Saving The World In A Decentralized Manner
@neo_network
Join the network at: @neo_network_chat
β‘οΈπ₯Άπ
Our beliefs in the current system are being challenged once more as temperatures freeze across the country.
The Electric Reliability Council of Texas (ERCOT) which manages the power generation and distribution to more than 26 million Texas customers (90% of the whole state) is on emergency alert. They have implemented "rotating outages" which are "controlled, temporary interruptions of electric service. This type of demand reduction is only used as a last resort to preserve the reliability of the electric system as a whole"
There are currently 2.7M people currently in Texas without power. Check out the live map here.
At the same time, the food supply chain has not been able to supply large parts of Texas due to hazardous road conditions and power outages. I've had first hand experience seeing cleaned out food shelves since Monday, and now we're hearing local reports of grocery store lines that stretch around the block.
Who's going to come to our aid?
We have to come to our own aid.
And that's exactly how people like Echo Colon have been handling it.
Echo organizes Austin Mutual Aid, which is a mutual aid group for the city of Austin that works with other regional mutual aid groups. Mutual aid groups are much like Freedom Cells in the sense that they're volunteer run, locally based, and bring people together.
We had the pleasure of hearing some advice from Echo on how people can organize mutual aid groups in their area and help their neighbors.
"We set up a Facebook page/Instagram/email and we created [2] online survey[s] for people who need things and people who can help. As people fill out the form theyβre added to a spreadsheet"
Echo typically uses the Google Forms & Google Sheets combo to do this. I've used Google Sheets in the past myself, its easy to use and robust.
At this point we should just be aware that our data is not ours when we submit it to cloud services. Interested in finding alternatives, I researched a few online form services and read through their privacy policies. They all tell you up front that they have full rights to any submission of data.
However, don't despair. I have also self-hosted my own form applications in the past, which store the submission data on your own server and aren't sending it off to the cloud.
If you are even a little bit technically proficient, you should look into buying a Virtual Private Server (there are many options in independent providers) and self-hosting your own applications.
You can install entire platforms on your server that allow you to locally install applications from an app store in one-click, like Yunohost and Sandstorm.
If you want to just browse all the software you can self host, here's a whole list of goodies, including document editors, photo storage tools, and of course - surveys.
If you're only interested in managing survey software, then a few solid options are:
JDHost
OhMyForm
LimeSurvey
If you're unable to set this stuff up, than don't despair, try and look for someone technically proficient to help you in your community. Voluntary collaboration under a common goal is the essence of Freedom Cells and Mutual Aid Groups. Find individuals to help you with the cause.
And don't get stuck on the technology, if you are ready to help people - by all means use Google Sheets. Just be aware of where your data could go. (mostly big corporations & world governments).
Once you have your surveys, up - you can start running the operation.
@neo_network
Join the network at: @neo_network_chat
β‘οΈπ₯Άπ
Our beliefs in the current system are being challenged once more as temperatures freeze across the country.
The Electric Reliability Council of Texas (ERCOT) which manages the power generation and distribution to more than 26 million Texas customers (90% of the whole state) is on emergency alert. They have implemented "rotating outages" which are "controlled, temporary interruptions of electric service. This type of demand reduction is only used as a last resort to preserve the reliability of the electric system as a whole"
There are currently 2.7M people currently in Texas without power. Check out the live map here.
At the same time, the food supply chain has not been able to supply large parts of Texas due to hazardous road conditions and power outages. I've had first hand experience seeing cleaned out food shelves since Monday, and now we're hearing local reports of grocery store lines that stretch around the block.
Who's going to come to our aid?
We have to come to our own aid.
And that's exactly how people like Echo Colon have been handling it.
Echo organizes Austin Mutual Aid, which is a mutual aid group for the city of Austin that works with other regional mutual aid groups. Mutual aid groups are much like Freedom Cells in the sense that they're volunteer run, locally based, and bring people together.
We had the pleasure of hearing some advice from Echo on how people can organize mutual aid groups in their area and help their neighbors.
"We set up a Facebook page/Instagram/email and we created [2] online survey[s] for people who need things and people who can help. As people fill out the form theyβre added to a spreadsheet"
Echo typically uses the Google Forms & Google Sheets combo to do this. I've used Google Sheets in the past myself, its easy to use and robust.
At this point we should just be aware that our data is not ours when we submit it to cloud services. Interested in finding alternatives, I researched a few online form services and read through their privacy policies. They all tell you up front that they have full rights to any submission of data.
