Saturday, May 24, 2025

Polaris of Enlightenment

Ad:

Exposing the lies that keep you trapped in surveillance culture

Debunking the biggest myths about data collection

Published 19 April 2025
– By Naomi Brockwell

Let’s be honest: data is useful. But we’re constantly told that in order to benefit from modern tech—and the insights that come with it—we have to give up our privacy. That useful data only comes from total access. That once your info is out there, you’ve lost control. That there’s no point in trying to protect it anymore.

These are myths. And they’re holding us back.

The truth is, you can benefit from data-driven tools without giving away everything. You can choose which companies to trust. You can protect one piece of information while sharing another. You can demand smarter systems that deliver insights without exploiting your identity.

Privacy isn’t about opting out of technology—it’s about choosing how you engage with it.

In this issue, we’re busting four of the most common myths about data collection. Because once you understand what’s possible, you’ll see how much power you still have.

Myth #1: “I gave data to one company, so my privacy is already gone”.

This one is everywhere. Once people sign up for a social media account or share info with a fitness app, they often throw up their hands and say, “Well, I guess my privacy’s already gone”.

But that’s not how privacy works.

Privacy is about choice. It’s about context. It’s about setting boundaries that make sense for you.

Just because you’ve shared data with one company doesn’t mean you’re giving blanket permission to every app, government agency, or ad network to track you forever.

You’re allowed to:

  • Share one piece of information and protect another.
  • Say yes to one service and no to others.
  • Change your mind, rotate your identifiers, and reduce future exposure.

Privacy isn’t all or nothing. And it’s never too late to take some power back.

Myth #2: “If I give a company data, they can do whatever they want with it”.

Not if you pick the right company.

Many businesses are committed to ethical data practices. Some explicitly state in their terms that they’ll never share your data, sell it, or use it outside the scope of the service you signed up for.

Look for platforms that don’t retain unnecessary data. There are more of them out there than you think.

Myth #3: “To get insights, a company needs to see my data”.

This one’s finally starting to crumble—thanks to game-changing tech like homomorphic encryption.

Yes, really: companies can now do compute on encrypted data without ever decrypting it.

It’s already in use in financial services, research, and increasingly, consumer apps. It proves that privacy and data analysis can go hand in hand.

Imagine this: a health app computes your sleep averages, detects issues, and offers recommendations—without ever seeing your raw data. It stays encrypted the whole time.

We need to champion this kind of innovation. More research. More tools. More adoption. And more support for companies already doing it—because our business sends a signal that this investment was worth it for them, and encourages other companies to jump on board.

Myth #4: “To prove who you are, you have to hand over sensitive data.”

You’ve heard this from banks, employers, and government forms: “We need your full ID to verify who you are”.

But here’s the problem: every time we hand over sensitive data, we increase our exposure to breaches and identity theft. It’s a bad system.

There’s a better way.
With zero-knowledge proofs, we can prove things like being over 18, or matching a record—without revealing our address, birthdate, or ID number.

The tech already exists. But companies and institutions are slow to adopt it or even recognize it as legitimate. This won’t change until we demand better.

Let’s push for a world where:

  • Our identity isn’t a honeypot for hackers.
  • We can verify ourselves without becoming vulnerable.
  • Privacy-first systems are the norm—not the exception.

Takeaways

The idea that we have to trade privacy for progress is a myth. You can have both. The tools exist. The choice is ours.

Privacy isn’t about hiding—it’s about control. You can choose to share specific data without giving up your rights or exposing everything.

Keep these in mind:

  • Pick tools that respect you. Look for platforms with strong privacy practices and transparent terms.
  • Use privacy-preserving tech. Homomorphic encryption and zero-knowledge proofs are real—and growing.
  • Don’t give up just because you shared once. Privacy is a spectrum. You can always take back control.
  • Talk about it. The more people realize they have options, the faster we change the norm.

Being informed doesn’t have to mean being exploited.
Let’s demand better.

 

Yours in privacy,
Naomi

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Youtube.

TNT is truly independent!

We don’t have a billionaire owner, and our unique reader-funded model keeps us free from political or corporate influence. This means we can fearlessly report the facts and shine a light on the misdeeds of those in power.

Consider a donation to keep our independent journalism running…

This isn’t the internet we were promised

But decentralized tech is breaking the chains of control and giving you back your digital freedom.

