Wednesday, May 28, 2025

Polaris of Enlightenment

Ad:

What I wish I knew about privacy sooner

The hard truths no one warned me about.

Published 22 March 2025
– By Naomi Brockwell

I’ve been deep in the privacy world for years, but I wasn’t always this way. If I could go back, I’d grab my younger self by the shoulders and say: “Wake up. The internet is a battlefield of people fighting for your attention, and many of them definitely don’t have your best interests at heart”.

I used to think I was making my own decisions—choosing what platforms to try, what videos to watch, what to believe. I didn’t realize I was part of a system designed to shape my behavior. Some just wanted to sell me things I didn’t need—or even things that actively harm me. But more importantly, some were paying to influence my thoughts, my votes, and even who I saw as the enemy.

There is a lot at stake when we lose the ability to make choices free from manipulation. When our digital exhaust—every click, every pause, every hesitation—is mined and fed into psychological experiments designed to drive behavior, our ability to think independently is undermined.

No one warned me about this. But it’s not too late—not for you. Here are the lessons I wish I had learned sooner—and the steps you can take now, before you wish you had.

1. Privacy mistakes compound over time—like a credit score, but worse

Your digital history doesn’t reset—once data is out there, it’s nearly impossible to erase.

The hard truth:

  • Companies connect everything—your new email, phone number, or payment method can be linked back to your old identity through data brokers, loyalty programs, and behavioral analysis.
  • Switching to a new device or platform doesn’t give you a blank slate—it just gives companies another data point to connect.

What to do:

  • Break the chain before it forms. Use burner emails, aliases, and virtual phone numbers.
  • Change multiple things at once. A new email won’t help if you keep the same phone number and credit card.
  • Be proactive, not reactive. Once a profile is built, you can’t undo it—so prevent unnecessary links before they happen.

2. You’re being tracked—even when you’re not using the internet

Most people assume tracking only happens when they’re browsing, posting, or shopping—but some of the most invasive tracking happens when you’re idle. Even when you think you’re being careful, your devices continue leaking data, and websites have ways to track you that go beyond cookies.

The hard truth:

  • Your phone constantly pings cell towers, creating a movement map of your location—even if you’re not using any apps.
  • Smart devices send data home at all hours, quietly updating manufacturers without your consent.
  • Websites fingerprint you the moment you visit, using unique device characteristics to track you, even if you clear cookies or use a VPN.
  • Your laptop and phone make hidden network requests, syncing background data you never approved.
  • Even privacy tools like incognito mode or VPNs don’t fully protect you. Websites use behavioral tracking to identify you based on how you type, scroll, or even the tilt of your phone.
  • Battery percentage, Bluetooth connections, and light sensor data can be used to re-identify you after switching networks.

What to do:

  • Use a privacy-focused browser like Mullvad Browser or Brave Browser.
  • Check how unique your device fingerprint is at coveryourtracks.eff.org.
  • Monitor hidden data leaks with a reverse firewall like Little Snitch (for Mac)—you’ll be shocked at how much data leaves your devices when you’re not using them.
  • Use a VPN like Mullvad to prevent network-level tracking, but don’t rely on it alone.
  • Break behavioral tracking patterns by changing your scrolling, typing, and browsing habits.

3. Your deleted data isn’t deleted—it’s just hidden from you

Deleting a file, message, or account doesn’t mean it’s gone.

The hard truth:

  • Most services just remove your access to data, not the data itself.
  • Even if you delete an email from Gmail, Google has already analyzed its contents and added what it learned to your profile.
  • Companies don’t just store data—they train AI models on it. Even if deletion were possible, what they’ve learned can’t be undone.

What to do:

  • Use services that don’t collect your data in the first place. Try ProtonMail instead of Gmail, or Brave instead of Google Search.
  • Assume that if a company has your data, it may never be deleted—so don’t hand it over in the first place.

4. The biggest privacy mistake: Thinking privacy isn’t important because “I have nothing to hide”

Privacy isn’t about hiding—it’s about control over your own data, your own life, and your own future.

The hard truth:

  • Data collectors don’t care who you are—they collect everything. If laws change, or you become notable, your past is already logged and available to be used against you.
  • “I have nothing to hide” becomes “I wish I had hidden that.” Your past purchases, social media comments, or medical data could one day be used against you.
  • Just because you don’t feel the urgency of privacy now doesn’t mean you shouldn’t be choosing privacy-focused products. Every choice you make funds a future—you’re either supporting companies that protect people or ones that normalize surveillance. Which future are you contributing to?
  • Anonymity only works if there’s a crowd. The more people use privacy tools, the safer we all become. Even if your own safety doesn’t feel like a concern right now, your choices help protect the most vulnerable members of society by strengthening the privacy ecosystem.

