Saturday, July 19, 2025

Polaris of Enlightenment

Sweden on the verge of becoming technologically peripheral – think tank

Published 17 October 2024
– By Editorial Staff
3 minute read

Fredrik Erixon, head of the think tank ECIPE, writes in an opinion piece that Sweden is one of the major losers in the new wave of global protectionism, which he sees spreading rapidly.

He argues that “Sweden is making a downward technological class journey” and that the country is quickly becoming more “peripheral” in a range of technology-related fields.

Erixon, who has a background at the investment bank JP Morgan and the neoliberal think tank Timbro, points out that the U.S. under recent presidents has distanced itself from “the economic world order that emerged after World War II” and instead shifted toward increased protectionism—believing that the current world economic order “is not capable of handling new geopolitical conflicts”.

“That attitude also extends to climate policy: the US, like the EU now as well, no longer accepts an international climate policy framework where China can continue a fossil-fueled economic expansion while Western companies become less competitive due to rising energy costs. The world economy is moving into a protectionist spiral”, he continues.

According to the lobbyist, “Sweden is one of the major losers” in this new era of protectionism – because “we are too small an economy to play hardball when dealing with economic frictions”.

“Sweden cannot compete based on the power of large numbers: we don’t have a population size that allows us to influence other countries with dazzling consumer demand, investments, natural resources, and so on. They can manage without us. At the same time, we are enormously dependent on economic openness for our prosperity and for access to services and technologies from the rest of the world”.

“Once at the forefront”

He also raises a warning about what he sees as Sweden’s tendency to align with an “EU policy that is more inward-looking and fearful of competition”, arguing that particularly “high-tech and research-intensive sectors” in Sweden have suffered under EU policies, and that Sweden’s passivity has damaged its geoeconomic influence.

“Sweden is making a downward technological class journey. In recent years, the government has created various incentives for a larger share of investments to go to ‘mid-tech’ technologies like batteries and green steel. The GDP effect from these technologies is limited. In major transversal technologies like materials, AI and quantum technology, telecommunications and space technology, and biotechnology, Sweden is becoming increasingly peripheral—even though we were once at the forefront of these technologies and their commercialization”, he laments.

Calls for government investment

According to Erixon, the solution is for the authorities to start using their “state capacity” to improve Sweden’s geoeconomic position -through targeted political efforts and by offering businesses “better tax incentives and more attractive conditions for research-intensive activities and human capital to locate in Sweden”.

“Especially in transversal technologies – that is, technologies expected to drive much of future innovation and structural transformation in the economy”, he continues.

He concludes with a recommendation that the government’s spending on research and development should be “at least” 5 percent of GDP within ten years – and that the state should begin by allocating an additional 500 billion SEK to strategic research over the coming decade.

TNT is truly independent!

We don’t have a billionaire owner, and our unique reader-funded model keeps us free from political or corporate influence. This means we can fearlessly report the facts and shine a light on the misdeeds of those in power.

Consider a donation to keep our independent journalism running…

Pentagon purchases Musk’s politically incorrect AI models

The future of AI

Published 15 July 2025
– By Editorial Staff
1 minute read

Despite the deep rift with Trump, Elon Musk is now receiving a contract with the Pentagon worth up to $200 million to deliver specially adapted language models for the US military.

The project is called “Grok for Government” in a statement on X, by X.

Grok’s new AI model has been a major topic of conversation this past week, in establishment media primarily because after an update where certain filters were removed, it began breaking strongly against politically correct patterns, and among the general public due to the humor perceived in this.

Among other things, it has been noted how the chatbot writes that certain Jewish organizations, particularly the far-right group ADL, pursue a hostile line against European ethnic groups. For this, the chatbot has been accused of “antisemitism”.

American media analyst and political commentator Mark Dice on the controversy surrounding Grok’s new versions.

However, the criticism has apparently not prevented the US military from procuring Grok solutions for their purposes.

Sweden: Over 900 convicted individuals evade prison sentences

Deteriorating safety

Published 15 July 2025
– By Editorial Staff
2 minute read

Today, over 900 people are wanted for refusing to serve their prison sentences. Meanwhile, the Swedish government has tightened the rules – since April this year, no one can “wait out” their sentence anymore.

A survey by news agency Siren shows that wanted criminals are found in half of Sweden’s municipalities. In total, it involves just over 900 people who actively avoid showing up when the Swedish Prison and Probation Service calls.

Since April 1 this year, the possibility of escaping punishment by hiding until the statute of limitations expires has completely disappeared. Now the sentences remain until they are enforced, regardless of how much time passes.

– It’s no longer enough to stay hidden for five or ten years, because now the sentences will remain, says Geska Mark, group manager at the Swedish Prison and Probation Service, to the news agency.

