Sunday, July 13, 2025

Polaris of Enlightenment

Volvo scraps electric car target

Published 9 September 2024
– By Editorial Staff
Volvo says that “the future is electric”, but that electrification may take longer than expected.
2 minute read

Volvo Cars previously planned to sell only electric cars by 2030. Now the company has decided to scrap that goal.

In 2021, Volvo Cars announced its goal to replace all combustion engine cars, including hybrids, with electric cars The plan was part of the company’s strategy to become a fully electric car manufacturer by 2030.

However, the market for electric cars has become more challenging, with rising electricity prices and increased competition between companies, as well as higher costs for consumers, including interest rates that have made private leasing of electric cars more expensive. As a result, several car companies have changed their targets for electric cars, but Volvo Cars has remained committed to selling only electric cars from 2030.

Now the company has announced a change in strategy: instead of phasing out internal combustion engine cars completely, Volvo Cars now plans to have 90 to 100 percent of its global sales by 2030 consist of electrified cars, including hybrids. The remaining zero to ten percent will be so-called mild hybrids, i.e. gasoline cars supported by small electric motors to reduce fuel consumption.

– We firmly believe that our future is electric, said Volvo Cars CEO Jim Rowan in a press release. An electric car offers a superior driving experience and increases the opportunities to use advanced technologies that improve the overall customer experience, but it is clear that the transition to electrification will not be linear, and customers and markets move at different speeds.

The company has also adjusted its carbon emissions target, now aiming to reduce emissions per vehicle sold by 65-75% by 2030 compared to 2018 levels.

TNT is truly independent!

We don’t have a billionaire owner, and our unique reader-funded model keeps us free from political or corporate influence. This means we can fearlessly report the facts and shine a light on the misdeeds of those in power.

Consider a donation to keep our independent journalism running…

How to be anonymous on social media

How to protect your identity depending on whom you're hiding from.

Published today 7:43
– By Naomi Brockwell
9 minute read

Using a pseudonym on social media can be an incredibly valuable way to reclaim your privacy online. In an age where digital footprints last forever, the ability to separate your online identity from your real-world persona is more important than ever.

Maybe you’re concerned about protecting yourself from online mobs that might target your job, your family, or your personal reputation. Maybe you don’t want everything you say online to be permanently linked to your real name. Perhaps you have multiple interests or roles in life (professional, personal, creative) and want to maintain separate identities for each.

Maybe you simply value your privacy. Having a pseudonymous account can be liberating. It allows you the freedom to explore new ideas, revise your beliefs, and reinvent yourself without every past opinion you’ve ever expressed being etched in stone and forever tied to you.

But setting up a pseudonymous account on social media isn’t always straightforward. Your approach will depend heavily on the platform you’re using. It will also depend on your threat model, which you can think of as whom you’re trying to hide your identity from, how private you need to be, and what’s at stake.

Threat models

It’s essential to understand your own threat model clearly, because the steps you’ll need to take to create a pseudonymous social media identity will vary dramatically at each level. For example, hiding your opinions from your boss will require very different precautions than hiding from a hostile government that wants to target you for your political beliefs.

There are countless threat models, but here are 3 general categories to give you some ideas of where you might fit in:

1. Hiding from the general public, and preventing low-level insider doxxing

This is an easier level to achieve. You simply don’t want your boss, colleagues, or random strangers linking your social media activity back to your real identity.

2. Hiding from the platform itself

Perhaps you have a higher profile, and you’re concerned about a platform employee accessing your personal details, billing information, or potentially doxxing you. At this level, you’re not being actively targeted, but you also don’t want the platform to know who you are. Protecting your identity here gets trickier and requires a deeper understanding of internet tracking and more rigorous control over your digital footprint.

3. Hiding from a hostile government that is targeting you

This is an extreme threat scenario. Perhaps you live under a hostile regime where political dissent is dangerous and consequences for being identified online can be severe. This level of threat requires meticulous discipline, and a tailored approach that goes far beyond general privacy advice. We won’t cover this threat model in this newsletter — not because it isn’t important, but because the stakes are too high for shortcuts. If your life or freedom could be at risk, please seek help from security professionals who specialize in operating anonymously under repressive conditions. Even small mistakes can be catastrophic.

