, Linux dominates heavily in markets such as servers, supercomputers and embedded systems, where its open source, security and versatility stand out.

The continued growth of Linux may accelerate even more in the future as the release of products such as Steam Deck (running the Linux operating system) is expected to continue to increase the acceptance of Linux among gamers and in turn raise awareness of its increasing suitability for gaming.

In parallel with the increase in market share, experts emphasize Linux’s clear advantages in terms of customization, privacy and security, compared to competitors such as Windows and Mac.

Ubuntu, a popular Linux distribution, is often highlighted as an alternative that offers greater privacy and security, not least because it is open source. It also eliminates the need to connect to clouds and privacy-invasive services such as Google and Microsoft accounts, and reduces surveillance of the user and their computer.

TNT is truly independent!

We don’t have a billionaire owner, and our unique reader-funded model keeps us free from political or corporate influence. This means we can fearlessly report the facts and shine a light on the misdeeds of those in power.

Consider a donation to keep our independent journalism running…

NATO implements AI system for military operations

The future of AI

Published yesterday 18:31
– By Editorial Staff
Modern warfare increasingly resembles what only a few years ago was science fiction.

The military pact NATO has entered into an agreement with the American tech company Palantir to introduce the AI-powered system Maven Smart System (MSS) in its military operations.

The Nordic Times has previously highlighted Palantir’s founder Peter Thiel and his influence over the circle around Trump, and how the company’s AI technology has been used to develop drones that can identify Russians and automate killing.

NATO announced on April 14 that it has signed a contract with Palantir Technologies to implement the Maven Smart System (MSS NATO), within the framework of Allied Command Operations, reports DefenceScoop.

MSS NATO uses generative AI and machine learning to quickly process information, and the system is designed to provide a sharper situational awareness by analyzing large amounts of data in real time.

This ranges from satellite imagery to intelligence reports, which are then used to identify targets and plan operations.

Terminator
In the “Terminator” movies, the remnants of the Earth’s population fight against the AI-controlled Skynet weapon system.

Modernizing warfare

According to the NATO Communications Agency NCIA, the aim is to modernize warfare capabilities. What used to require hundreds of intelligence analysts can now, with the help of MSS, be handled by a small group of 20-50 soldiers, according to the NCIA.

Palantir has previously supplied similar technology to the US Army, Air Force and Space Force. In September 2024, the company also signed a $100 million contract with the US military to expand the use of AI in targeting.

The system is expected to be operational as early as mid-May 2025.

The new deal has also caused financial markets to react and Palantir’s stock has risen. The company has also generally seen strong growth in recent years, with revenues increasing by 50% between 2022 and 2024.

Criticism and concerns

Palantir has previously been criticized for its cooperation with the Israeli Defense Forces, which led a major Nordic investor to cancel its involvement in the company. Criticisms include the risk of AI technology being used in ways that could violate human rights, especially in conflict zones.

On social media, the news has provoked mixed reactions. Mario Nawfal, a well-known voice on platform X, wrote in a post that “NATO goes full Skynet”, …referring to the fictional AI system in the Terminator movies, where technology takes control of the world.

Several critics express concerns about the implications of technology, while others see it as a necessary step to counter modern threats.

NATO and Palantir emphasize that technology does not replace human decision-making. They emphasize that the system is designed to support military leaders and not to act independently.

Nevertheless, there is a growing debate and concern about how AI’s role in warfare could affect future conflicts and global security. Some analysts also see the use of US technologies such as MSS as a way for NATO to strengthen ties across the Atlantic.

OpenAI may develop AI weapons for the Pentagon

The future of AI

Published 14 April 2025
– By Editorial Staff
Sam Altman's OpenAI is already working with defense technology company Anduril Industries.

OpenAI CEO Sam Altman, does not rule out that his and his company will help the Pentagon develop new AI-based weapon systems in the future.

– I will never say never, because the world could get really weird, the tech billionaire cryptically states.

The statement came during Thursday’s Vanderbilt Summit on Modern Conflict and Emerging Threat, and Altman added that he does not believe he will be working on developing weapons systems for the US military “in the foreseeable future” – unless it is deemed the best of several bad options.

