Wednesday, July 9, 2025

Polaris of Enlightenment

Too much free speech on X – Major Swedish newspaper DN leaves platform

Published 19 November 2024
– By Editorial Staff
Peter Wolodarski and the iconic "DN skyscraper" in Stockholm.
2 minute read

Under Elon Musk’s ownership, censorship on X (formerly Twitter) has been greatly reduced and the entrepreneur himself states that freedom of expression is very important to him.

Not everyone is happy about this development, however, and Peter Wolodarski, editor-in-chief of the Bonnier-owned newspaper DN (Dagens Nyheter), has announced that DN is boycotting the platform.

– Since Elon Musk took over, the platform has increasingly merged with his own and Donald Trump’s political ambitions, while the climate on X has become more harsh and extreme. Therefore, for the time being, we will not publish anything there from our official accounts, he told his own magazine.

While arbitrary censorship for political reasons used to be commonplace on Twitter, users are now relatively free to write what they really think about the often biased reporting of DN and other establishment media without much risk of banning or suspension – and this is not at all popular with media executives.

I think X is a lost platform, says Aftonbladet’s editorial director Karin Schmidt, explaining that they left X already in 2023.

Unlike X, I think it is so important that we are on Tiktok, where we can be a counterflow to fake news, she continues.

“Musk – a free speech fundamentalist”

The editor-in-chief of Swedish online magazine Kvartal, Jörgen Huitfeldt, agrees that there is sometimes a “rude and unpleasant” climate of conversation on X, but he has no plans to leave the platform.

– After all, many people are there, not least those who share journalistic content. It’s a way for us to reach out really, it’s that simple.

– Musk is a free speech fundamentalist, and I find it hard to believe that he will start censoring people in the same way he did under the Jack Dorsey regime, he continues.

TNT is truly independent!

We don’t have a billionaire owner, and our unique reader-funded model keeps us free from political or corporate influence. This means we can fearlessly report the facts and shine a light on the misdeeds of those in power.

Consider a donation to keep our independent journalism running…

Almost total halt for imported berry pickers in Sweden

Published yesterday 15:21
– By Editorial Staff
2 minute read

The Swedish Migration Agency has rejected almost all applications for berry pickers for 2025. As recently as 2023, 5,000 permits were granted.

Citing years of indications that employment conditions in the berry industry are not being upheld, the Migration Agency has granted only 89 permits for berry picking this year. A total of 2,397 applications for berry pickers have been received for 2025.

Last year, the Migration Agency rejected all applications for berry pickers, but 1,272 applications were subsequently approved after court review.

The Migration Agency has also this year assessed that workers in the berry industry risk not having their employment conditions met. Therefore, the agency has decided to reject most of the applications for Thai berry pickers, says Hanna Geurtsen, Deputy Project Manager for Work Permits at the Migration Agency, in a press release.

This year, the Migration Agency explains, all employers active in berry picking have chosen to apply for permits via the EU’s Seasonal Workers Directive. The difference when applying for a work permit as a seasonal worker, compared with the national main track for work permits, is among other things that the berry pickers this year are directly employed by a company in Sweden and not via a foreign staffing agency.

It’s partly about having an employment contract signed by both parties and that the employment conditions must be in line with Swedish collective agreements. For the majority of the applications received this year, these requirements have not been met, says Hanna Geurtsen.

The berry companies that have been rejected have the possibility to appeal these decisions in court, the agency adds in its press release.

Number of berry picking permits granted by the Migration Agency in recent years:

2025: 89
2024: 0 (1,272 were approved after court review)
2023: 5,372
2022: 6,594
2021: 5,175

Swedish government to map immigrants’ opinions

Published 7 July 2025
– By Editorial Staff
The Liberals' new integration minister Simona Mohamsson on the left, on the right migrants who have landed in Europe (archive image).
1 minute read

The Swedish government is now launching a project to examine immigrants’ opinions compared to native Swedes.

The results will serve as guidance for future integration efforts, says the Liberal Party’s new integration minister Simona Mohamsson about the project.

World Values Survey, WVS, is an international research program that examines people’s values in everything from social, political, economic, religious and cultural aspects.

The Swedish government is now paying WVS €450,000 to examine how values differ between non-Western immigrants and those with entirely Swedish backgrounds. During the autumn, around 3,000 people will be interviewed.