What to do:

  • Support privacy-friendly companies.
  • Normalize privacy tools in your circles. The more people use them, the less suspicious they seem.
  • Act now, not when it’s too late. Privacy matters before you need it.

5. You’re never just a customer—you’re a product

Free services don’t serve you—they serve the people who pay for your data.

The hard truth:

  • When I first signed up for Gmail, I thought I was getting a free email account. In reality, I was handing over my private conversations for them to scan, profile, and sell.
  • Even paid services can sell your data. Many “premium” apps still track and monetize your activity.
  • AI assistants and smart devices extract data from you. Be intentional about the data you give them, knowing they are mining your information.

What to do:

  • Ask: “Who profits from my data?”
  • Use privacy-respecting alternatives.
  • Think twice before using free AI assistants that explicitly collect your data, or speaking near smart devices.

Final thoughts: The future isn’t written yet

Knowing what I know now, I’d tell my younger self this: you are not powerless. The tools you use, the services you fund, and the choices you make shape the world we all live in.

Take your first step toward reclaiming your privacy today. Because every action counts, and the future isn’t written yet.

 

Yours in privacy,
Naomi

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Youtube.

TNT is truly independent!

We don’t have a billionaire owner, and our unique reader-funded model keeps us free from political or corporate influence. This means we can fearlessly report the facts and shine a light on the misdeeds of those in power.

Consider a donation to keep our independent journalism running…

Wallenberg and Nvidia to build “cutting-edge” AI center in Sweden

Published yesterday 12:28
– By Editorial Staff
Marcus Wallenberg believes that the AI initiative is absolutely crucial for Swedish industry.

US chip manufacturer Nvidia is establishing a new AI center in Sweden in collaboration with the Wallenberg sphere and several major Swedish companies, including Astra Zeneca, Ericsson, Saab, and SEB.

The aim of the initiative is to strengthen Sweden’s position in artificial intelligence by building the country’s first AI supercomputer for business. The center will be run by a joint venture formed by the parties involved.

– Investing in cutting-edge AI infrastructure is a crucial step toward accelerating the development and adoption of AI across Swedish industry, said Marcus Wallenberg, chairman of Wallenberg Investments, in a statement, adding:

– We believe this initiative will generate valuable spillover effects – by enabling upskilling, fostering new collaborations, and strengthening the broader national AI ecosystem.

The initiative was announced during a visit to Sweden by Nvidia CEO Jensen Huang. During his visit, he was also awarded an honorary doctorate at Linköping University.

– As electricity powered the industrial age and the Internet fueled the digital age, AI is the engine of the next industrial revolution. Through the visionary initiative of Wallenberg Investments and Sweden’s industry leaders, the country is building its first AI infrastructure – laying the foundation for breakthroughs across science, industry, and society, and securing Sweden’s place at the forefront of the AI era, argues Nvidia’s CEO.

AI-driven drug development

And the players have clear ambitions for the initiative. Pharmaceutical giant AstraZeneca will use the system for AI-driven breakthroughs in drug development, with advanced models and data processing.

Ericsson wants to develop AI models to improve performance, efficiency, and customer experiences, as well as enable new business models.

Saab will invest in AI to accelerate the development of advanced defense capabilities in its leading systems, and SEB will integrate AI for increased productivity, new customer offerings, and long-term competitiveness, with a focus on critical infrastructure.

The ambition with this initiative is to establish a next generation AI compute infrastructure that is both a production facility and at the same time serves as a reference installation, unlocking new possibilities for AI adoption”, the companies said.

One in two young Brits long for a world without the internet

Published 26 May 2025
– By Editorial Staff
In recent years, there have been a number of reports and alerts showing that social media has a very negative impact on young people's mental health.

A new survey from the British Standards Institution mapping young people’s relationship with social media and digital life reveals that nearly half of young Brits wish they had grown up without the internet.

Of the 1,293 respondents aged 16 to 21, 46% said they would prefer to be young in a world where the internet did not exist. Almost 70% said they felt worse and had lower self-esteem after using social media, with 68% saying their time online had been directly detrimental to their mental health.

A quarter of respondents spent four hours or more a day on social media. Of these, 42% admitted to lying to parents or guardians about their online use. The same number said they had lied about their age online at some point, while 40% used so-called “burner” accounts – hidden or alternative profiles. 27% had even pretended to be a completely different person and the same number had shared their location information with strangers online.

