Sunday, September 7, 2025

Polaris of Enlightenment

Your doctor’s visit isn’t private

Published 26 July 2025
– By Naomi Brockwell
6 minute read

A member of our NBTV members’ chat recently shared something with us after a visit to her doctor.

She’d just gotten back from an appointment and felt really shaken up. Not because of a diagnosis, she was shaken because she realized just how little control she had over her personal information.

It started right at check-in, before she’d even seen the doctor.
Weight. Height. Blood pressure. Lifestyle habits. Do you drink alcohol? Are you depressed? Are you sexually active?
All the usual intake questions.

It all felt deeply personal, but this kind of data collection is normal now.
Yet she couldn’t help but wonder: shouldn’t they ask why she’s there first? How can they know what information is actually relevant without knowing the reason for the visit? Why collect everything upfront, without context?

She answered every question anyway. Because pushing back makes people uncomfortable.

Finally, she was through with the medical assistant’s questions and taken to the actual doctor. That’s when she confided something personal, something she felt was important for the doctor to know, but made a simple request:

“Please don’t record that in my file”.

The doctor responded:

“Well, this is something I need to know”.

She replied:

“Yes, that’s why I told you. But I don’t want it written down. That file gets shared with who knows how many people”.

The doctor paused, then said:

“I’m going to write it in anyway”.

And just like that, her sensitive information, something she explicitly asked to keep off the record, became part of a permanent digital file.

That quiet moment said everything. Not just about one doctor, but about a system that no longer treats medical information as something you control. Because once something is entered into your electronic health record, it’s out of your hands.

You can’t delete it.

You can’t restrict who sees it.

She Said “Don’t Write That Down.” The Doctor Did Anyway.

Financially incentivized to collect your data

The digital device that the medical assistant and doctor write your information into is called an Electronic Health Record (EHR). EHRs aren’t just a digital version of your paper file. They’re part of a government-mandated system. Through legislation and financial incentives from the HHS, clinics and hospitals were required to digitize patient data.

On top of that, medical providers are required to prove what’s called “Meaningful Use” of these EHR systems. Unless they can prove meaningful use, the medical provider won’t get their Medicare and Medicaid rebates. So when you’re asked about your blood pressure, your weight, and your alcohol use, it’s part of a quota. There’s a financial incentive to collect your data, even if it’s not directly related to your care. These financial incentives reward over-collection and over-documentation. There are no incentives for respecting your boundaries.

You’re not just talking to your doctor. You’re talking to the system

Most people have no idea how medical records actually work in the US They assume that what they tell a doctor stays between the two of them.

That’s not how it works.

In the United States, HIPAA states that your personally identifiable medical data can be shared, without needing to get your permission first, for a wide range of “healthcare operations” purposes.

Sounds innocuous enough. But the definition of health care operations is almost 400 words long. It’s essentially a list of about 65 non-clinical business activities that have nothing to do with your medical treatment whatsoever.

That includes not just hospitals, pharmacy systems, and insurance companies, but billing contractors, analytics firms, and all kinds of third-party vendors. According to a 2010 Department of Health and Human Services (HHS) regulation, there are more than 2.2 million entities (covered entities and business associates) with which your personally identifiable, sensitive medical information can be shared, if those who hold it choose to share it. This number doesn’t even include government entities with access to your data, because they aren’t considered covered entities or business associates.

Your data doesn’t stay in the clinic. It gets passed upstream, without your knowledge and without needing your consent. No one needs to notify you when your data is shared. And you’re not allowed to opt out. You can’t even get a list of everyone it’s been shared with. It’s just… out there.

The doctor may think they’re just “adding it to your chart”. But what they’re actually doing is feeding a giant, invisible machine that exists far beyond that exam room.

We have an entire video diving into the details if you’re interested: You Have No Medical Privacy

Data breaches

Legal sharing isn’t the only risk of this accumulated data. What about data breaches? This part is almost worse.

Healthcare systems are one of the top targets for ransomware attacks. That’s because the data they hold is extremely valuable. Full names, birth dates, Social Security numbers, medical histories, and billing information, all in one place.