Published today 7:25
– By Naomi Brockwell

Let’s get one thing straight:

Decentralization is not the goal.

The goal is freedom. The goal is autonomy. The goal is human dignity in the digital age.

Decentralization is just one way, often the best way right now, to get us closer to those outcomes.

In a perfect world, we wouldn’t need decentralized systems. If governments weren’t able to pressure companies into silence, or force them to hand over your private data… if corporations weren’t constantly monetizing your every move… if centralized platforms could be trusted to operate in the interest of users… then maybe centralized systems would be fine.

They’re efficient. They reduce friction.

There’s no denying the impact these platforms have had. They connected the world. They brought billions of people online, enabled global communication, and revolutionized how we share ideas and build movements.

But they also created new dangers.

We now live in a world where control over your data is a leverage point for power. Where a single company can unilaterally decide what speech is acceptable. Where massive data breaches happen regularly because your life is stored in one convenient server.

Centralized systems have become centralized vulnerabilities.

And so, decentralization has emerged, not as an ideology, but as a solution. A way to take some of that power back. A way to distribute risk, enable resilience, and restore individual choice.

A brief history of the web

We’ve lived through three major internet eras so far:

  • Web 1.0: The early internet was made up of static websites, self-hosted pages, and personal blogs. There were no algorithms deciding what you saw. Just raw HTML and a whole lot of freedom. It was gloriously messy, decentralized, and user-owned.
  • Web 2.0: Then came the rise of centralized platforms. Facebook, YouTube, and X (formerly Twitter) made publishing easy and social. These platforms helped bring billions of people online, but at a cost. In exchange for convenience, we gave up control. Our data became trapped in platforms we couldn’t leave. Surveillance and censorship scaled. Cloud storage followed the same trend: easy access, but centralized vulnerability.
  • Web 3.0: Now we’re entering a new era. One that takes the best of both worlds. We’re combining the usability and scale of the modern internet with decentralized protocols that restore individual control. We no longer need to be locked into platforms or ecosystems. We can own our data, preserve our identity, and move freely between services. This isn’t just a return to the past. It’s a leap forward. A better model is finally being built.

Why decentralization matters

It’s not that decentralization is inherently good — it’s that centralization has made us vulnerable. The Web2 world comes with serious problems:

  • Targeted control: A government only needs to pressure one company to censor millions.
  • Censorship: Say the wrong thing and get kicked off a platform. Poof, your voice disappears.
  • Data monopolies: Corporations collect and sell your personal information because they control the servers and the systems. This includes cloud storage. Your private documents, photos, and messages are often just a policy change or government request away from being inaccessible.
  • Lock-in: Your content and identity are trapped on whatever platform you chose. You don’t own anything.

Decentralized systems distribute that risk.

They make it harder to shut things down. Harder to surveil everyone at once. Easier to move, fork, remix, or migrate without losing everything in the process.

They don’t guarantee freedom, but they make it harder to take freedom away.

The protocols powering the shift

The movement toward decentralization is about changing the foundation of how the internet works. Here are some tools leading the way:

Decentralized storage: Keeping files online without a single gatekeeper

Right now, most of our files — photos, documents, backups — live in cloud services owned by a handful of big companies. That means those companies decide how long your files stay online, who gets access to them, and whether they get deleted, censored, or handed over to someone else.

Decentralized storage flips that model.

Instead of uploading your files to a single company’s server, decentralized storage lets you store data across a network of independent operators. Sometimes your file is split up and distributed across many nodes. Other times, it’s stored as a whole on a specific server, but that server is part of a peer-to-peer network, not a centralized platform. Either way, no single company controls access to everyone’s data, which makes your data more resilient and less vulnerable to censorship or loss.

  • IPFS helps you share files in a way that doesn’t depend on one website or server. If anyone on the network has a copy of the file, you can still access it.
  • Filecoin is a network where people get paid to store your files securely. You choose how long your files should be kept, and the system ensures they’re really there.
  • Arweave is focused on long-term storage. You pay once, and the goal is to keep your data online for decades. It’s especially useful for archiving important documents and creative work that needs to be preserved.

Decentralized social media: You keep your identity, even if the app changes

Traditional social media apps own everything: your account, your posts, your followers. If they ban you or shut down, everything’s gone.