Two-thirds report voluntarily

Statistics from the Swedish Prison and Probation Service show that between 65 and 70 percent of those convicted follow the authority’s reporting decisions and appear at the designated facility when the time comes.

– When we look year by year at how many follow our reporting decisions, the proportion is between 65 and 70 percent, states Geska Mark.

Those who are not already in custody receive a letter with instructions about where and when they should report. If they fail to appear without acceptable reason, they risk being wanted, especially if they lack a known address.

Drunk driving most common among evaders

Before the rule change, approximately one hundred people annually managed to avoid prison by staying hidden until the sentence was subject to statute of limitations. Previously, there was a five-year limitation period for sentences under one year and ten years for sentences between one and four years.

Most of those who used this “way out” had been sentenced to short prison terms, often one to two months, where drunk driving was the most common crime.

– Most of the sentences that were previously subject to statute of limitations were short prison sentences, one to two months in prison, and the most common crime was drunk driving. It often involved cases where the convicted person had no address in Sweden, explains Geska Mark.

How to be anonymous on social media

How to protect your identity depending on whom you're hiding from.

Published 12 July 2025
– By Naomi Brockwell
9 minute read

Using a pseudonym on social media can be an incredibly valuable way to reclaim your privacy online. In an age where digital footprints last forever, the ability to separate your online identity from your real-world persona is more important than ever.

Maybe you’re concerned about protecting yourself from online mobs that might target your job, your family, or your personal reputation. Maybe you don’t want everything you say online to be permanently linked to your real name. Perhaps you have multiple interests or roles in life (professional, personal, creative) and want to maintain separate identities for each.

Maybe you simply value your privacy. Having a pseudonymous account can be liberating. It allows you the freedom to explore new ideas, revise your beliefs, and reinvent yourself without every past opinion you’ve ever expressed being etched in stone and forever tied to you.

But setting up a pseudonymous account on social media isn’t always straightforward. Your approach will depend heavily on the platform you’re using. It will also depend on your threat model, which you can think of as whom you’re trying to hide your identity from, how private you need to be, and what’s at stake.

Threat models

It’s essential to understand your own threat model clearly, because the steps you’ll need to take to create a pseudonymous social media identity will vary dramatically at each level. For example, hiding your opinions from your boss will require very different precautions than hiding from a hostile government that wants to target you for your political beliefs.

There are countless threat models, but here are 3 general categories to give you some ideas of where you might fit in:

1. Hiding from the general public, and preventing low-level insider doxxing

This is an easier level to achieve. You simply don’t want your boss, colleagues, or random strangers linking your social media activity back to your real identity.

2. Hiding from the platform itself

Perhaps you have a higher profile, and you’re concerned about a platform employee accessing your personal details, billing information, or potentially doxxing you. At this level, you’re not being actively targeted, but you also don’t want the platform to know who you are. Protecting your identity here gets trickier and requires a deeper understanding of internet tracking and more rigorous control over your digital footprint.

3. Hiding from a hostile government that is targeting you

This is an extreme threat scenario. Perhaps you live under a hostile regime where political dissent is dangerous and consequences for being identified online can be severe. This level of threat requires meticulous discipline, and a tailored approach that goes far beyond general privacy advice. We won’t cover this threat model in this newsletter — not because it isn’t important, but because the stakes are too high for shortcuts. If your life or freedom could be at risk, please seek help from security professionals who specialize in operating anonymously under repressive conditions. Even small mistakes can be catastrophic.

Some organizations you might reach out to include:

Let’s use X as an example

Depending on which social media platform you want to use, the steps for setting up a pseudonymous account will vary dramatically. In this article, we’ll just focus on X as one example, because it’s a popular platform where pseudonymous accounts thrive. While Facebook aggressively pushes users to use real names and actively works to de-anonymize its users, X is a place where personas, satire accounts, and anonymous commentary are quite common.

That said, pseudonymity is a delicate privacy layer that can easily be broken. In this article, we are not providing exhaustive checklists, but rather examples of what kinds of mistakes lead to deanonymization, and tips for better protecting yourself.

Threat model 1: Hiding from the general public, and preventing low-level insider doxxing

Goal:
You simply don’t want random people or followers connecting your tweets to your real identity. You want to ensure that even the average X employee with backend access won’t immediately be able to see your real identity linked to your pseudonymous account. Perhaps you’re worried about accidental exposure, corruption, or misuse of internal access.

