by Chris Campbell
“Welcome to 2030. I own nothing, have no privacy, and life has never been better.”
2017, we find ourselves caught between the incredible and Earth-shaking
potential of exponential technology — and a million minds, pulling the
reins, trying to tame the beast and train it to build out their
particular vision of the future.
One such vision is horrifyingly articulated in an article promoted by the World Economic Forum late last year.
The article, written by young Ida Auken, was published ahead of the World Economic Forum’s Annual Meeting of the Global Future Councils.
It details a techno-utopian circular economy, which, on the surface,
sounds great. In the circular economy, products are turned into
services. Everything is Uber-ized. So, of course, nobody owns anything
and all non-ownership is transparent.
“When products are
turned into services, no one has an interest in things with a short life
span. Everything is designed for durability, repairability and
recyclability. The materials are flowing more quickly in our economy and
can be transformed to new products pretty easily. Environmental
problems seem far away, since we only use clean energy and clean
The devil, of course, is in the
details. And a tiny, unavoidable glint of darkness emerges halfway
through the article: “Once in a while I get annoyed about the fact that
I have no real privacy. Nowhere I can go and not be registered. I know
that, somewhere, everything I do, think and dream of is recorded. I just
hope that nobody will use it against me.”
Ah, I see.
this scenario, without privacy, forget about freedom of speech,
assembly or the basic ability to form one’s own opinion about the nature
If the politicos are still at the top of the food
chain, if the sociopathic wolves still guard the chicken pen, we wonder,
what would this society look like?
The flow of information
would likely be managed to the bit. Models of reality would be shaped in
real-time. Maps would be mistaken for the territory, as nobody would
have a reason to think different.
“Free” education would
perfect the art of brainwashing. A.I. programs would parse through text
messages, emails and social media, in search of “problematic” language.
And those deemed a threat to the civility and order of the “Free
Society” would likely be, at best, casted out to live with the rurally
deplored or, at worst, hanged (humanely as possible, of course) in the
Think of all of those meandering thoughts which
run through your mind, of which you cannot control. Now imagine that
any one of them could be used against you. Welcome to 2030. I own
nothing, I have no privacy and life couldn’t be more terrifying.
privacy isn’t dead. And technology is a wild beast which might prove
impossible to tame completely. In fact, for those willing to put in the
work to protect themselves, there are plenty of options to keep your
information safe and protected from prying eyes. Today, to talk about
one tool you should add to your privacy arsenal, we invite Simon Black
of Sovereign Man.
Here’s a FANTASTIC Security Tool You Really Should Know About
By Simon Black
are you probably use a cloud service to store at least a portion of
your files. Dropbox. iCloud. Microsoft’s OneDrive. Mega. Box.
so many of them these days. And a few of them, like Switzerland-based
Tresorit, focus heavily on privacy and security to keep your data safe.
But let’s be honest– privacy is definitely not a top priority among most of the top cloud providers.
states right on its own website that the company has direct access to
your files. ensitive company data. Financial records. Intimate photos.
Personal information. Password files. Cryptocurrency keys.And even if
you delete the files, the backup copies are STILL stored on Dropbox’s
(It’s not just Dropbox– most of the major cloud services
operate this way.) This presents a significant amount of risk from
Hacker threats are nearly ubiquitous these days.
Hardly a month goes by without another announcement of some major data
breach… and we only hear about the big ones in which millions of people
are affected. One of the latest hacker trends is when attackers gain control of your mobile devices
by calling up your mobile carrier and convincing them that they’re
you. This allows them to reset passwords and easily gain access to your
emails and files. Then of course there are legal risks.
you’ve never been sued, congratulations. Let’s hope it stays that way.
If you have been sued, congratulations. It means that at least someone
thinks you’re successful. Broke people typically don’t get sued. Bear in mind that the ‘justice’ system today has very little to do with justice. It’s
about government prosecutors or some twisted, amoral, money-hungry
lawyer convincing 12 strangers on a jury that you’re a terrible person.
And during the discovery process of a lawsuit, EVERYTHING is up for
grabs. A court can literally subpoena your entire life, including your
emails, files, financial records, etc. Chances are they can find
something in all that data to make you look bad.
the other never-ending issue of government spying and the NSA archiving
every kilobyte of data that passes across the Internet. It might be
easier to simply CC the government on every email you send and add their
email address as an authorized user of your Dropbox account. Despite
all these known risks, though, and the constant stream of stories about
hackers and government spying, few people take steps to safeguard their
(As an example, according to a study by Keeper Security, the most common password is 123456. Not exactly hacker-proof.)
But there are some very simple tools available that can help.
One of them is called Cryptomator,
which came to my attention from a close friend of mine who works in the
US Army’s cyberwarfare divison, which was established to defend
government systems against foreign hackers. Cryptomator is free,
simple program which encrypts every single file you store on a cloud
server. Let’s say you use Dropbox to sync files between your laptop and
Ordinarily, your files are stored unencrypted on
your laptop, and they’re accessible by certain Dropbox staff through the
cloud servers. Cryptomator encrypts the files on BOTH ends, i.e. the
file that’s stored on the Dropbox servers is encrypted, AND the file
stored locally on your laptop is encrypted.
Dropbox employees who
try to access your data would see nothing but gibberish. And anyone who
gains physical access to your laptop would see nothing but gibberish.
Only you have the ability to unlock the files.
sounds like a cumbersome process… having to constantly encrypt and
decrypt files, enter passwords, etc. But it’s not. Cryptomator has
created a streamlined platform where you can group files together in
‘vaults’. Then you can decrypt an entire vault, attach it to your file
system, and easily re-encrypt it when you’re finished. You can see an example in this video.
it out if you’re interested; the software is free, available on Mac OS,
Windows, Linux, Android, and iPhone. Plus it’s open-source, meaning
that anyone who knows the Java programming language can download the
source code and verify that the software contains no backdoors or
[Ed. note: This article originally appeared on the Sovereign Man blog,
right here at this link.] Chris Campbell is the Managing editor of
Laissez Faire Today. Before joining Agora Financial, he was a researcher
and contributor to SilverDoctors.com. The article is published under a
creative commons license here.