Some organizations you might reach out to include:

Let’s use X as an example

Depending on which social media platform you want to use, the steps for setting up a pseudonymous account will vary dramatically. In this article, we’ll just focus on X as one example, because it’s a popular platform where pseudonymous accounts thrive. While Facebook aggressively pushes users to use real names and actively works to de-anonymize its users, X is a place where personas, satire accounts, and anonymous commentary are quite common.

That said, pseudonymity is a delicate privacy layer that can easily be broken. In this article, we are not providing exhaustive checklists, but rather examples of what kinds of mistakes lead to deanonymization, and tips for better protecting yourself.

Threat model 1: Hiding from the general public, and preventing low-level insider doxxing

Goal:
You simply don’t want random people or followers connecting your tweets to your real identity. You want to ensure that even the average X employee with backend access won’t immediately be able to see your real identity linked to your pseudonymous account. Perhaps you’re worried about accidental exposure, corruption, or misuse of internal access.

Tips:

  • Choose a completely separate profile name and username
    • Select a pseudonym that has no obvious connection to your real-world identity (avoid birthdays, locations, or nicknames).
  • Create a new email address (use an email alias service)
    • Don’t reuse your personal or work email. Use an email alias service (like SimpleLogin) that you only ever use for this account.
    • Even though your email address isn’t publicly visible on your profile, data breaches are extremely common. Presume that your credentials will be leaked. If your email ties back to your real identity, your pseudonym is blown.
  • Use a VoIP number for verification
    • Your personal cell number is a unique identifier that’s already been leaked everywhere. If you use it for verification, a data breach could link your identity to your pseudonymous account.
    • Use a VoIP service like MySudo or Cloaked to generate a clean, separate number.
  • Avoid personal identifiers
    • Don’t include real-world hobbies, your profession, specific locations, or distinctive personal details in your profile or posts.
  • Be careful whom you follow
    • Don’t follow your real account or people closely tied to you (e.g., best friend, sibling, coworker). These connections can unravel your anonymity.
  • Profile pictures and images
    • Don’t reuse photos from other accounts (reverse image searches can link them).
    • Consider AI-generated or royalty-free images.

These are some general tips that will help you. Just remember: any link, reference, or overlap between your pseudonymous account and real identity can risk exposure.

Threat model 2: Hiding from the platform itself

Goal:
You want to prevent the platform (X) from identifying you. This involves more sophisticated steps to scrub your digital footprint and reduce the metadata you leak by default.

This guide is not intended for people in life-threatening situations or under hostile regimes. It’s a conceptual framework for lower-risk scenarios, where the goal is to increase your privacy, not guarantee anonymity. Also keep in mind that this is not an exhaustive list — it’s a starting point for awareness, not a guarantee of protection.

This model assumes you’ve already followed all steps from Threat Model 1. From here, you’re adding aggressive compartmentalization, anonymization, and metadata hygiene.

Core protections

  • Minimize metadata exposure
    • Always strip EXIF data from images before uploading. Use privacy-friendly tools (see our video on metadata scrubbing).
  • Use a masked or virtual payment method
    • If you subscribe to X Premium, use a virtual card like Privacy.com to avoid exposing your billing info. You can enter a fake name and billing address, and the payment will still go through (we talk about masked credit cards in this video).
  • Always use a VPN
    • VPNs help hide your IP address from the platform. Choose one that doesn’t log (e.g., Mullvad, ProtonVPN). Use it consistently.
  • Careful device management
    • Access X only via a privacy-focused browser (like Brave), never the app. Apps collect far more data and can bypass system-level protections, often in a super sneaky way that users don’t even know about.
    • Use a dedicated browser profile or even a separate browser just for your pseudonymous identity. This prevents cross-contamination from cookies, autofill, and history.