“We are an extreme country”

According to surveys that World Values Survey has previously conducted, the differences between immigrants and native Swedes are very large regarding views on things like divorce, premarital sex, abortion and homosexuality, where Sweden overall stands out as an exceptionally liberal-oriented country.

We are an extreme country in a good way. For people who become part of our society, it becomes somewhat difficult to navigate that map, says Mohamsson about the project to the Bonnier-owned newspaper DN, which among other things highlights that immigrants are more skeptical toward homosexual relationships.

There’s a whole generation of girls who don’t get to choose who they want to love or boys who can’t come out of the closet, she says.

Buying someone’s real-time location is shockingly cheap

You need to stop handing out your cell number. Seriously.

Published 5 July 2025
– By Naomi Brockwell
11 minute read

Most people have no idea how exposed they are.

Your location is one of the most sensitive pieces of personal information, and yet it’s astonishingly easy to access. For just a few dollars, someone can track your real-time location without ever needing to hack your phone.

This isn’t science fiction or a rare edge case. It’s a thriving industry.

Telecom providers themselves have a long and disturbing history of selling customer location data to data brokers, who then resell it with little oversight.

In 2018, The New York Times exposed how major U.S. carriers, including AT&T, Verizon, T-Mobile, and Sprint, were selling access to phone location data. This data was ultimately accessed by bounty hunters and law enforcement, without user consent or a warrant.

A 2019 investigation by Vice showed that you could buy the real-time location of nearly any phone in the U.S. for about $300.

Other vendors advertise this service for as little as $5 on underground forums and encrypted messaging channels. No need to compromise someone’s device, just give them a phone number.

The big takeaway from this article is that if someone has your number, they can get your location. We’re going to go over how to shut this tracking method down.

Whether you’re an activist, journalist, or just someone who values your right to privacy, this newsletter series is designed to give you the tools to disappear from unwanted tracking, one layer at a time.

How cell numbers leak location

Your cell number is a real-time tracking beacon. Every time your phone is powered on, it talks to nearby cell towers. This happens even if you’re not making a call.

Your phone’s location is continuously updated in a database called the Home Location Register (HLR), which lets your carrier know which tower to route calls and texts through. If someone has access to your number, they can locate you, sometimes within meters, in real time. Here are some ways they can do it:

1. Access to telecom infrastructure

Selling data / corrupting employees:

Telecom providers are notorious for selling customers’ location data directly from their HLR. Alternatively, unauthorized individuals or entities can illegally access this data by bribing or corrupting telecom employees who have direct access to the HLR.

The data retrieved from the HLR database reveals only which specific cell tower your phone is currently registered to, and typically identifies your approximate location within tens or hundreds of meters, depending on tower density in the area.

To pinpoint your exact location with greater precision, down to just a few meters, requires additional specialized methods, such as carrier-based triangulation. Triangulation involves actively measuring your phone’s signal strength or timing from multiple cell towers simultaneously. Such detailed, real-time triangulation is typically restricted to telecom companies and authorized law enforcement agencies. However, these advanced methods can also be misused if telecom personnel or authorized entities are compromised through bribery or corruption.

Exploiting the SS7 protocol (telecom network vulnerabilities):

Attackers can also exploit vulnerabilities such as those in SS7, a global telecom signaling protocol, to illicitly request your current cell tower location from the HLR database. SS7 itself doesn’t store any location data — it provides the means to query your carrier’s HLR and retrieve your current tower association.

2. IMSI catchers (“Stingrays”): Your phone directly reveals its location

IMSI catchers (often called “Stingrays”) are specialized surveillance devices acting as fake cell towers. Your phone constantly searches for the strongest available cell signal, automatically connecting to these fake towers if their signals appear stronger than legitimate ones.

In this method, instead of querying telecom databases, your phone directly reveals its own location to whoever is operating the fake cell tower, as soon as the phone connects. Operators of IMSI catchers measure signal strength between your phone and their device, enabling precise location tracking, often accurate within a few meters.

While IMSI catchers were initially developed and primarily used by law enforcement and intelligence agencies, the legality of their use (even by authorities) is subject to ongoing debate. Unauthorized versions of IMSI catchers have also become increasingly available on black and gray markets.

