<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[privateLINE Substack]]></title><description><![CDATA[This is next-generation private networking technology, built from the hard won knowledge gained from prior companies and lessons learned dealing with the players who control and profit from your data.]]></description><link>https://blog.privateline.io</link><image><url>https://substackcdn.com/image/fetch/$s_!zSVW!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff7d6a6d-6660-4feb-ae21-b745f2e120f6_900x900.png</url><title>privateLINE Substack</title><link>https://blog.privateline.io</link></image><generator>Substack</generator><lastBuildDate>Thu, 07 May 2026 11:10:14 GMT</lastBuildDate><atom:link href="https://blog.privateline.io/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Private Line, LLC]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[privateline@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[privateline@substack.com]]></itunes:email><itunes:name><![CDATA[PrivateLine]]></itunes:name></itunes:owner><itunes:author><![CDATA[PrivateLine]]></itunes:author><googleplay:owner><![CDATA[privateline@substack.com]]></googleplay:owner><googleplay:email><![CDATA[privateline@substack.com]]></googleplay:email><googleplay:author><![CDATA[PrivateLine]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Why We Stopped Using Signal Messenger]]></title><description><![CDATA[A number of issues you should be aware of]]></description><link>https://blog.privateline.io/p/why-we-stopped-using-signal-messenger</link><guid isPermaLink="false">https://blog.privateline.io/p/why-we-stopped-using-signal-messenger</guid><dc:creator><![CDATA[PrivateLine]]></dc:creator><pubDate>Thu, 30 May 2024 14:30:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!nwon!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2c653f2-853c-4cf2-bf37-ee647c3424e9_474x355.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Signal was one of the most successful second generation secure messengers.  It had a lot going for it&#8230;ease of use, fairly solid security, a good team and lots of funding that made it possible for millions of people to become users.  It worked smoothly across devices and was so good, open source and free that it was difficult for other secure messengers to compete with it.  The large user base (est. 60m active) made it even more attractive as many of your friends and colleagues already had accounts.  It was a snap to find your friends and start a chat or make a call.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!nwon!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2c653f2-853c-4cf2-bf37-ee647c3424e9_474x355.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!nwon!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2c653f2-853c-4cf2-bf37-ee647c3424e9_474x355.jpeg 424w, https://substackcdn.com/image/fetch/$s_!nwon!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2c653f2-853c-4cf2-bf37-ee647c3424e9_474x355.jpeg 848w, https://substackcdn.com/image/fetch/$s_!nwon!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2c653f2-853c-4cf2-bf37-ee647c3424e9_474x355.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!nwon!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2c653f2-853c-4cf2-bf37-ee647c3424e9_474x355.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!nwon!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2c653f2-853c-4cf2-bf37-ee647c3424e9_474x355.jpeg" width="304" height="227.67932489451476" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a2c653f2-853c-4cf2-bf37-ee647c3424e9_474x355.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:355,&quot;width&quot;:474,&quot;resizeWidth&quot;:304,&quot;bytes&quot;:9805,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!nwon!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2c653f2-853c-4cf2-bf37-ee647c3424e9_474x355.jpeg 424w, https://substackcdn.com/image/fetch/$s_!nwon!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2c653f2-853c-4cf2-bf37-ee647c3424e9_474x355.jpeg 848w, https://substackcdn.com/image/fetch/$s_!nwon!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2c653f2-853c-4cf2-bf37-ee647c3424e9_474x355.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!nwon!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2c653f2-853c-4cf2-bf37-ee647c3424e9_474x355.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>In terms of features, Signal checked the boxes for the required minimum feature set of a secure messenger:</p><ul><li><p>Good security with end-to-end encryption</p></li><li><p>Easy onboarding, installation and operation.  Clean UI and reliable.</p></li><li><p>Works across all major platforms seamlessly (Android, iOS, WIN/MAC/LINUX)</p></li><li><p>Low latency for text chatting and reliable calling</p></li><li><p>Device verification (to notify others if your device was compromised)</p></li><li><p>Support for individual and group accounts.</p></li><li><p>The service is free (for Signal, completely free).</p></li></ul><p>There were a few downsides to Signal:</p><ul><li><p>A valid phone number was required (yes, you could use a burner, but&#8230;.)  Phone numbers are used for tracking and form the unique_ID for many data collection systems using phone numbers and IMEI (the unique ID for the handset used by carriers).  A person who worked for a state security agency once told us &#8220;if a secure messenger uses a phone number, it&#8217;s compromised&#8221;.  Most phones are attached to a govt issued ID and with voice print ID they know its you on any device in 15 seconds.  Telegram uses a phone number, too.  You have been warned.</p></li><li><p>Your phone number and other information was visible to other users.  (this major weakness was recently remedied on Signal)</p></li><li><p>Servers were centralized and accessed over the open internet.  It&#8217;s hard to know exactly what is monitored upstream/downstream from the <a href="https://www.signal.org/blog/signal-is-expensive/">Signal servers in AWS, Google and Microsoft</a> facilities who are <a href="https://www.nextgov.com/modernization/2020/11/exclusive-cia-awards-secret-multibillion-dollar-cloud-contract/170227/#:~:text=C2E%20represents%20the%20CIA's%20next,National%20Security%20Agency%20and%20FBI.">known to work with the CIA and other spying agencies</a>.  While the data is encrypted, metadata can be every bit as valuable as the data itself and these vendors have access to the metadata, if not the encrypted messages.</p></li><li><p>Third party companies provided notification services (text messages, etc.) and potentially can leak data.  This is known from the world of VPN&#8217;s, where M247, which has been tied to GCHQ, is an infrastructure service provider for up to 65% of VPN&#8217;s.</p></li><li><p>Platform notifications included plain text snips of messages, which could be intercepted, if the user allowed it.</p></li><li><p>The signaling plane (the messages back and forth to enable calling) is on the open internet, allowing snoops to know who you are calling, even if the call is encrypted.</p></li><li><p>It turns out that startup <a href="https://stillnessinthestorm.com/2021/02/11/signal-app-is-a-government-op-cia-connction-revealed/11/38/58/117391/news/stillness-in-the-storm/">funding for Signal was from a US Government tied entity</a>. Some people won&#8217;t like that.  Here&#8217;s an interesting article:  <a href="https://www.kitklarenberg.com/p/signal-facing-collapse-after-cia/comments#comment-44717458">Signal Facing Collapse After CIA Cuts Funding</a></p></li><li><p>When something is free to the user, the money to pay for the service must come from somewhere.  Who are the donors?  Signal costs a lot of money to operate.  Who gave it the funds to operate?</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/subscribe?"><span>Subscribe now</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/p/why-we-stopped-using-signal-messenger?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/p/why-we-stopped-using-signal-messenger?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p>There are three main problems with the network and business architecture of secure messengers like Signal, Telegram, etc.</p><ul><li><p>Free is a business model only if data is resold, it won&#8217;t work for privacy.  (or the service goes out of business).  These messengers are all free to the user, therefore someone is paying to run the service and by definition they are not private.</p></li><li><p>Users rely on central storage of their data (the most convenient approach).  privateLINE p2p will enable users to store their own data locally, with centralized signaling and back up storage, if the user opts to do it.  This is the future.</p></li><li><p>There is no expectation of privacy on a public network.  In the future we expect a separation between public and private networks.  You will still use your regular phone and network as an &#8220;alibi&#8221;.  Anything important will need to be conducted on a private network.</p><p></p></li></ul><p>For these reasons and others we decided we had to build a new network, away from the internet and under the user&#8217;s direct control as much as possible.  You should consider using privateLINE as a back up in case something happens to Signal.</p><p><strong>[NOTE: we have been developing a new platform for secure and private communications that is air-gapped from the internet using private network technology. If you are interested in testing it (FREE for early accounts), <a href="https://privateline.io/email-signup">go to this page to get Early Access LINK</a> We use it ourselves for all our comms away from Big Tech spying. Once you are in PL Comms, connect with &#8220;chris&#8221;]</strong></p><h3>Why Would We Stop Using Signal?</h3><p>We had a security breach of some root keys for a legacy chat server we were running and it got attacked and destroyed. It was too hard to restore after the attack and was abandoned.  We tracked down the data leak to Signal, as the engineers had used Signal to send these keys between themselves.  However, you can never be 100% sure and after the fact it&#8217;s impossible to prove with certainty that was the cause&#8230;.but it made us wonder.  That was a few years ago and we decided to stop putting anything sensitive on Signal and to build an alternative we could use for our projects.  What about Telegram, What&#8217;s App and the rest of them?  We&#8217;ve heard of similar issues and some are worse than Signal because they are not end-to-end encrypted &#8212; messages are converted to plain text once they hit the server, then re-encrypted when sent out  &#8212; another data collection bonanza for the person running the servers.  Let&#8217;s dig a bit deeper into Signal, how it was started and some publicly available information that made us ask some questions.</p><p>In the early days of instant messaging, encryption was light and security was lighter.  The trade off is always security vs. convenience and design was optimized for maximum usability (convenience) and growth hacking.  For this reason, privacy apps have always been a specialty niche and necessary service.   Signal did a good job, but their model is too expensive to run and has too much centralization.  privateLINE is taking a different approach that charges users for the services we provide (so our first obligation is to protect the user&#8217;s privacy).  We will push as much of the data and bandwidth to the edge of the network (the users provide much of the hardware and bandwidth), which costs the users nothing they haven&#8217;t already spent and allows us to provide a sustainable service at an affordable price.  We&#8217;ll avoid third party and Big Tech services.</p><h3>Signal has a Financial Crisis</h3><p>Investigative journalist<a href="https://english.almayadeen.net/articles/analysis/signal-facing-collapse-after-cia-cuts-funding"> Kit Klarenberg wrote in </a><strong><a href="https://english.almayadeen.net/articles/analysis/signal-facing-collapse-after-cia-cuts-funding">Signal facing collapse after CIA cuts funding</a></strong><a href="https://english.almayadeen.net/articles/analysis/signal-facing-collapse-after-cia-cuts-funding">:</a></p><blockquote><p>On November 16th, Meredith Whittaker, president of Signal, <a href="https://signal.org/blog/signal-is-expensive/">published a detailed breakdown</a> of the popular encrypted messaging app&#8217;s running costs for the very first time. The unprecedented disclosure&#8217;s motivation was simple - the platform is rapidly running out of money, and in dire need of donations to stay afloat. Unmentioned by Whittaker, this budget shortfall results in large part due to the US intelligence community, which lavishly financed Signal&#8217;s creation and maintenance over several years, severing its support for the app.</p></blockquote><p><a href="https://www.signal.org/blog/signal-is-expensive/">Signal is burning a lot of money</a> on their infrastructure (from the Signal blog post of 16 November, 2023):</p><blockquote><p><strong>Storage:</strong> $1.3 million dollars per year.<br><strong>Servers:</strong> $2.9 million dollars per year.<br><strong>Registration Fees:</strong> $6 million dollars per year.<br><strong>Total Bandwidth:</strong> $2.8 million dollars per year.<br><strong>Additional Services:</strong> $700,000 dollars per year.</p><p><strong>Current Infrastructure Costs (as of November 2023):</strong> Approximately $14 million dollars per year.</p><p></p></blockquote><p>It is unusual for a non-profit tech project to have so many highly paid people:</p><blockquote><p>This is a lot of work, and we do it with a small and mighty team. In total, around 50 full-time employees currently work on Signal, a number that is shockingly small by industry standards.</p><p>To sustain our ongoing development efforts, about half of Signal&#8217;s overall operating budget goes towards recruiting, compensating, and retaining the people who build and care for Signal. When benefits, HR services, taxes, recruiting, and salaries are included, this <strong>translates to around $19 million dollars per year.</strong></p></blockquote><p><strong>$19m / 50 = $380,000 per year per employee!!!</strong>  That&#8217;s like a well funded AI company or high level contractors working for a security agency, not a non-profit.  People at privateLINE and most startup tech companies could only dream of being paid like that, though to be fair, Signal employees and contractors will never get any stock compensation.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/subscribe?"><span>Subscribe now</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/p/why-we-stopped-using-signal-messenger?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/p/why-we-stopped-using-signal-messenger?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p>The infrastructure was not designed to minimize the cost of operations, it was designed for another purpose, data collection by third parties:</p><blockquote><p>&#8220;Signal spends tens of millions of dollars every year. We estimate that by 2025, Signal will require approximately $50 million dollars a year to operate&#8212;and this is very lean compared to other popular messaging apps that don&#8217;t respect your privacy.&#8221;</p></blockquote><p>Another red flag is the requirement to validate your account with a phone.  Most phones require a government issued ID, which could match up your data with your phone number.</p><blockquote><p>We use third-party services to send a registration code via SMS or voice call in order to verify that the person in possession of a given phone number actually intended to sign up for a Signal account. This is a critical step in helping to prevent spam accounts from signing up for the service and rendering it completely unusable&#8212;a non-trivial problem for any popular messaging app.</p><p><strong>The cost of these registration services for verifying phone numbers when people first install Signal, or when they re-register on a new device, currently averages around $6 million dollars per year.</strong></p></blockquote><p>$6m!!!  Who does the phone company share that data with and what is their privacy policy?  Telcos are like an arm of the local governments.</p><blockquote><p>&#8220;the registration fees that cover the delivery of verification codes during the sign-up process to help verify phone numbers and prevent spam accounts&#8221;</p></blockquote><p><strong>[NOTE: we have been developing a new platform for secure and private communications that is air-gapped from the internet. If you are interested in testing it (FREE for early accounts), <a href="https://privateline.io/email-signup">go to this page to get Early Access LINK</a> We use it ourselves for all our comms away from Big Tech spying. Once you are in PL Comms, connect with &#8220;chris&#8221;]</strong></p><p>Calling is routed through their servers, they are not p2p from person to person directly.  This means all calls can be monitored and copied going in and out.  Encryption for calling is weaker (because it&#8217;s real time), you need to keep this in mind. Metadata can be surmised over time mathematically if you watch a data stream long enough.</p><blockquote><p>To take one example, Signal always routes end-to-end encrypted calls from people who aren&#8217;t in your contacts through a relay server that obscures <a href="https://en.wikipedia.org/wiki/IP_address">IP address</a> information.</p></blockquote><p>There are more efficient approaches we will use with privateLINE that have the user help with paying for infrastructure costs and using their own hardware and bandwidth &#8212; the added benefit is the data is in their hands &#8212; we will run a network and provide services, but the user will always be able to DIY and keep complete control.  The network will be created using software and terrestrial, cellular and satellite connections to a core secure enclave.</p><p>Signal has been widely promoted as secure:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FGom!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F555c1458-4d0b-4920-a722-bbbf565098f4_1456x793.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FGom!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F555c1458-4d0b-4920-a722-bbbf565098f4_1456x793.jpeg 424w, https://substackcdn.com/image/fetch/$s_!FGom!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F555c1458-4d0b-4920-a722-bbbf565098f4_1456x793.jpeg 848w, https://substackcdn.com/image/fetch/$s_!FGom!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F555c1458-4d0b-4920-a722-bbbf565098f4_1456x793.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!FGom!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F555c1458-4d0b-4920-a722-bbbf565098f4_1456x793.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FGom!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F555c1458-4d0b-4920-a722-bbbf565098f4_1456x793.jpeg" width="1456" height="793" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/555c1458-4d0b-4920-a722-bbbf565098f4_1456x793.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:793,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:186918,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FGom!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F555c1458-4d0b-4920-a722-bbbf565098f4_1456x793.jpeg 424w, https://substackcdn.com/image/fetch/$s_!FGom!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F555c1458-4d0b-4920-a722-bbbf565098f4_1456x793.jpeg 848w, https://substackcdn.com/image/fetch/$s_!FGom!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F555c1458-4d0b-4920-a722-bbbf565098f4_1456x793.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!FGom!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F555c1458-4d0b-4920-a722-bbbf565098f4_1456x793.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Elon Musk also promotes Signal:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!a7Iu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70c44712-4247-4471-abf6-a55462d4d07f_571x254.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!a7Iu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70c44712-4247-4471-abf6-a55462d4d07f_571x254.png 424w, https://substackcdn.com/image/fetch/$s_!a7Iu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70c44712-4247-4471-abf6-a55462d4d07f_571x254.png 848w, https://substackcdn.com/image/fetch/$s_!a7Iu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70c44712-4247-4471-abf6-a55462d4d07f_571x254.png 1272w, https://substackcdn.com/image/fetch/$s_!a7Iu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70c44712-4247-4471-abf6-a55462d4d07f_571x254.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!a7Iu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70c44712-4247-4471-abf6-a55462d4d07f_571x254.png" width="571" height="254" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/70c44712-4247-4471-abf6-a55462d4d07f_571x254.