Tips:

  • Choose a completely separate profile name and username
    • Select a pseudonym that has no obvious connection to your real-world identity (avoid birthdays, locations, or nicknames).
  • Create a new email address (use an email alias service)
    • Don’t reuse your personal or work email. Use an email alias service (like SimpleLogin) that you only ever use for this account.
    • Even though your email address isn’t publicly visible on your profile, data breaches are extremely common. Presume that your credentials will be leaked. If your email ties back to your real identity, your pseudonym is blown.
  • Use a VoIP number for verification
    • Your personal cell number is a unique identifier that’s already been leaked everywhere. If you use it for verification, a data breach could link your identity to your pseudonymous account.
    • Use a VoIP service like MySudo or Cloaked to generate a clean, separate number.
  • Avoid personal identifiers
    • Don’t include real-world hobbies, your profession, specific locations, or distinctive personal details in your profile or posts.
  • Be careful whom you follow
    • Don’t follow your real account or people closely tied to you (e.g., best friend, sibling, coworker). These connections can unravel your anonymity.
  • Profile pictures and images
    • Don’t reuse photos from other accounts (reverse image searches can link them).
    • Consider AI-generated or royalty-free images.

These are some general tips that will help you. Just remember: any link, reference, or overlap between your pseudonymous account and real identity can risk exposure.

Threat model 2: Hiding from the platform itself

Goal:
You want to prevent the platform (X) from identifying you. This involves more sophisticated steps to scrub your digital footprint and reduce the metadata you leak by default.

This guide is not intended for people in life-threatening situations or under hostile regimes. It’s a conceptual framework for lower-risk scenarios, where the goal is to increase your privacy, not guarantee anonymity. Also keep in mind that this is not an exhaustive list — it’s a starting point for awareness, not a guarantee of protection.

This model assumes you’ve already followed all steps from Threat Model 1. From here, you’re adding aggressive compartmentalization, anonymization, and metadata hygiene.

Core protections

  • Minimize metadata exposure
    • Always strip EXIF data from images before uploading. Use privacy-friendly tools (see our video on metadata scrubbing).
  • Use a masked or virtual payment method
    • If you subscribe to X Premium, use a virtual card like Privacy.com to avoid exposing your billing info. You can enter a fake name and billing address, and the payment will still go through (we talk about masked credit cards in this video).
  • Always use a VPN
    • VPNs help hide your IP address from the platform. Choose one that doesn’t log (e.g., Mullvad, ProtonVPN). Use it consistently.
  • Careful device management
    • Access X only via a privacy-focused browser (like Brave), never the app. Apps collect far more data and can bypass system-level protections, often in a super sneaky way that users don’t even know about.
    • Use a dedicated browser profile or even a separate browser just for your pseudonymous identity. This prevents cross-contamination from cookies, autofill, and history.

Advanced protections

  • Never use personal internet connections
    • Avoid using home, work, or school Wi-Fi. Use public networks far from places associated with you.
    • Pay for your VPN anonymously (cash, crypto, gift card). Consider adding Tor as an additional layer.
  • Avoid platform fingerprinting
    • Disable JavaScript when feasible.• Avoid using a unique combination of extensions that can fingerprint you.
    • Regularly rotate browser profiles and clear cookies, local storage, and cache.
    • Consider disabling advanced fingerprinting vectors like canvas rendering and WebGL.
  • Make sure email and phone have also been set up anonymously
    • Your email should be created using anonymous methods and not linked to anything else you use.
    • Your VoIP number should also be generated in a way that avoids personal identifiers. Accidental crossover is one of the most common ways people get deanonymized.
  • Avoid revealing patterns
    • Vary your writing style and posting schedule.
    • Don’t engage with people or topics tied to your real-world identity.
    • Avoid posting about events or niche communities that could reveal your location or background.
  • Understand legal and jurisdictional risks
    • Be aware of keywords and behavior that could flag surveillance systems.
  • Don’t trust devices
    • Don’t bring your pseudonymous device near your home or workplace.
    • Wi-Fi probes and Bluetooth signals can reveal patterns.
    • Disable or remove mics/cameras where possible.
  • Use dedicated hardware and OS
    • Use a separate device that’s never touched your real accounts.
    • If that’s not possible, use isolated OSes (like Virtual Machines, Tails OS, Qubes OS) for advanced compartmentalization
    • Always wipe and reinstall OS if using secondhand hardware.• Never log in to pseudonymous and personal accounts from the same browser or device.
  • Limit interaction with the platform
    • Don’t click on X notifications or emails (they often contain trackers).
    • Avoid engaging unless it’s strategic.
  • Maintain a rotation schedule
    • Periodically “burn” your pseudonymous account and start fresh: new device, new email, new behavior.
    • The longer an identity lives, the more data accumulates.
    • Keep your footprint minimal and delete what you no longer need.

Threat model 3: Hiding from the government in a high-risk environment

Goal:
You live under a hostile regime where expressing dissenting opinions online carries severe consequences. For instance, you might be in Turkey, China, Iran, or another environment known for targeting political opponents, activists, or critical voices.