Decentralized social platforms are trying to change that. They separate your identity and content from the app you use. That way, if one app disappears or kicks you off, you can just log into another app and pick up where you left off.

  • Mastodon is like Twitter, but instead of one giant site, it’s made up of many smaller communities. Each one sets its own rules, but they all talk to each other.
  • Bluesky is building a system where your posts and followers stay with you, not the platform. If you don’t like the app you’re using, you can switch without losing anything.
  • Nostr is a protocol that’s decentralized by design. It uses cryptographic keys instead of usernames, and many apps integrate with Bitcoin’s Lightning Network for tipping.

This is just the beginning: There’s decentralized finance, decentralized search, decentralized governance, even decentralized AI. This new world of possibilities is just opening up. And the more we explore what it has to offer, the better it becomes.

We may be frustrated at the current state of the internet, but we’re entering an entirely new era. And I think things can become radically different. We have to keep exploring, building, and supporting this tech.

Beyond storage and social

It’s not just your files or your feeds. Trust in centralized systems is eroding everywhere.

From messaging apps quietly backdoored, to identity systems that can cut you off without appeal, to governments and corporations that leak your most personal data into the hands of criminals, it’s no surprise people are looking for alternatives.

We’ve seen government ID databases, health systems, and credit agencies breached, with entire identities dumped onto the dark web. Names, locations, biometrics. Everything needed for fraud. Lost because it was all stored in one convenient place.

That’s why decentralized tools have gained momentum. They don’t promise perfection, but they offer a way to reduce risk, reclaim control, and opt out of systems that keep failing us.

Encrypted messaging. Self-owned identities. Private money. Anonymous search. Community-led governance.

People aren’t waiting for permission. They’re choosing systems that put them back in charge.

Takeaways

  • Decentralization is not a rejection of structure. It’s a rebalancing of control.
  • The goal isn’t to replace everything. It’s to diversify what’s possible.
  • You don’t have to go all in. You can start with just one tool, one switch.
  • Sometimes the most powerful thing is knowing how something works, and choosing better.

Dive in and try out some of these bourgeoning systems. A lot of them a really early stages — We may not get everything right on the first try, but if we keep moving forward, we can build a radically different internet.

 

Yours in privacy,
Naomi

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Youtube.

Teuton Systems offers smart privacy-focused technology – without compromise

Advertising partnership with Teuton Systems

  • Teuton Systems, based in Sweden, is developing a unique concept for privacy-oriented computers and mobile phones that does not compromise user-friendliness or security.
  • We take the fight against corporate snooping, mass government surveillance and criminal phone tapping through firm open source principles and secure products.
Published yesterday 15:01
Both computers and phones from Teuton Systems come with interfaces you will recognize and with pre-installed apps for all your everyday needs.

Digitalization has given humanity superpowers – and opened the door to a whole jungle of new threats.

We see it every day: news headlines about breaches, scandals, and surveillance of ordinary people. Teuton Systems works for those who refuse to accept a reality where someone else owns their data. That’s why we offer hardware and software that gives you full control over your digital life.

Healthy skepticism about data collection is anything but paranoia – it’s perfectly justified. Here are just a few examples that should make anyone think twice about their everyday digital environment:

  • Mass surveillance: After Edward Snowden’s historic revelations, it became public knowledge that government programs were massively eavesdropping on both corporate and private communications. This is an important reminder that conscious action is required to preserve privacy. Since the revelations, this mass surveillance has continued in other forms.
  • Data leaks and scandals: Everything from the Cambridge Analytica scandal (where a company collected data on millions of Facebook users to influence elections) to the Apoteket leak (sensitive customer data was sent to Facebook without their knowledge) proves time and again how easily our data can be sold, lost, or misused.
  • Dependence on big business: Our digital everyday lives are dominated by a few tech giants, raising concerns about how much power they have over our data and infrastructure. Almost half of Swedes believe that Google and Facebook threaten privacy, according to recent figures. Allowing a few giant companies to dominate information about our private lives is simply not a decent option.
  • Spying apps: Common smartphone apps can access large amounts of private data – location, contacts, microphone, and more – which is then shared for profit or even more obscure purposes. In fact, 8 out of 10 Swedes know that apps can track their location via GPS, according to a national privacy report, which shows how widespread the phenomenon is. Collected app data has led to everything from targeted advertising to privacy scandals. Yet the flow of software that silently snoops in the background continues.

