Sunday, June 1, 2025

Polaris of Enlightenment

KYC is the crime

The Coinbase hack shows how state-mandated surveillance is putting lives at risk.

Published yesterday 7:36
– By Naomi Brockwell

Last week, Coinbase got hacked.

Hackers demanded a $20 million ransom after breaching a third-party system. They didn’t get passwords or crypto keys. But what they did get will put lives at risk:

  • Names
  • Home addresses
  • Phone numbers
  • Partial Social Security numbers
  • Identity documents
  • Bank info

That’s everything someone needs to impersonate you, blackmail you, or show up at your front door.

This isn’t hypothetical. There’s a growing wave of kidnappings and extortion targeting people with crypto exposure. Criminals are using leaked identity data to find victims and hold them hostage.

Let’s be clear: KYC doesn’t just put your data at risk. It puts people at risk.

Naturally, people are furious at any company that leaks their information.

But here’s the bigger issue:
No system is unhackable.
Every major institution, from the IRS to the State Department, has suffered breaches.
Protecting sensitive data at scale is nearly impossible.

And Coinbase didn’t want to collect this data.
Many companies don’t. It’s a massive liability.
They’re forced to, by law.

A new, dangerous normal

KYC, Know Your Customer, has become just another box to check.

Open a bank account? Upload your ID.
Use a crypto exchange? Add your selfie and utility bill.
Sign up for a payment app? Same thing.

But it wasn’t always this way.

Until the 1970s, you could walk into a bank with cash and open an account. Your financial life was private by default.

That changed with the Bank Secrecy Act of 1970, which required banks to start collecting and reporting customer activity to the government. Still, KYC wasn’t yet formalized. Each bank decided how well they needed to know someone. If you’d been a customer since childhood, or had a family member vouch for you, that was often enough.

Then came the Patriot Act, which turned KYC into law. It required every financial institution to collect, verify, and store identity documents from every customer, not just for large or suspicious transactions, but for basic access to the financial system.

From that point on, privacy wasn’t the default. It was erased.

The real-world cost

Today, everyone is surveilled all the time.
We’ve built an identity dragnet, and people are being hurt because of it.

Criminals use leaked KYC data to find and target people, and it’s not just millionaires. It’s regular people, and sometimes their parents, partners, or even children.

It’s happened in London, Buenos Aires, Dubai, Lagos, Los Angeles, all over the world.
Some are robbed. Some are held for ransom.
Some don’t survive.

These aren’t edge cases. They’re the direct result of forcing companies to collect and store sensitive personal data.

When we force companies to hoard identity data, we guarantee it will eventually fall into the wrong hands.

There are two types of companies, those that have been hacked, and those that don’t yet know they’ve been hacked” – former Cisco CEO, John Chambers

What KYC actually does

KYC turns every financial institution into a surveillance node.
It turns your personal information into a liability.

It doesn’t just increase risk — It creates it.

KYC is part of a global surveillance infrastructure. It feeds into databases governments share and query without your knowledge. It creates chokepoints where access to basic services depends on surrendering your privacy. And it deputizes companies to collect and hold sensitive data they never wanted.

If you’re trying to rob a vault, you go where the gold is.
If you’re trying to target people, you go where the data lives.

KYC creates those vaults, legally mandated, poorly secured, and irresistible to attackers.

Does it even work?

We’re told KYC is necessary to stop terrorism and money laundering.

But the top reasons banks file “suspicious activity reports” are banal, like someone withdrawing “too much” of their own money.

We’re told to accept this surveillance because it might stop a bad actor someday.

In practice, it does more to expose innocent people than to catch criminals.

KYC doesn’t prevent crime.
It creates the conditions for it.

A Better Path Exists

We don’t have to live like this.

Better tools already exist, tools that allow verification without surveillance:

  • Zero-Knowledge Proofs (ZKPs): Prove something (like your age or citizenship) without revealing documents
  • Decentralized Identity (DID): You control what gets shared, and with whom
  • Homomorphic Encryption: Allows platforms to verify encrypted data without ever seeing it

But maybe it’s time to question something deeper.
Why is centralized, government-mandated identity collection the foundation of participation in financial life?

This surveillance regime didn’t always exist. It was built.

And just because it’s now common doesn’t mean we should accept it.

We didn’t need it before. We don’t need it now.

