Fighting Big Tech Using New Tech

Holly at Altitude • January 20, 2021

Within the past few months, big tech has reached way beyond what we’ve ever seen in terms of censorship in the United States. It’s disturbing to the point of horrifying for the “hardcore” free speechers so much so that even casual observers of all stripes have been stirred by big tech’s behavior. Because any violation of big tech’s malleable and dynamic terms of service get banned; people are adapting quickly. It’s time to get smart about new tech that circumvents big tech.

The Most Common Things We Do Online are Not Private or Secure 

News has spread quickly that texting is not secure. I’ll try to avoid a JEB! “ please clap” moment, but you were warned over a month ago. Last week WhatsApp changed it’s ToS, alerting users it will now share data with Facebook. This spurred a mass exodus to Signal and Telegram two supposedly secure, encrypted, chat platforms. It’s rumored Telegram saw a user increase of 59M and Signal 40M in a single day. Now that people are sensitized to privacy and censorship issues, many are not feeling sure about Signal or Telegram’s security. Those instincts are correct. Neither Signal or Telegram are as secure as most believe.

Most of us know that browsing the web is not secure. Our online behavior creates a profile about us that is used in a number of ways. Let’s call it our digital footprint. A few “privacy first” browsers e.g. Brave, DuckDuckGo have gained popularity given peoples’ awareness. However, these browsers have the same fundamental security flaws as Signal and Telegram.

The two concepts that are driving the conversation about true privacy and security are centralization and decentralization.  Encryption and metadata are secondary topics in this overall discussion.

Encrypted Chat and Browser Breakdown

Signal is not as safe and as secure as most think for two reasons.  First, it’s centrally owned/operated/and run. This means somebody or some entity controls and owns your data.  Second, the notion of encryption doesn’t cover the data you generate as a Signal user. Signal offers encrypted messaging.  What this means is the content of your messages cannot be seen or read.  BUT, that data is only half the story.  The other half of your digital footprint is made up of metadata.  Metadata is the set of data that describes and gives information about other data.  To illustrate, metadata is the information that can identify your IP address.  Your IP address correlates to your physical location. Metadata also exposes who else you message, their IP address and by extension location, it exposes the times and frequency of your communication and more.  Your metadata is not encrypted and is available for others to see, collect and use.  The key flaw with encrypted platforms including Telegram and Signal is the entry point and exit point of the platform (where you “hop on and off” using the application). Those sessions are not encrypted or protected.  So, the episodes before and after you use an encrypted app are places where your metadata is generated and remains unsecured.  Metadata is a key component of your “digital footprint”. As you now know, your digital footprint gives a lot of information you may not want publicly available.  

The same situation applies to encrypted browsers. It all boils down to every action you take online or in an app creates a chain of data. The issue is how much of the chain you create is protected. Even if an app, or platform boasts “end to end encryption” (e2ee) it’s important to know how the app or platform defines end-to-end. Does it include encrypting your whole data chain or does it only encrypt the part of the chain the app occupies?

What Now?

Lucky for us, there are a lot of smart people who have anticipated the issues around privacy, and security when it comes to personal data.  They’ve been working hard to innovate and stay ahead of the inevitable pitfalls we face as technology advances.  

Decentralized vs Centralized Systems

To give you a mind map before we go into the tech, you already know what decentralization is and how it works. A current example is how our elections are run in the U.S. That’s a decentralized system.  Each state operates on its own, yet cooperates in the end to get to a national result.  

Technology can operate the same way. Decentralized technology means that whatever app or software is run on a network of computers, or servers. These computers can be located around the world, but still working in cooperation via an internet connection. Who owns and runs these servers? Anyone.

The question that’s probably on your mind is… How can this be safer and more secure than a company with IT experts protecting security and hacking? Their career expertise is to protect data centers, servers, and data. The answer is decentralization. No matter who owns the computers and where they’re located it is a much more secure architecture than a centralized system.

Without getting into too much detail, the way a decentralized system works is the data on these networks is encoded, chopped up into pieces (sometimes called sharding) and is routed through a network of computers.  The computers know how to talk to each other and have been programmed to execute one task then pass the data to the next computer to do its task, then onto to the next computer and so on until the job is complete.   

Think of it like this.  Decentralized networks create a “net”.  At each juncture of the net is a node. That node is a computer/server.  At any given time each one of these servers gets the assignment to jump in and do their task of running the code for your app or routing your data.  The path is different every time (also known as ‘hops’). 

The system protects data, making it inherently secure due to the idea of “sharding”.  At no point does a single node (computer or server) have all the information it needs to identify you, your data, who you’re communicating with, your location or the entire chain of tasks needed to complete the entire job. The computer network knows how to shard your data,  move it around, and then put it back together again automatically without knowing the whole chain of events. All this happens behind the scenes, you are none-the-wiser when you’re using one of these decentralized applications (or networks).

To help cement this idea of decentralization, the opposite of a decentralized system is a centralized system.  Let’s reference politics again. Communism is a centralized system.  The Government owns everything (property, businesses, supply chains etc).  It runs or administers every aspect of society.  All government functions are directed by the people in charge, basically out of a centralized location.  It’s a completely controlled system.

Let’s play this out to explain how centralized technology works.  To help visualize this, think of a centralized tech system set up like a wheel.  A spoke and hub model.  You are a spoke.  At the hub are the computers or servers which run the code for the app you’re using. You generate the data and feed it into the hub and the hub performs its duties, then passes data or information back to you.  The centralized system manages your data, scrapes your data, stores your data, knows where you are, who you’re talking to, your IP address, physical location etc. That’s the general concept. In reality it’s more complicated, but that detail isn’t relevant to this article.