Against this backdrop, Teuton Systems launched the Nordic region’s first fully Linux-based computer system for everyday users back in 2020. Since then, the concept has evolved: 100 percent open source, encryption as standard, and hardware optimized for security. The philosophy is simple: strong privacy should be the starting point for your devices, not a hidden option.

All devices are delivered pre-configured with privacy-preserving software and documentation in English. You can unpack the products and start using them right away, confident that the systems are already optimized to protect your privacy.

Image of the premium Matrix 8 Pro model equipped with 256 GB of storage space and a very powerful camera that has received top marks in tests.

The Matrix phone – the tracking-free smartphone

Perhaps the most important product is called the Matrix phone. A powerful smartphone with the operating system replaced by GrapheneOS – the world’s most secure mobile operating system according to industry experts. It comes completely free of Google apps – which means the phone does not automatically “call home” to Google and share data about your usage.

Instead, open alternatives are pre-installed: web browser, email, maps, chat, everything you need. Most popular apps and services (including the Swedish BankID, for example) work. The result is a smartphone that works much like any Android phone – but without you having to worry about your phone spying on you in the background.

The Nordic region’s first preconfigured Linux computers

The computer range includes both laptop and desktop models, where Windows has been replaced with Linux, an open and more secure operating system free from data collection by large corporations. Each system is specially configured for high security while maintaining a high level of user-friendliness. From the first start-up, the computer runs with full disk encryption and a secure VPN, embedded in a modern desktop environment with a traditional start menu and taskbar that will be familiar to all Windows users – all included in the TS PC concept. No digging around in settings, no bloatware. You get a familiar user experience but without the surveillance.

Why open source is smarter – and safer

Thanks to open-source code, anyone can review the software; no hidden backdoors, no secret data collection. This makes the systems more transparent than mainstream platforms – and we have the world’s open developer community backing us with quality assurance instead of a closed-off corporation. When a vulnerability appears, it gets fixed quickly – without lobbying or shareholder politics. By combining open source, hardware-level security, and privacy-focused configuration, we create an alternative that gives everyday users digital self-determination.

So break free from dependence on tech giants – take control of your technology and your information. These types of solutions should be a given in today’s IT landscape, but as we’ve seen, they are far from standard in the industry. Change is needed, and together we can make a difference.

The starting point is and remains the same: technology should be completely controlled by the user, not by authorities or greedy large corporations. With Teuton Systems’ products, you get security and freedom – without compromising on user-friendliness. In addition, you can always contact our telephone support team at our office in the heart of Sweden. They are ready to assist you before and after your purchase. In other words: Technology by the people, for the people.

Welcome to Teuton Systems – where personal privacy is standard and surveillance is a thing of the past!

 

Specialist doctor warns: Social media is hacking our brains

The rise of technocracy

Published 17 May 2025
– By Editorial Staff
In 15 years, eating disorders have almost doubled - largely attributed to morbid trends on social media.

Users are not the customers of social media giants – they are the product itself, where the most important thing is to capture our attention for as long as possible and at any cost.

This is the conclusion of psychiatrist Anders Hansen, who points to TikTok as an example of a platform that “creates information that our brains cannot look away from”.

On the Swedish public television channel SVT, he explains what happens to users’ brains when they use social media and how harmful much of the content actually is – especially for young users.

– We humans want to belong to a group at any cost. It’s pure survival. We constantly ask ourselves: ‘Am I good enough for the group, am I attractive enough, or smart enough, or thin enough?’ When we are exposed to this two to three hours a day, we perceive that we are not good enough, that we are not worthy.

– Our brains register this as a threat to our survival, which is why it makes us feel so bad. Some people then try to do something about it, such as starving themselves… These are deeply biological mechanisms within us that are being hacked by this extremely advanced and sophisticated technology.

“The companies don’t care”

Although it is actually prohibited on most platforms to target weight loss tips and similar ideals of thinness to children and young people, this is still very common.

Although eating disorders are a complex illness with many potential causes, Hansen says it cannot be ignored that they have almost doubled since 2010 across the Western world – and that this is likely due to the ideals promoted on social media.