– I don’t think most of the world wants AI making weapons decisions, he continued.

The fact that companies developing consumer technology are also developing military weapons has long been highly controversial – and in 2018, for example, led to widespread protests within Google’s own workforce, with many also choosing to leave voluntarily or being forced out by company management.

Believes in “exceptionally smart” systems before year-end

However, the AI industry in particular has shown a much greater willingness to enter into such agreements, and OpenAI has revised its policy on work related to “national security” in the past year. Among other things, it has publicly announced a partnership with defense technology company Anduril Industries Inc to develop anti-drone technology.

Altman also stressed the need for the US government to increase its expertise in AI.

– I don’t think AI adoption in the government has been as robust as possible, he said, adding that there will be “exceptionally smart” AI systems in operation ready before the end of the year.

Altman and Nakasone a retired four-star general attended the event ahead of the launch of OpenAI’s upcoming AI model, which is scheduled to be released next week. The audience included hundreds of representatives from intelligence agencies, the military and academia.

Don’t hit “Restore from backup” on your new device

A clean slate is better for privacy—and your peace of mind.

Published 12 April 2025
– By Naomi Brockwell

We all get a new computer or phone at some point. And when we do, there’s a screen that pops up: “Restore from backup?” One tap, and your whole digital life is right back where you left it. Easy, fast, familiar.

But what most people don’t realize is that restoring from backup doesn’t just bring back your apps. It reactivates years of old permissions, forgotten vulnerabilities, and tracking infrastructure that follows you from one device to the next.

It’s not a fresh start. It’s a rerun of your entire surveillance footprint.

Why you shouldn’t migrate everything

When you restore from a backup, you’re not just getting your apps and data—you’re reintroducing all your digital clutter. Here’s what comes with it:

  • App bloat
    Those one-off apps you installed become permanent squatters. Even if you’ve forgotten them, they could still be harvesting all your activities in the background, sending your data out to third parties.
  • Attack surface
    Every piece of software has vulnerabilities, and the more apps you install, the higher your security risk. Rather than transferring everything over, use this moment to think carefully about which apps are truly worth the added exposure.
  • Accounts and tracking
    Your Apple ID, Google account, or other login credentials build up a massive behavioral profile on you. A new device can also help you sever those old data pipelines. By starting fresh with a new account, you make it far harder for data brokers to link your future activity to the massive profile built under your old ID.
  • Ghost data
    Resetting from scratch also clears out “ghost data”: old settings, hidden config files, and leftover profiles you might not even realize you’re lugging around. Restoring from a backup can drag in outdated privacy defaults or security practices that no longer make sense. Plus, even uninstalled apps can leave behind bits of data—like login tokens or lingering preferences. Starting fresh ensures you’re adopting the newest, most secure configurations and leaving all that digital baggage behind.
  • Habit traps
    Sometimes we keep using apps just because they auto-restore, not because they actually serve us. Starting fresh is like a mini “reset”—you can ditch old routines and make room for better, more privacy-focused tools. Maybe there’s an app you’ve been curious to try but never got around to because your usual go-tos were already at your fingertips. A clean slate finally gives you that push to explore new options and live intentionally.
  • Mental bandwidth
    Clutter weighs us down—physically, mentally, and digitally. Fewer icons, fewer updates, fewer random notifications equals more headspace for the apps and tasks that truly matter.

Instead of dragging all that over, why not start with a clean slate?

7 smart moves when starting fresh

Here are seven clear, privacy-focused steps to help you make the most of your fresh start when setting up a new device:

    1. Start with essentials
      Install just the critical apps you truly can’t live without. Leave everything else off until you discover a real need for it.
    2. Use a browser
      Skip invasive native apps where you can. A privacy-friendly browser often demands fewer permissions and leaks less of your data.
    3. Pack light
      Think carefully about what needs to be on your phone 24/7. Not every app has to follow you everywhere—some can stay on a secondary device.
    4. Try privacy-focused alternatives
      While adding new apps, consider switching to more secure, privacy-respecting services. It’s a perfect time to level up your toolkit.
    5. Set up new accounts
      If you’re able, create fresh IDs instead of reusing old ones clogged with data exhaust. This cuts the thread linking your activity to outdated profiles. There might be costs associated with purchasing some new apps again, so decide if this is the right choice for you.
    6. Check permissions
      Pay attention to each permission request—location, contacts, camera—and limit or deny wherever possible. Don’t dish out unnecessary access.
    7. Be selective with backups
      Only migrate the essentials. Export contacts separately, store photos in a secure cloud, and keep old voice memos on a local drive if needed. Bringing less forward keeps your new device clutter-free.

