{"id":3318,"date":"2025-06-22T19:26:29","date_gmt":"2025-06-22T16:26:29","guid":{"rendered":"https:\/\/nottoday.media\/en\/?p=3318"},"modified":"2025-06-22T19:31:42","modified_gmt":"2025-06-22T16:31:42","slug":"the-idea-here-is-that-if-you-can-build-your-own-tools-you-are-your-own-boss-cyberanarchism-a-monologue-from-the-inside","status":"publish","type":"post","link":"https:\/\/nottoday.media\/en\/activism\/the-idea-here-is-that-if-you-can-build-your-own-tools-you-are-your-own-boss-cyberanarchism-a-monologue-from-the-inside","title":{"rendered":"\u201cThe idea here is that if you can build your own tools, you are your own boss\u201d &#8211; Cyberanarchism: A Monologue from the Inside"},"content":{"rendered":"\n<h4 class=\"wp-block-heading\"><strong>The internet promised freedom. But something went wrong.<\/strong><\/h4>\n\n\n\n<p><strong>We dreamed of a digital utopia\u2014equal, decentralized, without censorship or borders. But what we got were traps of authoritarian algorithms, cameras in our pockets, and likes as the currency of conformity. Somewhere between ditching Google and trying to figure out how Tor works, the figure of the cyber-anarchist appears\u2014a bit of a ghost, a bit of a prophet, a bit of a hacker.<\/strong><\/p>\n\n\n\n<p><strong>Who are these people who encrypt not only their messages, but the very possibility of their existence? How are they different from leftists, libertarians, or just plain paranoids? And is it even possible to preserve freedom in a network where every click is a report?<\/strong><\/p>\n\n\n\n<p><strong>Nottoday spoke with a cyber-anarchist about all of the above\u2014and publishes his monologue.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a data-fslightbox=\"post-gallery\" href=\"https:\/\/nottoday.media\/wp-content\/uploads\/2025\/06\/photo_2025-06-06_08-16-34-1024x768.jpg\"><img decoding=\"async\" src=\"https:\/\/nottoday.media\/wp-content\/uploads\/2025\/06\/photo_2025-06-06_08-16-34-1024x768.jpg\" alt=\"\" class=\"wp-image-3736\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Photo \u2014 a squat in a village near Barcelona<\/em><\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Introduction: How Cyber-Anarchism Arose<\/strong><\/h2>\n\n\n\n<p>Hello. Let me tell you a bit about cyber-anarchism\u2014how the concept came to be and what events preceded it.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-text-align-center\">&#8220;<strong>In general, cyber-anarchism is, in a sense, the natural development of anarchist ideas in the digital space. If in the 19th\u201320th centuries anarchists like <a href=\"https:\/\/www.britannica.com\/biography\/Peter-Kropotkin\">Kropotkin<\/a>, <a href=\"https:\/\/www.britannica.com\/biography\/Mikhail-Bakunin\">Bakunin<\/a>, or <a href=\"https:\/\/en.wikipedia.org\/wiki\/Errico_Malatesta\">Malatesta<\/a> built utopias in the industrial-factory society, then with the rise of the internet a new field for experiments appeared\u2014cyberspace.&#8221;<\/strong><\/p>\n<\/blockquote>\n\n\n\n<p class=\"has-text-align-center\">And the ideas that began to emerge there came not so much from theory as from practice.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Crypto-anarchism: Manifesto and First Steps<\/strong><\/h2>\n\n\n\n<p>Crypto-anarchism is one of the first such manifestations. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Timothy_C._May\">Timothy C. May<\/a> wrote the <a href=\"https:\/\/www.activism.net\/cypherpunk\/crypto-anarchy.html\">&#8220;Crypto Anarchist Manifesto&#8221;<\/a> in 1988, which outlined its essence: using cryptography to protect individual freedom from the state. He didn\u2019t reference Kropotkin or Proudhon\u2014this was not political philosophy in the academic sense, but a living practice of resistance. Later, crypto-anarchist ideas materialized in projects like <a href=\"https:\/\/bitcoin.org\/bitcoin.pdf\">Bitcoin<\/a>, <a href=\"https:\/\/www.torproject.org\/about\/history\/\">Tor<\/a>, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Pretty_Good_Privacy\">PGP<\/a>, <a href=\"https:\/\/wikileaks.org\/\">WikiLeaks<\/a>, <a href=\"https:\/\/en.wikipedia.org\/wiki\/OpenBazaar\">OpenBazaar<\/a>, <a href=\"https:\/\/simplex.chat\/\">SimpleX<\/a>\u2014all aimed at decentralization, anonymity, and control over one\u2019s own information.