– Companies don’t care if you develop a distorted self-image, they just want to squeeze every last second out of you. If you think about it, maybe you can awaken your inner rebel and not let companies take up your time, he explains.

Profit lost from restrictions

The psychiatrist also points out that all types of regulations and restrictions on algorithms and content mean that users will spend less time on social media – and that this is why social media companies systematically oppose such requirements.

– They have no interest whatsoever in trying to stop this.

Although TikTok is highlighted as the clearest example, there are now a long list of competitors that work in a similar way – including Instagram Reels (Meta), YouTube Shorts (Google), and Snapchat Spotlight.

Lock down your Mac

No Apple ID, no tracking, no nonsense.

Published 17 May 2025
– By Naomi Brockwell

Apple markets itself as a privacy-focused company. And compared to Google or Microsoft, it is. But let’s be clear: Apple is still collecting a lot of your data.

If you want the most private computer setup, your best option is to switch to Linux. Not everyone is ready to take that step though, and many might prefer to keep their existing computer instead.

If you want to keep your current device but make it more private, what are your options?

Windows is basically a privacy disaster. Privacy expert Michael Bazzell says in his book Extreme Privacy:

I do not believe any modern Microsoft Windows system is capable of providing a secure or private environment for our daily computing needs. Windows is extremely vulnerable to malicious software and their telemetry of user actions is worse than Apple’s. I do not own a Windows computer and I encourage you to avoid them for any sensitive tasks”.

If you want to keep your Mac without handing over your digital life to Apple, there are ways to lock it down and make it more private.

In this article, I’ll walk you through how to set up a Mac for better privacy—from purchasing the computer to tweaking your system settings, installing tools, and blocking unwanted data flows.

We’ll be following the setup laid out by Michael Bazzell in Extreme Privacy, with some added tips from my own experience.

We also made a video tutorial that you can follow along.

You don’t need to do everything. Each chapter is modular. But if you follow the full guide, you’ll end up with a Mac that doesn’t require an Apple ID, doesn’t leak constant data, and gives you control over your digital environment.

Buying your Mac

Choose a model that still gets security updates

Apple eventually drops support for older devices. A privacy-hardened system isn’t useful if it doesn’t receive security updates.

Two helpful sites:

Pay with cash in a physical store

If you buy a Mac with a credit card, the serial number is forever linked to your identity.
Cash keeps you anonymous. You might get strange looks, but it’s completely within your rights. Be polite. Be firm. They’ll grumble. That’s fine.

Fresh install of macOS

If it’s a refurbished Mac—or even brand new—it’s worth doing a clean install.

Update macOS

  • System Settings > General > Software Update
  • Install updates, reboot, and reach the welcome screen.

Erase all content

  • System Settings > General > Transfer or Reset > Erase All Content and Settings
  • Enter your password, confirm warnings
  • Your Mac will restart and erase itself

This restores factory defaults: user data and settings are gone, but the OS remains installed.

Optional: Wipe the disk completely (advanced)

If you want a truly clean install, you’ll need to manually erase the entire internal disk. Only do this if you’re comfortable in recovery mode.

Modern Macs split the system into two parts—a sealed system volume and a data volume—tied together with something called firmlinks. If you don’t erase both correctly, you can end up with phantom volumes that clog your disk and break things silently.

Steps:

  • Enter Recovery Mode:
    • Apple Silicon: Hold power > click “Options”
    • Intel: Hold Command + R on boot
  • Open Disk Utility
  • Click View > Show All Devices
  • Select the top-level physical disk (e.g., “Apple SSD”)
  • Click Erase
    • Name: Macintosh HD
    • Format: APFS
    • Scheme: GUID Partition Map

Warning: Skip “Show All Devices” or erase the wrong item and you could brick your Mac. Only do this if you understand what you’re doing.

Once erased, return to the recovery menu and choose Reinstall macOS.

First boot setup

macOS wants to immediately link your device to iCloud and Apple services. Stay offline as long as possible.