However, don't despair. I have also self-hosted my own form applications in the past, which store the submission data on your own server and aren't sending it off to the cloud.
If you are even a little bit technically proficient, you should look into buying a Virtual Private Server (there are many options in independent providers) and self-hosting your own applications.
You can install entire platforms on your server that allow you to locally install applications from an app store in one-click, like Yunohost and Sandstorm.
If you want to just browse all the software you can self host, here's a whole list of goodies, including document editors, photo storage tools, and of course - surveys.
If you're only interested in managing survey software, then a few solid options are:
JDHost
OhMyForm
LimeSurvey
If you're unable to set this stuff up, than don't despair, try and look for someone technically proficient to help you in your community. Voluntary collaboration under a common goal is the essence of Freedom Cells and Mutual Aid Groups. Find individuals to help you with the cause.
And don't get stuck on the technology, if you are ready to help people - by all means use Google Sheets. Just be aware of where your data could go. (mostly big corporations & world governments).
Once you have your surveys, up - you can start running the operation.
PowerOutage.us
Texas Power Outage Map, January 2026
PowerOutage.us tracks, records, and aggregates power outages across Texas.
"People can then work remotely to connect people who are on the list of needing something to people who have supplies and can help. It takes a bunch of making calls. Also setting up hubs where people can drop off supplies. This can be house, churches, businesses who are down to help.
So for example we had requests for food for a family of five. We currently have a kitchen set up so we looked on the list of people who could help and grabbed a driver to get food from the kitchen and take it to the family. Or if someone needs a generator, etc. [...] We also created signal chats that for drivers, one for rapid response, one for general mutual aid info in Austin."
You can see from Echo's advice how much location comes into play. People are able to help others if its in their power to do so. This might be affected by what they have or how far away they live.
Its a beautiful natural order in the decentralized 'chaos'. No central power is needed to save the world.
A tool that I think could seriously help this effort is an open source collaborative mapping tool, FacilMaps. You can keep track of local business that still have food & supplies, drop off points, places with heat / power / water, and more.
If conditions worsen (all signs point in that direction), then technologies like these will become exceptionally important as we fight to stay informed, connected, and safe.
And this is not a purely physical or purely digital process. Both parts must work in tandem to save the world.
The digital side brings in money (through donations from payment providers) and local information (social media, forms), and coordinates the group through messenger apps.
The in-person side works by being the boots on the ground, building relationships, receiving & offering, helping people in need.
"during a flood we cooked a bunch of hot food and then took it out on a truck. The truck became a hub that we knew these neighborhoods didnβt have power so thatβs where we went. People didn't have internet. So as you go around and feed people who talk to them about what they need and then can bring out those items that day or the next when you have them."
The idea of the digital and the physical being so intimately connected is something I want to explore through the @neo_network - We've always had the options using these technologies for good. Its too often we get lazy and allow centralized powers to use technology for evil. But this is our way to fight back - but all it takes is a little digital & physical effort.
Lastly, you may feel like you don't have the network set up to do this.
Echo has this to say:
"We have been doing this for awhile here in terms of the homeless community so we already had a network kinda in place. But we have also done this very quickly during floods when we didnβt have the network in place."
Thanks for reading, we need to inspire each other to make a greater difference in our communities. Start your local mutual aid group right now. Form a cell on freedomcells.org - love one another. We must turn to each other when the world is coming to an end.
So for example we had requests for food for a family of five. We currently have a kitchen set up so we looked on the list of people who could help and grabbed a driver to get food from the kitchen and take it to the family. Or if someone needs a generator, etc. [...] We also created signal chats that for drivers, one for rapid response, one for general mutual aid info in Austin."
You can see from Echo's advice how much location comes into play. People are able to help others if its in their power to do so. This might be affected by what they have or how far away they live.
Its a beautiful natural order in the decentralized 'chaos'. No central power is needed to save the world.
A tool that I think could seriously help this effort is an open source collaborative mapping tool, FacilMaps. You can keep track of local business that still have food & supplies, drop off points, places with heat / power / water, and more.
If conditions worsen (all signs point in that direction), then technologies like these will become exceptionally important as we fight to stay informed, connected, and safe.
And this is not a purely physical or purely digital process. Both parts must work in tandem to save the world.
The digital side brings in money (through donations from payment providers) and local information (social media, forms), and coordinates the group through messenger apps.
The in-person side works by being the boots on the ground, building relationships, receiving & offering, helping people in need.