The survey was conducted in the aftermath of coronavirus-related restrictions during the lockdown policy, a period which, according to three-quarters of participants, led to a marked increase in screen time.

Experts don’t believe in “digital curfew”

Against this backdrop, the UK’s technology minister, Peter Kyle, has recently opened the door to introducing mandatory digital “curfews” – i.e. blocking certain apps, such as TikTok and Instagram, after a certain time in the evening. Although critics have dismissed the proposal as repressive, it is gaining some support among young people: half of those surveyed, 50%, said they would support a digital curfew after 22:00.

However, several experts, including Rani Govender, policy manager for children’s online safety at the NSPCC, say the proposed restrictions are not enough.

We need to make clear that a digital curfew alone is not going to protect children from the risks they face online. They will be able to see all these risks at other points of the day and they will still have the same impact

She added that the focus should instead be on making the online environment safer and less addictive for children and young people, and preventing them from visiting obviously harmful sites and apps.

“Rabbit holes of harmful material”

Andy Burrows, CEO of the Molly Rose Foundation, also highlights the need for legislation to protect young people from harmful content:

– It’s clear that young people are aware of the risks online and, what’s more, they want action from tech companies to protect them.

He points out that algorithms often display content that can quickly lead young people into destructive flows and spirals:

– Algorithms can quickly spiral and take young people down rabbit holes of harmful and distressing material through no fault of their own.

Burrows calls for new laws to force a “safe by design” approach that puts the needs of children and society ahead of corporate profits.

This isn’t the internet we were promised

But decentralized tech is breaking the chains of control and giving you back your digital freedom.

Published 24 May 2025
– By Naomi Brockwell

Let’s get one thing straight:

Decentralization is not the goal.

The goal is freedom. The goal is autonomy. The goal is human dignity in the digital age.

Decentralization is just one way, often the best way right now, to get us closer to those outcomes.

In a perfect world, we wouldn’t need decentralized systems. If governments weren’t able to pressure companies into silence, or force them to hand over your private data… if corporations weren’t constantly monetizing your every move… if centralized platforms could be trusted to operate in the interest of users… then maybe centralized systems would be fine.

They’re efficient. They reduce friction.

There’s no denying the impact these platforms have had. They connected the world. They brought billions of people online, enabled global communication, and revolutionized how we share ideas and build movements.

But they also created new dangers.

We now live in a world where control over your data is a leverage point for power. Where a single company can unilaterally decide what speech is acceptable. Where massive data breaches happen regularly because your life is stored in one convenient server.

Centralized systems have become centralized vulnerabilities.

And so, decentralization has emerged, not as an ideology, but as a solution. A way to take some of that power back. A way to distribute risk, enable resilience, and restore individual choice.

A brief history of the web

We’ve lived through three major internet eras so far:

  • Web 1.0: The early internet was made up of static websites, self-hosted pages, and personal blogs. There were no algorithms deciding what you saw. Just raw HTML and a whole lot of freedom. It was gloriously messy, decentralized, and user-owned.
  • Web 2.0: Then came the rise of centralized platforms. Facebook, YouTube, and X (formerly Twitter) made publishing easy and social. These platforms helped bring billions of people online, but at a cost. In exchange for convenience, we gave up control. Our data became trapped in platforms we couldn’t leave. Surveillance and censorship scaled. Cloud storage followed the same trend: easy access, but centralized vulnerability.
  • Web 3.0: Now we’re entering a new era. One that takes the best of both worlds. We’re combining the usability and scale of the modern internet with decentralized protocols that restore individual control. We no longer need to be locked into platforms or ecosystems. We can own our data, preserve our identity, and move freely between services. This isn’t just a return to the past. It’s a leap forward. A better model is finally being built.

Why decentralization matters

It’s not that decentralization is inherently good — it’s that centralization has made us vulnerable. The Web2 world comes with serious problems:

  • Targeted control: A government only needs to pressure one company to censor millions.
  • Censorship: Say the wrong thing and get kicked off a platform. Poof, your voice disappears.
  • Data monopolies: Corporations collect and sell your personal information because they control the servers and the systems. This includes cloud storage. Your private documents, photos, and messages are often just a policy change or government request away from being inaccessible.
  • Lock-in: Your content and identity are trapped on whatever platform you chose. You don’t own anything.

Decentralized systems distribute that risk.