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:254,&quot;width&quot;:571,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:25282,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!a7Iu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70c44712-4247-4471-abf6-a55462d4d07f_571x254.png 424w, https://substackcdn.com/image/fetch/$s_!a7Iu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70c44712-4247-4471-abf6-a55462d4d07f_571x254.png 848w, https://substackcdn.com/image/fetch/$s_!a7Iu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70c44712-4247-4471-abf6-a55462d4d07f_571x254.png 1272w, https://substackcdn.com/image/fetch/$s_!a7Iu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70c44712-4247-4471-abf6-a55462d4d07f_571x254.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>When you see this kind of promotion or in the other extreme disinformation about a service to defame it, it screams of an operation.  Spies have lifetime contracts and many of them work for several agencies/countries.</p><h3>Where can data leak?</h3><p>A service might be 100% secure and protect your data, but what about the infrastructure providers?  What kind of privacy policy do they maintain?  Can they monitor your meta-data and resell it to a data broker or agency?  What is their privacy policy?  Everything is tied to your phone number, you should assume your metadata could be exposed to third party services, even if you are securely encrypted.  In many cases, the metadata is just as valuable as the messages inside.  There is no expectation of privacy on a public network and Signal and other messengers run over a public network.</p><p>From Signal&#8217;s blog:</p><blockquote><p>We use third-party services to send a registration code via SMS or voice call in order to verify that the person in possession of a given phone number actually intended to sign up for a Signal account. This is a critical step in helping to prevent spam accounts from signing up for the service and rendering it completely unusable&#8212;a non-trivial problem for any popular messaging app.</p></blockquote><p>There is a better way to handle this and that&#8217;s to use invitations sent by users.  You can only connect to someone who invites you.  There is zero spam and no need to validate email or phones, since you send your invitation to the email or phone number you personally know.  Accounts inside the enclave can be numbered and anonymous.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/subscribe?"><span>Subscribe now</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/p/why-we-stopped-using-signal-messenger?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/p/why-we-stopped-using-signal-messenger?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p>Signal uses Big Tech infrastructure:</p><blockquote><p>Millions of people use Signal every day, and it takes a <em>lot</em> of bandwidth to provide a fast and reliable service. <strong>Signal spends around $2.8 million dollars per year on bandwidth</strong> to support sending messages and files (such as photos, videos, voice notes, documents, etc.) and to enable voice and video calls.</p><p>Because everything in Signal is end-to-end encrypted, we can rent server infrastructure from a variety of providers like <a href="https://aws.amazon.com/">Amazon AWS</a>, <a href="https://cloud.google.com/compute">Google Compute Engine</a>, <a href="https://azure.microsoft.com/en-us">Microsoft Azure</a>, and others while ensuring that your messages and calls remain private and secure. We can&#8217;t access them, and neither can the companies that provide any of the infrastructure we rent.</p></blockquote><p>This sounds like the VPN providers, who &#8220;don&#8217;t keep logs&#8221;, but their service providers who are owned by the spies don&#8217;t have any restriction from tracking data.</p><h3>Privacy Policy</h3><p>From Signal&#8217;s Privacy Policy:</p><blockquote><p><strong>Information we may share</strong></p><p><strong>Third Parties.</strong> We work with third parties to provide some of our Services. For example, our Third-Party Providers send a verification code to your phone number when you register for our Services. These providers are bound by their Privacy Policies to safeguard that information.</p></blockquote><p>Those third parties are not disclosed, nor are the privacy policy and terms of service of those third parties mentioned anywhere in the Terms or Privacy Policy.</p><p>The last update on the <a href="https://signal.org/legal/#privacy-policy">Signal Privacy Policy was in 2018!</a>!!  Many things have changed in privacy laws in the past six years&#8230;.this is not even legal in many jurisdictions.</p><blockquote><p>Effective as of May 25, 2018</p><p>Updated May 25, 2018</p></blockquote><h3>Conclusion</h3><p>Signal provides pretty good privacy.  It&#8217;s easy to use.  But there are funding problems on the horizon and some red flags that gave us pause.  And it&#8217;s exposed to the public internet.  To the point that we think you should consider an alternative secure communications network or two.  The switching cost is of course moving your contacts over to the new system.  </p><p><strong>[NOTE: we have been developing a new platform for secure and private communications that is air-gapped from the internet. If you are interested in testing it (FREE for early accounts), <a href="https://privateline.io/email-signup">go to this page to get Early Access LINK</a> We use it ourselves for all our comms away from Big Tech spying. Once you are in PL Comms, connect with &#8220;chris&#8221;]</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/subscribe?"><span>Subscribe now</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/p/why-we-stopped-using-signal-messenger?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/p/why-we-stopped-using-signal-messenger?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[DIY Secure "Batphone" for privateLINE]]></title><description><![CDATA[An inexpensive and secure alternative to expensive "black phones" that you can build yourself]]></description><link>https://blog.privateline.io/p/diy-secure-phone-for-private-line</link><guid isPermaLink="false">https://blog.privateline.io/p/diy-secure-phone-for-private-line</guid><dc:creator><![CDATA[PrivateLine]]></dc:creator><pubDate>Mon, 29 Apr 2024 21:01:35 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!rZfG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29eacfd1-898f-423d-8e6a-ebfb4d70cca4_593x421.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>You have some important things you are working on with your team.  Maybe it&#8217;s a patent application for a new technology, or something you need to be absolutely sure is kept private even though you are communicating over a distance.</p><p>The main thing is you need something that has never touched the internet or public phone networks and that you store in a Faraday bag and powered off when not in use. Even so-called &#8220;black phones&#8221; use the regular phone system and they sit around on desktops, in pockets, cars, etc. and present an attack surface 24/7.  </p><p>The best solution we found to date is a DIY &#8220;Batphone&#8221;.  You can buy the phone used or reconditioned from eBay or Amazon.  Most any Google Pixel models (4, 6, 7, 8,  etc) will work, but we prefer the 6a for cost and other factors.  You can use the free version of privateLINE (limit of one device and split tunnel Shield), but if you upgrade to premium ($99 per year) - you will get up to 5 devices and Total Shield (full tunnel), which keeps your Batphone completely off the internet.  The advantage of this kind of device is that once you wipe the stock Android firmware from the phone, it will largely be &#8220;de-Googled&#8221; and like a brand new phone.  This device will also support privateLINE&#8217;s forthcoming private cell network (powered by ATT).</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Private&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rZfG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29eacfd1-898f-423d-8e6a-ebfb4d70cca4_593x421.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rZfG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29eacfd1-898f-423d-8e6a-ebfb4d70cca4_593x421.jpeg 424w, https://substackcdn.com/image/fetch/$s_!rZfG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29eacfd1-898f-423d-8e6a-ebfb4d70cca4_593x421.jpeg 848w, https://substackcdn.com/image/fetch/$s_!rZfG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29eacfd1-898f-423d-8e6a-ebfb4d70cca4_593x421.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!rZfG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29eacfd1-898f-423d-8e6a-ebfb4d70cca4_593x421.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rZfG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29eacfd1-898f-423d-8e6a-ebfb4d70cca4_593x421.jpeg" width="593" height="421" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/29eacfd1-898f-423d-8e6a-ebfb4d70cca4_593x421.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:421,&quot;width&quot;:593,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:54782,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rZfG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29eacfd1-898f-423d-8e6a-ebfb4d70cca4_593x421.jpeg 424w, https://substackcdn.com/image/fetch/$s_!rZfG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29eacfd1-898f-423d-8e6a-ebfb4d70cca4_593x421.jpeg 848w, https://substackcdn.com/image/fetch/$s_!rZfG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29eacfd1-898f-423d-8e6a-ebfb4d70cca4_593x421.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!rZfG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29eacfd1-898f-423d-8e6a-ebfb4d70cca4_593x421.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>This phone will be used only for the most important calls, so you will never connect it directly to the internet (it will be firewalled and only run privateLINE-approved apps). Apps include all of the privateLINE apps and other forthcoming apps.</p><p>If you would like to upgrade your security, please visit <a href="https://privateline.io">privateline.io and sign up for an account</a>.</p><p>This is how you do it in a nutshell:</p><ol><li><p>Get an UNLOCKED reconditioned Google Pixel phone for your area (e.g. US, EU, India, etc).  We like the 6a because it is the best value and is supported for a number of years going forward.  There are newer and better phones, but this one does the job at the lowest cost, currently about $200 +/- on Amazon.  We&#8217;re also testing Pixel 7 and other models.</p></li><li><p>You will be installing the secure GrapheneOS, which wipes out stock Android firmware.  I used a current MacBook Pro, but Windows machines also work.  You should follow the <a href="https://grapheneos.org/install/web">GrapheneOS installation instructions</a> or watch the below video:</p></li></ol><div id="youtube2-qruzL9IdUr8" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;qruzL9IdUr8&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/qruzL9IdUr8?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p><em>This is a great explainer video.  Be sure you have a very good condition cable, as a bad cable will waste a lot of your time. Be sure to carefully follow the directions in the video.</em></p><p></p><ol start="3"><li><p>Once GrapheneOS is installed, you will need to configure your new phone.  Be sure to never charge it from a device like a laptop or computer, only use a dedicated wall charger and never connect to the internet directly via any USB cable, unless you are already in Total Shield (full tunnel) mode.</p></li><li><p>Make a USB stick with all the apps you will need on your Batphone. I recommend putting these privateLINE apps on the USB: PL Comms, PL Auth, and PL Meet.  Brave browser is also a good choice, though GrapheneOS comes with Vanadium browser, which is also pretty good.  Get the privateLINE apps from the <a href="https://privateline.io/downloads">privateline.io web site</a> (so that you don&#8217;t leave any footprints at the Play store), and the Brave browser from brave.com.  Use a different machine that is connected to the internet to download.  Once apps are on the USB stick, eject it from the computer you used to download and mount it on your Batphone.  Go to Files from the top deck of your Batphone by swiping up in the middle of the screen and choosing the Files icon.  Click on the &#8220;hamburger&#8221; in the upper left and then at the bottom of the list choose your USB drive.  If you have a problem finding the USB stick, check permissions  (Settings&#8212;&gt; Security&#8212;&gt; USB).  USB peripheral should be set to Allow New USB Peripherals.  USB-C port should be set to ON.  Go to FILES, then choose the hamburger in the upper left. You should see the memory stick connect in the Files app on the phone (note: low-end USB sticks may not connect, and you should use a new one that hasn&#8217;t been used with many devices).  If you don&#8217;t see a USB device, try removing and plugging in the USB device again.</p><p>BE SURE TO CHANGE THE SETTINGS BACK TO BLOCK USB DEVICES ONCE YOU FINISH COPYING SOFTWARE TO THE PHONE, to maintain security for your device if you will never use the USB port for anything but charging.  NOTE:  you can also use a USB-C to ethernet cable to connect to the internet if you are concerned with RF.  Turn off Wifi, turn on the PL Connect app in Total Shield mode, then plug in your Batphone to the ethernet.   We have tested this and it works.</p></li><li><p>NEVER use biometric security.  People are losing fingers to crooks who want access, and courts have ruled the police can forcibly use your finger to open your phone.  Biometrics are a terrible idea for security.</p></li><li><p>Be sure to always keep your phone POWERED OFF when not in use for security.  You want to keep hackers away from the device, so be sure to keep it in a Faraday bag like <a href="https://www.amazon.com/gp/product/B0B4DPXC5S/ref=ppx_yo_dt_b_search_asin_title?ie=UTF8">this inexpensive one from Amazon</a>, you can get two of them for about $14:</p></li></ol><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0nt1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F209d24ea-bf31-4e6e-a2bc-d20aa4f525f9_624x879.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0nt1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F209d24ea-bf31-4e6e-a2bc-d20aa4f525f9_624x879.jpeg 424w, https://substackcdn.com/image/fetch/$s_!0nt1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F209d24ea-bf31-4e6e-a2bc-d20aa4f525f9_624x879.jpeg 848w, https://substackcdn.com/image/fetch/$s_!0nt1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F209d24ea-bf31-4e6e-a2bc-d20aa4f525f9_624x879.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!0nt1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F209d24ea-bf31-4e6e-a2bc-d20aa4f525f9_624x879.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0nt1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F209d24ea-bf31-4e6e-a2bc-d20aa4f525f9_624x879.jpeg" width="402" height="566.2788461538462" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/209d24ea-bf31-4e6e-a2bc-d20aa4f525f9_624x879.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:879,&quot;width&quot;:624,&quot;resizeWidth&quot;:402,&quot;bytes&quot;:81430,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0nt1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F209d24ea-bf31-4e6e-a2bc-d20aa4f525f9_624x879.jpeg 424w, https://substackcdn.com/image/fetch/$s_!0nt1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F209d24ea-bf31-4e6e-a2bc-d20aa4f525f9_624x879.jpeg 848w, https://substackcdn.com/image/fetch/$s_!0nt1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F209d24ea-bf31-4e6e-a2bc-d20aa4f525f9_624x879.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!0nt1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F209d24ea-bf31-4e6e-a2bc-d20aa4f525f9_624x879.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>We like this USB stick, because it has both USB-C and USB2/3 in one tiny stick.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!u97v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1aaa7476-14ac-4a27-92be-7bd80b52cee1_547x387.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!u97v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1aaa7476-14ac-4a27-92be-7bd80b52cee1_547x387.jpeg 424w, https://substackcdn.com/image/fetch/$s_!u97v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1aaa7476-14ac-4a27-92be-7bd80b52cee1_547x387.jpeg 848w, https://substackcdn.com/image/fetch/$s_!u97v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1aaa7476-14ac-4a27-92be-7bd80b52cee1_547x387.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!u97v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1aaa7476-14ac-4a27-92be-7bd80b52cee1_547x387.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!u97v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1aaa7476-14ac-4a27-92be-7bd80b52cee1_547x387.jpeg" width="199" height="140.79159049360146" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1aaa7476-14ac-4a27-92be-7bd80b52cee1_547x387.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:387,&quot;width&quot;:547,&quot;resizeWidth&quot;:199,&quot;bytes&quot;:16261,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!u97v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1aaa7476-14ac-4a27-92be-7bd80b52cee1_547x387.jpeg 424w, https://substackcdn.com/image/fetch/$s_!u97v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1aaa7476-14ac-4a27-92be-7bd80b52cee1_547x387.jpeg 848w, https://substackcdn.com/image/fetch/$s_!u97v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1aaa7476-14ac-4a27-92be-7bd80b52cee1_547x387.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!u97v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1aaa7476-14ac-4a27-92be-7bd80b52cee1_547x387.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><em>The 32G version runs about $13.  We&#8217;ve had some issues with adapters in the past and this works reliably.</em></p><p>Good luck with your new Batphone!</p><p>Here are some instructions on best practices on how to use your new &#8220;Batphone&#8221;  and keep it off the internet.</p><p>**************</p><ol><li><p> Keep the device powered off when not in use.  It&#8217;s harder to attack a powered down device.  <a href="https://www.androidpolice.com/you-can-soon-find-your-google-pixel-when-its-turned-off/">Bluetooth can still function for several hours as a &#8220;Find My Device&#8221;</a> feature on Android/GrapheneOS devices ( you should keep this feature OFF).  This is also true for iPhones in case you were wondering.</p></li><li><p>Keep the device inside the sealed Faraday bag.  Most signals won&#8217;t be able to reach the device, improving security.  NOTE:  most common Faraday bags will stop signals down to 800 Mhz.  There are other tracking systems that use lower, more penetrative frequencies, like Lojack for one.</p></li><li><p>Use the &#8220;Batphone&#8221; for important calls only.  Every time you connect to something, you run the risk of an attack.  Use your regular device with privateLINE and when you want to do an important call tell them &#8220;please switch to the Batphone&#8221;.</p></li><li><p>Use a different wifi location each time you call.  This might not be convenient, but cafes out of your area or open wifi not at your home base are best if you are concerned with keeping &#8220;off the grid&#8221;.  Many wifi access points are monitored, so the fewer connections, the better.  Leave your regular phone at home, as it can be used to track you and associate your &#8220;Batphone&#8221; with you when you connect that device.  Keeping your regular phone at home will not set off alarm bells, assume it&#8217;s being monitored and treat it accordingly.</p></li><li><p>Create a dedicated privateLINE account for your &#8220;Batphone&#8221; and a regular privateLINE account for other devices so you won&#8217;t mix them up.  You can use the same account, but your text chats will appear on your other devices.  Only connect with the most important people who care about their personal safety and security, and who also use a Batphone and keep the account name private.</p></li><li><p>Erase text messages after they have been received and viewed by the recipient.</p></li><li><p>Minimize groups.  Prefer one-to-one calls if possible.  </p></li><li><p>Only connect with others who are using a &#8220;Batphone&#8221;.  In the future we will have tools to help you know the security status of the device you are connecting to. (i.e. Blue for private phone and private cell network, Green for regular phone, etc)</p></li><li><p>Move away from other devices that are not secure, anything with a camera, microphone or wifi/Bluetooth capability when making your Batphone call.  Best to close all windows and doors and go out to the garden.  