Tech Panopticon

Created at:
Last updated at:


-§-

Modern society is far more repressive than anyone acknowledges, aided by technological surveillance of almost everyone on Earth. By surveiling, censoring, and persecuting wrongthink, totalitarians can criminalize their political opponents and control the populace.

The purpose of surveillance is control: by watching everything (and implicitly punishing anything) you do, they can control you. The fundamental ideology they push to exercise this control is tabula rasa, or the blank slate theory which states that people are essentially malleable through social conditioning. The useful idiots who are low-level enforcers often come from the political left, but also from the right (nationalists, religious fanatics, etc.).

I have recommendations on how to counter surveillance, but I do not follow my own recommendations, and it is potentially inadvisable to do so because being the only untraceable person in a room full of normies makes one a target.

Modems and routers

Modems are practically a black box, and you can basically be guaranteed to be connecting to an adversarial entity, however there is no alternative.

Proprietary router operating systems can easily execute a Man-In-The-Middle attack by sending any insecure traffic to a third party.

Recommendation: use open-source router software like OpenWRT.

Social media, big tech platforms

king's pact

The bigger the platform is, the more incentive there is to abuse their audience.

Recommendation: avoid like the plague.

Banking

Recommendation: use physical cash, barter, or Monero (to a lesser extent, Bitcoin). Hold physical gold if you can.

Programs (or as normies say, apps)

Recommendation: only use open-source software.

Personal computers

operating system

Unfortunately, most PCs are compromised at a hardware level with things like TPM, IME, and AMD PSP. The tech which purports to secure the system, is also the greatest vulnerability.

Security through obscurity, which is often derided, can be a valid defense: by using an operating system that nobody uses, on architecture that nobody uses, there would be little incentive to expend resources into backdooring some nerd autist.

Recommendation: use an outdated or uncommon architecture (PPC, MIPS, RISC-V), an obscure operating system (OpenBSD, Inferno, TempleOS), on airgapped hardware. This is obviously highly impractical.

Smartphones: glowniggers in your pocket

Smartphones are compromised in every way you can think of, and fundamentally insecure. There is every incentive to invade your privacy by all parties involved, so it is safer to assume that legal boundaries will not be respected.

Recommendation: avoid like the plague.

Internet access

Recommendation: use I2P or Tor if you have to, or a VPN that you can trust.

Physical surveillance

Recommendation: avoid living anywhere that is urbanized, wear a mask if you can.