Setup tips:

  • Region: Choose your location
  • Accessibility: Skip
  • Wi-Fi: Click “Other Network Options” > “My computer does not connect to the internet”
  • Data & Privacy: Continue
  • Migration Assistant: Skip (we’re starting fresh!)
  • Apple ID: Choose “Set up later”
  • Terms: Agree
  • Computer Name: Use a generic name like Laptop or Computer
  • Password: Strong and memorable. No hint. Write it down somewhere safe.
  • Location Services: Off
  • Time Zone: Set manually
  • Analytics: Off
  • Screen Time: Skip
  • Siri: Skip
  • Touch ID: Optional
  • Display Mode: Your choice

Harden system settings

Wi-fi & bluetooth

  • System Settings > Wi-Fi: Turn off
    • Disable “Ask to join networks” and “Ask to join hotspots”
  • System Settings > Bluetooth: Turn off

Firewall (built-In)

  • System Settings > Network > Firewall: Turn on
    • Disable “Automatically allow built-in software…”
    • Disable “Automatically allow downloaded signed software…”
    • Enable Stealth Mode
    • Remove any pre-approved entries

Notifications

  • System Settings > Notifications
    • Show Previews: Never
    • Turn off for Lock Screen, Sleep, and Mirroring
    • Manually disable for each app

Sound settings

  • System Settings > Sound
    • Alert Volume: Minimum
    • Disable sound effects and interface feedback

AirDrop & sharing

  • System Settings > General > AirDrop & Handoff: Turn everything off
  • System Settings > General > Sharing: Disable all toggles

Siri & Apple Intelligence

  • System Settings > Siri & Dictation: Disable all
  • Disable Apple Intelligence and per-app Siri access

Switch time server

Your Mac pings Apple to sync the time—leaking your IP every time it does.
Switch to a decentralized time server instead.

How:

  • System Settings > General > Date & Time
  • Click “Set…” > Enter password
  • Enter: pool.ntp.org
  • Click Done

Spotlight & gatekeeper

Spotlight

  • System Settings > Spotlight: Turn off “Help Apple improve search”

Gatekeeper

Gatekeeper prevents you from opening non-Apple-approved apps and sends app data to Apple.

If you’re a confident user, disable it:

  • Terminalsudo spctl --master-disable
  • System Settings > Privacy & Security: Allow apps from anywhere

FileVault & lockdown mode

FileVault

Encrypt your entire disk:

  • System Settings > Privacy & Security > FileVault: Turn on
  • Choose “Create a recovery key and do not use iCloud”
  • Write down your recovery key. Store it OFF your computer.

Lockdown mode (Optional)

Restricts features like USB accessories, AirDrop, and others. Useful for high-risk users.

Customize appearance & finder

Desktop & dock

  • Disable “Show Suggested and Recent Apps”
  • Disable “Recent apps in Stage Manager”

Wallpaper

Use a solid color instead of version-specific defaults to reduce your system’s fingerprint.

Lock screen

  • Screensaver: Never
  • Require password: Immediately
  • Sleep timer: Your preference (e.g. 1 hour)

Finder preferences

  • Show all file extensions
  • Hide Recents and Tags
  • Set default folder to Documents
  • View hidden files: Shift + Command + .

Block outbound connections

macOS and many apps connect to servers without asking. You’ll want to monitor and block them.

Use Little Snitch (or LuLu)

Browser

Install a privacy-respecting browser like Brave or Mullvad.

Compare options at privacytests.org

VPN

Use trusted providers like Mullvad or ProtonVPN.

Be careful which VPN you download — they’re often scamware and data collection tools.
Watch this video for more

Optional: Use Homebrew

Instead of the App Store, install software via Homebrew.

We’ll cover this more in a future guide.

Final takeaways

If you followed this guide, you now have:

  • A Mac with no Apple ID
  • No iCloud tether
  • Full disk encryption (FileVault)
  • A silent firewall
  • Blocked outbound connections
  • A private browser and VPN setup

You’ve taken serious steps to reclaim your digital autonomy. Well done.

In an upcoming guide, we’ll explore how to take the next step: switching to Linux.

Thanks again to Michael Bazzell for his work.

Find his book Extreme Privacy at: inteltechniques.com/book7.html

 

Yours in privacy,
Naomi

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Youtube.

Our independent journalism needs your support!
We appreciate all of your donations to keep us alive and running.

Our independent journalism needs your support!
Consider a donation.

You can donate any amount of your choosing, one-time payment or even monthly.
We appreciate all of your donations to keep us alive and running.

Dont miss another article!

Sign up for our newsletter today!

Take part of uncensored news – free from industry interests and political correctness from the Polaris of Enlightenment – every week.