Advanced protections

  • Never use personal internet connections
    • Avoid using home, work, or school Wi-Fi. Use public networks far from places associated with you.
    • Pay for your VPN anonymously (cash, crypto, gift card). Consider adding Tor as an additional layer.
  • Avoid platform fingerprinting
    • Disable JavaScript when feasible.• Avoid using a unique combination of extensions that can fingerprint you.
    • Regularly rotate browser profiles and clear cookies, local storage, and cache.
    • Consider disabling advanced fingerprinting vectors like canvas rendering and WebGL.
  • Make sure email and phone have also been set up anonymously
    • Your email should be created using anonymous methods and not linked to anything else you use.
    • Your VoIP number should also be generated in a way that avoids personal identifiers. Accidental crossover is one of the most common ways people get deanonymized.
  • Avoid revealing patterns
    • Vary your writing style and posting schedule.
    • Don’t engage with people or topics tied to your real-world identity.
    • Avoid posting about events or niche communities that could reveal your location or background.
  • Understand legal and jurisdictional risks
    • Be aware of keywords and behavior that could flag surveillance systems.
  • Don’t trust devices
    • Don’t bring your pseudonymous device near your home or workplace.
    • Wi-Fi probes and Bluetooth signals can reveal patterns.
    • Disable or remove mics/cameras where possible.
  • Use dedicated hardware and OS
    • Use a separate device that’s never touched your real accounts.
    • If that’s not possible, use isolated OSes (like Virtual Machines, Tails OS, Qubes OS) for advanced compartmentalization
    • Always wipe and reinstall OS if using secondhand hardware.• Never log in to pseudonymous and personal accounts from the same browser or device.
  • Limit interaction with the platform
    • Don’t click on X notifications or emails (they often contain trackers).
    • Avoid engaging unless it’s strategic.
  • Maintain a rotation schedule
    • Periodically “burn” your pseudonymous account and start fresh: new device, new email, new behavior.
    • The longer an identity lives, the more data accumulates.
    • Keep your footprint minimal and delete what you no longer need.

Threat model 3: Hiding from the government in a high-risk environment

Goal:
You live under a hostile regime where expressing dissenting opinions online carries severe consequences. For instance, you might be in Turkey, China, Iran, or another environment known for targeting political opponents, activists, or critical voices.

Is true anonymity possible?

Let’s be clear: achieving absolute, foolproof anonymity online is extraordinarily difficult. Governments have massive resources — they have surveillance infrastructure, legal coercion, and advanced forensic tools. One small mistake can unravel everything.

This guide does not offer operational security for high-risk environments. If your life or freedom are on the line, consult with trained security professionals. Do not rely on generalized privacy guides.

What would that involve?

Just to give you a sense of what’s involved, you’d need to consider:

  • Buying hardware anonymously and avoiding camera networks
  • Creating burner accounts and rotating them frequently
  • Maintaining total behavioral and linguistic separation
  • Never discussing pseudonymous work, even with trusted friends
  • Compartmentalizing your life with extreme precision

And this is just the beginning. If this sounds overwhelming, that’s because it is.

If you’re in this situation: don’t go it alone.
Your safety is worth getting help.

The good news

The good news is that most people’s threat model doesn’t involve being specifically targeted by the government. What does that mean exactly? Targeting an individual requires considerable time, effort, and cost, so governments rarely do it unless there’s a clear reason. Instead, they rely on mass surveillance: automated systems that vacuum up data at scale and piece together your identity from the information you (or your devices) voluntarily give away.

And that’s why this is good news: most of this exposure is preventable. You don’t need extreme measures to protect yourself, you just need better defaults. By using VoIP numbers, email aliases, and privacy-focused browsers, you can significantly reduce how much of your life is available for collection in the first place. Small changes in behavior can go a long way toward protecting your identity and limiting what’s visible to mass surveillance systems.

Final thoughts

For most people, achieving basic pseudonymity online is much easier than it sounds. If your goal is to keep your professional life separate from your online commentary, or just to prevent casual Googling from exposing your social media presence, a thin veil of anonymity can go a long way. Choosing a new name, using a separate email and phone number, and keeping your circles compartmentalized are often all you need.

If you want a stronger break between your real identity and your online persona, you can layer on more privacy tools like VPNs, burner devices, and metadata hygiene. These steps aren’t just for activists or whistleblowers, they’re increasingly useful for anyone who wants to reclaim a sense of control in a world of hyper-connected data.

But if your life or freedom truly depends on staying anonymous — if you are being targeted by a government or powerful institution — then the game changes. In high-risk situations, pseudonymity becomes fragile. One careless follow, one reused phone number, one unstripped photo is all it takes to unravel everything. You need airtight operational security, and professional guidance to match the stakes.

No matter where you fall on that spectrum, this guide is here to help you think critically about how you engage online, and to offer practical, achievable steps that meet you where you are. Privacy is not a one-size-fits-all endeavor. What matters most is understanding your threat model, being consistent in your habits, and staying aware of the tradeoffs you’re making.