The solution? Move to VoIP

Cell numbers use your phone’s baseband processor to communicate directly with cell towers over the cellular network, continuously updating your physical location in telecom databases.

VoIP numbers (Voice over Internet Protocol), on the other hand, transmit calls and texts through the internet using data connections. They don’t keep HLR records, and so they’re immune to tower-based location tracking.

Instead, the call or message is routed through internet infrastructure and only connects to the cellular network at carrier-level switching stations, removing the direct tower-based tracking of your physical location.

So the takeaway is that you want to stop using cell numbers, and start using VoIP number instead, so that anyone who knows your number isn’t able to use it to track your location.

But there’s a catch: VoIP is heavily regulated. In most countries, quality VoIP options are scarce, and short code SMS support is unreliable. In the US, though, there are good tools.

Action items:

1. Get a VoIP provider

Two good apps that you can download where you can generate VoIP numbers in the U.S. are:

  • MySudo: Great for compartmentalizing identity. Up to 9 identities/numbers per account.
  • Cloaked.com: Great for burner/throwaway numbers.

We are not sponsored by or affiliated with any of the companies mentioned here, they’re just tools I use and like. If you have services that you like and recommend, please let others know in the comments!

Setting up MySudo

Step 1: Install the app

  • You will need a phone with the Google Play Store or the Apple App Store.
  • Search for MySudo, download and install it, or visit the store directly via their webpage.

Step 2: Purchase a plan

  • $15/month gets you up to 9 Sudo profiles, each with its own number. Or you can start with just 1 number for $2/month. You will purchase this plan inside the app store on your phone.

Step 3: Set up your first Sudo profile

When prompted, create your first Sudo profile. Think of this as a separate, compartmentalized identity within MySudo, distinct from your main user account.

Each Sudo profile can include:

  • A dedicated phone number
  • Optional extras like an email alias, username handle, virtual credit card, etc.

For now, we’re focusing only on phone numbers:

  • Choose a purpose for this profile (such as Shopping, Medical, Work). This purpose will appear as a heading in your list of Sudos.
  • Create a name for your Sudo profile (I usually match this to the chosen purpose).

Step 4: Add a phone number to your Sudo

  • Tap the Sudo icon in the top-left corner.
  • Select the Sudo profile you just created.
  • Tap “Add a Phone Number.”
  • Select your preferred country, then enter a city name or area code.
  • Pick a number from the available options, then tap “Choose Number.”

You’re now set up and ready to use your VoIP number!

Step 4: Compartmentalize

You don’t need to assign all 9 numbers right away. But here are helpful categories you might consider:

  • Friends and family
  • Work
  • Government
  • Medical
  • Banking
  • Purchases
  • Anonymous purchases
  • High-risk anonymous use
  • Catch-all / disposable

Incoming calls go through the MySudo app, not your default dialer. Same with SMS. The person on the other end doesn’t know it’s VoIP.

Short codes don’t always work

Short codes (such as verification codes sent by banks or apps) use a special messaging protocol that’s different from regular SMS texts. Many VoIP providers don’t consistently support short codes, because this capability depends entirely on the underlying upstream provider (the entity that originally provisioned these numbers) not on the VoIP reseller you purchased from.

If you encounter problems receiving short codes, here are ways around the issue:

  • Use the “Call Me” option:
    Many services offer an alternative verification method: a phone call delivering the verification code verbally. VoIP numbers handle these incoming verification calls without any issue.
  • Try another VoIP provider (temporary):
    If a service blocks your primary VoIP number and insists on a real cellular number, you can borrow a non‑VoIP SIM verification service like SMSPool.net. They provide actual cell‑based phone numbers via the internet, but note: these are intended for temporary or burner use only. Don’t rely on rented numbers from these services for important or long-term accounts, always use stable, long-term numbers for critical purposes.
  • Register using a real cell number and port it to VoIP:
    For critical accounts, another option is to use a prepaid SIM card temporarily to register your account, then immediately port that number to a VoIP provider (such as MySudo or Google Voice). Many services only check whether a number is cellular or VoIP during initial account registration, and don’t recheck later.
  • Maintain a separate SIM just for critical 2FA:
    If you find that after porting, you still can’t reliably receive certain verification codes (particularly short codes), you might need to maintain a separate, dedicated SIM and cellular number exclusively for receiving critical two-factor authentication (2FA) codes. Do not share this dedicated SIM number with everyone, and do not use it for regular communications.

