🏴TheTruthAddict🏴
198 subscribers
18.3K photos
4.47K videos
1.26K files
38.4K links
thetruthaddict.substack.com
Fedi: @thetruthaddict@noauthority.social

XMR
8AVwAiPGVRGSrsfpvjjGBPQcZmHJpkRWwCripXFKdQVYLyc1zmhWAr2itCGn61btVhDcARZ1RpGc9LHSAoX1GJAZJrJA2Hs
Download Telegram
How to Build a Strong Digital Persona

How to Build a Strong Digital Persona: A Guide for Privacy Conscious Individuals

Most people walk into the internet like it’s their living room.
Same name. Same photo. Same email. Everywhere.

If that sounds like you, stop doing that.

The web isn’t neutral. It remembers everything.
So if you want to stay private, you need to stop being one person online.

Time to compartmentalize.


https://untraceabledigitaldissident.com/how-to-build-a-strong-digital-persona/
🔥
Full-Chain Membership Proofs Development

Full-Chain Membership Proofs, as a concept, is a replacement for rings within the Monero protocol. While rings have offered sender privacy to Monero since it launched, they're vulnerable to attacks such as the EAE attack, have difficulties upon chain reorganizations, and in general enable statistical analysis (mitigated by distribution of the decoy selection algorithm). Full-Chain Membership Proofs prove the output spent is one of any output on the chain, effectively removing all of these risks. This means every input goes from an immediate anonymity set of 16 to 100,000,000.

https://www.getmonero.org/2024/04/27/fcmps.html
New Xfinity router motion-detecting feature stokes privacy fears — feature powered by Wi-Fi signals

'...At face value, this sounds convenient, and it would have been fine and dandy if Xfinity hadn't pulled the classic fine print shenanigans. Buried deep within the terms of service, the company has a clause stating that once you enable this feature, you give the company the right to collect and log your data, which can subsequently be sold to advertisers...'

https://www.tomshardware.com/networking/routers/new-xfinity-router-motion-detecting-feature-stokes-privacy-fears-feature-powered-by-wi-fi-signals
Laws enabling the absence of physical differences between vaccines, biological agents and chemical toxins "capable of causing death and biological malfunction" to remain undisclosed and unseen.
https://bailiwicknews.substack.com/p/laws-enabling-the-absence-of-physical
Forwarded from Anarchismemes
Suffer Little Children — Poisoned by Pesticides and Damaged by Ultra-Processed Foods

"Our children are growing up exposed to a toxic cocktail of weedkillers, insecticides, and fungicides. It’s on their food and in their water, and it’s even doused over their parks and playgrounds.”
- Baskut Tuncak

https://off-guardian.org/2025/07/23/suffer-little-children-poisoned-by-pesticides-and-damaged-by-ultra-processed-foods/
Simple things the Constitution SHOULD have, Ratification pt 16

In this episode I am deep into my ratification series and I show the kinds of things that WOULD have been in the constitution IF there had been an actual convention as we're told. IF there had been some great discussion of a nEW FoRM of GoVT. That's all a pack of lies guys. It was a all a show. They jammed the constitution down our throats. It's not the most brilliant form of govt ever devises.

https://the-quash.captivate.fm/episode/simple-things-the-constitution-should-have-ratification-pt-16
So Sad They Think We’re All So Stupid

'What else could it be? The agenda and the goons running it have to believe that the people of the world are not only useless eaters, but as about as sharp as a bag of marbles.

This is very sad, but there is no other explanation for it...'


https://off-guardian.org/2025/07/19/so-sad-they-think-were-all-so-stupid/
‘Fund first, ask questions later’ is a bad way to go

'Among the innovations of the new One Big Beautiful Bill Act is handing huge sums to the Pentagon without asking for justification in advance or offering clear direction for their expenditure. Some may tout this flexible approach as a boon to national security, but it is far more likely to produce the opposite: wasteful, deficit-fueled spending on abortive programs that ultimately hurt the military more than they help it. With House Speaker Mike Johnson already floating proposals for more reconciliation bills, it’s important to understand why...

https://www.defenseone.com/ideas/2025/07/fund-first-ask-questions-later-bad-way-go/407139/
This is why governments LOVE bitcoin, but HATE Monero

White House Digital Assets Report Deems Financial Privacy "Primary Money Laundering Concern"

The White House Digital Assets Report asks the Treasury to finalize a rule that would codify all transactions that obfuscate the source of funds as a "primary money laundering concern".

https://www.therage.co/white-house-digital-assets-report-financial-privacy-primary-money-laundering/
Amir Taaki: Let There Be Dark

Gabriel Custodiet speaks with Amir Taaki, hardcore cypherpunk with a wild curriculum vitae: working on Bitcoin in the early days, developer of Dark Wallet, fighter against ISIS, and developer of Dark Fi privacy-focused communication platform (among other things).

https://watchmanprivacy.substack.com/p/amir-taaki-let-there-be-dark
The CIA Built Hundreds of Covert Websites. Here’s What They Were Hiding

The CIA didn’t just infiltrate governments; it infiltrated the internet itself. For over a decade, Langley operated a sprawling network of covert websites that served as global spy terminals disguised as harmless blogs, news hubs, and fan pages.

Beginning in 2004, the CIA established a vast network of at least 885 websites, ranging from Johnny Carson and Star Wars fan pages to online message boards about Rastafari. Spanning 29 languages and targeting at least 36 countries directly, these websites were aimed not only at adversaries such as China, Venezuela, and Russia, but also at allied nations, including France, Italy, and Spain, showing that the United States treats its friends much like its foes...


https://www.mintpressnews.com/cia-secret-network-885-fake-websites/290325/
Your Phone Is a Snitch

Not a tool. Not a companion. A tracking device with a touchscreen.

From the moment it powers on, it logs where you are, who you’re near, and what you’re doing. Constantly. Quietly. Without asking.

Encrypted apps? Tor routes? GrapheneOS? Good. But they don’t stop the bleed.

Because the leak isn’t just the software. It’s the entire network architecture.


https://untraceabledigitaldissident.com/your-phone-is-a-snitch/
The Death of Anonymity: And How to Fight Back

They killed anonymity.
Not with a bullet but with a feed, a fingerprint, and a Terms of Service.

Every time you tap, swipe, sign in, or send, you leave behind a trace. Not just data. A signature. One that corporate surveillance, state actors, and chain analysis firms can follow across years and devices.

Your default settings are a confession.


https://untraceabledigitaldissident.com/the-death-of-anonymity-and-how-to-fight-back/