It’s hard to find a major health system that hasn’t been breached. In fact, a 2023 report found that over 90% of healthcare organizations surveyed had experienced a data breach in the past three years.

That means if you’ve been to the doctor in the last few years, there’s a very real chance that some part of your medical file is already floating around, whether on the dark web, in a leaked ransomware dump, or being sold to data brokers.

The consequences aren’t just theoretical. In one high-profile case of such a healthcare breach, people took their own lives after private details from their medical files were leaked online.

So when your doctor says, “This is just for your chart,” understand what that really means. You’re not just trusting your doctor. You’re trusting a system that has a track record of failing to protect you.

What happens when trust breaks

Once you start becoming aware of how your data is being collected and shared, you see it everywhere. And in high-stakes moments, like a medical visit, pushing back is hard. You’re at your most vulnerable. And the power imbalance becomes really obvious.

So what do patients do when they feel that their trust has been violated? They start holding back. They say less. They censor themselves.

This is exactly the opposite of what should happen in a healthcare setting. Your relationship with your doctor is supposed to be built on trust. But when you tell your doctor something in confidence, and they say, “I’m going to log it anyway,” that trust is gone.

The problem here isn’t just one doctor. From their perspective, they’re doing what’s expected of them. The entire system is designed to prioritize documentation and compliance over patient privacy.

Privacy is about consent, not secrecy

But privacy matters. And not because you have something to hide. You might want your doctor to have full access to everything. That’s fine. But the point is, you should be the one making that call.

Right now, that choice is being stripped away by systems and policies that normalize forced disclosure.

We’re being told our preferences don’t matter. That our data isn’t worth protecting. And we’re being conditioned to stay quiet about it.

That has to change.

So what can you do?

First and foremost, if you’re in a high-stakes medical situation, focus on getting the care you need. Don’t let privacy concerns keep you from getting help.

But when you do have space to step back and ask questions, do it. That’s where change begins.

  • Ask what data is necessary and why.
  • Say no when something feels intrusive.
  • Let your provider know that you care about how your data is handled.
  • Support policy efforts that restore informed consent in healthcare.
  • Share your story, because this isn’t just happening to one person.

The more people push back, the harder it becomes for the system to ignore us.

You should be able to go to the doctor and share what’s relevant, without wondering who’s going to have access to that information later.

The exam room should feel safe. Right now, it doesn’t.

Healthcare is in urgent need of a privacy overhaul. Let’s make that happen.

 

Yours In Privacy,
Naomi

 

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Rumble.

TNT is truly independent!

We don’t have a billionaire owner, and our unique reader-funded model keeps us free from political or corporate influence. This means we can fearlessly report the facts and shine a light on the misdeeds of those in power.

Consider a donation to keep our independent journalism running…

Stop feeding Apple your data

Homebrew is the app store that doesn’t spy on you.

Published yesterday 8:21
– By Naomi Brockwell
5 minute read

If you’re on a Mac, chances are you download apps from Apple’s App Store. Add your Apple ID, and everything is neatly in one place, updated with the click of a button.

But convenience comes at a price. Linking an Apple ID to your computer ties all your activity together and makes profiling you effortless.

In past articles, we’ve shown how much data Apple collects, and explained that Linux is the gold standard for privacy. But if you’re not ready to switch, there are still steps you can take right now to make your Mac more private.

This article focuses on Apple IDs, the App Store, and a powerful alternative called Homebrew. It’s a package manager that gives you the convenience of centralized updates without the surveillance.

Apple ID and the App Store

It may seem impossible to avoid Apple IDs and the App Store. On an iPhone, you’re locked in: You need to add an Apple ID and use the App Store to download any apps. (The EU recently forced Apple to allow sideloading, but that doesn’t apply everywhere.)

On a Mac, things are different. You don’t need the App Store at all. You can download software directly from each developer’s website, which means you never need to attach an Apple ID to your computer. And that’s one of the best privacy moves you can make.

Unfortunately, Apple makes it a little tricky to opt out.

When you buy a new Mac, the store will push you to hand over an Apple ID at checkout. You should tell them you don’t have one.

Then when you first set up your computer, it will prompt you to add an Apple ID, and it’s not immediately clear how to skip past this step. The “Continue” button is grayed out unless you fill in your ID. What you might have missed is in the bottom left corner it says “Set Up Later”. Click that.

