What I wish I knew about privacy sooner

The hard truths no one warned me about.

Published March 22, 2025 – By Naomi Brockwell

I’ve been deep in the privacy world for years, but I wasn’t always this way. If I could go back, I’d grab my younger self by the shoulders and say: "Wake up. The internet is a battlefield of people fighting for your attention, and many of them definitely don’t have your best interests at heart".

I used to think I was making my own decisions—choosing what platforms to try, what videos to watch, what to believe. I didn’t realize I was part of a system designed to shape my behavior. Some just wanted to sell me things I didn’t need—or even things that actively harm me. But more importantly, some were paying to influence my thoughts, my votes, and even who I saw as the enemy.

There is a lot at stake when we lose the ability to make choices free from manipulation. When our digital exhaust—every click, every pause, every hesitation—is mined and fed into psychological experiments designed to drive behavior, our ability to think independently is undermined.

No one warned me about this. But it’s not too late—not for you. Here are the lessons I wish I had learned sooner—and the steps you can take now, before you wish you had.

1. Privacy mistakes compound over time—like a credit score, but worse

Your digital history doesn’t reset—once data is out there, it’s nearly impossible to erase.

The hard truth:

  • Companies connect everything—your new email, phone number, or payment method can be linked back to your old identity through data brokers, loyalty programs, and behavioral analysis.
  • Switching to a new device or platform doesn’t give you a blank slate—it just gives companies another data point to connect.

What to do:

  • Break the chain before it forms. Use burner emails, aliases, and virtual phone numbers.
  • Change multiple things at once. A new email won’t help if you keep the same phone number and credit card.
  • Be proactive, not reactive. Once a profile is built, you can’t undo it—so prevent unnecessary links before they happen.

2. You’re being tracked—even when you’re not using the internet

Most people assume tracking only happens when they’re browsing, posting, or shopping—but some of the most invasive tracking happens when you’re idle. Even when you think you’re being careful, your devices continue leaking data, and websites have ways to track you that go beyond cookies.

The hard truth:

  • Your phone constantly pings cell towers, creating a movement map of your location—even if you’re not using any apps.
  • Smart devices send data home at all hours, quietly updating manufacturers without your consent.
  • Websites fingerprint you the moment you visit, using unique device characteristics to track you, even if you clear cookies or use a VPN.
  • Your laptop and phone make hidden network requests, syncing background data you never approved.
  • Even privacy tools like incognito mode or VPNs don’t fully protect you. Websites use behavioral tracking to identify you based on how you type, scroll, or even the tilt of your phone.
  • Battery percentage, Bluetooth connections, and light sensor data can be used to re-identify you after switching networks.

What to do:

  • Use a privacy-focused browser like Mullvad Browser or Brave Browser.
  • Check how unique your device fingerprint is at coveryourtracks.eff.org.
  • Monitor hidden data leaks with a reverse firewall like Little Snitch (for Mac)—you’ll be shocked at how much data leaves your devices when you’re not using them.
  • Use a VPN like Mullvad to prevent network-level tracking, but don’t rely on it alone.
  • Break behavioral tracking patterns by changing your scrolling, typing, and browsing habits.

3. Your deleted data isn’t deleted—it’s just hidden from you

Deleting a file, message, or account doesn’t mean it’s gone.

The hard truth:

  • Most services just remove your access to data, not the data itself.
  • Even if you delete an email from Gmail, Google has already analyzed its contents and added what it learned to your profile.
  • Companies don’t just store data—they train AI models on it. Even if deletion were possible, what they’ve learned can’t be undone.

What to do:

  • Use services that don’t collect your data in the first place. Try ProtonMail instead of Gmail, or Brave instead of Google Search.
  • Assume that if a company has your data, it may never be deleted—so don’t hand it over in the first place.

4. The biggest privacy mistake: Thinking privacy isn’t important because "I have nothing to hide"

Privacy isn’t about hiding—it’s about control over your own data, your own life, and your own future.

The hard truth:

  • Data collectors don’t care who you are—they collect everything. If laws change, or you become notable, your past is already logged and available to be used against you.
  • "I have nothing to hide" becomes "I wish I had hidden that." Your past purchases, social media comments, or medical data could one day be used against you.
  • Just because you don’t feel the urgency of privacy now doesn’t mean you shouldn’t be choosing privacy-focused products. Every choice you make funds a future—you’re either supporting companies that protect people or ones that normalize surveillance. Which future are you contributing to?
  • Anonymity only works if there’s a crowd. The more people use privacy tools, the safer we all become. Even if your own safety doesn’t feel like a concern right now, your choices help protect the most vulnerable members of society by strengthening the privacy ecosystem.