Takeaways

Reclaiming your privacy isn’t about being perfect. It’s about making intentional choices. One of the easiest but most impactful things you can do is say no to restoring from backup.

This single decision sets the tone for your entire digital footprint. It gives you a clean slate. And it lets you rebuild on your terms.

Start with a handful of tools. Skip the bloat. Be picky about what gets installed and who gets your data.

It’s not about inconvenience—it’s about control. The digital world is filled with people trying to make decisions for you. Starting fresh is a way to take that power back.

 

Yours in privacy,
Naomi

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Youtube.

How to de-Google your phone

Your phone’s a tracking device. It's time to break free!

Published 5 April 2025
– By Naomi Brockwell

I’ve said it before, and I’ll say it again: our smartphones are incredible tools—but they’re also spyware magnets. Our smartphones constantly track us through apps, built-in radios, sensors, and the operating systems themselves. We carry these devices everywhere, giving them access to our location, cameras, microphones, and personal conversations. If privacy matters to you, it’s essential to plug these leaks.

Here’s the good news: you don’t have to ditch your smartphone to protect yourself. One of the biggest impacts I’ve made to transform my privacy is installing GrapheneOS on my phone.

What is GrapheneOS?

GrapheneOS is a mobile operating system designed specifically to protect your privacy and security. Unlike Android and iOS, it doesn’t share your data with Google or Apple. It’s currently the gold standard for privacy-conscious smartphone users.

7 steps to secure your phone with GrapheneOS

Step 1: Pick the right hardware

GrapheneOS is available exclusively on Pixel phones and tablets because Pixel meets Graphene’s strict security standards—especially the ability to relock the bootloader after installation. This prevents unauthorized OS modifications.

To choose the right Pixel, there are 2 websites I recommend:

Always pick a device that will get security updates for as long as possible.


Step 2: Purchase smart

Be extremely careful not to purchase a “variant device”, a modified Pixel typically tied to carrier contracts. These devices often have their bootloaders permanently locked—meaning you can’t unlock the bootloader to install GrapheneOS. Even if the carrier plan expires or the phone is later listed as “unlocked,” this restriction usually remains permanent.

To avoid issues:

  • Don’t buy Pixels bundled with carrier plans.
  • If buying refurbished or second-hand, explicitly confirm with the seller that the “OEM unlock” feature is enabled. (Note: “Carrier unlocked” and “OEM unlocked” are not the same thing.)

A locked bootloader makes installing GrapheneOS impossible, so verifying this before purchase is critical.

The most private way to buy your Pixel phone is in-store, using cash. Electronics retailers like Best Buy in the U.S. usually carry Pixel phones. Cash helps you maintain anonymity, since credit card purchases link your personal information directly to your device’s unique identifiers.


Step 3: Installing GrapheneOS

The installation may look daunting, but I’ve done it dozens of times—it’s quick, straightforward, and has an amazing web interface that makes it super simple:

grapheneos.org/install/web

We have a step-by-step tutorial you can follow along in our latest video:

How To DE-GOOGLE Your Phone!

The whole process usually takes under 20 minutes.


Step 4: Set up your phone

Here are some things I do when setting up my phone. These are just my preferences, so if you have a different setup, let others know in the comments!

  • In “Exploit Protections,” set your device to auto-reboot after 12 hours if not unlocked. This clears RAM (short-term memory), protecting encryption keys from theft.
  • Leave USB-C settings on “charging only when locked” to prevent unauthorized data access via USB.
  • Enable automatic shutdown of Wi-Fi and Bluetooth after 5 minutes of inactivity. This reduces location tracking.

