Reclaiming territory in cyberspace: #1 Hardware basics
Start your journey in building up your digital sovereignty.
We are living in interesting times. These days a vast array of tools are aimed at harvesting as much data as possible to build powerful centralized control systems. These systems are then leveraged against people in all kinds of insidious ways. This is not merely self-interested profit-seeking; it has a purpose and that purpose is to wage war on humanity. The Tools of the Technocracy series was intended to demonstrate the vast array of tools being weaponized against the people.
With this in mind, it is challenging to know how to proceed. People may want to simply eliminate all contact with technology, it’s hard to blame them. Others, are simply not prepared to make that decision and can fall into a trap of apathy. This series aims to build a solid foundation to reclaim much of your own digital sovereignty. As you do this, you can leverage many useful systems without becoming a prisoner of the technocracy. Those who are locked into the cloud are not only captives of the system, but are actively providing assistance to those who wish to control everyone, and everything.
But how can we turn the tide? What if it is too late to meaningfully change things?
While I can not promise total victory, there are many important ways for people to take action and start to liberate themselves from the cloud. I believe the pursuit of liberty is an asymmetric one in the people’s favor. While things may look bleak, it is very clear that every act of defiance, every action taken to bring freedom; costs the tyrants exponentially more effort to reverse.
Strategic overview
In cyberspace there 3 major resources: Storage, Bandwidth, and Computing Power. Our goal must be to maximize our use of these resources without having them being used against us.