They make it harder to shut things down. Harder to surveil everyone at once. Easier to move, fork, remix, or migrate without losing everything in the process.

They don’t guarantee freedom, but they make it harder to take freedom away.

The protocols powering the shift

The movement toward decentralization is about changing the foundation of how the internet works. Here are some tools leading the way:

Decentralized storage: Keeping files online without a single gatekeeper

Right now, most of our files — photos, documents, backups — live in cloud services owned by a handful of big companies. That means those companies decide how long your files stay online, who gets access to them, and whether they get deleted, censored, or handed over to someone else.

Decentralized storage flips that model.

Instead of uploading your files to a single company’s server, decentralized storage lets you store data across a network of independent operators. Sometimes your file is split up and distributed across many nodes. Other times, it’s stored as a whole on a specific server, but that server is part of a peer-to-peer network, not a centralized platform. Either way, no single company controls access to everyone’s data, which makes your data more resilient and less vulnerable to censorship or loss.

  • IPFS helps you share files in a way that doesn’t depend on one website or server. If anyone on the network has a copy of the file, you can still access it.
  • Filecoin is a network where people get paid to store your files securely. You choose how long your files should be kept, and the system ensures they’re really there.
  • Arweave is focused on long-term storage. You pay once, and the goal is to keep your data online for decades. It’s especially useful for archiving important documents and creative work that needs to be preserved.

Decentralized social media: You keep your identity, even if the app changes

Traditional social media apps own everything: your account, your posts, your followers. If they ban you or shut down, everything’s gone.

Decentralized social platforms are trying to change that. They separate your identity and content from the app you use. That way, if one app disappears or kicks you off, you can just log into another app and pick up where you left off.

  • Mastodon is like Twitter, but instead of one giant site, it’s made up of many smaller communities. Each one sets its own rules, but they all talk to each other.
  • Bluesky is building a system where your posts and followers stay with you, not the platform. If you don’t like the app you’re using, you can switch without losing anything.
  • Nostr is a protocol that’s decentralized by design. It uses cryptographic keys instead of usernames, and many apps integrate with Bitcoin’s Lightning Network for tipping.

This is just the beginning: There’s decentralized finance, decentralized search, decentralized governance, even decentralized AI. This new world of possibilities is just opening up. And the more we explore what it has to offer, the better it becomes.

We may be frustrated at the current state of the internet, but we’re entering an entirely new era. And I think things can become radically different. We have to keep exploring, building, and supporting this tech.

Beyond storage and social

It’s not just your files or your feeds. Trust in centralized systems is eroding everywhere.

From messaging apps quietly backdoored, to identity systems that can cut you off without appeal, to governments and corporations that leak your most personal data into the hands of criminals, it’s no surprise people are looking for alternatives.

We’ve seen government ID databases, health systems, and credit agencies breached, with entire identities dumped onto the dark web. Names, locations, biometrics. Everything needed for fraud. Lost because it was all stored in one convenient place.

That’s why decentralized tools have gained momentum. They don’t promise perfection, but they offer a way to reduce risk, reclaim control, and opt out of systems that keep failing us.

Encrypted messaging. Self-owned identities. Private money. Anonymous search. Community-led governance.

People aren’t waiting for permission. They’re choosing systems that put them back in charge.

Takeaways

  • Decentralization is not a rejection of structure. It’s a rebalancing of control.
  • The goal isn’t to replace everything. It’s to diversify what’s possible.
  • You don’t have to go all in. You can start with just one tool, one switch.
  • Sometimes the most powerful thing is knowing how something works, and choosing better.

Dive in and try out some of these bourgeoning systems. A lot of them a really early stages — We may not get everything right on the first try, but if we keep moving forward, we can build a radically different internet.

 

Yours in privacy,
Naomi

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Youtube.

Teuton Systems offers smart privacy-focused technology – without compromise

Advertising partnership with Teuton Systems

  • Teuton Systems, based in Sweden, is developing a unique concept for privacy-oriented computers and mobile phones that does not compromise user-friendliness or security.
  • We take the fight against corporate snooping, mass government surveillance and criminal phone tapping through firm open source principles and secure products.
Published 23 May 2025
Both computers and phones from Teuton Systems come with interfaces you will recognize and with pre-installed apps for all your everyday needs.

Digitalization has given humanity superpowers – and opened the door to a whole jungle of new threats.

We see it every day: news headlines about breaches, scandals, and surveillance of ordinary people. Teuton Systems works for those who refuse to accept a reality where someone else owns their data. That’s why we offer hardware and software that gives you full control over your digital life.