What to do:

  • Support privacy-friendly companies.
  • Normalize privacy tools in your circles. The more people use them, the less suspicious they seem.
  • Act now, not when it’s too late. Privacy matters before you need it.

5. You’re never just a customer—you’re a product

Free services don’t serve you—they serve the people who pay for your data.

The hard truth:

  • When I first signed up for Gmail, I thought I was getting a free email account. In reality, I was handing over my private conversations for them to scan, profile, and sell.
  • Even paid services can sell your data. Many "premium" apps still track and monetize your activity.
  • AI assistants and smart devices extract data from you. Be intentional about the data you give them, knowing they are mining your information.

What to do:

  • Ask: "Who profits from my data?"
  • Use privacy-respecting alternatives.
  • Think twice before using free AI assistants that explicitly collect your data, or speaking near smart devices.

Final thoughts: The future isn’t written yet

Knowing what I know now, I’d tell my younger self this: you are not powerless. The tools you use, the services you fund, and the choices you make shape the world we all live in.

Take your first step toward reclaiming your privacy today. Because every action counts, and the future isn’t written yet.

 

Yours in privacy,
Naomi

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Rumble.

TNT is truly independent!

We don’t have a billionaire owner, and our unique reader-funded model keeps us free from political or corporate influence. This means we can fearlessly report the facts and shine a light on the misdeeds of those in power.

Consider a donation to keep our independent journalism running…

Windows games get dramatically improved Linux compatibility

Published today 2:54 pm – By Editorial staff
Now you can ditch Microsoft from your gaming PC – 90 percent of all Windows games now work on Linux.

Nine out of ten Windows games can now run on Linux thanks to major improvements in compatibility tools. The proportion of games that don't work at all has dropped to historically low levels.

The gaming world is facing a shift where Linux is rapidly approaching Windows as a viable gaming platform. New statistics from ProtonDB, which has been compiled by the site Boiling Steam, show that around 90 percent of all Windows games now work on Linux systems, reports Sweclockers, a Swedish technology news site.

Behind this success is Proton, a tool developed by gaming company Valve that builds on the older Wine program. With Proton's help, the vast majority of Windows titles can be launched directly on Linux without complicated installations or extensive technical knowledge.

Particularly notable is that the proportion of games that won't start at all has decreased to around ten percent – the lowest figure ever measured. In many of these cases, it's not about technical barriers, but rather game developers deliberately blocking their products from being used via Proton. One example is March of Giants, which displays an explicit error message stating that Linux and Steam Deck are not supported.

The main remaining problem consists of anti-cheat programs that don't yet work well enough under Linux. However, Valve is working with game developers to resolve these obstacles.

The development has been rapid. In just a few years, Linux has evolved from a niche platform to an actual alternative for gamers, although the system is still not entirely problem-free.

GrapheneOS exits France after threats and smear campaign

Totalitarianism

Published today 11:06 am – By Editorial staff
GrapheneOS is considered the world's most secure mobile operating system while being nearly identical to Android, making it very user-friendly and popular.

The Canadian open-source organization behind the security-focused mobile operating system GrapheneOS announces it is ending all operations in France.

The background is an escalating conflict with French authorities, who according to the GrapheneOS team are spreading false accusations in the media and threatening arrests and server seizures.

GrapheneOS, a non-profit project that develops an operating system for Android phones with extra focus on privacy and security, has in recent days published a series of posts on the X platform about what they describe as a coordinated campaign by French police. According to the team, authorities have sent out internal messages to the country's police forces where all Google Pixel phones with GrapheneOS are labeled as suspicious. This has led to a wave of articles in French media, where claims that the system is used for criminal purposes are repeated without fact-checking or opportunity for GrapheneOS to respond.

"France's law enforcement are making outrageously false and unsubstantiated claims about GrapheneOS, which are being printed by both state and corporate media as facts when they're not", GrapheneOS writes in a post on X on November 23. The team emphasizes that they were not given any chance to review or respond to the accusations before publication. Instead, they have been forced into a defensive position, where they now plan to exercise their right of reply in French media.

Threats of intervention and demands for concessions

The conflict has escalated to direct threats, according to GrapheneOS. In contacts with French authorities, the team has been urged to assist with decryption of devices, something they technically cannot or will not do due to the system's design.