It’s time to stop normalizing mass surveillance as a condition for basic financial access.

The system isn’t protecting us.
It’s putting us in danger.

It’s time to say what no one else will

KYC isn’t a necessary evil.
It’s the original sin of financial surveillance.

It’s not a flaw in the system.
It is the system.

And the system needs to go.

Takeaways

  • Check https://HaveIBeenPwned.com to see how much of your identity is already exposed
  • Say no to services that hoard sensitive data
  • Support better alternatives that treat privacy as a baseline, not an afterthought

Because safety doesn’t come from handing over more information.

It comes from building systems that never need it in the first place.

 

Yours in privacy,
Naomi

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Youtube.

TNT is truly independent!

We don’t have a billionaire owner, and our unique reader-funded model keeps us free from political or corporate influence. This means we can fearlessly report the facts and shine a light on the misdeeds of those in power.

Consider a donation to keep our independent journalism running…

Wallenberg and Nvidia to build “cutting-edge” AI center in Sweden

Published 27 May 2025
– By Editorial Staff
Marcus Wallenberg believes that the AI initiative is absolutely crucial for Swedish industry.

US chip manufacturer Nvidia is establishing a new AI center in Sweden in collaboration with the Wallenberg sphere and several major Swedish companies, including Astra Zeneca, Ericsson, Saab, and SEB.

The aim of the initiative is to strengthen Sweden’s position in artificial intelligence by building the country’s first AI supercomputer for business. The center will be run by a joint venture formed by the parties involved.

– Investing in cutting-edge AI infrastructure is a crucial step toward accelerating the development and adoption of AI across Swedish industry, said Marcus Wallenberg, chairman of Wallenberg Investments, in a statement, adding:

– We believe this initiative will generate valuable spillover effects – by enabling upskilling, fostering new collaborations, and strengthening the broader national AI ecosystem.

The initiative was announced during a visit to Sweden by Nvidia CEO Jensen Huang. During his visit, he was also awarded an honorary doctorate at Linköping University.

– As electricity powered the industrial age and the Internet fueled the digital age, AI is the engine of the next industrial revolution. Through the visionary initiative of Wallenberg Investments and Sweden’s industry leaders, the country is building its first AI infrastructure – laying the foundation for breakthroughs across science, industry, and society, and securing Sweden’s place at the forefront of the AI era, argues Nvidia’s CEO.

AI-driven drug development

And the players have clear ambitions for the initiative. Pharmaceutical giant AstraZeneca will use the system for AI-driven breakthroughs in drug development, with advanced models and data processing.

Ericsson wants to develop AI models to improve performance, efficiency, and customer experiences, as well as enable new business models.

Saab will invest in AI to accelerate the development of advanced defense capabilities in its leading systems, and SEB will integrate AI for increased productivity, new customer offerings, and long-term competitiveness, with a focus on critical infrastructure.

The ambition with this initiative is to establish a next generation AI compute infrastructure that is both a production facility and at the same time serves as a reference installation, unlocking new possibilities for AI adoption”, the companies said.

One in two young Brits long for a world without the internet

Published 26 May 2025
– By Editorial Staff
In recent years, there have been a number of reports and alerts showing that social media has a very negative impact on young people's mental health.

A new survey from the British Standards Institution mapping young people’s relationship with social media and digital life reveals that nearly half of young Brits wish they had grown up without the internet.

Of the 1,293 respondents aged 16 to 21, 46% said they would prefer to be young in a world where the internet did not exist. Almost 70% said they felt worse and had lower self-esteem after using social media, with 68% saying their time online had been directly detrimental to their mental health.

A quarter of respondents spent four hours or more a day on social media. Of these, 42% admitted to lying to parents or guardians about their online use. The same number said they had lied about their age online at some point, while 40% used so-called “burner” accounts – hidden or alternative profiles. 27% had even pretended to be a completely different person and the same number had shared their location information with strangers online.

The survey was conducted in the aftermath of coronavirus-related restrictions during the lockdown policy, a period which, according to three-quarters of participants, led to a marked increase in screen time.

Experts don’t believe in “digital curfew”

Against this backdrop, the UK’s technology minister, Peter Kyle, has recently opened the door to introducing mandatory digital “curfews” – i.e. blocking certain apps, such as TikTok and Instagram, after a certain time in the evening. Although critics have dismissed the proposal as repressive, it is gaining some support among young people: half of those surveyed, 50%, said they would support a digital curfew after 22:00.