This centralized model is how most social networks, centralized databases, e-commerce stores, and banks are set up and function. In a centralized system an entity owns your data.  You do not control or own your data when you’re using a centralized system.  Hopefully I’ve explained this well enough that you can easily imagine the dangers and pitfalls of centralized systems.

So, getting back to decentralized systems.  This is one of the main reasons why everyone goes so bananas about the potential and future for blockchain technologies.  They’re decentralized (Bitcoin is a cryptocurrency that is built on a blockchain).  Nobody owns it and its decentralization inherently makes it private and secure (bitcoin has never been hacked).  

The whole idea of blockchain technology is that apps and platforms can be built on them.  Anything from ticketing, to banking, to communications, to gaming… all of these applications can be built on blockchain technology.   Sometimes there’s a good reason to build on this tech layer, sometimes it doesn’t make sense. (that’s a discussion for another article).

How Does All of This Apply to You, Today?  

There are two new decentralized apps I highly recommend. One is for chat and one is for web browsing.  I’ve tested these and have found they’re easy enough to use, so I’m recommending them to anyone who can install an application on their computer or phone.   

Full End-to-End Encrypted, Decentralized Messaging App: SESSION

It’s called Session.  It’s the replacement for Signal, (the messaging app that works like text messaging). Intuitive to start using without any instructions, easy to share with others, and is the most secure and private messaging solution I’ve found to date.   

Full End-to-End Encrypted, Decentralized Secure Web Browsing: LOKINET

It’s called Lokinet. It’s built by the Session folks. It’s basically a VPN on steroids.  The Lokinet explainer video is great ,  You can get the Lokinet download here

How Lokinet works is that you run all your web browsing through the Lokinet “app”. First, you download Lokinet, install it like a normal app, turn it on and browse like you always do using your chosen browser (DuckDuckGo, Brave, Chrome etc.)  What Lokinet does is protects not only your entry point to the web, what you search, your IP address etc.  It protects your exit point, too.  So when you’re using Lokinet, you basically access the entire internet through a secure portal that protects your data.  When Lokinet is “off”, it’s business as usual.  As a user, your online experience is no different, you can’t even tell you have Lokinet running.  Remember the issue around your metadata and privacy we talked about earlier?  Lokinet takes care of securing all that metadata.  Your entire data chain is protected from end-to-end.

These applications and others have existed for a while, they just haven’t totally hit mainstream.  As a blockchain fanatic, Lokinet and Session marks an amazing milestone that I’ve been anxiously awaiting. Usable, customer friendly applications that leverage new inherently secure and private technology.  There are other e2ee, decentralized applications for web browsing, and most likely chat.  I haven’t found any that I like more than Session and Lokinet.

We all need to get up to speed on this to protect ourselves, family, friends, and organizations from censorship and persecution.

Leave a comment below or contact me.  If there’s enough interest, I would be happy to do a live chat to explain blockchain technology, decentralization, privacy, and security.  I certainly don’t have all the answers, but am happy to share what I do know!

By Ryan McMaken February 20, 2022
"Lawbreaker" as a Political Slur
By Holly at Altitude February 20, 2022
The hit piece penned by Quentin Young raises serious questions. Was the paid propaganda attack on Col. Shawn Smith USAF (ret.) requested by Griswold or her legal handlers and carried out by Young? Smith’s months-long work has exposed alleged crimes by SecState that are now required by law to be investigated. Is the press smear meant to build a case for law enforcement action as retaliation against Smith?
By Marianne Goodland marianne.goodland February 9, 2022
The Colorado House has advanced a request from Secretary of State Jena Griswold seeking a boost of $120,800 for the Department of State to provide her private security and monitor threats against her.
By Holly at Altitude October 4, 2021
Guest Post written by Ret. Col. USAF Shawn Smith in response to Jimmy Sengenberger’s 9/28/21 opinion piece . Intro by HollyatAltitude.
Colorado Secretary of State’s Office Adopts Emergency Rules for Voting Systems
August 7, 2021
A third-party vendor with no election experience is currently performing a faulty, unsecure election audit in Arizona and calls for such sham audits have been spreading in other states. Several Colorado counties have been contacted by third parties offering to conduct audits.
All Denver public and many private sector employees ordered to vaccinate or face firings
August 7, 2021
The City of Denver has decreed that all city and county employees along with many in private sector jobs must be fully vaccinated by the end of September, or else.
Griswold Shuts Down Citizen Testimony
By Holly at Altitude August 4, 2021
Sec State Griswold has prematurely shut down citizen testimony on the election rules hearing. There were 50 citizens signed up to testify in the Aug 3 hearing that was supposed to continue into a second day given the citizen turnout.
Petitions, Hearings and What to Watch
By Holly at Altitude July 28, 2021
Dictator SOS Jena Griswold and her team have received the message loud and clear Colorado Voters do not want The Dictator’s emergency rules to be enacted permanently. There are 325 officially submitted petitions as of July 20 th
Never Trust a Clown
By Holly at Altitude July 15, 2021
Colorado voters are engaged and watching SecState Griswold plus County Clerk and Recorders (CCRs) across the state when it comes to election records, and rule changes.
State Rep. Ron Hanks Lights a Fire: Creates Coalition to Challenge Griswold
By Holly at Altitude July 11, 2021
State Rep. Ron Hanks Lights a Fire: Creates Coalition to Challenge Griswold
More Posts