"They have made several quite direct threats of arrests and seizures of servers, just as they did with SkyECC and Encrochat", GrapheneOS emphasizes in an update on November 25. The reference refers to previous cases where French authorities intervened against encrypted communication networks.

The authorities are in practice demanding that GrapheneOS stop distributing functioning disk encryption, otherwise the project risks legal action. This is likened to the famous dispute between Apple and FBI in the United States, but with a twist: Google's hardware in Pixel phones is designed to resist such demands, and GrapheneOS builds further on that security. "They don't demand the same thing from Google for standard Pixel despite nearly identical encryption, because they are much less secure and can be exploited in advance". the team explains.

GrapheneOS emphasizes that their work is legal in countries like Canada, Germany, the United States, and the Netherlands. France, however, is pushing for laws that force backdoors in encryption, a policy that has not yet been implemented but which police are acting as if it already applies.

Dismantling of infrastructure and future plans

In response to the threats, GrapheneOS has initiated a rapid withdrawal of its presence in France. They are leaving the server provider OVH, a French company, and migrating their 15 servers – spread across Canada, Singapore, Germany, and the United States – to alternative locations.

"We are leaving France as a server location and OVH as a provider before they do anything", they announce in a post on Tuesday. Already now, ten servers have been replaced, including those used for standard updates. The remaining five, which handle email, forums, and other services in Beauharnois, Canada, are planned to be moved to colocation servers in Toronto.

For European users, GrapheneOS promises maintained performance through servers in Switzerland, Luxembourg, and the Netherlands – countries that do not support the EU's controversial "Chat Control" proposal on mass surveillance. "We can offer low latency and high throughput to users in France without servers there", the team assures. They also intend to avoid travel to France, including conferences, and discourage employees from working from the country.

The incident raises questions about the EU's future for open-source projects within privacy. GrapheneOS, which is financed through donations and sponsors, has built its reputation on open source and robust protections against exploits (security vulnerabilities that can be exploited). Now they see France as an "unsafe place for open-source privacy projects."

A spokesperson for the French Ministry of the Interior has not commented on the accusations, but previous statements from the government point to a harder line against encryption in the fight against organized crime.

Swedish company continues to invest in GrapheneOS despite conflict

In the midst of the ongoing conflict, the Swedish technology company Teuton Systems shows continued confidence in GrapheneOS. The company works exclusively with the system in its privacy-secure mobile phone, the Matrix phone, which is one of the first such products on the Nordic market. Teuton Systems emphasizes that the installation of GrapheneOS occurs only via the official source and with open-source tools like Aurora Store and F-Droid, to ensure transparency and maximum privacy without dependence on Google services.

The Matrix phone, based on Google Pixel phone hardware, is delivered with GrapheneOS pre-installed and prepared secure apps for everyday tasks. The product offers advanced features such as granular control over app permissions, sensor blocking, and automatic security updates. "GrapheneOS gives users full control over their data in a time of increasing surveillance, without compromising user-friendliness", Teuton Systems emphasizes on its website.

The company, which focuses on Nordic users, underscores the system's independent review and absence of backdoors, making it a reliable choice for privacy-conscious users.

How your company can cut substantial costs through digital automation

Advertising partnership with Teuton Systems

AI has revolutionized the ability to automate complex work tasks. Swedish tech company Teuton Systems helps businesses get started with solutions that were previously reserved for large corporations.

Published November 23, 2025

Repetitive tasks steal valuable time from office workers every week. Now a new generation of AI-driven automation tools makes it possible even for smaller companies to streamline operations – without programming skills or large IT budgets.

No-code automation is growing rapidly in the Nordic region. The driving force is simple: companies that automate their workflows save both time and money, while the risk of human error decreases drastically.

The challenge for many smaller companies has been that traditional automation requires expensive consultants or in-house developers. But solutions like n8n are changing the game by offering powerful automation at a fraction of the cost of established cloud services.

The real game-changer came when n8n integrated AI functions, making it possible for a workflow to make intelligent decisions and act accordingly. According to TechCrunch, the use of n8n has grown significantly since 2022, when these features were introduced. With support for AI integrations and hundreds of ready-made workflows, even smaller companies can now build intelligent workflows that previously required large development teams.

Concrete use cases for small businesses

For e-commerce companies, automation can mean that new orders automatically update inventory balances, generate shipping labels and send tracking information to customers – all without manual handling. Accounting firms can automate document management, receipt scanning and customer communication during tax season.