Is true anonymity possible?

Let’s be clear: achieving absolute, foolproof anonymity online is extraordinarily difficult. Governments have massive resources — they have surveillance infrastructure, legal coercion, and advanced forensic tools. One small mistake can unravel everything.

This guide does not offer operational security for high-risk environments. If your life or freedom are on the line, consult with trained security professionals. Do not rely on generalized privacy guides.

What would that involve?

Just to give you a sense of what’s involved, you’d need to consider:

  • Buying hardware anonymously and avoiding camera networks
  • Creating burner accounts and rotating them frequently
  • Maintaining total behavioral and linguistic separation
  • Never discussing pseudonymous work, even with trusted friends
  • Compartmentalizing your life with extreme precision

And this is just the beginning. If this sounds overwhelming, that’s because it is.

If you’re in this situation: don’t go it alone.
Your safety is worth getting help.

The good news

The good news is that most people’s threat model doesn’t involve being specifically targeted by the government. What does that mean exactly? Targeting an individual requires considerable time, effort, and cost, so governments rarely do it unless there’s a clear reason. Instead, they rely on mass surveillance: automated systems that vacuum up data at scale and piece together your identity from the information you (or your devices) voluntarily give away.

And that’s why this is good news: most of this exposure is preventable. You don’t need extreme measures to protect yourself, you just need better defaults. By using VoIP numbers, email aliases, and privacy-focused browsers, you can significantly reduce how much of your life is available for collection in the first place. Small changes in behavior can go a long way toward protecting your identity and limiting what’s visible to mass surveillance systems.

Final thoughts

For most people, achieving basic pseudonymity online is much easier than it sounds. If your goal is to keep your professional life separate from your online commentary, or just to prevent casual Googling from exposing your social media presence, a thin veil of anonymity can go a long way. Choosing a new name, using a separate email and phone number, and keeping your circles compartmentalized are often all you need.

If you want a stronger break between your real identity and your online persona, you can layer on more privacy tools like VPNs, burner devices, and metadata hygiene. These steps aren’t just for activists or whistleblowers, they’re increasingly useful for anyone who wants to reclaim a sense of control in a world of hyper-connected data.

But if your life or freedom truly depends on staying anonymous — if you are being targeted by a government or powerful institution — then the game changes. In high-risk situations, pseudonymity becomes fragile. One careless follow, one reused phone number, one unstripped photo is all it takes to unravel everything. You need airtight operational security, and professional guidance to match the stakes.

No matter where you fall on that spectrum, this guide is here to help you think critically about how you engage online, and to offer practical, achievable steps that meet you where you are. Privacy is not a one-size-fits-all endeavor. What matters most is understanding your threat model, being consistent in your habits, and staying aware of the tradeoffs you’re making.

Every privacy step you take makes a difference.

 

Your in privacy,
Naomi

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Rumble.

Swedish climate extremists who blocked ambulance acquitted by Supreme Court

The exaggerated climate crisis

Published 11 July 2025
– By Editorial Staff
Police remove the road blockade in August 2022.
2 minute read

A nearly three-year legal process concluded this week when all activists from Restore Wetlands (Återställ Våtmarker) were acquitted for blocking the E4 motorway in August 2022, which in addition to causing long traffic jams also delayed an ambulance on an emergency call.

According to Sweden’s Supreme Court (Högsta domstolen), the road blockade was not comparable to the threats against vital societal interests required by law for a conviction of sabotage, and therefore acquitted all participants in the climate alarmist group’s action. The Supreme Court particularly emphasized the importance of freedom of demonstration and freedom of expression in a ruling that will serve as guidance for how civil disobedience should be punished, which in practice opens the door for more motorway blockades.

The legal situation has been unclear regarding what constitutes a serious disruption or obstruction in these cases. It’s good that we now have clear guidance from the Supreme Court on how prosecutions for sabotage should be assessed in the future, says Chief Prosecutor Katarina Johansson Welin in the Supreme Court’s press release.

The group itself describes its action as an “act of love”.

Victory! Today we celebrate that the sabotage charge has been shot down for the last time. In my heart, I have always known that I acted exactly right. To sit peacefully and openly on a motorway and demand that emissions decrease is among the strongest acts of love for our children and for life that you can do, and we did exactly that, says one of those acquitted in the climate group’s press release.

Our independent journalism needs your support!
We appreciate all of your donations to keep us alive and running.

Our independent journalism needs your support!
Consider a donation.

You can donate any amount of your choosing, one-time payment or even monthly.
We appreciate all of your donations to keep us alive and running.

Dont miss another article!

Sign up for our newsletter today!

Take part of uncensored news – free from industry interests and political correctness from the Polaris of Enlightenment – every week.