Step 5: Install app stores

You don’t have to rely on the Google Play Store to get apps on your phone. Here are four alternative app stores I use:

  1. GrapheneOS built-in app store
  • Comes pre-installed on your Graphene device (just search “App Store”).
  • Includes essential default apps and optional sandboxed Google Play Services, if needed.
  1. Accrescent
  • Comes from the GrapheneOS community and offers privacy-focused apps.
  • Install via the built-in GrapheneOS app store.
  1. F-Droid
  • Provides free, open-source apps built directly from publicly available source code.
  • Installing apps through F-Droid simplifies managing updates compared to manually downloading individual APK files (but be aware that updates may be released more slowly through F-Droid due to its review and build process).
  • Install F-Droid directly from f-droid.org.
  1. Aurora Store
  • A privacy-friendly front-end for the Google Play Store, allowing you to download apps without linking them to a Google account.
  • Install Aurora via the F-Droid store.

Privacy Tip: Keep your installed apps to a minimum—the fewer apps, the smaller your digital footprint and the fewer vulnerabilities you’ll face.


Step 6: Use profiles to secure your apps

Apps installed within the same profile can detect each other and potentially communicate without you realizing. To prevent this, GrapheneOS lets you separate your apps into secondary profiles, each isolated from one another.

Why use secondary profiles?

  • Individual Security: Each profile has its own PIN and encryption key, significantly enhancing security.
  • Clearing Sensitive Data: Profiles can automatically reboot when you exit, wiping RAM and protecting sensitive data, like your 2FA or financial apps, from unauthorized access.

However, managing multiple profiles can add complexity, especially if you’re new to Graphene. Starting with a single profile is simpler, and many users prefer this initially.

How I set up my profiles:

  • Owner Profile: Minimal essentials (browser, VPN, app stores).
  • Daily Driver: Everyday apps (Signal, email, maps).
  • Sensitive Apps: Apps I keep offline unless needed (2FA, financial apps).
  • Invasive Apps: Less-private or rarely-used apps (Spotify, social media).
  • Google Play Services: Apps requiring Google’s services.
  • Sandbox Profile: Testing or higher-risk apps.

I recommend beginning with a single profile and gradually adding others as you find new use cases.

Setting up a secondary profile:

  • Go to Settings > System Users, and tap Add user.
  • For sensitive profiles, toggle off “Run in background” to enhance security.

Step 7: What about Google Play services?

You might be wondering: this article is called “DE-GOOGLE your phone”, so why even consider adding Google services back in?

Unfortunately, some popular apps won’t function unless Google Play Services is installed. Usually, Google Play Services is incredibly invasive, collecting large amounts of data with elevated system-level permissions. But here’s where GrapheneOS shines: it offers Sandboxed Google Play Services, which treats Google Play like any other app—restricted and isolated, without special privileges or deep system access.

If you must use apps that rely on Google Play, you can install this sandboxed version without compromising the privacy and security of your entire phone. For even more control, isolate Google Play Services within a secondary profile to prevent it from interacting with or detecting other apps across profiles.

This way, you get the functionality you need without letting Google take over your device.

Taking control of your digital privacy

Hopefully, this gives you a thorough idea of what your new GrapheneOS phone can do. Privacy doesn’t mean losing smartphone convenience; it means regaining control over your digital life.

GrapheneOS feels familiar to Android users, but without bloatware and surveillance. It’s proof that enjoying technology doesn’t require sacrificing privacy—it’s about making informed choices and using tools that protect rather than exploit you.

We have many more privacy resources available. Explore our playlist covering privacy-friendly apps, alternatives, and practical privacy strategies

Your smartphone doesn’t have to be a surveillance tool. With GrapheneOS, you’ve already taken a huge step toward protecting your data.

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Youtube.

Our independent journalism needs your support!
We appreciate all of your donations to keep us alive and running.

Our independent journalism needs your support!
Consider a donation.

You can donate any amount of your choosing, one-time payment or even monthly.
We appreciate all of your donations to keep us alive and running.

Dont miss another article!

Sign up for our newsletter today!

Take part of uncensored news – free from industry interests and political correctness from the Polaris of Enlightenment – every week.