Saturday, September 13, 2025

Polaris of Enlightenment

Without consent

How parents unknowingly build surveillance files on their children.

Published 3 May 2025
– By Naomi Brockwell
4 minute read

Your child’s first digital footprint isn’t made by them—it’s made by you

What does the future look like for your child?

Before they can even talk, many kids already have a bigger digital footprint than their parents did at 25.

Every ultrasound shared on Facebook.
Every birthday party uploaded to Instagram.
Every proud tweet about a funny thing they said.

Each post seems harmless—until you zoom out and realize you’re building a permanent, searchable, biometric dossier on your child, curated by you.

This isn’t fearmongering. It’s the reality of a world where data is forever.
And it’s not just your friends and family who are watching.

Your kid is being profiled before they hit puberty

Here’s the uncomfortable truth:

When you upload baby photos, you’re training facial recognition databases on their face—at every age and stage.

When you post about their interests, health conditions, or behavior, you’re populating detailed profiles that can predict who they might become.

These profiles don’t just sit idle.
They’re analyzed, bought, and sold.

By the time your child applies for a job or stands up for something they believe in, they may already be carrying a hidden score assigned by an algorithm—built on data you posted.

When their childhood data comes back to haunt them

Imagine your child years from now, applying for a travel visa, a job, or just trying to board a flight.

A background check pulls information from facial recognition databases and AI-generated behavior profiles—flagging them for additional scrutiny based on “historic online associations”.

They’re pulled aside. Interrogated. Denied entry. Or worse, flagged permanently.

Imagine a future law that flags people based on past “digital risk indicators”—and your child’s online record becomes a barrier to accessing housing, education, or financial services.

Insurance companies can use their profile to label them a risky customer.

Recruiters might quietly filter them out based on years-old digital behavior.

Not because they did something wrong—but because of something you once shared.

Data doesn’t disappear.
Governments change. Laws evolve.
But surveillance infrastructure rarely gets rolled back.

And once your child’s data is out there, it’s out there forever.
Feeding systems you’ll never see.
Controlled by entities you’ll never meet.

For purposes you’ll never fully understand.

The rise of biometric surveillance—and why it targets kids first

Take Discord’s new AI selfie-based age verification. To prove they’re 13+, children are encouraged to submit selfies—feeding sensitive biometric data into AI systems.

You can change your password. You can’t change your face.

And yet, we’re normalizing the idea that kids should hand over their most immutable identifiers just to participate online.

Some schools already collect facial scans for attendance. Some toys use voice assistants that record everything your child says.

Some apps marketed as “parental control” tools grant third-party employees backend access to your child’s texts, locations—even live audio.

Ask yourself: Do you trust every single person at that company with your child’s digital life?

“I know you love me, and would never do anything to harm me…”

In the short film Without Consent, by Deutsche Telekom, a future version of a young girl named Ella speaks directly to her parents. She pleads with them to protect her digital privacy before it’s too late.

She imagines a future where:

  • Her identity is stolen.
  • Her voice is cloned to scam her mom into sending money.
  • Her old family photo is turned into a meme, making her a target of school-wide bullying.
  • Her photos appear on exploitation sites—without her knowledge or consent.

It’s haunting because it’s plausible.

This is the world we’ve built.
And your child’s data trail—your posts—is the foundation.

The most powerful privacy lesson you can teach? How you live online.

Children learn how to navigate the digital world by watching you.

What are you teaching them if you trade their privacy for likes?

The best gift you can give them isn’t a new device—it’s the mindset and tools to protect themselves in a world that profits from their exposure.

Even “kid-safe” tech often betrays that trust.

Baby monitors have leaked footage.

Tracking apps have glitched and exposed locations of random children (yes, really).

Schools collect and store sensitive information with barely any safeguards—and breaches happen all the time.

How to protect your child’s digital future

Stop oversharing
Avoid posting photos, birthdays, locations, or anecdotes about your child online—especially on platforms that monetize engagement.

Ditch spyware apps
Instead of surveillance, foster open dialogue. If monitoring is necessary, choose open-source, self-hosted tools where you control the data—not some faceless company.

Teach consent early
Help your child understand that their body, thoughts, and information are theirs to control. Make digital consent a family value.

Opt out of biometric collection
Say no to tools that demand selfies, facial scans, or fingerprints. Fight back against the normalization of biometric surveillance for kids.

Use aliases and VoIP numbers
When creating accounts for your child, use email aliases and VoIP numbers to avoid linking their real identity across platforms.

Push schools and apps for better policies
Ask your child’s school: What data do they collect? Who has access? Is it encrypted?
Push back on apps that demand unnecessary permissions. Ask hard questions.

This isn’t paranoia—it’s parenting in the digital age

This is about protecting your child’s right to grow up without being boxed in by their digital past.

About giving them the freedom to explore ideas, try on identities, and make mistakes—without it becoming a permanent record.

Privacy is protection.
It’s dignity.
It’s autonomy.

And it’s your job to help your child keep it.
Let’s give the next generation a chance to write their own story.

 

Yours in privacy,
Naomi

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Rumble.

TNT is truly independent!