But Apple still puts up roadblocks. Gatekeeper, which is a macOS security feature that controls which apps are allowed to run on your Mac, by default only allows apps from the App Store or from developers that Apple has verified. If you want to allow downloads from elsewhere, you first have to turn off Gatekeeper’s strict enforcement using command line, and then go back into your settings and select the option to allow apps from “Anywhere”.

Apple really wants every download to run through them. That way, they can log every install, every update, and build a permanent profile of your habits and interests.

App Store: Convenient, But Costly

Of course, there are perks. The App Store makes managing your apps painless. You can update everything with a single click. If you’ve downloaded apps from a dozen different sites, updating becomes a chore. Each app has to be opened and checked manually.

You can always enable auto-updates, but that means your apps constantly ping servers in the background. For many people, that’s a privacy trade-off not worth making.

In fact, I use the firewall software Little Snitch to block my apps from unnecessarily talking to the internet, which makes auto updates even harder. I have to disable the firewall, check every app one by one, and then remember to re-enable the firewall afterwards. It’s easy to slip up, and Apple knows most people won’t bother with this manual process.

Enter Homebrew

This is where Homebrew comes in handy, by providing the convenience of the App Store without all the tracking.

Homebrew is a package manager for macOS and Linux. A package manager is similar to an app store in many ways. Think of it like a hub: a single place to find, install, and update apps quickly and reliably.

Homebrew is well known and open source, but it looks different from the stores you’re used to. There’s no visual store or GUI: Instead you use the command line in Terminal. You can’t buy anything in the store, the software is free. Some apps have paid upgrade features, but Homebrew itself has no ability to collect payments. You don’t need any account to access it, there’s no hidden tracking, and no ads.

Benefits

There are three main benefits, in my opinion, to using Homebrew over downloading apps directly from random websites.

Convenience

Instead of bouncing between dozens of sites to find, install, and update apps, Homebrew gives you simple commands that do it all in one place. One system, and you can use it without handing over telemetry about everything you’re doing.

Safety

Homebrew can help decrease the risk of installing fake or malicious software. When you download apps manually, there’s always the chance that you spelled the URL wrong or landed on a fake site through a phishing link. Homebrew pulls apps from official, verified sources, and it automatically checks the integrity of every file. Generally open source repos include a checksum of the file on their website, which is a hash of the exact file. The checksum of what you downloaded should be identical to the checksum the app has provided. Homebrew verifies that they match, so you’re not getting a tampered or unsafe version. Their code is watched over by a large community, and they log every change publicly. No system is 100% safe, but Homebrew is highly reputable and widely regarded in the open source community.

Gateway to Linux

Homebrew is also compatible with Linux. If you ever decide to switch operating systems, Homebrew is a great way to make the transition easier, and get comfortable with tools you’ll probably use on Linux too.

Tutorial coming soon

Friday week we’ll release a full video tutorial on how to install and use Homebrew, so keep an eye out.

For now, the takeaway is simple: Homebrew gives you the convenience of centralized updates without the privacy trade-offs. You get easy installs, built-in safety checks, and you never have to tie your Mac to an Apple ID.

If you want the benefits of an app store without the profiling that comes with it, Homebrew is the smarter choice.

 

Yours in Privacy,
Naomi

 

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Rumble.

IP addresses are used in Sweden to track unemployed people

Published 1 September 2025
– By Editorial Staff
The Swedish Public Employment Service has already identified approximately 4,000 people who appear to have logged in from a country other than Sweden.
2 minute read

The Swedish Public Employment Service (Arbetsförmedlingen) has begun tracking the IP addresses of unemployed individuals to verify that they are actually located in Sweden. Approximately 4,000 people who logged in from foreign IP numbers now risk losing their benefits.

To be eligible for unemployment insurance (A-kassa) and other forms of compensation linked to being unemployed, certain requirements must be met. One of these requirements is that individuals must be located in Sweden, in order to be available in case a job opportunity arises.

When job seekers log into the Swedish Public Employment Service’s website, their IP address is now checked. If a person logs in from a foreign IP number, this suggests that they are located in another country.