Important caveat for high-risk users:

Any SIM cards placed into the same phone are linked together by the telecom carrie, which is important information for high-risk threat models. When you insert a SIM card into your device, the SIM itself will independently send special messages called “proactive SIM messages” to your carrier. These proactive messages:

  • Completely bypass your phone’s operating system (OS), making them invisible and undetectable from user-level software.
  • Contain device-specific identifiers such as the IMEI or IMEISV of your phone and also usually include the IMEI of previous devices in which the SIM was inserted.

If your threat model is particularly high-risk and requires total compartmentalization between identities or numbers, always use separate physical devices for each compartmentalized identity. Most people don’t need to take such extreme precautions, as this generally falls outside their threat model.

Cloaked.com for burner numbers

  • Offers unlimited, disposable phone numbers.
  • Great for one-off verifications, restaurants, or merchants.
  • Doesn’t require installing an app, you can just use it in the browser and never link any forwarding number.
  • Be aware that if any of the VoIP numbers you generated inside Cloaked hasn’t received any calls or messages for 60 days, it enters a watch period. After an additional 60 days without receiving calls or messages (120 days total of inactivity), you lose the number, and it returns to the available pool for someone else to use. Only use Cloaked for numbers you expect to actively receive calls or messages on, or for temporary use where losing the number isn’t an issue.

What to do with your current cell number

Your cell number is already everywhere: breached databases, government forms, medical records, and countless other places. You can’t “un-breach” it, and you don’t want to lose that number because it’s probably an important number that people know they can contact you on. But you can stop it from being used to track you.

Solution: Port your existing cell number to a VoIP Provider

Best choice: Google Voice (recommended due to strong security protections)

  • You can choose to just pay a one-time $20 fee, which turns the number into a receiving-only number. You’ll get to receive calls and texts forever on this number with no ongoing fees.
  • Or you can choose to pay an ongoing monthly fee, which will allow you to continue to make outgoing calls and send outgoing messages from the number.

The one-time fee option will be sufficient for most people, because the aim is to gradually make this existing number obsolete and move people over to your new VoIP numbers.

Google Voice is considered a strong option because the threat of SIM swapping (where an attacker fraudulently takes control of your phone number) is very real and dangerous. Unlike basically every other telecom provider, Google lets you secure your account with a hardware security key, making it significantly harder for attackers to port your number away from your control.

Google obviously is not a privacy-respecting company, but remember, your existing cell number isn’t at all private anyway. The idea is to eventually stop using this number completely, while still retaining control of it.

How to port your existing cell number to Google Voice

  1. Check porting eligibility
    Visit the Google Voice porting tool and enter your number to verify it’s eligible.
  2. Start the port-in process
    • Navigate to Settings → Phones tab → Change / Port.
    • Select “I want to use my mobile number” and follow the on-screen prompts
  3. Pay the one-time fee
    A $20 fee is required to port your number into Google Voice
  4. Complete the porting process
    • Enter your carrier account details and submit the request. Porting generally completes within 24–48 hours, though it can take longer in some cases.
  5. Post-port setup
    • Porting your number to Google Voice cancels your old cellular service. You’ll need a new SIM or plan for regular mobile connectivity, but you’ll ideally only use this new SIM for data, and use your VoIP numbers for communication not the associated cell number.
    • Configure call forwarding, voicemail transcription, and text forwarding to email from the Google Voice Settings page.

Now, even if someone tries to look you up via your old number, they can’t get your real-time location. It’s no longer tied to a SIM that is logging your location in HLRs.

Summary: Take it one step at a time

Switching to VoIP numbers is a big change, so take it step by step:

  1. Download your VoIP apps of choice (like MySudo) and set up your new numbers.
  2. Gradually migrate your contacts to your new VoIP numbers.
  3. Use burner numbers (via Cloaked or similar services) for reservations, merchants, or anyone who doesn’t genuinely need your permanent number.

Keep your existing SIM active for now, until you’re comfortable and confident using the new VoIP system.

When ready, finalize your migration:

  1. Port your original cell number to Google Voice.
  2. Get a new SIM card with a fresh number, but don’t use this new number for calls, texts, or identification.
  3. Use the new SIM solely for data connectivity.