Every privacy step you take makes a difference.

 

Your in privacy,
Naomi

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Youtube.

Musk launches Grok 4 – takes the lead as world’s strongest AI model

The future of AI

Published 10 July 2025
– By Editorial Staff
Elon Musk speaks during the press conference alongside developers from xAI.
3 minute read

Elon Musk’s AI company xAI presented its latest AI model Grok 4 on Wednesday, along with a monthly fee of $300 for access to the premium version. The launch comes amid a turbulent period for Musk’s companies, as X CEO Linda Yaccarino has left her position and the Grok system, which lacks politically correct safeguards, has made controversial comments.

xAI took the step into the next generation on Wednesday evening with Grok 4, the company’s most advanced AI model to date. At the same time, a premium service called SuperGrok Heavy was introduced with a monthly fee of $300 – the most expensive AI subscription among major providers in the market.

Grok 4 is positioned as xAI’s direct competitor to established AI models like OpenAI’s ChatGPT and Google’s Gemini. The model can analyze images and answer complex questions, and has been increasingly integrated into Musk’s social network X over recent months, where xAI recently acquired significant ownership stakes.

Musk: “Better than PhD level”

During a livestream on Wednesday evening, Musk made bold claims about the new model’s capabilities.

“With respect to academic questions, Grok 4 is better than PhD level in every subject, no exceptions”, Musk claimed. However, he acknowledged that the model can sometimes lack common sense and has not yet invented new technologies or discovered new physics – “but that is just a matter of time”.

Expectations for Grok 4 are high ahead of the upcoming competition with OpenAI’s anticipated GPT-5, which is expected to launch later this summer.

Launch during turbulent week

The launch comes during a tumultuous period for Musk’s business empire. Earlier on Wednesday, Linda Yaccarino announced that she is leaving her position as CEO of X after approximately two years in the role. No successor has yet been appointed.

Yaccarino’s departure comes just days after Grok’s official, automated X account made controversial comments criticizing Hollywood’s “Jewish executives” and other politically incorrect statements. xAI was forced to temporarily restrict the account’s activity and delete the posts. In response to the incident, xAI appears to have removed a recently added section from Grok’s public system instructions that encouraged the AI not to shy away from “politically incorrect” statements.

Musk wore his customary leather jacket and sat alongside xAI leaders during the Grok 4 launch. Photo: xAI

Two model versions with top performance

xAI launched two variants: Grok 4 and Grok 4 Heavy – the latter described as the company’s “multi-agent version” with improved performance. According to Musk, Grok 4 Heavy creates multiple AI agents that work simultaneously on a problem and then compare their results “like a study group” to find the best answer.

The company claims that Grok 4 demonstrates top performance across several test areas, including “Humanity’s Last Exam” – a demanding test that measures AI’s ability to answer thousands of questions in mathematics, humanities, and natural sciences. According to xAI, Grok 4 achieved a score of 25.4 percent without “tools,” surpassing Google’s Gemini 2.5 Pro (21.6 percent) and OpenAI’s o3 high (21 percent).

With access to tools, Grok 4 Heavy allegedly achieved 44.4 percent, compared to Gemini 2.5 Pro’s 26.9 percent.

Future products on the way

SuperGrok Heavy subscribers get early access to Grok 4 Heavy as well as upcoming features. xAI announced that the company plans to launch an AI coding model in August, a multimodal agent in September, and a video generation model in October.

The company is also making Grok 4 available through its API to attract developers to build applications with the model, despite the enterprise initiative being only two months old.

Whether companies are ready to adopt Grok despite the recent mishap remains to be seen, as xAI attempts to establish itself as a credible competitor to ChatGPT, Claude, and Gemini in the enterprise market.

The Grok service can now be accessed outside the X platform through Grok.com.

Buying someone’s real-time location is shockingly cheap

You need to stop handing out your cell number. Seriously.

Published 5 July 2025
– By Naomi Brockwell
11 minute read

Most people have no idea how exposed they are.

Your location is one of the most sensitive pieces of personal information, and yet it’s astonishingly easy to access. For just a few dollars, someone can track your real-time location without ever needing to hack your phone.

This isn’t science fiction or a rare edge case. It’s a thriving industry.

Telecom providers themselves have a long and disturbing history of selling customer location data to data brokers, who then resell it with little oversight.