"during a flood we cooked a bunch of hot food and then took it out on a truck. The truck became a hub that we knew these neighborhoods didnβt have power so thatβs where we went. People didn't have internet. So as you go around and feed people who talk to them about what they need and then can bring out those items that day or the next when you have them."
The idea of the digital and the physical being so intimately connected is something I want to explore through the @neo_network - We've always had the options using these technologies for good. Its too often we get lazy and allow centralized powers to use technology for evil. But this is our way to fight back - but all it takes is a little digital & physical effort.
Lastly, you may feel like you don't have the network set up to do this.
Echo has this to say:
"We have been doing this for awhile here in terms of the homeless community so we already had a network kinda in place. But we have also done this very quickly during floods when we didnβt have the network in place."
Thanks for reading, we need to inspire each other to make a greater difference in our communities. Start your local mutual aid group right now. Form a cell on freedomcells.org - love one another. We must turn to each other when the world is coming to an end.
Privacy Checkup | A Telegram Setting Can Give People Your Exact Location
@neo_network
Discuss at: @neo_network_chat
π€πΊπ§
Didya know @Telegram just became the most downloaded mobile app in the world?
Its pretty crazy to see this kind of growth from a platform. Pavel Durov, one of Telegram's Product Managers attributes their success to a commitment with privacy.
"You β our users β have been and will always be our only priority. Unlike other popular apps, Telegram doesnβt have shareholders or advertisers to report to. We donβt do deals with marketers, data miners or government agencies. Since the day we launched in August 2013 we havenβt disclosed a single byte of our users' private data to third parties."
Well if that doesn't give me the warm & fuzzies inside. You can take Pavel at his word, but that doesn't stop the huge influx of scammers alongside the new users.
If you're unaware of your privacy settings, Telegram's feature 'richness' can turn into feature 'risks', kid. (sorry, I had to)
Let's run through the privacy checkup:
1. Is your nearby users setting on?
Well if it is - turn it off immediately. Not only will it enable random people to message you out of the blue (as the women in my family can attest to), but it can be used to find your exact location.
First reported in early January by Ahmed, the exploit works by using Telegram's nearby location feature to find the distance of your target user from a triangle of points. You can either walk around and do the measurements yourself, or use a GPS spoofer to make the process quicker. This is not unlike phone tower triangulation by law enforcement.
This feature is off by default, but even if you're feeling adventurous, I'd keep it off - you could give away your home address. (and there are never any cuties around anyways)
2. Are you sharing your phone number with everyone?
Its not uncommon to meet people on Telegram, and after some friendly back and forth you might add them as a contact. But be careful, there's a checkbox allowing you to share your number - essentially giving away your identity through a reverse phone number search.
Go to your privacy settings and select 'nobody' for 'Who can see my phone number'. Note that if someone out in the world knows your registered phone number already, they're able to find you on Telegram by searching your phone number.
In the future, I'll share ways to get anonymous & disposable phone numbers
3. Can anyone add you to their group?
By default, anyone can invite you to a group, which makes it so you automatically join a group and start receiving messages. We've seen swaths of new crypto scams, fake local marketplace groups, and fake food delivery groups take advantage of this. They have bots (or people) which go in and invite anyone they can to their groups.
To fix this go into privacy settings and click 'Group Invite' settings, then select 'My contacts' for 'Who can add me to groups and channels'.
Now, only your Uncle Lester can invite you to his yard sale... π - and there's no way to turn that off.
If this even protects one person, I'll be happy I wrote it.
Stay warm & safe,
π€πΊπ§
@neo_network
Discuss at: @neo_network_chat
@neo_network
Discuss at: @neo_network_chat
π€πΊπ§
Didya know @Telegram just became the most downloaded mobile app in the world?
Its pretty crazy to see this kind of growth from a platform. Pavel Durov, one of Telegram's Product Managers attributes their success to a commitment with privacy.
"You β our users β have been and will always be our only priority. Unlike other popular apps, Telegram doesnβt have shareholders or advertisers to report to. We donβt do deals with marketers, data miners or government agencies. Since the day we launched in August 2013 we havenβt disclosed a single byte of our users' private data to third parties."
Well if that doesn't give me the warm & fuzzies inside. You can take Pavel at his word, but that doesn't stop the huge influx of scammers alongside the new users.