We don’t have a billionaire owner, and our unique reader-funded model keeps us free from political or corporate influence. This means we can fearlessly report the facts and shine a light on the misdeeds of those in power.

Consider a donation to keep our independent journalism running…

AI company pays billions in damages to authors

Published 10 September 2025
– By Editorial Staff
The AI company has used pirated books to train its AI bot Claude.
1 minute read

AI company Anthropic is paying $1.5 billion to hundreds of thousands of authors in a copyright lawsuit. The settlement is the first and largest of its kind in the AI field.

It was last year that authors Andrea Bartz, Charles Graeber and Kirk Wallace Johnson filed a lawsuit against Anthropic for using pirated books to train their AI Claude.

In June, a federal judge ruled that it was not illegal to train AI chatbots on copyrighted books, but that Anthropic had wrongfully obtained millions of books via pirate sites.

Now Anthropic has agreed to pay approximately $3,000 for each of the estimated 500,000 books covered. In total, this amounts to $1.5 billion.

First of its kind

The settlement is the first in a series of legal proceedings ongoing against AI companies regarding the use of copyrighted material for AI training. Among others, George R.R. Martin together with 16 other authors has sued OpenAI for copyright infringement.

As best as we can tell, it’s the largest copyright recovery ever, says Justin Nelson, lawyer for the authors, according to The Guardian. It’s the first of its kind in the AI era.

If Anthropic had not agreed to the settlement, experts say it could have cost significantly more.

We were looking at a strong possibility of multiple billions of dollars, enough to potentially cripple or even put Anthropic out of business, says William Long, legal analyst at Wolters Kluwer.

Spyware takes photos of porn users for blackmail

Published 9 September 2025
– By Editorial Staff
Strangely enough, Stealerium is distributed as free open source code on Github.
2 minute read

Security company Proofpoint has discovered malicious software that automatically photographs users through their webcams when they visit pornographic sites. The images are then used for extortion purposes.

The new spyware Stealerium has a particularly disturbing function: it monitors the victim’s browser for pornography-related search terms like “sex” and “porn”, while simultaneously taking screenshots and webcam photos of the user, sending everything to the hacker.

Security company Proofpoint discovered the software in tens of thousands of email messages sent since May this year. Victims were tricked into downloading the program through fake invoices and payment demands, primarily targeting companies in hospitality, education and finance.

— When it comes to infostealers, they typically are looking for whatever they can grab, says Selena Larson, researcher at Proofpoint to Wired.

— This adds another layer of privacy invasion and sensitive information that you definitely wouldn’t want in the hands of a particular hacker. It’s gross. I hate it, she adds.

Available openly on Github

In addition to the automated sextortion function, Stealerium also steals traditional data such as banking information, passwords and cryptocurrency wallet keys. All information is sent to the hacker via services like Telegram, Discord or email.

Strangely, Stealerium is distributed as free open source code on Github. The developer, who calls himself witchfindertr and claims to be a “malware analyst” in London, maintains that the program is “for educational purposes only”.

— How you use this program is your responsibility. I will not be held accountable for any illegal activities. Nor do i give a shit how u use it, the developer writes on the page.

Kyle Cucci, also a researcher at Proofpoint, calls automated webcam images of users browsing porn “pretty much unheard of”. The only similar case was an attack against French-speaking users in 2019.

New trend among cybercriminals

According to Larson, the new type of attacks may be part of a larger trend where smaller hacker groups are turning away from large-scale ransomware attacks that attract authorities’ attention.

— For a hacker, it’s not like you’re taking down a multimillion-dollar company that is going to make waves and have a lot of follow-on impacts. They’re trying to monetize people one at a time. And maybe people who might be ashamed about reporting something like this, Larson explains.

Proofpoint has not identified specific victims of the sextortion function, but believes that the function’s existence suggests it has likely already been used.

New robot takes on household chores

The future of AI

Published 7 September 2025
– By Editorial Staff
1 minute read

The AI robot Helix can wash dishes, fold laundry and collaborate with other robots. It is the first robot of its kind that can control the entire upper part of the body.

The American robotics company Figure AI’s new humanoid robot has visual perception, language understanding and full control over fingers, wrists, torso and head. This enables the robot to pick up small objects and thereby help with household tasks.

Helix is powered by a so-called dual-system architecture, which can be explained as having a unique “two-brain” AI architecture where one part interprets language and vision while another part controls movements quickly and precisely.

Among other things, the company demonstrates that the robot can load dishes into the dishwasher, fold laundry and sort groceries. The robot can also sort and weigh packages at postal facilities.

It can also handle thousands of new objects in cluttered environments, without prior demonstrations or custom programming. This means it can perform tasks it is not programmed for and is designed to solve problems independently in an unpredictable environment.

It can follow voice commands in a similar way to talking with a human and act accordingly. What also makes the robot special is that it can collaborate with other robots. In tests, for example, two Helix robots have successfully been able to work together to unpack groceries.

Stop feeding Apple your data

Homebrew is the app store that doesn’t spy on you.