In 2018, The New York Times exposed how major U.S. carriers, including AT&T, Verizon, T-Mobile, and Sprint, were selling access to phone location data. This data was ultimately accessed by bounty hunters and law enforcement, without user consent or a warrant.

A 2019 investigation by Vice showed that you could buy the real-time location of nearly any phone in the U.S. for about $300.

Other vendors advertise this service for as little as $5 on underground forums and encrypted messaging channels. No need to compromise someone’s device, just give them a phone number.

The big takeaway from this article is that if someone has your number, they can get your location. We’re going to go over how to shut this tracking method down.

Whether you’re an activist, journalist, or just someone who values your right to privacy, this newsletter series is designed to give you the tools to disappear from unwanted tracking, one layer at a time.

How cell numbers leak location

Your cell number is a real-time tracking beacon. Every time your phone is powered on, it talks to nearby cell towers. This happens even if you’re not making a call.

Your phone’s location is continuously updated in a database called the Home Location Register (HLR), which lets your carrier know which tower to route calls and texts through. If someone has access to your number, they can locate you, sometimes within meters, in real time. Here are some ways they can do it:

1. Access to telecom infrastructure

Selling data / corrupting employees:

Telecom providers are notorious for selling customers’ location data directly from their HLR. Alternatively, unauthorized individuals or entities can illegally access this data by bribing or corrupting telecom employees who have direct access to the HLR.

The data retrieved from the HLR database reveals only which specific cell tower your phone is currently registered to, and typically identifies your approximate location within tens or hundreds of meters, depending on tower density in the area.

To pinpoint your exact location with greater precision, down to just a few meters, requires additional specialized methods, such as carrier-based triangulation. Triangulation involves actively measuring your phone’s signal strength or timing from multiple cell towers simultaneously. Such detailed, real-time triangulation is typically restricted to telecom companies and authorized law enforcement agencies. However, these advanced methods can also be misused if telecom personnel or authorized entities are compromised through bribery or corruption.

Exploiting the SS7 protocol (telecom network vulnerabilities):

Attackers can also exploit vulnerabilities such as those in SS7, a global telecom signaling protocol, to illicitly request your current cell tower location from the HLR database. SS7 itself doesn’t store any location data — it provides the means to query your carrier’s HLR and retrieve your current tower association.

2. IMSI catchers (“Stingrays”): Your phone directly reveals its location

IMSI catchers (often called “Stingrays”) are specialized surveillance devices acting as fake cell towers. Your phone constantly searches for the strongest available cell signal, automatically connecting to these fake towers if their signals appear stronger than legitimate ones.

In this method, instead of querying telecom databases, your phone directly reveals its own location to whoever is operating the fake cell tower, as soon as the phone connects. Operators of IMSI catchers measure signal strength between your phone and their device, enabling precise location tracking, often accurate within a few meters.

While IMSI catchers were initially developed and primarily used by law enforcement and intelligence agencies, the legality of their use (even by authorities) is subject to ongoing debate. Unauthorized versions of IMSI catchers have also become increasingly available on black and gray markets.

The solution? Move to VoIP

Cell numbers use your phone’s baseband processor to communicate directly with cell towers over the cellular network, continuously updating your physical location in telecom databases.

VoIP numbers (Voice over Internet Protocol), on the other hand, transmit calls and texts through the internet using data connections. They don’t keep HLR records, and so they’re immune to tower-based location tracking.

Instead, the call or message is routed through internet infrastructure and only connects to the cellular network at carrier-level switching stations, removing the direct tower-based tracking of your physical location.

So the takeaway is that you want to stop using cell numbers, and start using VoIP number instead, so that anyone who knows your number isn’t able to use it to track your location.

But there’s a catch: VoIP is heavily regulated. In most countries, quality VoIP options are scarce, and short code SMS support is unreliable. In the US, though, there are good tools.

Action items:

1. Get a VoIP provider

Two good apps that you can download where you can generate VoIP numbers in the U.S. are:

  • MySudo: Great for compartmentalizing identity. Up to 9 identities/numbers per account.
  • Cloaked.com: Great for burner/throwaway numbers.

We are not sponsored by or affiliated with any of the companies mentioned here, they’re just tools I use and like. If you have services that you like and recommend, please let others know in the comments!