Microphones are very sensitive and can pickup conversations up to 10 offices away.  Use an ultrasonic microphone jammer like this one from AliExpress near the other devices to overwhelm those mics.</p></li></ol><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-XY3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb800fce-3c45-4d97-85e0-391d6a705813_1000x587.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-XY3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb800fce-3c45-4d97-85e0-391d6a705813_1000x587.png 424w, https://substackcdn.com/image/fetch/$s_!-XY3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb800fce-3c45-4d97-85e0-391d6a705813_1000x587.png 848w, https://substackcdn.com/image/fetch/$s_!-XY3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb800fce-3c45-4d97-85e0-391d6a705813_1000x587.png 1272w, https://substackcdn.com/image/fetch/$s_!-XY3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb800fce-3c45-4d97-85e0-391d6a705813_1000x587.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-XY3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb800fce-3c45-4d97-85e0-391d6a705813_1000x587.png" width="1000" height="587" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/eb800fce-3c45-4d97-85e0-391d6a705813_1000x587.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:587,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:167895,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-XY3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb800fce-3c45-4d97-85e0-391d6a705813_1000x587.png 424w, https://substackcdn.com/image/fetch/$s_!-XY3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb800fce-3c45-4d97-85e0-391d6a705813_1000x587.png 848w, https://substackcdn.com/image/fetch/$s_!-XY3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb800fce-3c45-4d97-85e0-391d6a705813_1000x587.png 1272w, https://substackcdn.com/image/fetch/$s_!-XY3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb800fce-3c45-4d97-85e0-391d6a705813_1000x587.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Private&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[6 Ways Big Tech Collects, Then Uses Your Data]]></title><description><![CDATA[Why you should care and what you can do about it]]></description><link>https://blog.privateline.io/p/6-ways-big-tech-collects-then-uses</link><guid isPermaLink="false">https://blog.privateline.io/p/6-ways-big-tech-collects-then-uses</guid><dc:creator><![CDATA[PrivateLine]]></dc:creator><pubDate>Wed, 20 Mar 2024 18:00:22 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!1wyg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6b91d1c-92a5-4ccd-9559-c9cbf89ab4c4_825x500.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>NOTE: You can sign up to be among the first to test our new <a href="https://privateline.io/email-signup">privateLINE.io service HERE</a>.  This service keeps your communications off the internet in your own private enclave without data collection or tracking.</strong></p><p>When phones were copper lines and connected to your local Telephone Company, a warrant was required to listen in on conversations.  Only criminals were wiretapped &#8212; that was what we were told. With the advent of mobile phones and wireless services, a Big Tech layer has been added on top of your phone and internet line &#8212; when you click &#8220;I agree&#8221; to the Terms of Service agreement, you give Big Tech and others permission to collect and use your data. Each app on your phone can have permission to collect your personal data, so long as &#8220;You Agree&#8221;. No warrant is required if you give permission to share your data, and it can be resold to anyone, including law enforcement.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1wyg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6b91d1c-92a5-4ccd-9559-c9cbf89ab4c4_825x500.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1wyg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6b91d1c-92a5-4ccd-9559-c9cbf89ab4c4_825x500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!1wyg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6b91d1c-92a5-4ccd-9559-c9cbf89ab4c4_825x500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!1wyg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6b91d1c-92a5-4ccd-9559-c9cbf89ab4c4_825x500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!1wyg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6b91d1c-92a5-4ccd-9559-c9cbf89ab4c4_825x500.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1wyg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6b91d1c-92a5-4ccd-9559-c9cbf89ab4c4_825x500.jpeg" width="825" height="500" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a6b91d1c-92a5-4ccd-9559-c9cbf89ab4c4_825x500.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:500,&quot;width&quot;:825,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:156147,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1wyg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6b91d1c-92a5-4ccd-9559-c9cbf89ab4c4_825x500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!1wyg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6b91d1c-92a5-4ccd-9559-c9cbf89ab4c4_825x500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!1wyg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6b91d1c-92a5-4ccd-9559-c9cbf89ab4c4_825x500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!1wyg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6b91d1c-92a5-4ccd-9559-c9cbf89ab4c4_825x500.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Your data is being collected everywhere on the internet by thousands of tech companies and application developers, making your private information available to almost anyone who can pay for it.</em></p><p>Multi-billion $ industries are based on your personal and business information. If this data wasn&#8217;t valuable, their services would not be free and those companies would be worthless. If you knew all the ways your data was being used, you would not be happy. It turns out you are worth quite a bit of money to someone, or maybe they just want to keep tabs on your whereabouts. With vast, low-Earth orbit satellite fleets covering the Earth, there will be no escape from the surveillance. Here&#8217;s a recent story about how the <a href="https://www.reuters.com/technology/cybersecurity/national-security-agency-buys-web-browsing-data-without-warrant-letter-shows-2024-01-26/">NSA is buying your data from data brokers without a warrant</a>:</p><blockquote><p>SAN FRANCISCO, Jan 25 (Reuters) - The U.S. National Security Agency buys Americans' internet browsing information from commercial brokers without a warrant, the agency's director told Democratic Senator Ron Wyden in a letter made public on Thursday.</p><p>Wyden, who released the Dec. 11 letter, called upon U.S. intelligence officials to stop using Americans' personal data without their express knowledge and consent, saying it was unlawful.</p></blockquote><p>There are about 4,000 active data brokers who resell data: </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!VlMR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5decbcec-d2e4-44d2-98e4-7c649db4166c_596x557.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VlMR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5decbcec-d2e4-44d2-98e4-7c649db4166c_596x557.jpeg 424w, https://substackcdn.com/image/fetch/$s_!VlMR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5decbcec-d2e4-44d2-98e4-7c649db4166c_596x557.jpeg 848w, https://substackcdn.com/image/fetch/$s_!VlMR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5decbcec-d2e4-44d2-98e4-7c649db4166c_596x557.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!VlMR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5decbcec-d2e4-44d2-98e4-7c649db4166c_596x557.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VlMR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5decbcec-d2e4-44d2-98e4-7c649db4166c_596x557.jpeg" width="596" height="557" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5decbcec-d2e4-44d2-98e4-7c649db4166c_596x557.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:557,&quot;width&quot;:596,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:68706,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!VlMR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5decbcec-d2e4-44d2-98e4-7c649db4166c_596x557.jpeg 424w, https://substackcdn.com/image/fetch/$s_!VlMR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5decbcec-d2e4-44d2-98e4-7c649db4166c_596x557.jpeg 848w, https://substackcdn.com/image/fetch/$s_!VlMR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5decbcec-d2e4-44d2-98e4-7c649db4166c_596x557.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!VlMR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5decbcec-d2e4-44d2-98e4-7c649db4166c_596x557.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Look carefully. By aggregating data from many sources, a complete picture of almost anyone can be computed. Source:  CrackedLabs.org</em></p><p>Let&#8217;s think for a minute. If you gave your permission for someone to collect and use your data according to their terms in an app or device&#8230;.can&#8217;t they legally do with your data as they wish? What about information gathered from public places? Like CCTV on the street? What about grabbing unencrypted comms like email from the open internet? (Note: your email is relayed using plain text after it hits the first relay server, the encryption is only from your software client to your server). There are clear court cases in the USA where there is &#8220;No Expectation of Privacy in Public&#8221;. This is actually a good thing for society, it keeps things in public open and transparent. But where your data is concerned, you need to maintain internet situational awareness and take care or it could end up in the hands of data brokers.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/subscribe?"><span>Subscribe now</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/p/6-ways-big-tech-collects-then-uses?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/p/6-ways-big-tech-collects-then-uses?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p>Someone is buying your information or access to you based on your real time location, who you communicate with, your emails and proximity to others. Everything you type on or say near your phone can be captured. This data collection might be illegal in some places, but remember, once you give someone your permission to do it, it&#8217;s 100% legal. After all, it&#8217;s your information and you agreed in the Terms of Service to grant them access to it. </p><p>Let&#8217;s track the data collection and see where it&#8217;s going and what you can do to minimize what is collected.</p><p>Some people think &#8220;I&#8217;ve got nothing to hide and nothing to worry about&#8221;. Data collection started with security agencies, who have always tracked people of interest for internal and external threats. This was imitated by advertisers and Big Tech, who were financed and advised by these agencies and now collect information on everyone (not just potential threats). The security agencies now have access to a wildly broader source of data that has been collected by Big Tech with permission from&#8230;YOU. Now, China, using technology provided by Big Tech, leads the way with a comprehensive social credit system based on the gathering and use of this personal data. A social credit score entirely influences how you are able to interact with society - from transportation to banking, for starters. In China, CCP Party functionaries are rewarded and good people are punished.  Also, there is substantial industrial espionage and business interference happening you need to be aware of<strong>.</strong> I&#8217;ll show you one solution we have been developing to create your own Safe Space away from the internet and the intrusion of Big Tech &#8212; we call it <strong>privateLINE</strong>.</p><p><strong>privateLINE</strong> is a private network that functions like the internet, but away from the internet. We create an encrypted tunnel from your computer to a secure enclave and give you communications applications that only work in the private enclave. You can find out more about it at <a href="https://privateline.io">privateline.io CLICK HERE</a>. We are beginning the ALPHA service and you can click through to the website, then click on any of  the &#8220;Get&#8230;&#8221; or &#8220;Try&#8230;&#8221; buttons to sign up to be on the waitlist to try it out.</p><p>Data is only valuable when it can be turned into &#8220;actionable information&#8221;. There are laws about government data collection, but if you enter into a private agreement with Big Tech via CLICK TO ACCEPT, you might have agreed to let them exploit your data extensively. Many of these info gathering techniques originated with security services, but now corporations are in on the act and because you agreed to everything, it is 100% legal. After all, you accepted their terms in exchange for watching a video or using some software. They are after your IP address wherever it appears, your location, as well as any associated phone numbers and email addresses, not to mention whatever subject you are talking about. This happens because the companies that purchase your data will then be able to market products and services to you. </p><p>Did you know your conversations are recorded, processed and scored with AI in real time and added to your file? Out in the field at The Ranch, I had a conversation with one of our contractors about a concrete pad. My Android phone was in my pocket and 20 minutes after going inside, I started getting Google Ads for &#8220;concrete pads&#8221;. Extremely spooky. Everything you say in front of the microphones is being recorded and potentially sold or worse.</p><p>The solution is to move away from the internet and keep a private side to your life.  You can still maintain a public presence while keeping certain things private.  <a href="https://privateline.io">Check out privateLINE</a> for one solution to this problem.</p><p>Everything is highly automated with AI and data is collected from:</p><p><strong>Networks</strong> - Phone carriers and ISP&#8217;s have your location, frequency, meta data and frequency with whom you are talking to, which websites you visit and your IP (internet address), phone, email and other data you willingly provided them when you agreed to use their services. Your data also travels over the open internet for things like email, website visits and many other things. These networks not only cooperate with state security agencies (they have to, they are not given a choice &#8212; there is really no escape from state security when using public wires or spectrum), but your data is also &#8220;brokered&#8221; and resold by private companies you willingly gave your data to when you accepted their &#8220;Terms of Service&#8221;.  </p><p>We are all subject to having our data accessed by leaks over the internet. For example when you send an email, while it is encrypted on the first hop, your message is sent via plain text for the next dozen mail server relays. Hurricane Electric is a CCP controlled company, it has ~19% of the public internet IP prefixes, so they have control over those IPs. Anything going through a router controlled by companies like this should be assumed to be &#8220;phoning home your data&#8221; to Beijing. The CCP is doing the same thing every state security service does everywhere, including our NSA and CIA.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CKeU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78cf69c2-0602-45e9-bfa2-083c8e6773f7_833x625.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CKeU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78cf69c2-0602-45e9-bfa2-083c8e6773f7_833x625.jpeg 424w, https://substackcdn.com/image/fetch/$s_!CKeU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78cf69c2-0602-45e9-bfa2-083c8e6773f7_833x625.jpeg 848w, https://substackcdn.com/image/fetch/$s_!CKeU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78cf69c2-0602-45e9-bfa2-083c8e6773f7_833x625.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!CKeU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78cf69c2-0602-45e9-bfa2-083c8e6773f7_833x625.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CKeU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78cf69c2-0602-45e9-bfa2-083c8e6773f7_833x625.jpeg" width="833" height="625" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/78cf69c2-0602-45e9-bfa2-083c8e6773f7_833x625.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:625,&quot;width&quot;:833,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:84582,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!CKeU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78cf69c2-0602-45e9-bfa2-083c8e6773f7_833x625.jpeg 424w, https://substackcdn.com/image/fetch/$s_!CKeU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78cf69c2-0602-45e9-bfa2-083c8e6773f7_833x625.jpeg 848w, https://substackcdn.com/image/fetch/$s_!CKeU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78cf69c2-0602-45e9-bfa2-083c8e6773f7_833x625.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!CKeU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78cf69c2-0602-45e9-bfa2-083c8e6773f7_833x625.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>The notorious Room 641A at ATT. The NSA &#8220;legally&#8221; tapped into all internet communications going through the main ATT switch in San Francisco. The internet is a PUBLIC space and in the USA, there is no expectation of privacy in pubic. Rooms like this are installed at most data centers and telcos in the USA, as well as in other countries. This is why you need a Private Network. Photo credit: Wikipedia.</em></p><p><strong>Hardware</strong> - Everything runs on hardware and software. Backdoors have been built into nearly every commonly available hardware CPU. Extra goodies also get installed in your hardware on the way from Amazon to your front porch, if you are targeted in any way. Intel, AMD and ARM processors all have an &#8220;administrative area&#8221;, accessible by wifi and 3G cellular right on the CPU, in addition to whatever network connection you thought you turned off. This is very difficult to avoid, unless you use 15 year old hardware or a custom chip that can be fully audited and secured. This hardware vulnerability can be found on phones, routers, appliances, doorbells, security and traffic cameras, etc.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!89nP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80485829-fdec-4ea7-a2a9-42b735326cf6_640x227.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!89nP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80485829-fdec-4ea7-a2a9-42b735326cf6_640x227.jpeg 424w, https://substackcdn.com/image/fetch/$s_!89nP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80485829-fdec-4ea7-a2a9-42b735326cf6_640x227.jpeg 848w, https://substackcdn.com/image/fetch/$s_!89nP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80485829-fdec-4ea7-a2a9-42b735326cf6_640x227.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!89nP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80485829-fdec-4ea7-a2a9-42b735326cf6_640x227.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!89nP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80485829-fdec-4ea7-a2a9-42b735326cf6_640x227.jpeg" width="640" height="227" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/80485829-fdec-4ea7-a2a9-42b735326cf6_640x227.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:227,&quot;width&quot;:640,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:43859,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!89nP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80485829-fdec-4ea7-a2a9-42b735326cf6_640x227.jpeg 424w, https://substackcdn.com/image/fetch/$s_!89nP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80485829-fdec-4ea7-a2a9-42b735326cf6_640x227.jpeg 848w, https://substackcdn.com/image/fetch/$s_!89nP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80485829-fdec-4ea7-a2a9-42b735326cf6_640x227.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!89nP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80485829-fdec-4ea7-a2a9-42b735326cf6_640x227.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><strong>Operating System</strong>s - All the major OS have issues. Windows, Mac and even Linux have zero day exploits (unreported flaws that can be hacked) and back doors. A new OS or even one that is cleaned up would be a major undertaking.