This completes your migration, significantly enhancing your privacy and reducing your exposure to location tracking.

GrapheneOS users

You can’t currently purchase your MySudo subscription directly on a GrapheneOS device. Instead, you’ll first need to buy your MySudo plan through the Google Play Store or Apple App Store using another device.

Once you’ve purchased your plan, you can migrate your account to your GrapheneOS phone:

  1. On your GrapheneOS device, download and install MySudo from your preferred app store (I personally like the Aurora store as a front-end for the Google Play Store).
  2. Open MySudo on your GrapheneOS device and navigate to:
    Settings → Backup & Import/Export → Import from Another Device
  3. Follow the on-screen prompts to securely migrate your entire account over to your GrapheneOS phone.

You can retain your original device as a secure backup for messages and account data.

To ensure reliable, real-time notifications for calls and messages, make sure sandboxed Google Play is enabled on the GrapheneOS profile where you’re using MySudo.

What you’ve achieved

You now have:

  • Up to 9 persistent, compartmentalized VoIP numbers via MySudo.
  • Disposable, on-demand burner numbers via Cloaked.
  • Your original cell number safely ported to Google Voice and secured with a hardware security key.
  • A clear plan for transitioning away from your original cell number.

You’ve replaced a vulnerable, easily trackable cell identifier. Your real-time location is no longer constantly broadcast through cell towers via a number that is identified as belonging to you, your digital identities are better compartmentalized, and you’re significantly harder to track or exploit.

This marks the beginning of a safer digital future. What’s next? More layers, better privacy tools, and greater freedom. Remember, privacy isn’t a destination, it’s a lifestyle. You’re now firmly on that path.

 

Yours in Privacy,
Naomi

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Youtube.

Fewer shootings in Sweden — but bomb attacks have doubled

organized crime

Published 3 July 2025
– By Editorial Staff
According to Swedish police, the purpose of the bomb attacks is often to extort, intimidate, or threaten the victims.
2 minute read

The number of shootings in Sweden has almost halved compared to last year – but at the same time, bombings have increased dramatically. According to new statistics from the Swedish Police Authority, over 100 bombing incidents have occurred so far this year, representing a doubling compared to the same period in 2024.

During the first six months of this year, police have recorded 84 shootings. This marks a significant decrease compared to the first half of 2022, when 205 shootings occurred, resulting in 34 deaths and 49 injuries. The number of people injured in shooting incidents has also gradually decreased since then. However, the 2025 statistics include the school attack in Örebro, central Sweden, where ten people lost their lives.

This development comes against the backdrop of Sweden’s long-standing struggles with organized crime, where violent gangs, often with immigrant backgrounds, have spread fear in both major cities and smaller towns. For several years, authorities have struggled to effectively address the escalating violence – but according to police, certain measures are now showing results.

– In both physical and digital environments, as well as in investigations, we are now faster and more efficient, which has enabled us to prevent impending crimes and increase the clearance rate of deadly gang-related violence from about 20-30 percent to about 60 percent in recent years. This partly explains why we’re seeing fewer shootings, says August Knutsson, operational coordinator at the Swedish Police’s National Operations Center.

More bombings during winter months

While shootings have decreased, another form of violence has increased significantly. So far this year, 104 explosions have occurred – double the number compared to the same period in 2024, when 52 bomb attacks were recorded.

– This is obviously serious, and we’ve noticed that criminal groups have shifted their methods and carried out more bombings during winter and spring. Often for extortion purposes, to intimidate or threaten. However, since the beginning of the year, when we saw a sharp increase in completed bombings, they have decreased. We’re arresting more perpetrators during the preparation stage than before, explains Knutsson.

He emphasizes that the situation is still considered very serious and that gang violence could soon escalate again:

– At the same time, the conflict level remains high, and we know from experience that the situation can change rapidly. We’re doing everything we can to keep violence levels down.

Our independent journalism needs your support!
We appreciate all of your donations to keep us alive and running.

Our independent journalism needs your support!
Consider a donation.

You can donate any amount of your choosing, one-time payment or even monthly.
We appreciate all of your donations to keep us alive and running.

Dont miss another article!

Sign up for our newsletter today!

Take part of uncensored news – free from industry interests and political correctness from the Polaris of Enlightenment – every week.