If you're unaware of your privacy settings, Telegram's feature 'richness' can turn into feature 'risks', kid. (sorry, I had to)
Let's run through the privacy checkup:
1. Is your nearby users setting on?
Well if it is - turn it off immediately. Not only will it enable random people to message you out of the blue (as the women in my family can attest to), but it can be used to find your exact location.
First reported in early January by Ahmed, the exploit works by using Telegram's nearby location feature to find the distance of your target user from a triangle of points. You can either walk around and do the measurements yourself, or use a GPS spoofer to make the process quicker. This is not unlike phone tower triangulation by law enforcement.
This feature is off by default, but even if you're feeling adventurous, I'd keep it off - you could give away your home address. (and there are never any cuties around anyways)
2. Are you sharing your phone number with everyone?
Its not uncommon to meet people on Telegram, and after some friendly back and forth you might add them as a contact. But be careful, there's a checkbox allowing you to share your number - essentially giving away your identity through a reverse phone number search.
Go to your privacy settings and select 'nobody' for 'Who can see my phone number'. Note that if someone out in the world knows your registered phone number already, they're able to find you on Telegram by searching your phone number.
In the future, I'll share ways to get anonymous & disposable phone numbers
3. Can anyone add you to their group?
By default, anyone can invite you to a group, which makes it so you automatically join a group and start receiving messages. We've seen swaths of new crypto scams, fake local marketplace groups, and fake food delivery groups take advantage of this. They have bots (or people) which go in and invite anyone they can to their groups.
To fix this go into privacy settings and click 'Group Invite' settings, then select 'My contacts' for 'Who can add me to groups and channels'.
Now, only your Uncle Lester can invite you to his yard sale... π - and there's no way to turn that off.
If this even protects one person, I'll be happy I wrote it.
Stay warm & safe,
π€πΊπ§
@neo_network
Discuss at: @neo_network_chat
Hearing reports of Patreon delisting content creators, and now even Bitchute (which is home to radical / free content). Censorship on the centralized web continues to grow.
It seems that my earlier exposition posted at @neo_network and @theconsciousresistance got ProtonMail's attention. They reached out to us and want to 'correct the inaccuracies'.
Would y'all be interested in an interview with them?
Tell us here:
@neo_network_chat
@theconsciousresistance
Would y'all be interested in an interview with them?
Tell us here:
@neo_network_chat
@theconsciousresistance
Forwarded from West Coast News & Discussion
This media is not supported in your browser
VIEW IN TELEGRAM
The best example so far of the snow that burns...it sustains the flame! Arson, Chemtrails and GeoEngineering are the Lefts new Climate Change (formerly known as the global warming hoax)
@neo_network Protocols
ππ£π‘
Here are a few basic principles for this channel so our discussions can be clear, productive and helpful.
1. Focus: We will attempt to keep channel & group discussion oriented around technology. Other topics may come in based on being related to technology or breaking news, although these topics are allowed, let's try to bring the discussion back to technology & solutions. There are certain topics, like partisan politics that are more likely to get removed as they hardly ever lead to a productive discussion.
2. Substance: If you make an assertion or statement, please do some research to back yourself up. You can link to other sources of content to support your claims. When responding to other people's statements, let's analyze the sources and potential biases, the primary information, and let's research and respond with our own.
3. Solutions: Although a big part of privacy and security is focusing on danger, we should also provide a better alternative based on our findings. After all, we are trying to help each other be the best that we can be. This means balancing our negative analysis with positive solutions and having well-informed opinions.
Suggestions & recommendations are always welcomed and considered. :)
Thanks for being part of the @neo_network β€οΈ
ππ£π‘
Here are a few basic principles for this channel so our discussions can be clear, productive and helpful.
1. Focus: We will attempt to keep channel & group discussion oriented around technology. Other topics may come in based on being related to technology or breaking news, although these topics are allowed, let's try to bring the discussion back to technology & solutions. There are certain topics, like partisan politics that are more likely to get removed as they hardly ever lead to a productive discussion.
2. Substance: If you make an assertion or statement, please do some research to back yourself up. You can link to other sources of content to support your claims. When responding to other people's statements, let's analyze the sources and potential biases, the primary information, and let's research and respond with our own.
3. Solutions: Although a big part of privacy and security is focusing on danger, we should also provide a better alternative based on our findings. After all, we are trying to help each other be the best that we can be. This means balancing our negative analysis with positive solutions and having well-informed opinions.