Setting up MySudo

Step 1: Install the app

  • You will need a phone with the Google Play Store or the Apple App Store.
  • Search for MySudo, download and install it, or visit the store directly via their webpage.

Step 2: Purchase a plan

  • $15/month gets you up to 9 Sudo profiles, each with its own number. Or you can start with just 1 number for $2/month. You will purchase this plan inside the app store on your phone.

Step 3: Set up your first Sudo profile

When prompted, create your first Sudo profile. Think of this as a separate, compartmentalized identity within MySudo, distinct from your main user account.

Each Sudo profile can include:

  • A dedicated phone number
  • Optional extras like an email alias, username handle, virtual credit card, etc.

For now, we’re focusing only on phone numbers:

  • Choose a purpose for this profile (such as Shopping, Medical, Work). This purpose will appear as a heading in your list of Sudos.
  • Create a name for your Sudo profile (I usually match this to the chosen purpose).

Step 4: Add a phone number to your Sudo

  • Tap the Sudo icon in the top-left corner.
  • Select the Sudo profile you just created.
  • Tap “Add a Phone Number.”
  • Select your preferred country, then enter a city name or area code.
  • Pick a number from the available options, then tap “Choose Number.”

You’re now set up and ready to use your VoIP number!

Step 4: Compartmentalize

You don’t need to assign all 9 numbers right away. But here are helpful categories you might consider:

  • Friends and family
  • Work
  • Government
  • Medical
  • Banking
  • Purchases
  • Anonymous purchases
  • High-risk anonymous use
  • Catch-all / disposable

Incoming calls go through the MySudo app, not your default dialer. Same with SMS. The person on the other end doesn’t know it’s VoIP.

Short codes don’t always work

Short codes (such as verification codes sent by banks or apps) use a special messaging protocol that’s different from regular SMS texts. Many VoIP providers don’t consistently support short codes, because this capability depends entirely on the underlying upstream provider (the entity that originally provisioned these numbers) not on the VoIP reseller you purchased from.

If you encounter problems receiving short codes, here are ways around the issue:

  • Use the “Call Me” option:
    Many services offer an alternative verification method: a phone call delivering the verification code verbally. VoIP numbers handle these incoming verification calls without any issue.
  • Try another VoIP provider (temporary):
    If a service blocks your primary VoIP number and insists on a real cellular number, you can borrow a non‑VoIP SIM verification service like SMSPool.net. They provide actual cell‑based phone numbers via the internet, but note: these are intended for temporary or burner use only. Don’t rely on rented numbers from these services for important or long-term accounts, always use stable, long-term numbers for critical purposes.
  • Register using a real cell number and port it to VoIP:
    For critical accounts, another option is to use a prepaid SIM card temporarily to register your account, then immediately port that number to a VoIP provider (such as MySudo or Google Voice). Many services only check whether a number is cellular or VoIP during initial account registration, and don’t recheck later.
  • Maintain a separate SIM just for critical 2FA:
    If you find that after porting, you still can’t reliably receive certain verification codes (particularly short codes), you might need to maintain a separate, dedicated SIM and cellular number exclusively for receiving critical two-factor authentication (2FA) codes. Do not share this dedicated SIM number with everyone, and do not use it for regular communications.

Important caveat for high-risk users:

Any SIM cards placed into the same phone are linked together by the telecom carrie, which is important information for high-risk threat models. When you insert a SIM card into your device, the SIM itself will independently send special messages called “proactive SIM messages” to your carrier. These proactive messages:

  • Completely bypass your phone’s operating system (OS), making them invisible and undetectable from user-level software.
  • Contain device-specific identifiers such as the IMEI or IMEISV of your phone and also usually include the IMEI of previous devices in which the SIM was inserted.

If your threat model is particularly high-risk and requires total compartmentalization between identities or numbers, always use separate physical devices for each compartmentalized identity. Most people don’t need to take such extreme precautions, as this generally falls outside their threat model.

Cloaked.com for burner numbers

  • Offers unlimited, disposable phone numbers.
  • Great for one-off verifications, restaurants, or merchants.
  • Doesn’t require installing an app, you can just use it in the browser and never link any forwarding number.
  • Be aware that if any of the VoIP numbers you generated inside Cloaked hasn’t received any calls or messages for 60 days, it enters a watch period. After an additional 60 days without receiving calls or messages (120 days total of inactivity), you lose the number, and it returns to the available pool for someone else to use. Only use Cloaked for numbers you expect to actively receive calls or messages on, or for temporary use where losing the number isn’t an issue.