However, several experts, including Rani Govender, policy manager for children’s online safety at the NSPCC, say the proposed restrictions are not enough.

We need to make clear that a digital curfew alone is not going to protect children from the risks they face online. They will be able to see all these risks at other points of the day and they will still have the same impact

She added that the focus should instead be on making the online environment safer and less addictive for children and young people, and preventing them from visiting obviously harmful sites and apps.

“Rabbit holes of harmful material”

Andy Burrows, CEO of the Molly Rose Foundation, also highlights the need for legislation to protect young people from harmful content:

– It’s clear that young people are aware of the risks online and, what’s more, they want action from tech companies to protect them.

He points out that algorithms often display content that can quickly lead young people into destructive flows and spirals:

– Algorithms can quickly spiral and take young people down rabbit holes of harmful and distressing material through no fault of their own.

Burrows calls for new laws to force a “safe by design” approach that puts the needs of children and society ahead of corporate profits.

This isn’t the internet we were promised

But decentralized tech is breaking the chains of control and giving you back your digital freedom.

Published 24 May 2025
– By Naomi Brockwell

Let’s get one thing straight:

Decentralization is not the goal.

The goal is freedom. The goal is autonomy. The goal is human dignity in the digital age.

Decentralization is just one way, often the best way right now, to get us closer to those outcomes.

In a perfect world, we wouldn’t need decentralized systems. If governments weren’t able to pressure companies into silence, or force them to hand over your private data… if corporations weren’t constantly monetizing your every move… if centralized platforms could be trusted to operate in the interest of users… then maybe centralized systems would be fine.

They’re efficient. They reduce friction.

There’s no denying the impact these platforms have had. They connected the world. They brought billions of people online, enabled global communication, and revolutionized how we share ideas and build movements.

But they also created new dangers.

We now live in a world where control over your data is a leverage point for power. Where a single company can unilaterally decide what speech is acceptable. Where massive data breaches happen regularly because your life is stored in one convenient server.

Centralized systems have become centralized vulnerabilities.

And so, decentralization has emerged, not as an ideology, but as a solution. A way to take some of that power back. A way to distribute risk, enable resilience, and restore individual choice.

A brief history of the web

We’ve lived through three major internet eras so far:

  • Web 1.0: The early internet was made up of static websites, self-hosted pages, and personal blogs. There were no algorithms deciding what you saw. Just raw HTML and a whole lot of freedom. It was gloriously messy, decentralized, and user-owned.
  • Web 2.0: Then came the rise of centralized platforms. Facebook, YouTube, and X (formerly Twitter) made publishing easy and social. These platforms helped bring billions of people online, but at a cost. In exchange for convenience, we gave up control. Our data became trapped in platforms we couldn’t leave. Surveillance and censorship scaled. Cloud storage followed the same trend: easy access, but centralized vulnerability.
  • Web 3.0: Now we’re entering a new era. One that takes the best of both worlds. We’re combining the usability and scale of the modern internet with decentralized protocols that restore individual control. We no longer need to be locked into platforms or ecosystems. We can own our data, preserve our identity, and move freely between services. This isn’t just a return to the past. It’s a leap forward. A better model is finally being built.

Why decentralization matters

It’s not that decentralization is inherently good — it’s that centralization has made us vulnerable. The Web2 world comes with serious problems:

  • Targeted control: A government only needs to pressure one company to censor millions.
  • Censorship: Say the wrong thing and get kicked off a platform. Poof, your voice disappears.
  • Data monopolies: Corporations collect and sell your personal information because they control the servers and the systems. This includes cloud storage. Your private documents, photos, and messages are often just a policy change or government request away from being inaccessible.
  • Lock-in: Your content and identity are trapped on whatever platform you chose. You don’t own anything.

Decentralized systems distribute that risk.

They make it harder to shut things down. Harder to surveil everyone at once. Easier to move, fork, remix, or migrate without losing everything in the process.

They don’t guarantee freedom, but they make it harder to take freedom away.

The protocols powering the shift

The movement toward decentralization is about changing the foundation of how the internet works. Here are some tools leading the way:

Decentralized storage: Keeping files online without a single gatekeeper

Right now, most of our files — photos, documents, backups — live in cloud services owned by a handful of big companies. That means those companies decide how long your files stay online, who gets access to them, and whether they get deleted, censored, or handed over to someone else.