Suggestions & recommendations are always welcomed and considered. :)
Thanks for being part of the @neo_network β€οΈ
ImgBB
cube-concept
Image cube-concept hosted in ImgBB
Forwarded from Matteo Salm
Re Protonmail: I would like to double down on 'automatic' privacy issues when going through servers based on Swiss territory! Please all be aware that Swiss Secret Services based on valid Swiss law are controlling and analyzing all communications to and from abroad. This is public knowledge and based on transparent existing laws. Any communication to a Server based in Switzerland from abroad and any communication going from Switzerland to a foreign location is automatically analyzed. Even worse there is the law called 'Vorratsdatenspeicherung' = 'data preservation' which forces all Internet Providers of all kind to preserve ALL DATA (including calls, all digital communication) for at least 6 months by law. They have to provide this data to government entities if asked. Even worse: The law (at this moment, 2021) does not force providers to delete data after this forced period, so it is possible that data is preserved for much longer. There are powerful political forces that want to increase the forced period by law to at least 12 months and they also work to further increase digital control and surveillance. Not many people know that Switzerland in fact has much worse digital privacy rights than the EU! So when you include the background of protonmail key management and founders and their ties (incl. the usual reasonalbe supicion based on further information that they too, just like google and so many more digital companies have been actually founded by the military/intelligence complex of the US and their allied and vassal states (which by the way includes Switzerland). This just shows you for one factor, communication, that you have to exit life and society in a quite extreme way, not only geographically and what concerns your supplies, etc. to eliminate your vulnerability to the forces in power, the global elite, which are expanding their grip right now with incredible mass and speed.
Ramiro's Recommended Apps SnackPack Part I
@neo_network
Discuss at: @neo_network_chat (π srsly click this π€ )
ππ π
I'm made a commitment to write for @neo_network every day this month, however I'm feeling lazy today. Here's some low hanging but delicious fruit in the form of app recommendations.
Everything has a useful FREE version (i love free) and most things are privacy minded - but not all things. Do your own research (and then share it with us on @neo_network_chat)
Productivity
CryptPad: Browser-based cloud Encrypted Office Suite With Storage, Word Documents, Spreadsheets , Presentations & More π₯
CherryTree: A Personal (Local) Hierarchical Note Taking System with rich text formatting, code blocks, links, and more. I use it like a personal wikipedia or for journals. Your CherryTree notebooks can be saved as an encrypted database file. π
Obsidian: A Graph-Based Knowledge Base & Markdown Editor: I usually compose my more serious writing here. π
YunoHost: Self-hosting platform for email, calendar, web applications & more π
Communication
Jitsi Meet: Open Source & Private Real-Time Video Conferencing With Screen Sharing, Chat & More π§ββοΈ
CTemplar: Highly Secure Email Service Based In Iceland π§I've written a bit about it at @neo_network
Technical:
FileZilla: A Really Easy Way To Transfers Files Quickly Between Any Computers within the same Network π
VSCodium: The Truly Open-Souce Fork of VSCode (now with less telemetry!) π©βπ»
Crypto:
Atomic Wallet: The Cross-Platform Wallet I've Seen With The Most Supported Tokens and Built-in Exchange (pretty trustworthy, except I can't get my monero out of there, damn it) βοΈ
CryptoWatch: Awesome Crypto-Trading Dashboard to watch coin prices & see candlestick charts π
Till tomorrow then, :)
Discuss at: @neo_network_chat
@neo_network
Discuss at: @neo_network_chat (π srsly click this π€ )
ππ π
I'm made a commitment to write for @neo_network every day this month, however I'm feeling lazy today. Here's some low hanging but delicious fruit in the form of app recommendations.
