The Freedom Tech Stack
Full disclosure. I am not a technical person. I do my best and have learned a lot over the years and certainly spending so much time on SN has helped expose me to more technical discussions and technically inclined people than I was used to prior to joining SN.
I have been highly impressed with @siggy47's recent dive into the rabbit hole of more technical things especially around privacy/security etc. I know Siggy like myself didn't come from a technical background and isn't the youngest pup (turns out you can teach an old dog new tricks).
The arrest of Telegram founder Pavel Durov, is just the latest in a long list of recent events that has me concerned about our freedoms in a digital world. Other events that have given me pause:
  • Arrest of Samurai founders
  • Arrest of Tornado cash devs
  • Censorship of X during Venezuelan elections
  • Citizens being questioned and in some instances arrested for online posts during the recent UK protests/riots regarding immigration.
  • EU "misinformation" law
  • Canadian Truckers and some of the people who donated to their protest having bank accounts frozen
I am sure there are more but these come to top of mind and seem to be increasing in frequency.
So, Stackers I am reaching out to you today to try and cultivate the best possible freedom tech stack for myself (and hopefully others). Obviously, Bitcoin and Nostr and part of the puzzle, but what other pieces do we need to build the best possible personal Freedom Tech Stack.
Sats for all, GR
302 sats \ 2 replies \ @nichro 26 Aug
I'll add that baby steps is better than no steps.
Better to start slow, get used to the flow and improve over time than to get overwhelmed and annoyed and give up.
If your step 1 is just being aware of and tweaking privacy settings for every app you use, and turning off Bluetooth and location when not in use, then good.
If your step one is to implement a full stack right away, and go live in the mountains, also good.
Another good concept to read about is threat models. Everyone's threat model is different. You have celebrities, you have CEOs, you have Snowden, you have regular Joes, activists, parents, etc. each with their own needs.
Privacy often comes at the cost of convenience, though this improves over time as the tools improve.
Assess your threat model first.
I see so many instances in the privacy space where someone asks for help and everyone piles on aggressively opinionated. Don't let that discourage you and just keep in mind your threat model. In truth we can all point you in the right directions but we can't "prescribe" you a stack without knowing your threat model. And you probably shouldn't tell us :P
Others have given good suggestions. I like to tell new folks to bookmark Privacy Guides. As far as I remember they have some good reading on privacy concepts and suggestions for tools, browsers, apps and reasoning behind them.
With that said, I like to use:
  • GrapheneOS on phone
  • Brave & Firefox for browsers (some settings to be tweaked)
  • Fedora linux on laptop
  • Protonmail + simplelogin aliases for email (bonus: they accept BTC)
  • I bounce between a few VPNs that accept BTC as well
My setup isn't perfect, but it suits my current threat model fine. I still use Windows along with Ubuntu on desktops. I still have some big brother apps, but more limited and contained on GrapheneOS.
I've become a fan of "identity segregation" because of my tendencies for obssessing about details and OPSEC. I must've reinstalled all my OS a handful of times before settling for my current setup and realising that it makes the most sense to me with a balance between privacy+security and convenience when required to stay productive. e.g. I'm ok with some big brother apps to keep in touch with some friends and family especially, but I don't carry them with me and use them in a separate dumb chromium browser I don't use for anything else. If the situation in life or the world changes, threat model will be reassessed as needed.
Cheers and best of luck on your privacy endaevors!
reply
Excellent suggestions. Thanks for sharing. I am hoping to make another post in the coming days distilling and curating these ideas for myself and other non techie folks like me.
reply
Good advice especially identity segregation. I used to be the opposite and realized that is a terrible idea
reply
For starters, bare minumum:
email - protonmail use aliases for public emails desktop OS - Debian browser - LibreWolf with minimal extensions PiHole on your home network to filter ads and tracers local app for many things - umbrel beind tor for your BTC node and electron and mempool phone - GrapheneOS compatible phone (newer pixels), You will get kick out of reboot sequence when it shows google logo and then "nope, I changed my mind, load Graphene" lol You will learn as you go, tons of stuff out there if you are willing to do some work
reply
Awesome suggestions. Thanks.
reply
Great! This is how you build a private fortress these days!
reply
Or at least get as close as you can.
reply
Tor and e2e encrypted communication tools. From the things that don’t exist (or I don’t know about), completely anonymous phones, which are “invisible” to mobile operators (every phone has its IMEI recorded on the network).
reply
Where does one get an anonymous phone?
reply
If you connect to a mobile network, you can be pseudonymous at best as your number is known. You can use WiFi at public hotspots or an eSIM bought anonymously.