</p><p><strong>Applications</strong> - Tik Tok is the most obvious offender, but many free applications also track and sell data. When you click &#8220;Agree&#8221; to let them use your mic, they could be recording you everywhere and sending back data. Mics are very sensitive, they can hear your conversation up to ten offices away. Many applications included with mobile devices do this out of the box. We tested a new phone from China and it was sending 100MB of data per day from 20 different apps we had not even used! Beware!</p><p><strong>NOTE: You can sign up to be among the first to test our new <a href="https://privateline.io/email-signup">privateLINE.io service HERE</a>. This service keeps your communications off the internet in your own private enclave without data collection or tracking.</strong></p><p><strong>Internet of Things</strong> - Appliances, TV&#8217;s, cars and anything with electricity can have hidden trackers and microphones. Data is returned via IoT cell networks, which are completely separated from the internet. China was caught grabbing this data in the USA and nothing was done about it. You have to assume the NSA was making a copy for themselves and their &#8220;partners&#8221;.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/subscribe?"><span>Subscribe now</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/p/6-ways-big-tech-collects-then-uses?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/p/6-ways-big-tech-collects-then-uses?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p>Here are some of the most obvious ways your information is collected.</p><ol><li><p> <strong>CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart).</strong> Proving you are not a robot is one thing, but every time that cute grid pops up, your IP address goes right to Google&#8217;s Data Centers. Let&#8217;s say you are using a certain web site, or app, as soon as the CAPTCHA screen loads &#8212; your IP address will be appended to your record at Google. CAPTCHA is so ubiquitous it&#8217;s become a meme:</p></li></ol><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3VL3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4059d72d-1f6b-4305-bb8b-9a7c2f6db43b_500x1096.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3VL3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4059d72d-1f6b-4305-bb8b-9a7c2f6db43b_500x1096.webp 424w, https://substackcdn.com/image/fetch/$s_!3VL3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4059d72d-1f6b-4305-bb8b-9a7c2f6db43b_500x1096.webp 848w, https://substackcdn.com/image/fetch/$s_!3VL3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4059d72d-1f6b-4305-bb8b-9a7c2f6db43b_500x1096.webp 1272w, https://substackcdn.com/image/fetch/$s_!3VL3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4059d72d-1f6b-4305-bb8b-9a7c2f6db43b_500x1096.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3VL3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4059d72d-1f6b-4305-bb8b-9a7c2f6db43b_500x1096.webp" width="376" height="824.192" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4059d72d-1f6b-4305-bb8b-9a7c2f6db43b_500x1096.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1096,&quot;width&quot;:500,&quot;resizeWidth&quot;:376,&quot;bytes&quot;:36558,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!3VL3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4059d72d-1f6b-4305-bb8b-9a7c2f6db43b_500x1096.webp 424w, https://substackcdn.com/image/fetch/$s_!3VL3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4059d72d-1f6b-4305-bb8b-9a7c2f6db43b_500x1096.webp 848w, https://substackcdn.com/image/fetch/$s_!3VL3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4059d72d-1f6b-4305-bb8b-9a7c2f6db43b_500x1096.webp 1272w, https://substackcdn.com/image/fetch/$s_!3VL3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4059d72d-1f6b-4305-bb8b-9a7c2f6db43b_500x1096.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><ol start="2"><li><p><strong>Facebook</strong> - Facebook is a spying machine that was originally known as Lifelog (created by the CIA), before becoming Facebook. You are tracked through both your &#8220;private messages&#8221; and what you post on the Facebook site, they also track your visits on other sites with their tools on other sites, such as commenting, buttons and other syndicated features.</p></li></ol><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BujS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb189b03f-b612-49e1-9f88-50bae8597845_480x474.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BujS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb189b03f-b612-49e1-9f88-50bae8597845_480x474.jpeg 424w, https://substackcdn.com/image/fetch/$s_!BujS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb189b03f-b612-49e1-9f88-50bae8597845_480x474.jpeg 848w, https://substackcdn.com/image/fetch/$s_!BujS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb189b03f-b612-49e1-9f88-50bae8597845_480x474.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!BujS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb189b03f-b612-49e1-9f88-50bae8597845_480x474.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BujS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb189b03f-b612-49e1-9f88-50bae8597845_480x474.jpeg" width="318" height="314.025" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b189b03f-b612-49e1-9f88-50bae8597845_480x474.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:474,&quot;width&quot;:480,&quot;resizeWidth&quot;:318,&quot;bytes&quot;:39217,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!BujS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb189b03f-b612-49e1-9f88-50bae8597845_480x474.jpeg 424w, https://substackcdn.com/image/fetch/$s_!BujS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb189b03f-b612-49e1-9f88-50bae8597845_480x474.jpeg 848w, https://substackcdn.com/image/fetch/$s_!BujS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb189b03f-b612-49e1-9f88-50bae8597845_480x474.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!BujS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb189b03f-b612-49e1-9f88-50bae8597845_480x474.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Facebook spying is so widespread humorous memes have been created about it.</em></p><ol start="3"><li><p> <strong>Google</strong> - Probably the greatest spy machine ever devised, it tracks you nearly everywhere on the internet, and it also tracks your phone&#8217;s location, microphone, camera, photos (with GPS embedded), videos. The microphone routinely listens as long as the phone is turned on and even while it&#8217;s sitting unused in your pocket. As mentioned above, I had a conversation with a contractor and twenty minutes later I was getting ads for &#8220;concrete pads&#8221; (I had only mentioned it to him), never in any email. Google controls 84% of internet search, and much of the web site authentication and tracking. Analytics is used on most sites and all your web site visit data is grabbed there.</p></li></ol><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!g1NK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8162e687-d6a2-41e4-b890-f2d4d2d81de8_368x321.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!g1NK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8162e687-d6a2-41e4-b890-f2d4d2d81de8_368x321.webp 424w, https://substackcdn.com/image/fetch/$s_!g1NK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8162e687-d6a2-41e4-b890-f2d4d2d81de8_368x321.webp 848w, https://substackcdn.com/image/fetch/$s_!g1NK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8162e687-d6a2-41e4-b890-f2d4d2d81de8_368x321.webp 1272w, https://substackcdn.com/image/fetch/$s_!g1NK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8162e687-d6a2-41e4-b890-f2d4d2d81de8_368x321.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!g1NK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8162e687-d6a2-41e4-b890-f2d4d2d81de8_368x321.webp" width="368" height="321" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8162e687-d6a2-41e4-b890-f2d4d2d81de8_368x321.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:321,&quot;width&quot;:368,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:5874,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!g1NK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8162e687-d6a2-41e4-b890-f2d4d2d81de8_368x321.webp 424w, https://substackcdn.com/image/fetch/$s_!g1NK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8162e687-d6a2-41e4-b890-f2d4d2d81de8_368x321.webp 848w, https://substackcdn.com/image/fetch/$s_!g1NK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8162e687-d6a2-41e4-b890-f2d4d2d81de8_368x321.webp 1272w, https://substackcdn.com/image/fetch/$s_!g1NK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8162e687-d6a2-41e4-b890-f2d4d2d81de8_368x321.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Single sign on has been the holy grail for Big Tech.  They know every app and web site you have joined and how often you visit when you click on their icon &#8220;for convenience&#8221;.  There is often a price for one click convenience.</em></p><ol start="4"><li><p><strong>Zoom video conferencing</strong> - Assume everything on Zoom goes back to China and they collect all calls, chats and contacts you are communicating with. Even though they claim to have &#8220;cleaned up&#8221; these reported problems, it shows a lack of care and you should avoid this app. Don&#8217;t take my word for it, this has been very well documented:</p></li></ol><p><a href="https://www.voanews.com/a/zoom-gets-more-popular-despite-worries-about-links-to-china/6282120.html">Zoom Gets More Popular Despite Worries About Links to China</a></p><p><a href="https://www.secureworld.io/industry-news/zoom-traffic-through-china-data-routing-controls">Zoom Traffic Through China: Company Apologizes, Announces You Can Control Data Routing</a></p><p><a href="https://www.secureworld.io/industry-news/zoom-traffic-through-china-data-routing-controls">STOP using ZOOM or risk being WATCHED by the Chinese Communist Party (CCP)</a></p><ol start="5"><li><p><strong>Your car</strong> - Mozilla and Electronic Frontier Foundation (EFF) did a study of data collected by cars, here is what they found: &#8220;Mozilla breaks down four main reasons why it finds car privacy (or lack thereof) so concerning. They are;</p><ol><li><p>They collect too much personal data (all of them)</p></li><li><p>Most (84%) share or sell your data</p></li><li><p>Most (92%) give drivers little to no control over their personal data</p></li><li><p>We couldn&#8217;t confirm whether any of them meet our Minimum Security Standards</p><p></p><p>Perhaps the most concerning aspect of the study is that each car brand Mozilla tested failed miserably in the privacy test. The foundation finds that cars are collecting more data than necessary for driving, and cars are in a unique position to collect a lot of data about you, since they take you almost everywhere.&nbsp;</p><p></p><p>"They can collect personal information from how you interact with your car, the connected services you use in your car, the car&#8217;s app (which provides a gateway to information on your phone), and can gather even more information about you from third party sources like Sirius XM or Google Maps. It&#8217;s a mess," the study says.&nbsp;Additionally, over half (56%) of car brands tested will share your data with government agencies or law enforcement from a simple request -- not a formal one. 84% of those tested will share your data, and&nbsp;76% can sell it.</p><p></p><p>It goes beyond just the data from your car and how you drive; how often you speed, the number of &#8220;near misses&#8221; you had including &#8220;hard braking&#8221;, etc.  That info will be fed to your insurance company and affect your rates. That oil change or any maintenance you just got, the shop records the mileage and that gets sold to the data brokers.</p><p></p><p>The takeaway here is that, if you drive a modern car with smart capabilities such as trackers, sensors, camera, and preinstalled apps, it's probably tracking you.&#8221; What can you do about it?  Drive an older model car.  The data collection is built deep into the electronics and it will be difficult to untangle things.</p><p></p></li></ol></li><li><p> <strong>Household &#8220;Smart&#8221; Devices -</strong>  Your doorbell camera and household devices (Roomba, Alexa, etc) are sure handy, but most are data vacuums, in addition to whatever dirt they clean off your floor. Anything with a camera or microphone can be turned on at any time to listen or watch what&#8217;s going on around it.  The Ring cameras are quite popular, but who has access to them?</p><blockquote><p>In some cases, yes. Ring says that it will still <strong><a href="https://reviewed.usatoday.com/smarthome/features/can-police-access-security-camera-footage-what-to-know">cooperate with law enforcement</a></strong> when a search warrant is present, and Ring still has the right to share user data without consent. Ring said in an interview with <em><strong><a href="https://www.theverge.com/2024/1/24/24049165/ring-police-neighbors-app-clips-search-warrant">The Verge</a></strong></em> that police can request footage in &#8220;emergencies&#8221; without obtaining a search warrant&#8212;making when and how law enforcement obtain footage arguably less transparent than before. I guess it depends on what kind of emergency the police are having&#8230;. </p></blockquote><p>Those robo vacuums make <a href="https://www.nytimes.com/2017/07/25/technology/roomba-irobot-data-privacy.html">nice maps of the inside of your home</a>, in addition to keeping things tidy.</p><blockquote><p>High-end models of Roomba, iRobot&#8217;s robotic vacuum, collect data as they clean, identifying the locations of your walls and furniture. This helps them avoid crashing into your couch, but it also creates a map of your home that iRobot could share with Amazon, Apple or Google.</p></blockquote><p>And when it comes to Alexa, it&#8217;s always listening (if only for the word &#8220;Alexa&#8221;).  The <a href="https://www.thesun.co.uk/tech/9611689/outrage-as-amazons-alexa-listens-to-brits-having-sex-rowing-swearing-and-sharing-medical-news/">UK Sun reported</a> the surprising sounds that triggered Alexa:</p><blockquote><p><strong>A SUN investigation today reveals Amazon staff can listen to Alexa recordings of British couples rowing, discussing private family matters &#8212; and having sex. </strong>The sounds of lovemaking are among noises that can trigger Alexa-activated Echo speakers, which make recordings as users speak to them.</p></blockquote></li><li><p> <strong>Your phone - </strong>This is the big one. People carry their phones everywhere.  Your phone has a number of ways it can be used to spy on you with the microphone, camera, gps location, and other sensors. This data can reveal many things about you. It used to be you could remove the battery from your phone if you wanted privacy, but that is no longer an option. Batteries are locked inside phones to save on manufacturing costs. The best way to gain privacy is to put the phone out of earshot, which is not easy since phone microphones are very sensitive. A friend was told by someone in a security agency &#8220;phone mics can hear everything ten offices away&#8221;. We need to be careful. Apps are also spying on you using the sensors and <a href="https://www.abc15.com/news/let-joe-know/which-apps-are-collecting-personal-data-on-you">anything else you give them permission to do</a>.</p><blockquote><p>Most people don't know that by installing a phone app you agree to terms beyond what you may think you agreed to. One example is thinking you're just allowing an app to access your photos. "They don't realize that also included in the things they agreed to are their browsing history, their search history, things they purchased, financial information, health and fitness data," she said.</p></blockquote><p>A few years ago, <a href="https://whatphone.com.au/guide/the-scary-secrets-behind-how-much-data-your-smartphone-collects-about-you/">another study was done</a> on how much data was being collected:</p><blockquote><p>New research conducted at Carnegie Mellon University asked 23 users of Android&#8217;s version 4.3 to use their smartphone, and tracked requests for location data from each device with specially designed software. The study revealed that many popular <a href="http://time.com/3754626/apps-collect-location-data/">Android apps tracked their user</a> nearly 6,200 times per participant over two weeks &#8211; that&#8217;s every three minutes. The study found that apps asked for more data than was needed. The participants received daily messages telling them how many times their personal information lists had been shared, and some privacy nudges were particularly alarming. For example, over just a few days your location could have been shared 5,398 times with Groupon, Facebook, and more. One participant reacted to these nudges by saying that he felt like he was being followed by his own phone. The amount of location <a href="https://www.dailymail.co.uk/sciencetech/article-3013164/Do-know-smartphone-sharing-personal-data-Results-experiment-shock-public.html">information shared</a> can be quite alarming.</p></blockquote><p>That there is a mountain of data on you collected every day should not be surprising, and once it goes to a data broker, it will be sold to anyone with money.</p></li></ol><p><strong>NOTE: You can sign up to be among the first to test our new <a href="https://privateline.io/email-signup">privateLINE.io service HERE</a>.  This service keeps your communications off the internet in your own private enclave without data collection or tracking.</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/subscribe?"><span>Subscribe now</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/p/6-ways-big-tech-collects-then-uses?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/p/6-ways-big-tech-collects-then-uses?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[The Safest Way to Communicate Isn't What You Think]]></title><description><![CDATA[the internet is not your friend]]></description><link>https://blog.privateline.io/p/the-safest-way-to-communicate-isnt</link><guid isPermaLink="false">https://blog.privateline.io/p/the-safest-way-to-communicate-isnt</guid><dc:creator><![CDATA[PrivateLine]]></dc:creator><pubDate>Sat, 03 Feb 2024 16:10:02 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!mT9L!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bd59667-865c-4210-90e2-2fc9a9e5f6b9_881x557.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mT9L!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bd59667-865c-4210-90e2-2fc9a9e5f6b9_881x557.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mT9L!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bd59667-865c-4210-90e2-2fc9a9e5f6b9_881x557.png 424w, https://substackcdn.com/image/fetch/$s_!mT9L!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bd59667-865c-4210-90e2-2fc9a9e5f6b9_881x557.png 848w, https://substackcdn.com/image/fetch/$s_!mT9L!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bd59667-865c-4210-90e2-2fc9a9e5f6b9_881x557.png 1272w, https://substackcdn.com/image/fetch/$s_!mT9L!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bd59667-865c-4210-90e2-2fc9a9e5f6b9_881x557.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mT9L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bd59667-865c-4210-90e2-2fc9a9e5f6b9_881x557.png" width="410" height="259.21679909194097" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2bd59667-865c-4210-90e2-2fc9a9e5f6b9_881x557.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:557,&quot;width&quot;:881,&quot;resizeWidth&quot;:410,&quot;bytes&quot;:314317,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!mT9L!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bd59667-865c-4210-90e2-2fc9a9e5f6b9_881x557.png 424w, https://substackcdn.com/image/fetch/$s_!mT9L!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bd59667-865c-4210-90e2-2fc9a9e5f6b9_881x557.png 848w, https://substackcdn.com/image/fetch/$s_!mT9L!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bd59667-865c-4210-90e2-2fc9a9e5f6b9_881x557.png 1272w, https://substackcdn.com/image/fetch/$s_!mT9L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2bd59667-865c-4210-90e2-2fc9a9e5f6b9_881x557.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The safest way to communicate is to go out in the woods far away from all electronics and whisper in someone&#8217;s ear. No one can hear you and you know the message was received.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/p/the-safest-way-to-communicate-isnt?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/p/the-safest-way-to-communicate-isnt?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/subscribe?"><span>Subscribe now</span></a></p><p>That might be safe, but it isn&#8217;t practical for those not in close proximity to the other person &#8212; after all, if someone was down the hall, you could just walk over and say hello. For the rest of us, communications technology is quite handy and immediate when we are at a distance. The safest way for us to communicate is over a private network, away from the internet.