Everything has a useful FREE version (i love free) and most things are privacy minded - but not all things. Do your own research (and then share it with us on @neo_network_chat)
Productivity
CryptPad: Browser-based cloud Encrypted Office Suite With Storage, Word Documents, Spreadsheets , Presentations & More π₯
CherryTree: A Personal (Local) Hierarchical Note Taking System with rich text formatting, code blocks, links, and more. I use it like a personal wikipedia or for journals. Your CherryTree notebooks can be saved as an encrypted database file. π
Obsidian: A Graph-Based Knowledge Base & Markdown Editor: I usually compose my more serious writing here. π
YunoHost: Self-hosting platform for email, calendar, web applications & more π
Communication
Jitsi Meet: Open Source & Private Real-Time Video Conferencing With Screen Sharing, Chat & More π§ββοΈ
CTemplar: Highly Secure Email Service Based In Iceland π§I've written a bit about it at @neo_network
Technical:
FileZilla: A Really Easy Way To Transfers Files Quickly Between Any Computers within the same Network π
VSCodium: The Truly Open-Souce Fork of VSCode (now with less telemetry!) π©βπ»
Crypto:
Atomic Wallet: The Cross-Platform Wallet I've Seen With The Most Supported Tokens and Built-in Exchange (pretty trustworthy, except I can't get my monero out of there, damn it) βοΈ
CryptoWatch: Awesome Crypto-Trading Dashboard to watch coin prices & see candlestick charts π
Till tomorrow then, :)
Discuss at: @neo_network_chat
If You Want Encryption Done Right, You Gotta Do It Yourself: Using PGP
ππ¨π§₯
@neo_network
Discuss at: @neo_network_chat
"If privacy is outlawed, only outlaws will have privacy. Intelligence agencies have access to good cryptographic technology. So do the big arms and drug traffickers. So do defense contractors, oil companies, and other corporate giants. But ordinary people and grassroots political organizations mostly have not had access to affordable "military grade" public-key cryptographic technology. Until now.
PGP empowers people to take their privacy into their own hands. There's a growing social need for it. That's why I wrote it. "
- Philip Zimmerman (Creator of PGP), 1994
In 1991, the US Senate proposed a 'Comprehensive Counter-Terrorism Act', which would force all software & communications providers to 'ensure that communications systems permit the Government to obtain the plain text contents of voice, data, and other communications when appropriately authorized by law'.
Does that sound like outlawing privacy to you?
π« Fun Fact: The senator who once proposed this bill is now the President...
Seeing this, the internet folk hero Philip Zimmerman (PRZ) wrote the first version of Pretty Good Privacy. Although it was outlawed for US citizens or companies to export strong encryption models, PRZ found a loophole and published his source code in a book, releasing it to the world. (what a legend)
Despite the 3 year criminal investigation that ensued for him, Philip's software became a weapon to fight government surveillance, leading to open source development groups & large scale adoption of encryption.
Today, given the uncertainty of how trustworthy web encryption is, I wanted to do a short tutorial on how you can use PGP.
This Is A Private Conversation π€«
How does PGP work?
If I want to send you (and only you) a message, I could encrypt the message by mixing the letters up. Key based encryption mixes the letters up in a programmatic manner derived by a cryptographic 'key'.
You could use this same key to decrypt the message, just by playing the steps backwards.
But how am I going to send you this key securely without it getting intercepted? This is why we cannot use single-key cryptography, and why public key systems were created.
With public key cryptography, I generate two keys that are counterparts to each other: the public key, and the private key.
The public key can be released to the public, and serves as a way to contact me privately if you encrypt a message with it and send the resulting ciphertext to me.
The private key must be kept secret, it can only decrypt the ciphertext encrypted with the public key.
When you create your own public keys, they are generated as part of a key certificate that include your name, timestmap, and the material of the key. This allows you to register it with a public location, where people can look you up by name or email.
The private key contains the secrets and is encrypted with an additional passcode that is entered at time of creation, in case it ever gets stolen.
The keys can also be used to sign messages, if you use your secret key to encrypt a message - you prove that you wrote that message when it is decrypted by others using your public key.
ππ¨π§₯
@neo_network
Discuss at: @neo_network_chat
"If privacy is outlawed, only outlaws will have privacy. Intelligence agencies have access to good cryptographic technology. So do the big arms and drug traffickers. So do defense contractors, oil companies, and other corporate giants. But ordinary people and grassroots political organizations mostly have not had access to affordable "military grade" public-key cryptographic technology. Until now.
PGP empowers people to take their privacy into their own hands. There's a growing social need for it. That's why I wrote it. "
- Philip Zimmerman (Creator of PGP), 1994
In 1991, the US Senate proposed a 'Comprehensive Counter-Terrorism Act', which would force all software & communications providers to 'ensure that communications systems permit the Government to obtain the plain text contents of voice, data, and other communications when appropriately authorized by law'.
Does that sound like outlawing privacy to you?
π« Fun Fact: The senator who once proposed this bill is now the President...
Seeing this, the internet folk hero Philip Zimmerman (PRZ) wrote the first version of Pretty Good Privacy. Although it was outlawed for US citizens or companies to export strong encryption models, PRZ found a loophole and published his source code in a book, releasing it to the world. (what a legend)
Despite the 3 year criminal investigation that ensued for him, Philip's software became a weapon to fight government surveillance, leading to open source development groups & large scale adoption of encryption.