Published 6 September 2025
– By Naomi Brockwell
5 minute read

If you’re on a Mac, chances are you download apps from Apple’s App Store. Add your Apple ID, and everything is neatly in one place, updated with the click of a button.

But convenience comes at a price. Linking an Apple ID to your computer ties all your activity together and makes profiling you effortless.

In past articles, we’ve shown how much data Apple collects, and explained that Linux is the gold standard for privacy. But if you’re not ready to switch, there are still steps you can take right now to make your Mac more private.

This article focuses on Apple IDs, the App Store, and a powerful alternative called Homebrew. It’s a package manager that gives you the convenience of centralized updates without the surveillance.

Apple ID and the App Store

It may seem impossible to avoid Apple IDs and the App Store. On an iPhone, you’re locked in: You need to add an Apple ID and use the App Store to download any apps. (The EU recently forced Apple to allow sideloading, but that doesn’t apply everywhere.)

On a Mac, things are different. You don’t need the App Store at all. You can download software directly from each developer’s website, which means you never need to attach an Apple ID to your computer. And that’s one of the best privacy moves you can make.

Unfortunately, Apple makes it a little tricky to opt out.

When you buy a new Mac, the store will push you to hand over an Apple ID at checkout. You should tell them you don’t have one.

Then when you first set up your computer, it will prompt you to add an Apple ID, and it’s not immediately clear how to skip past this step. The “Continue” button is grayed out unless you fill in your ID. What you might have missed is in the bottom left corner it says “Set Up Later”. Click that.

But Apple still puts up roadblocks. Gatekeeper, which is a macOS security feature that controls which apps are allowed to run on your Mac, by default only allows apps from the App Store or from developers that Apple has verified. If you want to allow downloads from elsewhere, you first have to turn off Gatekeeper’s strict enforcement using command line, and then go back into your settings and select the option to allow apps from “Anywhere”.

Apple really wants every download to run through them. That way, they can log every install, every update, and build a permanent profile of your habits and interests.

App Store: Convenient, But Costly

Of course, there are perks. The App Store makes managing your apps painless. You can update everything with a single click. If you’ve downloaded apps from a dozen different sites, updating becomes a chore. Each app has to be opened and checked manually.

You can always enable auto-updates, but that means your apps constantly ping servers in the background. For many people, that’s a privacy trade-off not worth making.

In fact, I use the firewall software Little Snitch to block my apps from unnecessarily talking to the internet, which makes auto updates even harder. I have to disable the firewall, check every app one by one, and then remember to re-enable the firewall afterwards. It’s easy to slip up, and Apple knows most people won’t bother with this manual process.

Enter Homebrew

This is where Homebrew comes in handy, by providing the convenience of the App Store without all the tracking.

Homebrew is a package manager for macOS and Linux. A package manager is similar to an app store in many ways. Think of it like a hub: a single place to find, install, and update apps quickly and reliably.

Homebrew is well known and open source, but it looks different from the stores you’re used to. There’s no visual store or GUI: Instead you use the command line in Terminal. You can’t buy anything in the store, the software is free. Some apps have paid upgrade features, but Homebrew itself has no ability to collect payments. You don’t need any account to access it, there’s no hidden tracking, and no ads.

Benefits

There are three main benefits, in my opinion, to using Homebrew over downloading apps directly from random websites.

Convenience

Instead of bouncing between dozens of sites to find, install, and update apps, Homebrew gives you simple commands that do it all in one place. One system, and you can use it without handing over telemetry about everything you’re doing.

Safety

Homebrew can help decrease the risk of installing fake or malicious software. When you download apps manually, there’s always the chance that you spelled the URL wrong or landed on a fake site through a phishing link. Homebrew pulls apps from official, verified sources, and it automatically checks the integrity of every file. Generally open source repos include a checksum of the file on their website, which is a hash of the exact file. The checksum of what you downloaded should be identical to the checksum the app has provided. Homebrew verifies that they match, so you’re not getting a tampered or unsafe version. Their code is watched over by a large community, and they log every change publicly. No system is 100% safe, but Homebrew is highly reputable and widely regarded in the open source community.

Gateway to Linux

Homebrew is also compatible with Linux. If you ever decide to switch operating systems, Homebrew is a great way to make the transition easier, and get comfortable with tools you’ll probably use on Linux too.

Tutorial coming soon

Friday week we’ll release a full video tutorial on how to install and use Homebrew, so keep an eye out.

For now, the takeaway is simple: Homebrew gives you the convenience of centralized updates without the privacy trade-offs. You get easy installs, built-in safety checks, and you never have to tie your Mac to an Apple ID.

If you want the benefits of an app store without the profiling that comes with it, Homebrew is the smarter choice.

 

Yours in Privacy,
Naomi

 

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Rumble.

Our independent journalism needs your support!
We appreciate all of your donations to keep us alive and running.

Our independent journalism needs your support!
Consider a donation.

You can donate any amount of your choosing, one-time payment or even monthly.
We appreciate all of your donations to keep us alive and running.

Dont miss another article!

Sign up for our newsletter today!

Take part of uncensored news – free from industry interests and political correctness from the Polaris of Enlightenment – every week.