A particularly popular use case is automatic handling of customer inquiries. When someone fills out the contact form on the website, an automatic flow starts that saves the information in the CRM system, sends a confirmation email to the customer, notifies the sales team in Slack and creates a task in the project management tool – all in a few seconds:

Example: Handling contact forms on the website, processed in seconds. This flow runs 24/7 and can handle hundreds of requests per day without any problems.

For a company receiving 50 inquiries per week, this means 4-8 hours of saved work time, every week. In customer service, the tool can also handle automatic routing of support cases to the right department and AI-driven responses to common questions. Marketing departments use automation to coordinate content publishing across multiple platforms and handle lead follow-up automatically.

Companies that have implemented n8n report impressive results. The small company Bordr built a six-figure business in a few months thanks to automated workflows that handle everything from payments to document generation – without their own development department.

Privacy and control – more important than ever

For many companies, choosing an automation tool is about more than just functionality. Unlike cloud-based alternatives, n8n offers the ability to run automation on your own servers, which means company data stays with the company with full control over storage and security. For businesses with GDPR requirements, trade secrets or privacy focus, this is a crucial advantage. The self-hosted version is also completely free with unlimited executions.

The pricing model is transparent and predictable. For those who choose the cloud version, you pay per complete workflow – regardless of how many steps it contains. For complex automations, this means significant savings compared to services that charge per step. And as previously mentioned – the self-hosted version is completely free to use, without ongoing license fees or subscriptions.

The tool has received high ratings from users on review platforms like G2 and is backed by leading investors like Sequoia. With hundreds of integrations (Gmail, Slack, Trello, Excel, and most other tools companies use daily) and a rapidly growing user base, n8n has established itself as one of the most popular automation tools.

Example of workflow enhanced with artificial intelligence and advanced connections. n8n makes it possible to automate complex processes by connecting different systems, APIs and AI services in a visual interface. Each node represents an action or data source that can be combined to create powerful automation flows.

Get started quickly with professional help

Although n8n is built to be user-friendly, the right expertise can make a big difference in getting started quickly and securely. For companies that want professional help, Swedish company Teuton Systems offers consultation and installation of n8n as a service. This means getting help with everything from secure setup on your own servers to customized automation solutions adapted and configured to your business needs – without having to build your own technical expertise from scratch.

For smaller companies looking to streamline without large IT investments, automation can be the key to increased productivity and competitiveness. With the right partner and tools, the transition from manual work to automation happens faster than many think.

Want to know more about how n8n can fit your specific business? Contact Teuton Systems for a free consultation.

 

Breakthrough could give China unlimited nuclear energy

Published November 15, 2025 – By Editorial staff

The Shanghai Institute of Applied Physics, a Chinese research institute, has successfully converted thorium into uranium in an experimental reactor, enabling nearly unlimited access to nuclear energy.

The two-megawatt molten salt reactor is the world's only functioning facility of its kind.

The experiment has, according to the Chinese Academy of Sciences, demonstrated that thorium-based technology is technically feasible in molten salt reactors and represents a significant breakthrough. It is the first time researchers have been able to collect experimental data from thorium operation in such a reactor, reported the newspaper Science and Technology Daily.

The reactor has produced heat through nuclear fission since reaching criticality on October 11, 2023, according to Li Qingnuan, party secretary and deputy director at the institute.

Superior fuel availability

Thorium exists in much larger quantities and is more readily available than uranium. A single mining waste site in Inner Mongolia is estimated to contain enough thorium to supply all of China with energy for over a thousand years.

The new technology is based on a process where naturally occurring thorium-232 is converted into uranium-233 inside the reactor core. Thorium-232 absorbs a neutron and becomes thorium-233, which then decays into protactinium-233 and finally into uranium-233 – a fissile material that can sustain nuclear reactions.

The thorium is dissolved in a fluoride salt that forms a high-temperature molten mixture which functions as both fuel and coolant. The system creates a self-sustaining cycle where the reactor "breeds" fuel while simultaneously producing energy.

Requires no water cooling

Unlike conventional reactors, the thorium reactor requires no water at all for cooling, allowing it to be located in dry inland areas. The molten fluoride salts efficiently transfer heat at atmospheric pressure and extreme temperatures.

Safety is, according to the developers, significantly higher than in traditional reactors because the system operates at atmospheric pressure, eliminating the risk of high-pressure explosions. In the event of a leak, the molten salt would flow into a passive collection tank where it would solidify.

The reactor reached full power in June 2024, and in October of the same year, the world's first experiment with adding thorium to a molten salt reactor was conducted. China is now building a 100-megawatt demonstration reactor in the Gobi Desert with the goal of proving the technology is commercially viable around 2035.