Today, given the uncertainty of how trustworthy web encryption is, I wanted to do a short tutorial on how you can use PGP.
This Is A Private Conversation π€«
How does PGP work?
If I want to send you (and only you) a message, I could encrypt the message by mixing the letters up. Key based encryption mixes the letters up in a programmatic manner derived by a cryptographic 'key'.
You could use this same key to decrypt the message, just by playing the steps backwards.
But how am I going to send you this key securely without it getting intercepted? This is why we cannot use single-key cryptography, and why public key systems were created.
With public key cryptography, I generate two keys that are counterparts to each other: the public key, and the private key.
The public key can be released to the public, and serves as a way to contact me privately if you encrypt a message with it and send the resulting ciphertext to me.
The private key must be kept secret, it can only decrypt the ciphertext encrypted with the public key.
When you create your own public keys, they are generated as part of a key certificate that include your name, timestmap, and the material of the key. This allows you to register it with a public location, where people can look you up by name or email.
The private key contains the secrets and is encrypted with an additional passcode that is entered at time of creation, in case it ever gets stolen.
The keys can also be used to sign messages, if you use your secret key to encrypt a message - you prove that you wrote that message when it is decrypted by others using your public key.
Enough talk. Let's get our hands dirty with GnuPG, an implementation of the OpenPGP standard. GnuPG allows you to manage your keys and connect to public key directories. Make sure to download the GUI version.
Here are downloads for all environments (scroll down to Binary Releases and pick your platform). (linux users might have to find alternate gnupg clients, like KGpg)
Once you get it installed, launch the program. It should prompt you to generate a new key. Fill out your name, email, and an optional comment.
Select the key-size based on how much security you need (higher is more secure, but takes longer).
Then, enter your passphrase for the key.
Now you'll see a fingerprint, which people will use to identify your public key.
BOOM - is this what privacy feels like?
At this point, you should sign your public key to validate yourself as the creator (it may do this automatically).
You can even get other people you trust to sign your key, and you may want to - it is the only secure way you can obtain a public key. Ensuring you have the right public key for someone is based on a web of trust.
The web of trust is built when you give your public key to someone in a secure manner. This could be in person, or in print (with signature). You should have this person then sign your key with their private key. This key can go on switching hands in a secure manner, developing signatures. Different public keys you release may have different chains of trust based on who receives them.
A person who may find that public key somewhere only needs to know one person on the list of signatures to trust that that key does belong to the right person.
NEVER sign a key for someone you don't personally know or cannot verify. You'd break the web of trust. The private key is your identity. It is you.
What to do next?
- Send your public key to your friends, let them know that the key is yours. You should get the key signed by a few people before sending it across the internet.
- Keep your private key in a safe place. On a secure computer, a flash drive, or a CD. Back it up to as many secure locations as you can. You can even print it out.
Conclusion
There are many players that are determined to manage our security for us. We always wonder if we can trust them. God forbid, if we find ourselves living in a future where you cannot say what is on your mind, and we find that the trust in the players was misplaced, can we at least can trust ourselves? π
More content at: @neo_network
Discuss at: @neo_network_chat
Here are downloads for all environments (scroll down to Binary Releases and pick your platform). (linux users might have to find alternate gnupg clients, like KGpg)
Once you get it installed, launch the program. It should prompt you to generate a new key. Fill out your name, email, and an optional comment.
Select the key-size based on how much security you need (higher is more secure, but takes longer).
Then, enter your passphrase for the key.
Now you'll see a fingerprint, which people will use to identify your public key.
BOOM - is this what privacy feels like?
At this point, you should sign your public key to validate yourself as the creator (it may do this automatically).
You can even get other people you trust to sign your key, and you may want to - it is the only secure way you can obtain a public key. Ensuring you have the right public key for someone is based on a web of trust.
The web of trust is built when you give your public key to someone in a secure manner. This could be in person, or in print (with signature). You should have this person then sign your key with their private key. This key can go on switching hands in a secure manner, developing signatures. Different public keys you release may have different chains of trust based on who receives them.
A person who may find that public key somewhere only needs to know one person on the list of signatures to trust that that key does belong to the right person.
NEVER sign a key for someone you don't personally know or cannot verify. You'd break the web of trust. The private key is your identity. It is you.
What to do next?
- Send your public key to your friends, let them know that the key is yours. You should get the key signed by a few people before sending it across the internet.
- Keep your private key in a safe place. On a secure computer, a flash drive, or a CD. Back it up to as many secure locations as you can. You can even print it out.