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Private&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2cxk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F029a58ba-84b5-4d4b-b1af-802d5bfb2c74_2574x1770.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2cxk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F029a58ba-84b5-4d4b-b1af-802d5bfb2c74_2574x1770.png 424w, https://substackcdn.com/image/fetch/$s_!2cxk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F029a58ba-84b5-4d4b-b1af-802d5bfb2c74_2574x1770.png 848w, https://substackcdn.com/image/fetch/$s_!2cxk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F029a58ba-84b5-4d4b-b1af-802d5bfb2c74_2574x1770.png 1272w, https://substackcdn.com/image/fetch/$s_!2cxk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F029a58ba-84b5-4d4b-b1af-802d5bfb2c74_2574x1770.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2cxk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F029a58ba-84b5-4d4b-b1af-802d5bfb2c74_2574x1770.png" width="1456" height="1001" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/029a58ba-84b5-4d4b-b1af-802d5bfb2c74_2574x1770.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1001,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1319407,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!2cxk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F029a58ba-84b5-4d4b-b1af-802d5bfb2c74_2574x1770.png 424w, https://substackcdn.com/image/fetch/$s_!2cxk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F029a58ba-84b5-4d4b-b1af-802d5bfb2c74_2574x1770.png 848w, https://substackcdn.com/image/fetch/$s_!2cxk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F029a58ba-84b5-4d4b-b1af-802d5bfb2c74_2574x1770.png 1272w, https://substackcdn.com/image/fetch/$s_!2cxk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F029a58ba-84b5-4d4b-b1af-802d5bfb2c74_2574x1770.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>A private network isolates you from the internet and its many threats while prevent censorship of your valuable communications and helping protect your financial transactions.</em></p><p>Your typical VPN and &#8220;secure messenger&#8221; over the internet - they aren&#8217;t everything they are promoted to be as you will see. What can you do about this? We&#8217;ve been working hard on developing a tech solution we call Private Line.</p><h3>Is Encryption Secure?</h3><p>Sure it&#8217;s secure&#8230;if you are trying to keep out the local high school hacker and maybe low level criminal gangs. Use logic. If encryption was so secure that &#8220;they&#8221; could not get into it, would &#8220;they&#8221; let you have it? No. Encryption needs to be strong enough to keep certain threats out but allow certain security agencies to have full transparency of everything. Otherwise encryption could be used like a weapon (against people like WEF Prof. Schwab and his friends). Here is how they think:</p><div id="youtube2--Z5fXBC3o_4" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;-Z5fXBC3o_4&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/-Z5fXBC3o_4?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p><em>&#8220;In this new world, we must accept transparency, and I&#8217;ll even say total transparency. Everything is going to be transparent, and you have to get used to it, you have to behave accordingly. It becomes, how should I put it, integrated into your personality, but if you have nothing to hide, you shouldn&#8217;t be afraid.&#8221;</em></p><p>How are bank systems like the SWIFT Network secured? I ran into someone who had worked for SWIFT, traveling the world installing network and security software at banks who were joining their network. She told me that she had two handlers; one from NSA, the other from the CIA. Each spy watched over her and the other spy to be sure no one was putting anything malicious into the system. After all, spies and bankers trust no one, especially not spies nor bankers. They were using special bank grade cryptography, which has far greater security than the public is permitted to use. This also shows the level of cooperation between banking and spying, something discovered early on by the Rothschilds.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JU5k!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca3a490f-2d45-4329-a580-1a0f08e823af_1024x541.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JU5k!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca3a490f-2d45-4329-a580-1a0f08e823af_1024x541.png 424w, https://substackcdn.com/image/fetch/$s_!JU5k!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca3a490f-2d45-4329-a580-1a0f08e823af_1024x541.png 848w, https://substackcdn.com/image/fetch/$s_!JU5k!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca3a490f-2d45-4329-a580-1a0f08e823af_1024x541.png 1272w, https://substackcdn.com/image/fetch/$s_!JU5k!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca3a490f-2d45-4329-a580-1a0f08e823af_1024x541.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JU5k!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca3a490f-2d45-4329-a580-1a0f08e823af_1024x541.png" width="1024" height="541" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ca3a490f-2d45-4329-a580-1a0f08e823af_1024x541.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:541,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:91008,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!JU5k!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca3a490f-2d45-4329-a580-1a0f08e823af_1024x541.png 424w, https://substackcdn.com/image/fetch/$s_!JU5k!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca3a490f-2d45-4329-a580-1a0f08e823af_1024x541.png 848w, https://substackcdn.com/image/fetch/$s_!JU5k!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca3a490f-2d45-4329-a580-1a0f08e823af_1024x541.png 1272w, https://substackcdn.com/image/fetch/$s_!JU5k!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fca3a490f-2d45-4329-a580-1a0f08e823af_1024x541.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Commercial services must exist in the &#8220;Bank&#8221; level or below. Operate a &#8220;weapon&#8221; level service and you will be out of business. &#8220;Military Grade&#8221; means the military and others can get in &#8212; the data is fully transparent to certain groups but not to anyone else. Big Tech lives in the Open Source world, where software is engineered to solve problems while collecting your data at the same time.</em></p><h3>The Myth of VPN&#8217;s</h3><p>What about VPN&#8217;s? They are not as private as you think. When I tell people this, you can see the sadness in their eyes&#8230;they truly believed they actually had privacy. Sorry for that.</p><p>A friend who consults on these matters had done research on VPN&#8217;s and he shared some information with me (paraphrased from his email to protect his confidence):</p><blockquote><p>Research using tools like DNSlytics, Netlas, and others suggest<br>that more than 65 percent of VPN operators use the M247 infrastructure<br>for end points from VPNs. Customers include several famous internet brand names we will not mention here, NOTE: if you carefully examine the egress points of your VPN, you should be able to see if they use M247.</p><p>The M247 operates primarily out of Bucharest, Romania. A map<br>of the firm's "servers" and "points of presence" is available at <a href="https://m247.com/eu/">LINK </a>and <a href="https://m247.com/ro-ro/de-ce-m247/despre-noi/">HERE</a>.</p><p>In October 2016, Metronet acquired M247, for about US$52 million <a href="https://www.privateequitywire.co.uk/m247-acquired-metronet/#:~:text=Following%20the%20acquisition%20of%20M247,across%20the%20UK%20and%20Europe.">LINK</a>. People running Metronet came from UK telcos. It is important to note that UK based telcos and ISPs allegedly cooperate fully with the UK National Crime Agency and GCHQ (UK&#8217;s version of NSA).</p></blockquote><p>NOTE: Once the USA, UK, Israel, Japan, Australia, Canada and New Zealand have something, they all have access to it. It&#8217;s no longer FIVE EYES, it&#8217;s now SEVEN EYES.</p><p>At Unseen we built a hardware based VPN. Within a year of release, these were banned in China and Russia &#8212; I guess that means they worked. One of our customers told us our hardware VPN was the only VPN he couldn&#8217;t detect and he had tested 60 VPNs. Everyone else used standard OpenVPN and other software tools that left clear signatures in the data, which is how they were detected. There&#8217;s a very good chance we might bring something similar to this to our network.</p><p>Regular VPN&#8217;s dump you out on the Internet in other places and countries. You are still facing the same spying and threats of the internet when using a VPN because you are again on the open internet. Only when you connect directly to a server itself are you secure.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/p/the-safest-way-to-communicate-isnt?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/p/the-safest-way-to-communicate-isnt?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h4></h4><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/subscribe?"><span>Subscribe now</span></a></p><h3>Secure Messengers</h3><p>Signal users went into a tizzy when the CEO of Signal started begging for money because the main source of funding for them was a branch of the US government and it was drying up. The US government doesn&#8217;t spend money unless it achieves their goals and I believe these were related to giving secure comms to certain overseas groups who were opposed to their local governments. It&#8217;s also a handy honeypot for domestic security, as well. Their annual budget for personnel was about $19m for about 50 staff <a href="https://signal.org/blog/signal-is-expensive/">LINK</a>, in addition to hosting and storage costs. That&#8217;s about $380,000 per employee. We should all wish to work at Signal, LOL. There are a number of eye-openers on that blog post from Signal.</p><p>Here&#8217;s a video you need to watch, if you use We Chat, Signal or Telegram. It&#8217;s a person speaking to the Scottish parliament and most who see this have a sudden epiphany, like finding out Santa isn&#8217;t real:</p><div id="youtube2-1l02KVL4dOo" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;1l02KVL4dOo&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/1l02KVL4dOo?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p><em>The shock was apparent from everyone I sent this video to admitting that the government (and implying all of them) have access to these messages.</em></p><p>I don&#8217;t need to say another word about secure messengers, since this is right from the horse&#8217;s mouth. Apparently, end to end encryption and everything else about these messengers was a joke.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://decodetheworld.substack.com/p/the-safest-way-to-communicate-isnt?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&amp;token=eyJ1c2VyX2lkIjoxODUzMjk0NzIsInBvc3RfaWQiOjE0MTA4MzY1NSwiaWF0IjoxNzA2OTc2MTgwLCJleHAiOjE3MDk1NjgxODAsImlzcyI6InB1Yi0xMTAxMDUyIiwic3ViIjoicG9zdC1yZWFjdGlvbiJ9.CqQaZceWtYvxgVCkPWXtzssf9KtpQikUOqY_fRi82eA&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://decodetheworld.substack.com/p/the-safest-way-to-communicate-isnt?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&amp;token=eyJ1c2VyX2lkIjoxODUzMjk0NzIsInBvc3RfaWQiOjE0MTA4MzY1NSwiaWF0IjoxNzA2OTc2MTgwLCJleHAiOjE3MDk1NjgxODAsImlzcyI6InB1Yi0xMTAxMDUyIiwic3ViIjoicG9zdC1yZWFjdGlvbiJ9.CqQaZceWtYvxgVCkPWXtzssf9KtpQikUOqY_fRi82eA"><span>Share</span></a></p><h3>Hardware, Software and Networks</h3><p>Hardware is nearly all corrupted in several places. The most obvious is the CPU &#8212; all major CPU&#8217;s have an administrative section which has God mode powers along with wifi and 3G access built in, separate from the wifi, cellular or ethernet access. Originally installed in x86 processors, this is now a &#8220;feature&#8221; of all current CPU&#8217;s, though it might not be called Management Engine.</p><p><a href="https://www.csoonline.com/article/562761/researchers-say-now-you-too-can-disable-intel-me-backdoor-thanks-to-the-nsa.html">Here&#8217;s an article</a> that discusses the &#8220;Management Engine&#8221; back door:</p><blockquote><p>The <strong><a href="https://www.eff.org/deeplinks/2017/05/intels-management-engine-security-hazard-and-users-need-way-disable-it">EFF described Intel ME</a></strong> as a &#8220;largely undocumented master controller for your CPU: it works with system firmware during boot and has direct access to system memory, the screen, keyboard and network.&#8221;</p><p>Back in June 2016, <strong><a href="https://boingboing.net/2016/06/15/intel-x86-processors-ship-with.html">hardware hacker Damien Zammit warned</a></strong>, &#8220;Recent Intel x86 processors implement a secret, powerful control mechanism that runs on a separate chip that no one is allowed to audit or examine. When these are eventually compromised, they&#8217;ll expose all affected systems to nearly unkillable, undetectable rootkit attacks.&#8221;</p></blockquote><p>Translation: someone with access to this God mode basically owns your computer and can see and hear everything happening on it. All major CPU&#8217;s have this &#8220;feature&#8221;. ARM, inside your phone, AMD and of course Intel Inside. Intel processors have had hidden wifi and 3G connections for many years.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/subscribe?"><span>Subscribe now</span></a></p><p>Here are some general rules of thumb about Big Tech spying:</p><p>-Assume your phone is always listening. Google spies on everything you say. I&#8217;ve personally experience talking with my Android phone in my pocket about pouring a concrete pad and 20 minutes later got ads for concrete pads when I went back inside. All Big Tech does this. Taking your battery out used to be an easy way to stop this when you needed more privacy, but batteries are no longer removable. That was handy for Big Tech, wasn&#8217;t it?</p><p>-Most devices with electricity could be used for eavesdropping and they connect via cellular IoT bands. IoT is the last unregulated area of the internet and it has billions of devices connected to it. This includesTV&#8217;s (which have both cameras and microphones), ovens, washing machines, stereos, etc.. Eavesdropping can be done remotely or through apps on your device. In the case of TV&#8217;s the easiest fix is to put a piece of tape over the camera. The microphones used in these devices are dirt cheap, so they will be put everywhere. A friend with a relative at a Chinese security agency told me they can hear ten offices away through a phone microphone. It&#8217;s not only your devices spying on you, it&#8217;s everything else around you.</p><div id="youtube2-0x6TOtkFQxY" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;0x6TOtkFQxY&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/0x6TOtkFQxY?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>-Avoid electronics made by Chinese firms. Here is one case of a clothes iron that had a wifi hacking device inside that sends spam and malware to your network <a href="https://blog.knowbe4.com/bid/362187/hacked-chinese-clothes-iron-sends-spam-and-malware">LINK</a>.</p><p>-Disable anything with Google. Apple is a little better, but since Steve died, many things he would have forbidden have no doubt been compromised.</p><p>The internet is a collection of private networks connected to each other. Everything works well, as long as everyone cooperates. In unstable times, however, things start to break down and it&#8217;s time to &#8220;lock the gate&#8221;.</p><p>Policies of each network affect what you can do on the network and this is becoming a problem with de-platforming and censorship. Additionally, the openness of the networks allow security agencies, Big Tech and hackers to collect data and censor data easily. One way to do this is to hack an existing router, or in the case of security agencies, to install a router in line at the data center. We saw this at Xoom.com in 1997, with a special NSA room at our ISP that was collecting all email and web site visits. No one is the wiser while everything is vacuumed up &#8212; and of course the ISP is paid well for this service. No one knows where all that data goes, as it&#8217;s shared among different agencies who no doubt trade it with others and even sell it for profit.</p><h3>The Internet is Becoming Adversarial</h3><p>The internet has become adversarial and most of the threats you need to worry about are on the public internet. What is not well known is we are entering the next phase of the information war which involves the direct censorship and the altering of information. If you can&#8217;t get a message through in the first place, whatever level of security you have on that message is worthless. What is needed is a private network for Anti-censorship and the network is the key to getting your message through.</p><p>Routers carry your information and because they are exposed to the public internet, they are a major potential problem, as this screen grab shows. In 2014, <a href="https://www.engadget.com/2016-08-21-nsa-technique-for-cisco-spying.html">Edward Snowden talked about router hacking and toolkits</a> that allow access to Quality of Service (QoS) settings inside the router and many other functions. Just hack in and lower the QoS and you can block access to a web site, like this screenshot demonstrates:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ipPX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1dd37449-d22c-4973-be8b-cabf73c6f723_857x458.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ipPX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1dd37449-d22c-4973-be8b-cabf73c6f723_857x458.png 424w, https://substackcdn.com/image/fetch/$s_!ipPX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1dd37449-d22c-4973-be8b-cabf73c6f723_857x458.png 848w, https://substackcdn.com/image/fetch/$s_!ipPX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1dd37449-d22c-4973-be8b-cabf73c6f723_857x458.png 1272w, https://substackcdn.com/image/fetch/$s_!ipPX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1dd37449-d22c-4973-be8b-cabf73c6f723_857x458.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ipPX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1dd37449-d22c-4973-be8b-cabf73c6f723_857x458.png" width="857" height="458" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1dd37449-d22c-4973-be8b-cabf73c6f723_857x458.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:458,&quot;width&quot;:857,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:180521,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!ipPX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1dd37449-d22c-4973-be8b-cabf73c6f723_857x458.png 424w, https://substackcdn.com/image/fetch/$s_!ipPX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1dd37449-d22c-4973-be8b-cabf73c6f723_857x458.png 848w, https://substackcdn.com/image/fetch/$s_!ipPX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1dd37449-d22c-4973-be8b-cabf73c6f723_857x458.png 1272w, https://substackcdn.com/image/fetch/$s_!ipPX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1dd37449-d22c-4973-be8b-cabf73c6f723_857x458.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>This is an MTR chart, it shows the path of packets of information from your computer to the server you are trying to reach. In this case, two routers at Hurricane Electric in California, which is alleged to be affiliated with the CCP, dropped 75% and 89% of the packets, making communications impossible. This kind of attack destroyed Unseen &#8212; customers could not reach our server and they requested refunds. You should expect to see missing email, phone calls and blockages to become more frequent.</em></p><h3>Big Tech Spying is Ubiquitous</h3><p>A friend who is a contractor for Google told me Google does not allow their vendors to use Gmail and other public facing services when communicating with Google. LOL! I guess the spying is so bad they won&#8217;t even use the services themselves.</p><p>Data is collected from the entire internet by Big Tech. No one has any idea what it is exactly used for or who it is shared with. Here are some examples of data collection you might not be aware of:</p><ul><li><p>CAPTCHA - those cute grids that have become popular memes, they collect your IP address every time you solve them.</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!g7Yy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f6249ea-34e8-495d-9061-2dd68c1b7389_427x480.