Healthy skepticism about data collection is anything but paranoia – it’s perfectly justified. Here are just a few examples that should make anyone think twice about their everyday digital environment:

  • Mass surveillance: After Edward Snowden’s historic revelations, it became public knowledge that government programs were massively eavesdropping on both corporate and private communications. This is an important reminder that conscious action is required to preserve privacy. Since the revelations, this mass surveillance has continued in other forms.
  • Data leaks and scandals: Everything from the Cambridge Analytica scandal (where a company collected data on millions of Facebook users to influence elections) to the Apoteket leak (sensitive customer data was sent to Facebook without their knowledge) proves time and again how easily our data can be sold, lost, or misused.
  • Dependence on big business: Our digital everyday lives are dominated by a few tech giants, raising concerns about how much power they have over our data and infrastructure. Almost half of Swedes believe that Google and Facebook threaten privacy, according to recent figures. Allowing a few giant companies to dominate information about our private lives is simply not a decent option.
  • Spying apps: Common smartphone apps can access large amounts of private data – location, contacts, microphone, and more – which is then shared for profit or even more obscure purposes. In fact, 8 out of 10 Swedes know that apps can track their location via GPS, according to a national privacy report, which shows how widespread the phenomenon is. Collected app data has led to everything from targeted advertising to privacy scandals. Yet the flow of software that silently snoops in the background continues.

Against this backdrop, Teuton Systems launched the Nordic region’s first fully Linux-based computer system for everyday users back in 2020. Since then, the concept has evolved: 100 percent open source, encryption as standard, and hardware optimized for security. The philosophy is simple: strong privacy should be the starting point for your devices, not a hidden option.

All devices are delivered pre-configured with privacy-preserving software and documentation in English. You can unpack the products and start using them right away, confident that the systems are already optimized to protect your privacy.

Image of the premium Matrix 8 Pro model equipped with 256 GB of storage space and a very powerful camera that has received top marks in tests.

The Matrix phone – the tracking-free smartphone

Perhaps the most important product is called the Matrix phone. A powerful smartphone with the operating system replaced by GrapheneOS – the world’s most secure mobile operating system according to industry experts. It comes completely free of Google apps – which means the phone does not automatically “call home” to Google and share data about your usage.

Instead, open alternatives are pre-installed: web browser, email, maps, chat, everything you need. Most popular apps and services (including the Swedish BankID, for example) work. The result is a smartphone that works much like any Android phone – but without you having to worry about your phone spying on you in the background.

The Nordic region’s first preconfigured Linux computers

The computer range includes both laptop and desktop models, where Windows has been replaced with Linux, an open and more secure operating system free from data collection by large corporations. Each system is specially configured for high security while maintaining a high level of user-friendliness. From the first start-up, the computer runs with full disk encryption and a secure VPN, embedded in a modern desktop environment with a traditional start menu and taskbar that will be familiar to all Windows users – all included in the TS PC concept. No digging around in settings, no bloatware. You get a familiar user experience but without the surveillance.

Why open source is smarter – and safer

Thanks to open-source code, anyone can review the software; no hidden backdoors, no secret data collection. This makes the systems more transparent than mainstream platforms – and we have the world’s open developer community backing us with quality assurance instead of a closed-off corporation. When a vulnerability appears, it gets fixed quickly – without lobbying or shareholder politics. By combining open source, hardware-level security, and privacy-focused configuration, we create an alternative that gives everyday users digital self-determination.

So break free from dependence on tech giants – take control of your technology and your information. These types of solutions should be a given in today’s IT landscape, but as we’ve seen, they are far from standard in the industry. Change is needed, and together we can make a difference.

The starting point is and remains the same: technology should be completely controlled by the user, not by authorities or greedy large corporations. With Teuton Systems’ products, you get security and freedom – without compromising on user-friendliness. In addition, you can always contact our telephone support team at our office in the heart of Sweden. They are ready to assist you before and after your purchase. In other words: Technology by the people, for the people.

Welcome to Teuton Systems – where personal privacy is standard and surveillance is a thing of the past!

 

Our independent journalism needs your support!
We appreciate all of your donations to keep us alive and running.

Our independent journalism needs your support!
Consider a donation.

You can donate any amount of your choosing, one-time payment or even monthly.
We appreciate all of your donations to keep us alive and running.

Dont miss another article!

Sign up for our newsletter today!

Take part of uncensored news – free from industry interests and political correctness from the Polaris of Enlightenment – every week.