Conclusion
There are many players that are determined to manage our security for us. We always wonder if we can trust them. God forbid, if we find ourselves living in a future where you cannot say what is on your mind, and we find that the trust in the players was misplaced, can we at least can trust ourselves? π
More content at: @neo_network
Discuss at: @neo_network_chat
Happy 2/22/2021! 2οΈβ£
200 members & 600 subs at @neo_network β€οΈ This is the first time in my life I have a community following my writing. I can't thank y'all enough. We have so much planned, including a new site & videos. What should we learn next?
200 members & 600 subs at @neo_network β€οΈ This is the first time in my life I have a community following my writing. I can't thank y'all enough. We have so much planned, including a new site & videos. What should we learn next?
Anonymous Poll
26%
Picking VPNs
21%
Browser Security
39%
Cryptocurrency
49%
More Decentralized Web
27%
Security & Intelligence Gathering
Forwarded from StormCloudsGathering
Israel is the first to start coercing its citizens to take the vaccine, reopening for only those who accept the jab. Those who refuse are shut out of everyday activities.
https://www.wsj.com/articles/israels-speedy-vaccination-campaign-now-faces-key-test-in-returning-to-normal-11613929717
https://www.wsj.com/articles/israels-speedy-vaccination-campaign-now-faces-key-test-in-returning-to-normal-11613929717
WSJ
Israelβs Speedy Vaccination Campaign Now Faces Key Test in Returning to Normal
Officials are combining incentives with threats, offering perks like free meals at Covid-19 vaccination sites while warning that those who donβt get the shot will be shut out of everyday activities.
Announcing The neo-network Blog!
@neo_network
βοΈπ»π
I have been missing for the past few days, hard at work building a blog that will update itself as soon as I write a new post. This editing flow will make it super easy for me to write up a post, publish it in Telegram, and then have the site update itself a few minutes after. And now you'll be able to share links to posts here with your non-telegram friends!
https://neonetwork.in/
Next steps: Publish automatically to IPFS, alternative social media platforms.
The whole process took me around 3 days and ~8 hours. (i'll be faster next time >:D)
Are you interested in creating your own blog like this? We have a lot of knowledgeable people in our community with lots to share. I am planning to do a write up and offer consults to anyone who wants to do their own.
Let me know if you're interested by responding in our chat
@neo_network_chat
@neo_network
βοΈπ»π
I have been missing for the past few days, hard at work building a blog that will update itself as soon as I write a new post. This editing flow will make it super easy for me to write up a post, publish it in Telegram, and then have the site update itself a few minutes after. And now you'll be able to share links to posts here with your non-telegram friends!
https://neonetwork.in/
Next steps: Publish automatically to IPFS, alternative social media platforms.
The whole process took me around 3 days and ~8 hours. (i'll be faster next time >:D)
Are you interested in creating your own blog like this? We have a lot of knowledgeable people in our community with lots to share. I am planning to do a write up and offer consults to anyone who wants to do their own.
Let me know if you're interested by responding in our chat
@neo_network_chat
Forwarded from Derrick Broze's Daily News
Well Patreon officially deleted Ryan Cristian's (The Last American Vagabond) account. Visit the website and support him directly if you can.
FYI by supporting TLAV you support me. My main source of income is writing articles for TLAV. I make some money via Patreon but obviously that might not last.
The Last American Vagabond
FYI by supporting TLAV you support me. My main source of income is writing articles for TLAV. I make some money via Patreon but obviously that might not last.
The Last American Vagabond
Forwarded from Derrick Broze's Daily News
Check out my latest article for The Last American Vagabond. I told you this was going to happen last May. Have you done anything to prepare to survive and thrive outside the Technocratic control grid?
"As the European Union announces they are preparing to implement βvaccine certificatesβ the largest airline association is also preparing to roll out their version of the controversial Immunity Passports."
https://www.thelastamericanvagabond.com/as-predicted-immunity-passports-are-no-longer-fantasy/
"As the European Union announces they are preparing to implement βvaccine certificatesβ the largest airline association is also preparing to roll out their version of the controversial Immunity Passports."
https://www.thelastamericanvagabond.com/as-predicted-immunity-passports-are-no-longer-fantasy/
The Last American Vagabond
As Predicted: Immunity Passports Are No Longer a Fantasy
As the EU prepares to implement "vaccine certificates" the largest airline association is preparing to roll out their own Immunity Passports.