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!g7Yy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f6249ea-34e8-495d-9061-2dd68c1b7389_427x480.jpeg 424w, https://substackcdn.com/image/fetch/$s_!g7Yy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f6249ea-34e8-495d-9061-2dd68c1b7389_427x480.jpeg 848w, https://substackcdn.com/image/fetch/$s_!g7Yy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f6249ea-34e8-495d-9061-2dd68c1b7389_427x480.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!g7Yy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f6249ea-34e8-495d-9061-2dd68c1b7389_427x480.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!g7Yy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f6249ea-34e8-495d-9061-2dd68c1b7389_427x480.jpeg" width="427" height="480" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4f6249ea-34e8-495d-9061-2dd68c1b7389_427x480.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:480,&quot;width&quot;:427,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:137333,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!g7Yy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f6249ea-34e8-495d-9061-2dd68c1b7389_427x480.jpeg 424w, https://substackcdn.com/image/fetch/$s_!g7Yy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f6249ea-34e8-495d-9061-2dd68c1b7389_427x480.jpeg 848w, https://substackcdn.com/image/fetch/$s_!g7Yy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f6249ea-34e8-495d-9061-2dd68c1b7389_427x480.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!g7Yy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f6249ea-34e8-495d-9061-2dd68c1b7389_427x480.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>CAPTCHAS are ubiquitous to the point they are now used for jokes.</em></p><ul><li><p>fonts - collecting your IP from every web page the fonts are on.</p></li><li><p>DNS (Google and Cloudflare)- collecting your IP and sites you visit</p></li><li><p>Open source software - has had trackers installed. Where are the code reviewers?</p></li></ul><h3>Private Networks Will Play a Key Role in Your Personal and Business CyberSecurity</h3><p>Here is the big picture:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!r0zs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04d36b4e-fa26-4eef-bccd-0f9b22a1ffee_894x531.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!r0zs!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04d36b4e-fa26-4eef-bccd-0f9b22a1ffee_894x531.png 424w, https://substackcdn.com/image/fetch/$s_!r0zs!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04d36b4e-fa26-4eef-bccd-0f9b22a1ffee_894x531.png 848w, https://substackcdn.com/image/fetch/$s_!r0zs!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04d36b4e-fa26-4eef-bccd-0f9b22a1ffee_894x531.png 1272w, https://substackcdn.com/image/fetch/$s_!r0zs!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04d36b4e-fa26-4eef-bccd-0f9b22a1ffee_894x531.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!r0zs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04d36b4e-fa26-4eef-bccd-0f9b22a1ffee_894x531.png" width="894" height="531" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/04d36b4e-fa26-4eef-bccd-0f9b22a1ffee_894x531.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:531,&quot;width&quot;:894,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:120404,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!r0zs!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04d36b4e-fa26-4eef-bccd-0f9b22a1ffee_894x531.png 424w, https://substackcdn.com/image/fetch/$s_!r0zs!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04d36b4e-fa26-4eef-bccd-0f9b22a1ffee_894x531.png 848w, https://substackcdn.com/image/fetch/$s_!r0zs!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04d36b4e-fa26-4eef-bccd-0f9b22a1ffee_894x531.png 1272w, https://substackcdn.com/image/fetch/$s_!r0zs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04d36b4e-fa26-4eef-bccd-0f9b22a1ffee_894x531.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Existing devices such as cellular phones, laptops and desktop computers can access Private Line&#8217;s enclave for services such as private chat, calling and file sharing, as well as other applications like crypto wallets, financial applications, marketplaces and forums. All are sequestered inside the firewall and are not accessible to the public internet. Away from threats of the internet and Big Tech.</em></p><p>If things become bad on the Internet, we will build our own private Internet for our clients, colleagues, friends and family. A place for members only, with our own terms of service, privacy policies and without censorship. We call it Private Line and we hope you will come along for this exciting journey!</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/p/the-safest-way-to-communicate-isnt?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/p/the-safest-way-to-communicate-isnt?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h4></h4><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/subscribe?"><span>Subscribe now</span></a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Private&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Major Comm Platforms are Compromised]]></title><description><![CDATA[Anything that uses a phone number...TG, WhatsApp, Signal, also emails...]]></description><link>https://blog.privateline.io/p/major-comm-platforms-are-compromised</link><guid isPermaLink="false">https://blog.privateline.io/p/major-comm-platforms-are-compromised</guid><dc:creator><![CDATA[PrivateLine]]></dc:creator><pubDate>Mon, 27 Nov 2023 21:41:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/youtube/w_728,c_limit/1l02KVL4dOo" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Don&#8217;t believe me, listen carefully to these gentlemen talking to the Scottish Parliament&#8230;</p><p>&#8220;Where have the messages gone?&#8221; That&#8217;s going to be the real question after everyone realizes everything they said in those &#8220;private&#8221; comm applications have been collected.</p><p>So much for privacy and security. No need for any code reviews&#8230;.it&#8217;s now out there for anyone to see for themselves. If they &#8220;have it&#8221;, by definition whatever the code was is worthless, regardless what any &#8220;security expert&#8221; tells you. If that&#8217;s true in the UK, it&#8217;s true in USA and everywhere else in the world. You have been notified!</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/p/major-comm-platforms-are-compromised?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/p/major-comm-platforms-are-compromised?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/subscribe?"><span>Subscribe now</span></a></p><div id="youtube2-1l02KVL4dOo" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;1l02KVL4dOo&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/1l02KVL4dOo?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><blockquote><blockquote><p>&#8220;The Scottish Government has not handed over any WhatsApp messages to the UK Covid Inquiry. It comes after indiscreet UK Government communications sent on the app during the pandemic were made public. The Inquiry heard that key decision makers did use WhatsApp but that very few messages appear to have been retained. Lawyers raised questions about why messages were deleted.&#8221;</p></blockquote></blockquote><p>Good thing there are people working on a real solution to privacy, using private networks. I&#8217;ll have more about this in the near future.</p><p>Remember, if a phone number is required to use something, that is a UNIQUE_ID for your personal record. Most public encryption isn&#8217;t as good as you have been told.</p><p>Without real privacy, there is no civil society.  Your private writings are your private property.  When privacy is gone, lots of people gain access to your private things&#8230;.they are no longer your property at that point.  In fact, this is about private property.</p>]]></content:encoded></item><item><title><![CDATA[Secrets of Web Traffic Building]]></title><description><![CDATA["the traffic motor" and other forgotten tricks of the trade are powerful business tools that do not rely on Big Tech, yet generate big returns]]></description><link>https://blog.privateline.io/p/secrets-of-web-traffic-building</link><guid isPermaLink="false">https://blog.privateline.io/p/secrets-of-web-traffic-building</guid><dc:creator><![CDATA[PrivateLine]]></dc:creator><pubDate>Mon, 27 Nov 2023 21:38:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!-G28!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2865554d-d255-434a-84db-12f86d29dea0_1244x794.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>How can you help a new web site grow rapidly without spending a lot of money? Some friends are building a mainstream site that can replace YouTube (we need this!!), but Big Tech is not helping them. Many of my readers might be trying to promote ideas, businesses, websites or literally anything and have the same problem. Everyone wants more of whatever it is than you have right now and you don&#8217;t have a lot of money to spend. This could be sales for your business, web traffic or influence and the rules of the game are changing fast with cancel culture and social credit &#8212; people are being left in the dust as they get cancelled, shadow banned and worse. Because these techniques were developed before search engines and social media really became mainstream, they do not rely on Big Tech as a traffic source. Using them ensures you will become a real destination and a valuable part of your viewer&#8217;s/customer&#8217;s lives.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-G28!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2865554d-d255-434a-84db-12f86d29dea0_1244x794.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-G28!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2865554d-d255-434a-84db-12f86d29dea0_1244x794.png 424w, https://substackcdn.com/image/fetch/$s_!-G28!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2865554d-d255-434a-84db-12f86d29dea0_1244x794.png 848w, https://substackcdn.com/image/fetch/$s_!-G28!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2865554d-d255-434a-84db-12f86d29dea0_1244x794.png 1272w, https://substackcdn.com/image/fetch/$s_!-G28!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2865554d-d255-434a-84db-12f86d29dea0_1244x794.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-G28!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2865554d-d255-434a-84db-12f86d29dea0_1244x794.png" width="1244" height="794" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2865554d-d255-434a-84db-12f86d29dea0_1244x794.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:794,&quot;width&quot;:1244,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:180932,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!-G28!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2865554d-d255-434a-84db-12f86d29dea0_1244x794.png 424w, https://substackcdn.com/image/fetch/$s_!-G28!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2865554d-d255-434a-84db-12f86d29dea0_1244x794.png 848w, https://substackcdn.com/image/fetch/$s_!-G28!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2865554d-d255-434a-84db-12f86d29dea0_1244x794.png 1272w, https://substackcdn.com/image/fetch/$s_!-G28!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2865554d-d255-434a-84db-12f86d29dea0_1244x794.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/p/secrets-of-web-traffic-building?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/p/secrets-of-web-traffic-building?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/subscribe?"><span>Subscribe now</span></a></p><p>As for free traffic from search engines, social media and other Big Tech properties, you cannot rely on the people who fundamentally oppose what you stand for to help promote your things. Many times they want to destroy you and they won&#8217;t tell you, it&#8217;ll just happen. If you are being cancelled, you should listen to this article, it might seriously help you build your idea, business or web site.</p><p>Two weeks after President Trump won the 2016 election, one of our companies was permanently banned by Google&#8217;s Ad Sense, where we had been running for five years, for basically allowing some of our users to post positive stories about a political candidate. Google kept the $3000 they owed us and &#8220;returned it to the advertisers&#8221; on a technicality. After burning up 5m+ of our ad impressions. They did this to 200 other sites at the same time. Big Tech is like a rattlesnake. Never trust it and do not turn your back on it.</p><p>There are many techniques that don&#8217;t need Big Tech to grow traffic, but have been forgotten because people today all rely on the Big Guys for traffic since it&#8217;s &#8220;easy&#8221;. Of course, if you can get some free promotion from Big Tech&#8230;take it! I&#8217;m not saying don&#8217;t SEO&#8230;if it can help, you do it. However, you&#8217;ll also need to be mindful of &#8220;dirty tricks&#8221; that can be used to destroy your traffic.</p><p>So far, these web traffic building techniques have been used to:</p><ul><li><p>Build a top 20 traffic web directory site that was acquired by Lycos (built for less than $300k in 1995 when web tools were non-existent, everything scratch built).</p></li><li><p>Build the #13 site on the internet at the time, the original Xoom.com which IPO&#8217;d, starting with nothing and using less than $10m (which was mostly spent on hardware). Compared to $100m for most IPO&#8217;s of that era.</p></li><li><p>Double the sales of Wine.com in one year with virtually no advertising spend.</p></li><li><p>Build Before It&#8217;s News from zero to 8m unique visits per month with zero marketing spend.</p></li><li><p>Get the Unseen private and secure communications system based in Iceland to breakeven with over 10,000 paying customers before it was destroyed by the Deep State (dirty tricks).</p></li></ul><p>Others have had similar success with these methods, but you must focus on becoming a <strong>destination</strong>, not a colony. Control your destiny. When people wake up in the morning or when they are looking for what you have, they should go directly to your web site, not to a search engine who is loyal only to the highest bidder and won&#8217;t care if you go out of business when they send your user to your competitor&#8217;s site. Facebook encouraged businesses to send all their clients to Facebook because it was easy for the small business to reach their customers on Facebook. Once everyone had a Facebook account, they pulled the rug and now Facebook charges you to reach the very customers you handed to them. Outrageous!!!! Snakes!!!</p><p>Here are some of the rules I&#8217;ve found that helped me to build a destination internet site or business:</p><h3><strong>1. FREE is a very good price.</strong></h3><p>Giving things away for free drives a lot of traffic. Everyone does this and it&#8217;s obvious. But it&#8217;s still one of the most powerful marketing tools ever invented and new examples come up all the time. Never underestimate FREE.</p><p><em>(The late Tom Peterson who owned appliance stores in Portland Oregon used to say this in late night TV ads. This saying outlasted the man and his business, it&#8217;s pure genius!)</em></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!AX5A!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3946a486-b8d4-4902-895c-9ddb038be557_450x569.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!AX5A!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3946a486-b8d4-4902-895c-9ddb038be557_450x569.jpeg 424w, https://substackcdn.com/image/fetch/$s_!AX5A!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3946a486-b8d4-4902-895c-9ddb038be557_450x569.jpeg 848w, https://substackcdn.com/image/fetch/$s_!AX5A!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3946a486-b8d4-4902-895c-9ddb038be557_450x569.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!AX5A!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3946a486-b8d4-4902-895c-9ddb038be557_450x569.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!AX5A!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3946a486-b8d4-4902-895c-9ddb038be557_450x569.jpeg" width="156" height="197.25333333333333" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3946a486-b8d4-4902-895c-9ddb038be557_450x569.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:569,&quot;width&quot;:450,&quot;resizeWidth&quot;:156,&quot;bytes&quot;:43383,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!AX5A!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3946a486-b8d4-4902-895c-9ddb038be557_450x569.jpeg 424w, https://substackcdn.com/image/fetch/$s_!AX5A!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3946a486-b8d4-4902-895c-9ddb038be557_450x569.jpeg 848w, https://substackcdn.com/image/fetch/$s_!AX5A!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3946a486-b8d4-4902-895c-9ddb038be557_450x569.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!AX5A!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3946a486-b8d4-4902-895c-9ddb038be557_450x569.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!u3Jf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7881c22-f40a-457c-8f18-41eb479bf2d9_1576x816.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!u3Jf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7881c22-f40a-457c-8f18-41eb479bf2d9_1576x816.jpeg 424w, https://substackcdn.com/image/fetch/$s_!u3Jf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7881c22-f40a-457c-8f18-41eb479bf2d9_1576x816.jpeg 848w, https://substackcdn.com/image/fetch/$s_!u3Jf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7881c22-f40a-457c-8f18-41eb479bf2d9_1576x816.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!u3Jf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7881c22-f40a-457c-8f18-41eb479bf2d9_1576x816.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!u3Jf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7881c22-f40a-457c-8f18-41eb479bf2d9_1576x816.jpeg" width="420" height="217.5" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b7881c22-f40a-457c-8f18-41eb479bf2d9_1576x816.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:754,&quot;width&quot;:1456,&quot;resizeWidth&quot;:420,&quot;bytes&quot;:243753,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!u3Jf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7881c22-f40a-457c-8f18-41eb479bf2d9_1576x816.jpeg 424w, https://substackcdn.com/image/fetch/$s_!u3Jf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7881c22-f40a-457c-8f18-41eb479bf2d9_1576x816.jpeg 848w, https://substackcdn.com/image/fetch/$s_!u3Jf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7881c22-f40a-457c-8f18-41eb479bf2d9_1576x816.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!u3Jf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb7881c22-f40a-457c-8f18-41eb479bf2d9_1576x816.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><em>The Tom Peterson wrist watch was given away for free when you bought an appliance from Tom and it&#8217;s now a collectible. Kurt Cobain, lead singer for Nirvana, wore one. What can you give people that is incredibly valuable to your users, but costs you almost nothing? That is a WIN-WIN.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/p/secrets-of-web-traffic-building?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/p/secrets-of-web-traffic-building?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/subscribe?"><span>Subscribe now</span></a></p><h3><strong>2. You can do it all yourself</strong></h3><h3><strong>-</strong><em><strong>but</strong></em><strong>-</strong></h3><h3><strong>You can do it faster, bigger and better if others come to help.</strong></h3><p>What sounds better; a one-man-band or a symphony orchestra? If you can get your users/viewers to help, it can be amazing and many will want to help for free. If you can pay a little, you&#8217;ll get even more help. <strong>Don&#8217;t be an island, be an army.</strong></p><h3><strong>3. Be a destination, not a colony</strong></h3><p>Never become a big tech colony. Ever. If you rely on Big Tech, it&#8217;s only a matter of time before there is a &#8220;rug pull&#8221; and you are left high and dry, or they start charging you a lot of money. Treasure your independence and your users/customers will also treasure you. Always maintain a direct relationship with your audience/customers to the extent you can.</p><p>This video, &#8220;The Saint of Second Chances&#8221; will show you the power of fandom and a bit of how innovative marketing techniques were successfully used in professional baseball &#8212; it&#8217;s a touching personal story as well. I recommend it and think you will enjoy it.</p><div id="youtube2-TgnxwkUbI_g" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;TgnxwkUbI_g&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/TgnxwkUbI_g?