I don't know about where you are, but in the UK you can buy a physical SIM card without KYC. And a used phone bought on eBay is KYC free too, but the seller knows the address and name it was sent to.
reply
I know that it is possible to get SIM cards without registration in the UK or Czech Republic, unfortunately, this is not possible in the country where I live.
I bought my phone in an apple store with cash without KYC.
The thing is that I have this one phone, and even with eSIM, my phone has a unique identification number registered by the mobile operators (this IMEI), so they essentially see this number around my home, work, other places. Based on these patterns I could be easily identified. Solution could be to use multiple phones and eSIMs, but who would do that?
reply
I am in Canada. I will do some research.
reply
burner in walmart :-) $15
reply
52 sats \ 1 reply \ @jp305 26 Aug
This, plus https://silent.link/ for SMS
reply
Thanks
reply
Thanks
reply
Metro PCS lol
reply
I don’t know. I know that there are phones that allow you to reconfigure IMEI (not easy to do though).
reply
Gotcha.
reply
Problem is that if someone comes up with an idea of how to anonymize phones, sell such anonymous phones, or create a totally new mobile network which doesn’t record any data, they would likely end like Durov now.
reply
You could easily self-host an email server on a randomly generated .onion site.
reply
171 sats \ 0 replies \ @AD_ 26 Aug
Not a tech suggestion but perhaps a useful tip: Operate on the internet with the assumption that EVERYTHING is spying on you. Don’t post anything you wouldn’t want the whole world to know, even in DMs or e2e messengers that market themselves as secure, assume they’re compromised.
I’m sure everyone here already operates like this but just a friendly reminder :)
reply
We need to group together and bring people over to our cause. Individually, we can do a lot. Together we can. As they say, "Preoccupied with a single tree, you'll miss the entire forest."
reply
I have nothing bad to say about Proton, but if we are under a scenario where entire sites are being blocked, you need a self-hosted option. NextCloud is a good starting point because it is free and open source software, self-hostable, and you can integrate with cloud services like Sendgrid for deliverability plus fallback to your own delivery systems if your provider gets shut out
reply
I do like and use Proton but very good points here. Thanks for sharing.
reply
I also think that it is essential to strengthen our privacy and keep our data safe... it would be a little difficult to make mobile phones anonymous... but I think it is a good idea... I personally in my marketing study group use an application called Briar that can connect via Bluetooth between nearby phones or in the same area and there we manage all our data and conversations... that way we are a little safer and our information is safer!!
reply
60 sats \ 0 replies \ @OT 27 Aug
A VPN paid in bitcoin like iVPN or Mulvad.
A password manager like keepass or bitwarden.
reply
50 sats \ 5 replies \ @guts 26 Aug
Transparent blockchains expose you.
reply
Agree but the ability to hold your wealth in a self sovereign way is freedom tech in my opinion. Privacy can definitely be improved upon but open networks where you are free to transact permissionlessly and hold your wealth without an intermediary is part of the solution not the problem. I don't expect there to be any perfect solutions which is why building a stack allows one to do the best they can with the tools available.
reply
20 sats \ 3 replies \ @guts 27 Aug
There are already solutions as Monero
reply
Have you seen @supertestnet’s writings on the flaws in monero?
reply
20 sats \ 1 reply \ @guts 27 Aug
Yes, it doesn't prove any flaws.
reply
Ok. I will have a look at it again. I don’t want to discount anything as a potential tool when fighting off the tyrants.
reply
I think it is key we do everything we can to use privacy-enhancing features. I would like to move away from Apple/Android, I don't know the best solution as of right now.
reply
We should use GrapheneOS
reply
Nice suggestion...... ..đź‘Ťgood
One arrest after another. Another day, another night. Which makes me think that they are not very bright. But a few good men will give us the brightest light.
The list created by Prism Break is very elaborate. An example of their curated list of privacy tech for Android and others is available in their website.