What is the most valuable digital asset in the world?
Your digital DNA.
In a world dominated by digital platforms, currencies, social media sites and electronic records Americans have been lulled into creating an entire economy dedicated to making you the product. There is no such thing as a free meal. Facebook, instagram, Google, Amazon, and every other digital economy in today’s modern world has been designed to extract as much digital information on you as possible and the monetize, store, analyze and even weaponize that information against you.
Dumb FucksMark Zuckerburg on Facebook users giving up private information to the platform in 2004
In one of the most ironic maneuvers of 2020 the highly popular content provider Netflix released a documentary called, The Social Delima.
Once you watch this documentary I would challenge you to ask yourself a couple questions.
- What other digital economies are have my information?
- How long has this been occurring to me?
- What information is online of me?
- How have these systems modified my behaviors?
- How much money has been made off my information?
- Have I read any “EULA’s” for anything I use digitally?
What consumerism really is, at its worst is getting people to buy things that don’t actually improve their lives.Jeff Bezos
How to protect your assets
We could go on for hours about the tech tyrants, e-com monopolies, and sociocommunism platforms but you need a way to protect yourself and fast.
You need to download these tools and start building them into your daily habits.
1. Nord VPN.
A VPN service provides you a secure, encrypted tunnel for online traffic to flow. Nobody can see through the tunnel and get their hands on your internet data. NordVPN is the best VPN if you’re looking for a peace of mind when you use public Wi-Fi, access personal and work accounts on the road, or want to keep your browsing history to yourself.
Do you use Windows at work, macOS at home, and Linux for your special projects? No problem. There’s a NordVPN application for each of these, plus apps for iOS, Android, and Android TV. Oh, and also encrypted proxy extensions for Chrome and Firefox. Best of all, with one NordVPN account, you can secure up to 6 devices at the same time.
Buffering is the ultimate buzzkill, so streaming or downloading files with a slow internet connection is not an option. No worries — you just need a VPN service that offers a fast connection with no limits on bandwidth. You need NordVPN. Choose from over 5400 NordVPN servers in 59 countries and enjoy the fastest VPN experience. Having more servers means less load, and the wide variety of locations means there’s a higher chance you’ll find one nearby.
2. Tor Browser
Tor Browser isolates each website you visit so third-party trackers and ads can’t follow you. Any cookies automatically clear when you’re done browsing. So will your browsing history.
DEFEND AGAINST SURVEILLANCE
Tor Browser prevents someone watching your connection from knowing what websites you visit. All anyone monitoring your browsing habits can see is that you’re using Tor.
Tor Browser aims to make all users look the same, making it difficult for you to be fingerprinted based on your browser and device information.
Your traffic is relayed and encrypted three times as it passes over the Tor network. The network is comprised of thousands of volunteer-run servers known as Tor relays.
With Tor Browser, you are free to access sites your home network may have blocked
3. Zero Tier
Connect team members from anywhere in the world on any device.
ZeroTier creates secure networks between on-premise, cloud, desktop, and mobile devices.
4. STOP USING GOOGLE
Seriously, stop. We understand it is the best. But nothing is free. When you use Google, you are feeding the machine more of your digital DNA.
Use http://Duckduckgo.com instead
5. Use a pin to lock your phone, not a fingerprint.
The reason for this is that your fingerprint is not protected under the fourth and fifth amendment unlike a pin code. This is because a pin exists only in your mind and thus is protected under the fifth amendment where as your fingerprint exists physically on your person just like a weapon found in your possession and can be used against you.
6. Use Signal
State-of-the-art end-to-end encryption (powered by the open source Signal Protocol) keeps your conversations secure. We can’t read your messages or listen to your calls, and no one else can either. Privacy isn’t an optional mode — it’s just the way that Signal works. Every message, every call, every time.
7. Explore ATAK
The Android Team Awareness Kit (ATAK), for civilian uses, or Android Tactical Assault Kit (also ATAK) for military uses – is a suite of software that provides geospatial information and allows user collaboration over geography. ATAK was originally developed by the Air Force Research Laboratory (AFRL) and is now maintained by a Joint Product Center.
Our society is not moving away from technology. In fact, we are on pace to integrate with even more technology in our lives. Devices like the Neuralink, Brainaural, Plantwave, and many others are going to become main stream just like how we adopted smart phones within 15 years. You must focus on how to protect your data and digital DNA now so when our society moves into partially integrated or fully integrated human/machine devices and programming you are ready to ensure you are not the product.
They who can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.Benjamin Franklin, Memoirs of the life & writings of Benjamin Franklin