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h3>4. Test, then invest</h3><p>Never waste money. Wasting money is a sin. Someone traded their virtue for the money you are spending, use it wisely and show some respect &#8212; you might wish you had the money you wasted in the future. Take good care of your customers and users, they are your family.</p><h3>5. Two days are a trend</h3><p>Never, ever waste time. Make decisions based on hard data and make these decisions as soon as you have the information. Wasting time is a bigger sin than wasting money. You can always make more money, but you can never make more time. If something is not working, stop spending time and money on it immediately. If something works, figure out why and do more of that.</p><h3>6. Focus your mind (a clean and clear mind)</h3><p>Make your core message clear, make it attractive, repeat the message and get your customers and users to repeat it often, as well. With a clear goal and a Unique Selling Proposition that you can say in five words or less, everyone will pull the wagon in the same direction.</p><h3>7. If it isn&#8217;t measured, it isn&#8217;t managed</h3><p>Capture data everywhere you can. Tools are now so commonplace and free or cheap there is no excuse for doing it. Pay attention to these numbers, focusing on the KPI drivers for your business. Watch hourly and daily. Set alarms for things like broken pages/web sites. Watch your site like a hawk and listen carefully to customers.</p><h3>The Traffic Motor Concept</h3><p>This is a concept our team first developed at Point Communications and it channeled the inner Engineer inside me &#8212; we created it even before the term KPI (key performance indicators) came about. It&#8217;s an incredibly simple and very powerful concept which combines marginal analysis (daily percent growth) with exponential compounding . It gives you a tool to analyze on the back of an envelope how you are doing every day and it can help you achieve constant improvement. It&#8217;s so simple, everyone on your team will know your numbers and goals. The whole team will look for problems and solutions.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/p/secrets-of-web-traffic-building?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/p/secrets-of-web-traffic-building?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/subscribe?"><span>Subscribe now</span></a></p><p>When you first start a gasoline engine, every cylinder needs to fire properly at the right time. To start, it gets a boost from the starter motor, spinning from nothing and then it&#8217;s a little bumpy when it first starts until it reaches running speed&#8230;.just like your web site or business. There&#8217;s a flywheel, a circular weight attached to the driveshaft on the engine, that helps maintain momentum and smooths out the motion. The Traffic Motor I&#8217;m talking about is similar in that once it functions well, your website or business will &#8220;maintain speed&#8221; on it&#8217;s own. Then you can concentrate on making it go faster by better tuning, adding new features or adding more inputs (fuel).</p><h4>Exponential Compounding is the Secret</h4><p>The first thing you must understand is the power of compounding. Web site traffic grows exponentially, it compounds and grows on itself. You could say it&#8217;s biological. Measure your Key Performance Indicators (web visits, pages, sales, etc) on a daily basis. If your site is lively and growing, there are things you can do to grow things consistently and speed things up. A tiny difference in daily improvement adds up fast over a year. Everything is &#8220;on the margin&#8221;, that is where the improvement is monitored. Is the screen green (up) or red (down) and how much. You must watch the daily total numbers growth RATES to know what is happening. This is the discipline you must instill in your team in everything you do. EVERY DAY MATTERS!!</p><p>To give an example, if you can grow your web traffic by 1% a day, in one year you will have grown 24X!!</p><p>Lets&#8217; say you can only do 0.5% growth per day. After one year you will still have grown 5.5X!!</p><p>2% daily growth for a year is almost 1500X!!!</p><p>Here&#8217;s a chart of daily growth of 2.0% (blue), 1.5% (red), 1.0% (yellow), 0.75%, 0.5% and 0.25% after a year. A measly 1% can add up to a big number!</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xB-K!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a2690e5-d989-4b68-87d7-2bd2e1f1f562_600x371.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xB-K!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a2690e5-d989-4b68-87d7-2bd2e1f1f562_600x371.png 424w, https://substackcdn.com/image/fetch/$s_!xB-K!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a2690e5-d989-4b68-87d7-2bd2e1f1f562_600x371.png 848w, https://substackcdn.com/image/fetch/$s_!xB-K!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a2690e5-d989-4b68-87d7-2bd2e1f1f562_600x371.png 1272w, https://substackcdn.com/image/fetch/$s_!xB-K!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a2690e5-d989-4b68-87d7-2bd2e1f1f562_600x371.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xB-K!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a2690e5-d989-4b68-87d7-2bd2e1f1f562_600x371.png" width="600" height="371" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1a2690e5-d989-4b68-87d7-2bd2e1f1f562_600x371.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:371,&quot;width&quot;:600,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:11286,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!xB-K!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a2690e5-d989-4b68-87d7-2bd2e1f1f562_600x371.png 424w, https://substackcdn.com/image/fetch/$s_!xB-K!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a2690e5-d989-4b68-87d7-2bd2e1f1f562_600x371.png 848w, https://substackcdn.com/image/fetch/$s_!xB-K!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a2690e5-d989-4b68-87d7-2bd2e1f1f562_600x371.png 1272w, https://substackcdn.com/image/fetch/$s_!xB-K!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a2690e5-d989-4b68-87d7-2bd2e1f1f562_600x371.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The first thing you notice is the huge difference once you can go over 1.0% daily growth &#8212; this should be your goal &#8220;I want to grow at least 1% every day&#8221;. This is very difficult for you to consistently achieve, but even if you can only do it for small percentage of the days in a year, it&#8217;ll still make a big difference as you can see from the graph. When you are starting out, you will have some 5% and 10% growth days, as you get key links from partners, or maybe a search engine kicked in and it&#8217;s possible you get some &#8220;blackbirds&#8221; too, so don&#8217;t lose faith if you have some bad and negative growth days. Pick yourself up and dust off, then get back to it. The next important thing is if you can move out to the right on the curve, say by spending on some promotion or adding a new traffic recirculation feature, you can move your base down the curve saving a lot of time. Money can save time&#8230;if you have it.</p><p>This system starts with daily improvement and measurement, feeding back results immediately so you don&#8217;t waste any time and maximize your growth, it moves you to a higher curve and further down the curve (to a higher level) as well. Keep in mind you will encounter seasonality and even weekly variation. Compare like days (e.g. Mondays to Mondays) and always compare to the previous day and month ago as well. Weekends typically have 50% of the traffic of a week day. Mondays are slower than Tuesdays and of course if some big disaster hits, that&#8217;s going to have an effect, as well. Keep your own spreadsheet so you can track day by day and do &#8220;what if&#8221; projection models for new recirculation or promotion ideas.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/p/secrets-of-web-traffic-building?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/p/secrets-of-web-traffic-building?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/subscribe?"><span>Subscribe now</span></a></p><p>The best way I have found to visualize your site/business is the control volume concept and it works well when applied to the daily compounding model. It&#8217;s easy to track everything coming in and going out:</p><ol><li><p>Draw a box around your website or business (like I did for the traffic motor, which we will build inside your website or business)</p></li><li><p>Add arrows for traffic coming in, a different arrow for each source, including things you pay for. You are going to carefully track traffic, user data and money on a daily basis. This is like high tech &#8220;barrel accounting&#8221;. Before double entry bookkeeping was created by the Venetians, this is how accounting was done and it works. All cash was thrown into the barrel and all expenses also came out of the barrel. Did the pile in the barrel go up or down (profit or loss)?</p></li><li><p>Add arrows out for traffic leaving and the money you collect from ads, sales or donations. Same as #2 above, but going out.</p></li><li><p>Don&#8217;t forget <strong>the key is Traffic Recirculation</strong>: email and other notifications to return people to your site (this is KEY) and suggested pages to visit next. The goal is to get as many page views from a visit as possible and to return visitor directly to your site&#8230;.without paying the Big Tech vampires anymore than you must.</p></li></ol><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!I314!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82911b38-e25b-4817-9321-32591909f14b_960x540.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!I314!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82911b38-e25b-4817-9321-32591909f14b_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!I314!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82911b38-e25b-4817-9321-32591909f14b_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!I314!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82911b38-e25b-4817-9321-32591909f14b_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!I314!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82911b38-e25b-4817-9321-32591909f14b_960x540.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!I314!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82911b38-e25b-4817-9321-32591909f14b_960x540.png" width="960" height="540" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/82911b38-e25b-4817-9321-32591909f14b_960x540.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:540,&quot;width&quot;:960,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:69081,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!I314!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82911b38-e25b-4817-9321-32591909f14b_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!I314!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82911b38-e25b-4817-9321-32591909f14b_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!I314!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82911b38-e25b-4817-9321-32591909f14b_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!I314!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82911b38-e25b-4817-9321-32591909f14b_960x540.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Let&#8217;s go through these one at a time:</p><p><strong>Traffic IN.</strong> What are your traffic sources? There are many free sources of traffic, the best are referring links from other web sites. If you have something of interest to another site, you could propose a link exchange with the other site. We did this for several years until the ad model made web traffic a revenue generator. Here&#8217;s a list of traffic sources (a good tool like analytics can monitor performance&#8230;you will need to come up with the actual traffic ideas):</p><ul><li><p><strong>Direct</strong> - people typing in the URL in the browser or using a bookmark. A good and easy to spell and say name goes a long way.</p></li><li><p><strong>Link exchange</strong> - be sure the exchange is fair and similarly trafficked or you could drain traffic from your site.</p></li><li><p><strong>Membership list</strong> - daily emails bring loyal viewers back to your site. Most of the largest web properties like Facebook were built using email notifications. If you are not forming a direct email relationship with your users and relying on social media notifications you could get into trouble. Your membership email list is a key part of what you need to promote your site.</p></li><li><p><strong>Content syndication</strong> with link back. Do not give all content away like this, probably no more than 20% will preserve your site&#8217;s integrity.</p></li><li><p>There are probably 20 or more other places you can pick up traffic that are beyond the scope of this article. Many very talented people are out there and they know more than I do about this, so do a bit of research.</p></li></ul><p><strong>Cash IN</strong> - This is the place to watch as it is money leaving your pocket.</p><p><strong>Traffic OUT</strong> - You want this as low as possible, but all visits must come to an end. Carefully watch analytics for leaks of traffic. Dead pages, 404&#8217;s, etc. that get people to bail.</p><p><strong>Cash OUT (Revenue)</strong> - You&#8217;ll get to this part after you have traffic. Focus on the traffic first, conversion to sale (goods, services or subscriptions) and advertising sales once your traffic motor is established. Make sure everything actually works and when you see the money hit the bank, that&#8217;s a good first step. You will want to constantly check and watch the revenue. I used to watch it hourly at Xoom.com and go running down the hall to find an engineer to fix things if they broke. Broken things cost money.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/p/secrets-of-web-traffic-building?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/p/secrets-of-web-traffic-building?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[The Encryption Psyop]]></title><description><![CDATA[what you thought was safe and secure just turned out to be another mind game]]></description><link>https://blog.privateline.io/p/the-encryption-psyop</link><guid isPermaLink="false">https://blog.privateline.io/p/the-encryption-psyop</guid><dc:creator><![CDATA[PrivateLine]]></dc:creator><pubDate>Mon, 27 Nov 2023 21:35:42 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zSVW!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff7d6a6d-6660-4feb-ae21-b745f2e120f6_900x900.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Originally posted May 16, 2014 on the Unseen.is blog, with edits</p><p>Looking back in hindsight at this blog post from almost ten years ago, it is now obvious to me that encryption is being used as a psyop to convince people they are &#8220;safe and secure&#8221; when they use approved software/technology. In reality, the public is only allowed to use technology that can be tracked, monitored and turned off at will by someone. This goes for your computers, cars, appliances and phones. The &#8220;Internet of Things&#8221; and soon &#8220;The Internet of People&#8221; will have all of these &#8220;features&#8221;.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8Bvx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F666bb7d8-0e4f-46a5-b52f-6fccf4b06f4c_430x285.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8Bvx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F666bb7d8-0e4f-46a5-b52f-6fccf4b06f4c_430x285.webp 424w, https://substackcdn.com/image/fetch/$s_!8Bvx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F666bb7d8-0e4f-46a5-b52f-6fccf4b06f4c_430x285.webp 848w, https://substackcdn.com/image/fetch/$s_!8Bvx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F666bb7d8-0e4f-46a5-b52f-6fccf4b06f4c_430x285.webp 1272w, https://substackcdn.com/image/fetch/$s_!8Bvx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F666bb7d8-0e4f-46a5-b52f-6fccf4b06f4c_430x285.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8Bvx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F666bb7d8-0e4f-46a5-b52f-6fccf4b06f4c_430x285.webp" width="430" height="285" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/666bb7d8-0e4f-46a5-b52f-6fccf4b06f4c_430x285.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:285,&quot;width&quot;:430,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:16312,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!8Bvx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F666bb7d8-0e4f-46a5-b52f-6fccf4b06f4c_430x285.webp 424w, https://substackcdn.com/image/fetch/$s_!8Bvx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F666bb7d8-0e4f-46a5-b52f-6fccf4b06f4c_430x285.webp 848w, https://substackcdn.com/image/fetch/$s_!8Bvx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F666bb7d8-0e4f-46a5-b52f-6fccf4b06f4c_430x285.webp 1272w, https://substackcdn.com/image/fetch/$s_!8Bvx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F666bb7d8-0e4f-46a5-b52f-6fccf4b06f4c_430x285.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/p/the-encryption-psyop?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/p/the-encryption-psyop?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/subscribe?"><span>Subscribe now</span></a></p><p></p><p>**************</p><p>We&#8217;ve met some VERY interesting people in our journey with Unseen.is. &nbsp;We&#8217;ve connected with active hackers, cryptographers, former contractors (not Edward Snowden, but people like him in some regards), technologists at the largest companies, etc. &nbsp;People are all fascinated by what we&#8217;re trying to do &#8212; it&#8217;s really a work in progress, but it gets better every day. &nbsp;The goal of course is to give people some real security for their valuable communications.</p><p>When we tell people &#8220;if it&#8217;s publicly available, it&#8217;s already cracked&#8221;, quite a few people don&#8217;t believe us. &nbsp;That&#8217;s OK, you just haven&#8217;t had a chance to listen in on the conversations we&#8217;ve had with people in a position to know what&#8217;s really happening. &nbsp;There is theory and then there&#8217;s reality. &nbsp;We look at the results.</p><p>One person we&#8217;ve spoken to told us there were four kinds of encryption;</p><p>1. &nbsp;<strong>Toy encryption.</strong> &nbsp;This is stuff used by school kids and is so easy to break, it&#8217;s like a joke. &nbsp;Sadly, some of this kind of very weak stuff is still in use where stronger crypto should be used.</p><p>2. <strong>Pretty Good Encryption</strong>. &nbsp;This is allowed to be exported around the world and it&#8217;s all broken by the major security services who have distributed tools to other countries and probably by some of the largest criminal gangs, too. &nbsp;It includes the standard encryption most people know about, i.e. RSA, AES, SSL, etc.</p><p>3. &nbsp;<strong>Bank Grade Encryption</strong>. &nbsp;These are less publicly known or less crippled algorithms used by the largest corporations and banks that need real security. &nbsp;Export is strictly forbidden from the US, though local laws vary in different countries. &nbsp;Not easy to find.</p><p>4. <strong>Weapon</strong>. &nbsp;This is the highest grade and the security agencies consider this to be a weapon on par with atomic weapons and those kinds of secrets. &nbsp;We&#8217;ve known a couple of people who were told to stop working in cryptography. &nbsp;They either join the &#8220;team&#8221; or shut down. There is no private business in weapons grade cryptography.</p><p>Who said this? The CTO of a modestly large cell carrier. After he asked if we &#8220;had a bodyguard&#8221;.</p><p>Are &#8220;weapons&#8221; like this illegal? &nbsp;Actually, isn&#8217;t that admitting that the pen is indeed mightier than the sword? How could something that&#8217;s purely defensive, like encryption, be used offensively like some kind of weapon? Isn&#8217;t that changing the definition to control the discussion and twist the meaning? That&#8217;s the sort of thing they used to do in the former Soviet Union under communism, turn the truth on its head purely for political gain and more power over people. We don&#8217;t see how encryption could ever be a &#8220;weapon&#8221;, it&#8217;s really just an envelope other people can&#8217;t open. So in that regard it&#8217;s more of a shield that can be used to protect your personal, owned by you information.</p><p>In the U.S., the first amendment lets you have freedom of speech and it doesn&#8217;t say how you have to speak. &nbsp;People there are also allowed to own real weapons &#8212; quite a few people own and carry guns in the U.S. &nbsp;We were told that you might win in court there, as none of these things are against the law in most places (from what our lawyers tell us) and they are all definitely legal in Iceland. &nbsp;However, there is a point where things go &#8220;beyond the legal system&#8221; and extra-legal violence becomes reality. &nbsp; Night time visitors carrying flashlights in the dark and that sort of thing.