The Swedish Public Employment Service has been tracking job seekers since the end of June, and the agency has already identified approximately 4,000 people who appear to have logged in from a country other than Sweden.

It’s a way to counteract the risk of incorrect payments. We’re talking about people who are abroad even though they should be in Sweden looking for work or participating in labor market policy programs, says Andreas Malmgren, operations controller at the Swedish Public Employment Service, to the Bonnier publication DN.

None of these individuals have been contacted yet, but the agency plans to make contact during September. These people risk having their benefits withdrawn.

Furthermore, the agency has also established a special tool to check whether job seekers are using VPN services, so that no one ends up among those flagged by mistake.

Wifi signals can identify people with 95 percent accuracy

Mass surveillance

Published 21 August 2025
– By Editorial Staff
2 minute read

Italian researchers have developed a technique that can track and identify individuals by analyzing how wifi signals reflect off human bodies. The method works even when people change clothes and can be used for surveillance.

Researchers at La Sapienza University in Rome have developed a new method for identifying and tracking people using wifi signals. The technique, which the researchers call “WhoFi”, can recognize people with an accuracy rate of up to 95 percent, reports Sweclockers.

The method is based on the fact that wifi signals reflect and refract in different ways when they hit human bodies. By analyzing these reflection patterns using machine learning and artificial neural networks, researchers can create unique “fingerprints” for each individual.

Works despite clothing changes

Experiments show that these digital fingerprints are stable enough to identify people even when they change clothes or carry backpacks. The average recognition rate is 88 percent, which researchers say is comparable to other automatic identification methods.

The research results were published in mid-July and describe how the technology could be used in surveillance contexts. According to the researchers, WhoFi can solve the problem of re-identifying people who were first observed via a surveillance camera in one location and then need to be found in footage from cameras in other locations.

Can be used for surveillance

The technology opens up new possibilities in security surveillance, but simultaneously raises questions about privacy and personal security. The fact that wifi networks, which are ubiquitous in today’s society, can be used to track people without their knowledge represents a new dimension of digital surveillance.

The researchers present their discovery as a breakthrough in the field of automatic person identification, but do not address the ethical implications that the technology may have for individuals’ privacy.

Danish students build drone that flies and swims

Published 18 August 2025
– By Editorial Staff
2 minute read

Four students at Aalborg University in Denmark have developed a revolutionary drone that seamlessly transitions between air and water. The prototype uses innovative rotor technology that automatically adapts to different environments.

Four students at Aalborg University in Denmark have created something that sounds like science fiction – a drone that can literally fly down into water, swim around and then jump back up into the air to continue flying, reports Tom’s Hardware.

Students Andrei Copaci, Pawel Kowalczyk, Krzysztof Sierocki and Mikolaj Dzwigalo have developed a prototype as their thesis project that demonstrates how future amphibious drones could function. The project has attracted attention from technology media after a demonstration video showed the drone flying over a pool, crashing down into the water, navigating underwater and then taking off into the air again.

Intelligent rotor technology solves the challenge

The secret behind the impressive performance lies in what the team calls a “variable rotor system”. The individual rotor blades can automatically adjust their pitch angle depending on whether the drone is in air or water.

When the drone flies through the air, the rotor blades work at a higher angle for optimal lift capacity. Underwater, the blade pitch is lowered to reduce resistance and improve efficiency during navigation. The system can also reverse thrust to increase maneuverability when the drone moves through tight passages underwater.

Most components in the prototype have been manufactured by the students themselves using 3D printers, since equivalent parts were not available on the market.

Although the project is still in an early concept stage and exists only as a single prototype, it demonstrates the possibilities for future amphibious vehicles. The technology could have applications in everything from rescue operations to environmental monitoring where vehicles need to move both above and below the water surface.

Our independent journalism needs your support!
We appreciate all of your donations to keep us alive and running.

Our independent journalism needs your support!
Consider a donation.

You can donate any amount of your choosing, one-time payment or even monthly.
We appreciate all of your donations to keep us alive and running.

Dont miss another article!

Sign up for our newsletter today!

Take part of uncensored news – free from industry interests and political correctness from the Polaris of Enlightenment – every week.