Decentralized storage flips that model.

Instead of uploading your files to a single company’s server, decentralized storage lets you store data across a network of independent operators. Sometimes your file is split up and distributed across many nodes. Other times, it’s stored as a whole on a specific server, but that server is part of a peer-to-peer network, not a centralized platform. Either way, no single company controls access to everyone’s data, which makes your data more resilient and less vulnerable to censorship or loss.

  • IPFS helps you share files in a way that doesn’t depend on one website or server. If anyone on the network has a copy of the file, you can still access it.
  • Filecoin is a network where people get paid to store your files securely. You choose how long your files should be kept, and the system ensures they’re really there.
  • Arweave is focused on long-term storage. You pay once, and the goal is to keep your data online for decades. It’s especially useful for archiving important documents and creative work that needs to be preserved.

Decentralized social media: You keep your identity, even if the app changes

Traditional social media apps own everything: your account, your posts, your followers. If they ban you or shut down, everything’s gone.

Decentralized social platforms are trying to change that. They separate your identity and content from the app you use. That way, if one app disappears or kicks you off, you can just log into another app and pick up where you left off.

  • Mastodon is like Twitter, but instead of one giant site, it’s made up of many smaller communities. Each one sets its own rules, but they all talk to each other.
  • Bluesky is building a system where your posts and followers stay with you, not the platform. If you don’t like the app you’re using, you can switch without losing anything.
  • Nostr is a protocol that’s decentralized by design. It uses cryptographic keys instead of usernames, and many apps integrate with Bitcoin’s Lightning Network for tipping.

This is just the beginning: There’s decentralized finance, decentralized search, decentralized governance, even decentralized AI. This new world of possibilities is just opening up. And the more we explore what it has to offer, the better it becomes.

We may be frustrated at the current state of the internet, but we’re entering an entirely new era. And I think things can become radically different. We have to keep exploring, building, and supporting this tech.

Beyond storage and social

It’s not just your files or your feeds. Trust in centralized systems is eroding everywhere.

From messaging apps quietly backdoored, to identity systems that can cut you off without appeal, to governments and corporations that leak your most personal data into the hands of criminals, it’s no surprise people are looking for alternatives.

We’ve seen government ID databases, health systems, and credit agencies breached, with entire identities dumped onto the dark web. Names, locations, biometrics. Everything needed for fraud. Lost because it was all stored in one convenient place.

That’s why decentralized tools have gained momentum. They don’t promise perfection, but they offer a way to reduce risk, reclaim control, and opt out of systems that keep failing us.

Encrypted messaging. Self-owned identities. Private money. Anonymous search. Community-led governance.

People aren’t waiting for permission. They’re choosing systems that put them back in charge.

Takeaways

  • Decentralization is not a rejection of structure. It’s a rebalancing of control.
  • The goal isn’t to replace everything. It’s to diversify what’s possible.
  • You don’t have to go all in. You can start with just one tool, one switch.
  • Sometimes the most powerful thing is knowing how something works, and choosing better.

Dive in and try out some of these bourgeoning systems. A lot of them a really early stages — We may not get everything right on the first try, but if we keep moving forward, we can build a radically different internet.

 

Yours in privacy,
Naomi

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Youtube.

Teuton Systems offers smart privacy-focused technology – without compromise

Advertising partnership with Teuton Systems

  • Teuton Systems, based in Sweden, is developing a unique concept for privacy-oriented computers and mobile phones that does not compromise user-friendliness or security.
  • We take the fight against corporate snooping, mass government surveillance and criminal phone tapping through firm open source principles and secure products.
Published 23 May 2025
Both computers and phones from Teuton Systems come with interfaces you will recognize and with pre-installed apps for all your everyday needs.

Digitalization has given humanity superpowers – and opened the door to a whole jungle of new threats.

We see it every day: news headlines about breaches, scandals, and surveillance of ordinary people. Teuton Systems works for those who refuse to accept a reality where someone else owns their data. That’s why we offer hardware and software that gives you full control over your digital life.