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/p/the-encryption-psyop?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/p/the-encryption-psyop?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[Was Bitcoin an NSA Project?]]></title><description><![CDATA[many clues point to this conclusion]]></description><link>https://blog.privateline.io/p/was-bitcoin-an-nsa-project</link><guid isPermaLink="false">https://blog.privateline.io/p/was-bitcoin-an-nsa-project</guid><dc:creator><![CDATA[PrivateLine]]></dc:creator><pubDate>Mon, 27 Nov 2023 21:32:43 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zSVW!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff7d6a6d-6660-4feb-ae21-b745f2e120f6_900x900.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Originally Published Linkedin on July 14, 2017. Edited October 3, 2022</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6oVp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8f36197f-85ab-487f-8220-eed0a5c44c04_500x269.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6oVp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8f36197f-85ab-487f-8220-eed0a5c44c04_500x269.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6oVp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8f36197f-85ab-487f-8220-eed0a5c44c04_500x269.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6oVp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8f36197f-85ab-487f-8220-eed0a5c44c04_500x269.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6oVp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8f36197f-85ab-487f-8220-eed0a5c44c04_500x269.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6oVp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8f36197f-85ab-487f-8220-eed0a5c44c04_500x269.jpeg" width="500" height="269" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/8f36197f-85ab-487f-8220-eed0a5c44c04_500x269.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:269,&quot;width&quot;:500,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Logo:  Bitcoin&quot;,&quot;title&quot;:&quot;Logo:  Bitcoin&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Logo:  Bitcoin" title="Logo:  Bitcoin" srcset="https://substackcdn.com/image/fetch/$s_!6oVp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8f36197f-85ab-487f-8220-eed0a5c44c04_500x269.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6oVp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8f36197f-85ab-487f-8220-eed0a5c44c04_500x269.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6oVp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8f36197f-85ab-487f-8220-eed0a5c44c04_500x269.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6oVp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8f36197f-85ab-487f-8220-eed0a5c44c04_500x269.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Logo: Bitcoin</figcaption></figure></div><p>This is a question I hear a lot. The creation of Bitcoin is surrounded in mystery, so people imagine a lot of things. Money has always been used as a weapon, so security agencies get involved to help protect this most valuable state asset. Only the people who made Bitcoin know exactly who made Bitcoin for certain, but I'm going to share my assessment with you and you can come to your own conclusions.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/p/was-bitcoin-an-nsa-project?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/p/was-bitcoin-an-nsa-project?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/subscribe?"><span>Subscribe now</span></a></p><p>The original Bitcoin white paper and initial blog posts were written by Satoshi Nakamoto. Everyone agrees with that. The name is obviously fake, it's a pseudonym for a group of people who created Bitcoin and didn't want their names to be known. People have searched for Satoshi and he's a ghost.</p><p>Some of you may have heard of the 1996 NSA paper "<strong><a href="http://groups.csail.mit.edu/mac/classes/6.805/articles/money/nsamint/nsamint.htm">HOW TO MAKE A MINT: THE CRYPTOGRAPHY OF ANONYMOUS ELECTRONIC CASH</a></strong>" which outlines the potential requirements of digital currencies. A <strong><a href="http://www.zerohedge.com/news/2017-06-12/exposed-real-creator-bitcoin-likely-nsa-one-world-currency">Zerohedge</a></strong> post has more detail on this paper, as well as their reasoning why they believe the NSA built Bitcoin.</p><p>I'm going to explore another approach that hasn't been discussed much, the legal and regulatory angle. The question that has been in the back of my mind for several years is "why hasn't Bitcoin been shut down yet?" I've spoken with many bankers and they all told me "we think bitcoin doesn't follow the KYC and AML regulations all banks have to follow". Legally, anyone who handles money as a business is required to keep record of suspicious transactions, report all cash transactions over $10,000 and if you are an issuer of digital currencies, you need to register at a minimum with FinCEN and possibly obtain licenses with states as well. (This, by the way, is the reason banks won&#8217;t touch Bitcoin, they have no idea what kinds of shady business it has been involved in. ) Yet Bitcoin didn't do any of this -- with Bitcoin, you can send millions of dollars in a click with no ID. There is no company, no legal contract with terms of service to use it, there is nothing, just some software that's maintained by a community. It wasn't deemed to be money, a commodity or security (yet). The IRS settled on property, they needed a way to tax it.</p><p>When Bitcoin began, the coins had zero value and they have always been self-issued by the software. The network is anonymous and distributed and the people who originally created it were nameless cryptography hackers. No one dared to put their real name on the project because if it became valuable one day, they knew what was at stake. <strong><a href="https://www.wired.com/2009/06/e-gold/">They knew what the US Treasury did to the founder of e-gold</a></strong>, an early digital currency who tried to operate legally.</p><p>When regulators looked at the laws and regulations they have to work with, Bitcoin was like water. There was nothing to grab onto, nobody to take to court, no centralized service to shutter and because of the cryptographic security, no way to directly confiscate the coins. Getting a new law passed by congress takes a long time and that won't happen until the dust settles. In the meantime, crypto grows by leaps and bounds.</p><p>The key to Bitcoin is the way the coins self-issue, to someone who can remain anonymous, based on a random guess of a hash (known as mining). This solved the double spending problem with digital currencies, but more importantly, it's LEGALLY COMPLIANT!!! The miner who solves the puzzle in a race against other miners is rewarded by the software automatically. No person or entity makes this decision, it's automatically decided by the software. Download the software, do some work and get coins. It&#8217;s a lottery. Run the software more and get more &#8220;tickets&#8221; and a greater chance to win.</p><p>That is no accident and very subtle. There are easier and much cheaper ways to secure a digital currency via consensus and other means, and you can give coins away using a variety of ways. However, being completely decentralized with anonymous mining and automatic random software issuance means there is no issuer and nothing to regulate. If there was a central issuer sending out coins once they have some value they will certainly fall under a variety of laws and the issuer would need to have money transmission licenses or a bank license. The two available loopholes to coin developers who don't want to spend tens of millions on compliance are to either give all the coins away while the value is zero or have the coins self-issue via mining, lottery or other means.</p><p>There is one final aspect. Nothing in modern society can get over a certain size, say $1 billion in total value or revenue per year, without someone's approval. I'm not talking about legal approval, and I'm not going to say any more about this subject. Bitcoin was clearly used by this group as an experiment and they are now prepared to roll out the real Central Bank Digital Currency (CBDC).</p><p>Because of the cryptographic and legal sophistication, the people who have the capability to pull this off -- nearly all cryptographers are heavily recruited for agency work, many by multiple countries -- plus the tacit "approval" to get things up to almost $400+B in market cap (as of Oct 3, 2022) -- that tells me it's people associated with a security agency who originally built Bitcoin. I'm not saying 100% NSA because there were a lot of talented hands in the creation of Bitcoin. Most importantly, that means there are still a lot of good people at security agencies!</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/p/was-bitcoin-an-nsa-project?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/p/was-bitcoin-an-nsa-project?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[The Four Kinds of Encryption]]></title><description><![CDATA[What you need to know about your computer security]]></description><link>https://blog.privateline.io/p/the-four-kinds-of-encryption</link><guid isPermaLink="false">https://blog.privateline.io/p/the-four-kinds-of-encryption</guid><dc:creator><![CDATA[PrivateLine]]></dc:creator><pubDate>Mon, 27 Nov 2023 21:30:36 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zSVW!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff7d6a6d-6660-4feb-ae21-b745f2e120f6_900x900.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>Originally Posted at blog.unseen.is:</strong> Friday, May 16, 2014, Minor edits applied Monday October 3, 2022</p><p>We&#8217;ve met some VERY interesting people in our journey with Unseen.is. &nbsp;We&#8217;ve connected with active hackers, cryptographers, former security agency contractors (not Edward Snowden, but people like him in some regards), technologists at the largest companies, etc. &nbsp;People are all fascinated by what we&#8217;re trying to do with secure communications at Unseen.is &#8212; it&#8217;s really a work in progress, but it gets better every day. &nbsp;The goal of course is to give people some real security for their valuable communications.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/p/the-four-kinds-of-encryption?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/p/the-four-kinds-of-encryption?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/subscribe?"><span>Subscribe now</span></a></p><p>When we tell people &#8220;if it&#8217;s publicly available, it&#8217;s already cracked&#8221;, quite a few people don&#8217;t believe us. &nbsp;That&#8217;s OK, you just haven&#8217;t had a chance to listen in on the conversations we&#8217;ve had with people in a position to know what&#8217;s really happening. &nbsp;There is theory and then there&#8217;s reality. &nbsp;We look at the results.</p><p>One person we&#8217;ve spoken to told us there were four kinds of encryption;</p><p>1. &nbsp;Toy encryption. &nbsp;This is stuff used by school kids and is so easy to break &#8212; an example would be the Caesar cypher, where you add a number to a letter to change its position, e.g. A +3 = D and so one with other letters. Just reverse the process to decode, e.g. D -3 = A. Good for fun only.</p><p>2. Publicly Available Encryption. &nbsp;This is allowed to be exported around the world and it&#8217;s all broken by the major security services who have distributed tools to other countries and probably by some of the largest criminal gangs have stolen these tools as well. &nbsp;This includes the standard encryption most people know about that is in every day use, i.e. RSA, AES, SSL, etc.</p><p>3. &nbsp;Bank Grade Encryption. &nbsp;These are less publicly known algorithms or upgraded Publicly Available Encryption and they are used by the largest corporations and banks that need real security. &nbsp;Export is strictly forbidden from the US, though local laws vary in different countries. &nbsp;You won&#8217;t find this, it&#8217;s kept under lock and key with agency &#8220;minders&#8221; sent along to make sure everything stays under lock and key.</p><p>4. Weapon. &nbsp;This is the highest grade and the security agencies consider this to be a weapon on par with atomic weapons and those kinds of secrets. &nbsp;We&#8217;ve known a couple of people who were told to stop working in cryptography. &nbsp;They either join the &#8220;team&#8221; or shut down.</p><p>Are &#8220;weapons&#8221; like this illegal? &nbsp;Actually, isn&#8217;t that admitting that the pen is indeed mightier than the sword? How could something that&#8217;s purely defensive, like encryption, be used offensively like some kind of weapon? Isn&#8217;t that changing the definition to control the discussion and twist the meaning? That&#8217;s the sort of thing they used to do in the former Soviet Union under communism, turn the truth on its head purely for political gain and to gain more power over people. We don&#8217;t see how encryption could ever be a &#8220;weapon&#8221;, it&#8217;s really just an envelope other people can&#8217;t open. So in that regard it&#8217;s more of a shield that can be used to protect your personal, owned by you information.</p><p>Keep in mind, agencies have many ways to break into your computer. They have zero day exploits (security bugs they know about but the world hasn&#8217;t yet discovered), holes in applications, operating systems and even built in back doors in most hardware (Intel, AMD, ARM, etc) using 3G IoT communications, wifi, etc. Water leaks in wherever there is a hole to get through. Take a waterproof item and plunge it in water&#8230;it&#8217;s guaranteed you will find the leak!</p><p>In the U.S., the first amendment lets you have freedom of speech and it doesn&#8217;t say how you have to speak. &nbsp;People there are also allowed to own real weapons, quite a few people own and carry guns in the U.S. &nbsp;We were told that you might win in court there, as none of these things are against the law in most places (from what our lawyers tell us) and they are all definitely legal in Iceland. These sorts of things never see the light of day in a public court &#8212; secret courts exist everywhere in the world, even in Iceland (see an Icelander&#8217;s shocked face!). &nbsp;However, there is a point where things go &#8220;beyond the legal system&#8221; and extra-legal violence becomes reality. &nbsp; Night time visitors carrying flashlights in the dark, the black SUV &#8220;truck roll&#8221; and that sort of thing. Be careful!</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/p/the-four-kinds-of-encryption?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/p/the-four-kinds-of-encryption?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[Does True Randomness Exist?]]></title><description><![CDATA[Does God exist?]]></description><link>https://blog.privateline.io/p/does-true-randomness-exist</link><guid isPermaLink="false">https://blog.privateline.io/p/does-true-randomness-exist</guid><dc:creator><![CDATA[PrivateLine]]></dc:creator><pubDate>Mon, 27 Nov 2023 21:28:53 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zSVW!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff7d6a6d-6660-4feb-ae21-b745f2e120f6_900x900.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>Originally Posted at blog.unseen.is :</strong> Saturday, May 17, 2014. Some minor edits applied Monday October 3, 2022.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/p/does-true-randomness-exist?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/p/does-true-randomness-exist?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/subscribe?"><span>Subscribe now</span></a></p><p>Randomness is the basis of many aspects of cryptography. &nbsp;It&#8217;s used as a key part of nearly all encryption algorithms to generate keys and many cryptographers will tell you privately that they don&#8217;t know if that&#8217;s where the major weakness is for cryptography, but they have their suspicions. &nbsp;If that&#8217;s true, the lack of true &#8220;randomness&#8221; could be a major weakness in encryption.</p><p>Looking at our world, everything around us seems chaotic, random and jumbled. &nbsp;But is it? &nbsp;Car horns honk, static noise on the radio, people walking on the street, all of these things look random. However, science has discovered the existence of other dimensions that exist in micro-cosmic spaces which is why you can&#8217;t see them. &nbsp;Scientists can&#8217;t see them either, but they have proven this mathematically. &nbsp;If there&#8217;s math that demonstrates the existence of these hidden dimensions, couldn&#8217;t math also be used to &#8220;see&#8221; things in these higher or lower dimensions? &nbsp;If you can navigate through a number field in another dimension that isn&#8217;t random looking, won&#8217;t that help you find your way out of the maze? It would be like going up in a hot air balloon to look down at the maze to very clearly see the correct path out.</p><p>That&#8217;s one principle of discovering the true nature of randomness, finding a mathematical relationship between the things that appear random and converting them into a much simpler formula that shows the true, underlying order to these things. &nbsp;With the correct formula, you could see through the randomness and use that knowledge to &#8220;predict&#8221; with some precision or even certainty a set of results that would remove some or all of the randomness from the equation. &nbsp;Even narrowing down the possible solutions can make encryption a lot easier to break using today&#8217;s desktop computers, not to mention quantum computers.</p><p>Viewing things from a higher level, things that appear random and chaotic are actually very clear and well ordered. &nbsp;Buddhism teaches this aspect of wisdom, from Sakyamuni through many enlightened people today, they&#8217;ll say things like &#8220;everything is very well ordered&#8221; and &#8220;nothing happens without reason&#8221;. &nbsp; They are able to look into these other dimensions and when they do so without any intention, the truth of the universe is very clearly seen. Religions have posited this for millennia. &#8220;God has a plan&#8221;, meaning everything is very carefully arranged by God.</p><p>These observations by calm and rational minds point out something very important; &nbsp;if nothing is truly random, where can you look to see the order? &nbsp;People with abilities to &#8220;see&#8221; into other dimensions point out a way to break through &#8220;randomness&#8221; and to see the order. &nbsp;You can learn more about that in this book, link:&nbsp;<a href="https://falundafa.org/eng/eng/pdf/ZFL2014.pdf">Zhuan Falun.</a> &nbsp;High level math and super and quantum computers can explore this area today and break through the &#8220;randomness&#8221;, which makes it possible to substantially lower the number of possible solutions to a cypher. &nbsp;Not everyone working at Unseen.is (note: Unseen.is is defunct, but the technology will live on in other forms) is a cryptography expert, though we have a few who are expert in this domain. &nbsp;However, most of the people at Unseen.is do meditate, so we understand this principle from another angle.</p><p>If high powered computing power available to various security agencies can &#8220;look into&#8221; or simulate other dimensions to see through &#8220;randomness&#8221;, breaking encryption is a much simpler task. &nbsp;Then the issue becomes one of obfuscation, hiding things in plain sight. &nbsp;&#8221;I didn&#8217;t see it, but it was right in front of me&#8221; comes to mind.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/p/does-true-randomness-exist?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/p/does-true-randomness-exist?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[Coming soon]]></title><description><![CDATA[This is privateLINE Substack.]]></description><link>https://blog.privateline.io/p/coming-soon</link><guid isPermaLink="false">https://blog.privateline.io/p/coming-soon</guid><dc:creator><![CDATA[PrivateLine]]></dc:creator><pubDate>Mon, 27 Nov 2023 21:20:04 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zSVW!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff7d6a6d-6660-4feb-ae21-b745f2e120f6_900x900.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This is privateLINE Substack.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.privateline.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.privateline.io/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item></channel></rss>