What to do with your current cell number

Your cell number is already everywhere: breached databases, government forms, medical records, and countless other places. You can’t “un-breach” it, and you don’t want to lose that number because it’s probably an important number that people know they can contact you on. But you can stop it from being used to track you.

Solution: Port your existing cell number to a VoIP Provider

Best choice: Google Voice (recommended due to strong security protections)

  • You can choose to just pay a one-time $20 fee, which turns the number into a receiving-only number. You’ll get to receive calls and texts forever on this number with no ongoing fees.
  • Or you can choose to pay an ongoing monthly fee, which will allow you to continue to make outgoing calls and send outgoing messages from the number.

The one-time fee option will be sufficient for most people, because the aim is to gradually make this existing number obsolete and move people over to your new VoIP numbers.

Google Voice is considered a strong option because the threat of SIM swapping (where an attacker fraudulently takes control of your phone number) is very real and dangerous. Unlike basically every other telecom provider, Google lets you secure your account with a hardware security key, making it significantly harder for attackers to port your number away from your control.

Google obviously is not a privacy-respecting company, but remember, your existing cell number isn’t at all private anyway. The idea is to eventually stop using this number completely, while still retaining control of it.

How to port your existing cell number to Google Voice

  1. Check porting eligibility
    Visit the Google Voice porting tool and enter your number to verify it’s eligible.
  2. Start the port-in process
    • Navigate to Settings → Phones tab → Change / Port.
    • Select “I want to use my mobile number” and follow the on-screen prompts
  3. Pay the one-time fee
    A $20 fee is required to port your number into Google Voice
  4. Complete the porting process
    • Enter your carrier account details and submit the request. Porting generally completes within 24–48 hours, though it can take longer in some cases.
  5. Post-port setup
    • Porting your number to Google Voice cancels your old cellular service. You’ll need a new SIM or plan for regular mobile connectivity, but you’ll ideally only use this new SIM for data, and use your VoIP numbers for communication not the associated cell number.
    • Configure call forwarding, voicemail transcription, and text forwarding to email from the Google Voice Settings page.

Now, even if someone tries to look you up via your old number, they can’t get your real-time location. It’s no longer tied to a SIM that is logging your location in HLRs.

Summary: Take it one step at a time

Switching to VoIP numbers is a big change, so take it step by step:

  1. Download your VoIP apps of choice (like MySudo) and set up your new numbers.
  2. Gradually migrate your contacts to your new VoIP numbers.
  3. Use burner numbers (via Cloaked or similar services) for reservations, merchants, or anyone who doesn’t genuinely need your permanent number.

Keep your existing SIM active for now, until you’re comfortable and confident using the new VoIP system.

When ready, finalize your migration:

  1. Port your original cell number to Google Voice.
  2. Get a new SIM card with a fresh number, but don’t use this new number for calls, texts, or identification.
  3. Use the new SIM solely for data connectivity.

This completes your migration, significantly enhancing your privacy and reducing your exposure to location tracking.

GrapheneOS users

You can’t currently purchase your MySudo subscription directly on a GrapheneOS device. Instead, you’ll first need to buy your MySudo plan through the Google Play Store or Apple App Store using another device.

Once you’ve purchased your plan, you can migrate your account to your GrapheneOS phone:

  1. On your GrapheneOS device, download and install MySudo from your preferred app store (I personally like the Aurora store as a front-end for the Google Play Store).
  2. Open MySudo on your GrapheneOS device and navigate to:
    Settings → Backup & Import/Export → Import from Another Device
  3. Follow the on-screen prompts to securely migrate your entire account over to your GrapheneOS phone.

You can retain your original device as a secure backup for messages and account data.

To ensure reliable, real-time notifications for calls and messages, make sure sandboxed Google Play is enabled on the GrapheneOS profile where you’re using MySudo.

What you’ve achieved

You now have:

  • Up to 9 persistent, compartmentalized VoIP numbers via MySudo.
  • Disposable, on-demand burner numbers via Cloaked.
  • Your original cell number safely ported to Google Voice and secured with a hardware security key.
  • A clear plan for transitioning away from your original cell number.