Healthy skepticism about data collection is anything but paranoia – it’s perfectly justified. Here are just a few examples that should make anyone think twice about their everyday digital environment:

  • Mass surveillance: After Edward Snowden’s historic revelations, it became public knowledge that government programs were massively eavesdropping on both corporate and private communications. This is an important reminder that conscious action is required to preserve privacy. Since the revelations, this mass surveillance has continued in other forms.
  • Data leaks and scandals: Everything from the Cambridge Analytica scandal (where a company collected data on millions of Facebook users to influence elections) to the Apoteket leak (sensitive customer data was sent to Facebook without their knowledge) proves time and again how easily our data can be sold, lost, or misused.
  • Dependence on big business: Our digital everyday lives are dominated by a few tech giants, raising concerns about how much power they have over our data and infrastructure. Almost half of Swedes believe that Google and Facebook threaten privacy, according to recent figures. Allowing a few giant companies to dominate information about our private lives is simply not a decent option.
  • Spying apps: Common smartphone apps can access large amounts of private data – location, contacts, microphone, and more – which is then shared for profit or even more obscure purposes. In fact, 8 out of 10 Swedes know that apps can track their location via GPS, according to a national privacy report, which shows how widespread the phenomenon is. Collected app data has led to everything from targeted advertising to privacy scandals. Yet the flow of software that silently snoops in the background continues.

Against this backdrop, Teuton Systems launched the Nordic region’s first fully Linux-based computer system for everyday users back in 2020. Since then, the concept has evolved: 100 percent open source, encryption as standard, and hardware optimized for security. The philosophy is simple: strong privacy should be the starting point for your devices, not a hidden option.

All devices are delivered pre-configured with privacy-preserving software and documentation in English. You can unpack the products and start using them right away, confident that the systems are already optimized to protect your privacy.

Image of the premium Matrix 8 Pro model equipped with 256 GB of storage space and a very powerful camera that has received top marks in tests.

The Matrix phone – the tracking-free smartphone

Perhaps the most important product is called the Matrix phone. A powerful smartphone with the operating system replaced by GrapheneOS – the world’s most secure mobile operating system according to industry experts. It comes completely free of Google apps – which means the phone does not automatically “call home” to Google and share data about your usage.

Instead, open alternatives are pre-installed: web browser, email, maps, chat, everything you need. Most popular apps and services (including the Swedish BankID, for example) work. The result is a smartphone that works much like any Android phone – but without you having to worry about your phone spying on you in the background.

The Nordic region’s first preconfigured Linux computers

The computer range includes both laptop and desktop models, where Windows has been replaced with Linux, an open and more secure operating system free from data collection by large corporations. Each system is specially configured for high security while maintaining a high level of user-friendliness. From the first start-up, the computer runs with full disk encryption and a secure VPN, embedded in a modern desktop environment with a traditional start menu and taskbar that will be familiar to all Windows users – all included in the TS PC concept. No digging around in settings, no bloatware. You get a familiar user experience but without the surveillance.

Why open source is smarter – and safer

Thanks to open-source code, anyone can review the software; no hidden backdoors, no secret data collection. This makes the systems more transparent than mainstream platforms – and we have the world’s open developer community backing us with quality assurance instead of a closed-off corporation. When a vulnerability appears, it gets fixed quickly – without lobbying or shareholder politics. By combining open source, hardware-level security, and privacy-focused configuration, we create an alternative that gives everyday users digital self-determination.

So break free from dependence on tech giants – take control of your technology and your information. These types of solutions should be a given in today’s IT landscape, but as we’ve seen, they are far from standard in the industry. Change is needed, and together we can make a difference.

The starting point is and remains the same: technology should be completely controlled by the user, not by authorities or greedy large corporations. With Teuton Systems’ products, you get security and freedom – without compromising on user-friendliness. In addition, you can always contact our telephone support team at our office in the heart of Sweden. They are ready to assist you before and after your purchase. In other words: Technology by the people, for the people.

Welcome to Teuton Systems – where personal privacy is standard and surveillance is a thing of the past!

 

Our independent journalism needs your support!
We appreciate all of your donations to keep us alive and running.

Our independent journalism needs your support!
Consider a donation.

You can donate any amount of your choosing, one-time payment or even monthly.
We appreciate all of your donations to keep us alive and running.

Dont miss another article!

Sign up for our newsletter today!

Take part of uncensored news – free from industry interests and political correctness from the Polaris of Enlightenment – every week.