You’ve replaced a vulnerable, easily trackable cell identifier. Your real-time location is no longer constantly broadcast through cell towers via a number that is identified as belonging to you, your digital identities are better compartmentalized, and you’re significantly harder to track or exploit.

This marks the beginning of a safer digital future. What’s next? More layers, better privacy tools, and greater freedom. Remember, privacy isn’t a destination, it’s a lifestyle. You’re now firmly on that path.

 

Yours in Privacy,
Naomi

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Youtube.

Spotify fills playlists with fake music – while CEO invests millions in military AI

The future of AI

Published 1 July 2025
– By Editorial Staff
Spotify CEO Daniel Ek accused of diverting artist royalties to military AI development.
3 minute read

Swedish streaming giant Spotify promotes anonymous pseudo-musicians and computer-generated music to avoid paying royalties to real artists, according to a new book by music journalist Liz Pelly.

Meanwhile, criticism grows against Spotify CEO Daniel Ek, who recently invested over €600 million in a company developing AI technology for future warfare.

In the book Mood Machine: The Rise of Spotify and the Costs of the Perfect Playlist, Liz Pelly reveals that Spotify has long been running a secret internal program called Perfect Fit Content (PFC). The program creates cheap, generic background music – often called “muzak” – through a network of production companies with ties to Spotify. This music is then placed in Spotify’s popular playlists, often without crediting any real artists.

The program was tested as early as 2010 and is described by Pelly as Spotify’s most profitable strategy since 2017.

“But it also raises worrying questions for all of us who listen to music. It puts forth an image of a future in which – as streaming services push music further into the background, and normalize anonymous, low-cost playlist filler – the relationship between listener and artist might be severed completely”, Pelly writes.

By 2023, the PFC program controlled hundreds of playlists. More than 150 of them – with names like Deep Focus, Cocktail Jazz, and Morning Stretch – consisted entirely of music produced within PFC.

“Only soulless AI music will remain”

A jazz musician told Pelly that Spotify asked him to create an ambient track for a few hundred dollars as a one-time payment. However, he couldn’t retain the rights to the music. When the track later received millions of plays, he realized he had likely been deceived.

Social media criticism has been harsh. One user writes: “In a few years, only soulless AI music will remain. It’s an easy way to avoid paying royalties to anyone.”

“I deleted Spotify and cancelled my subscription”, comments another.

Spotify has previously faced criticism for similar practices. The Guardian reported in February that the company’s Discovery Mode system allows artists to gain more visibility – but only if they agree to receive 30 percent less payment.

Spotify’s CEO invests in AI for warfare

Meanwhile, CEO Daniel Ek has faced severe criticism for investing over €600 million through his investment firm Prima Materia in the German AI company Helsing. The company develops software for drones, fighter aircraft, submarines, and other military systems.

– The world is being tested in more ways than ever before. That has sped up the timeline. There’s an enormous realisation that it’s really now AI, mass and autonomy that is driving the new battlefield, Ek commented in an interview with Financial Times.

With this investment, Ek has also become chairman of Helsing. The company is working on a project called Centaur, where artificial intelligence will be used to control fighter aircraft.

The criticism was swift. Australian producer Bluescreen explained in an interview with music site Resident Advisor why he chose to leave Spotify – a decision several other music creators have also made.

– War is hell. There’s nothing ethical about it, no matter how you spin it. I also left because it became apparent very quickly that Spotify’s CEO, as all billionaires, only got rich off the exploitation of others.

Competitor chooses different path

Spotify has previously been questioned for its proximity to political power. The company donated $150,000 to Donald Trump’s inauguration fund in 2017 and hosted an exclusive brunch the day before the ceremony.

While Spotify is heavily investing in AI-generated music and voice-controlled DJs, competitor SoundCloud has chosen a different path.

– We do not develop AI tools or allow third parties to scrape or use SoundCloud content from our platform for AI training purposes, explains communications director Marni Greenberg.

– In fact, we implemented technical safeguards, including a ‘no AI’ tag on our site to explicitly prohibit unauthorised use.

Our independent journalism needs your support!
We appreciate all of your donations to keep us alive and running.

Our independent journalism needs your support!
Consider a donation.

You can donate any amount of your choosing, one-time payment or even monthly.
We appreciate all of your donations to keep us alive and running.

Dont miss another article!

Sign up for our newsletter today!

Take part of uncensored news – free from industry interests and political correctness from the Polaris of Enlightenment – every week.