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Phreakers and Hackers: Forerunners of Digital Anarchy<\/strong><\/h2>\n\n\n\n<p>But long before this, there were their own \u201canarchists\u201d\u2014not by ideology but by spirit. For example, <a href=\"https:\/\/en.wikipedia.org\/wiki\/John_Draper\">John Draper<\/a>, better known as Captain Crunch. In the 1970s he became a legend among phreaks and hackers. He discovered that the whistle from Cap&#8217;n Crunch cereal boxes produced a 2600 Hz tone that could control AT&amp;T phone lines. Thus was born <a href=\"https:\/\/en.wikipedia.org\/wiki\/Phreaking\">phreaking<\/a>\u2014the hacking of telephone networks, long before computer networks. <\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-text-align-center\">&#8220;<strong>This wasn\u2019t a political protest, but a practical prank, though at its core was the same drive for freedom, for bypassing restrictions, for control over infrastructure\u2014which later became ideologically saturated in cyber-anarchism.&#8221;<\/strong><\/p>\n<\/blockquote>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a data-fslightbox=\"post-gallery\" href=\"https:\/\/nottoday.media\/wp-content\/uploads\/2025\/06\/photo_2025-06-06_02-24-51-768x1024.jpg\"><img decoding=\"async\" src=\"https:\/\/nottoday.media\/wp-content\/uploads\/2025\/06\/photo_2025-06-06_02-24-51-768x1024.jpg\" alt=\"\" class=\"wp-image-3722\" style=\"width:840px;height:auto\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Photo \u2014 a squat in a village near Barcelona<\/em><\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>DIY Philosophy: Freedom Starts with Tools<\/strong><\/h2>\n\n\n\n<p>The idea here is that if you can build your own tools\u2014you\u2019re your own master. That\u2019s why people around the world create <a href=\"https:\/\/ru.wikipedia.org\/wiki\/%D0%9E%D1%82%D0%BA%D1%80%D1%8B%D1%82%D0%BE%D0%B5_%D0%BF%D1%80%D0%BE%D0%B3%D1%80%D0%B0%D0%BC%D0%BC%D0%BD%D0%BE%D0%B5_%D0%BE%D0%B1%D0%B5%D1%81%D0%BF%D0%B5%D1%87%D0%B5%D0%BD%D0%B8%D0%B5\">open-source software<\/a>, decentralized platforms, encryption systems, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Decentralized_finance\">decentralized finance (DeFi) services<\/a>, and so on. And they do this not for profit, but for the principle\u2014to build a society where no one dominates, where power isn\u2019t concentrated in the hands of corporations or states.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Cyberspace as the Last Continent<\/strong><\/h2>\n\n\n\n<p>There are also more modern reflections. For example, a recent free book discusses cyberspace as the last <a href=\"https:\/\/thenetworkstate.com\/\">&#8220;unsettled continent&#8221;<\/a>. It\u2019s too early to go to space, too late to sail to the New World\u2014all continents are already discovered, but the internet is a new territory. What is this territory? Essentially, it\u2019s an information field, a space for exchanging meaning.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote has-text-align-center is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&#8220;<strong>Previously, knowledge was spread through books; now it\u2019s spread through the network. That\u2019s a huge shift, because digital space is not just text. It\u2019s a platform where you can build a new economy, new forms of interaction, even alternative political structures.&#8221;<\/strong><\/p>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Cryptocurrencies: From Anarchy to State Reserves<\/strong><\/h2>\n\n\n\n<p>In the digital world, you can do without traditional money\u2014take <a href=\"https:\/\/en.wikipedia.org\/wiki\/Cryptocurrency\">cryptocurrencies<\/a> and smart contracts, which enable the creation of <a href=\"https:\/\/www.wtfisqf.com\/\">more sophisticated and fair self-regulating financial infrastructure<\/a>. Crypto-anarchists originally invented them as a way to break free from banks and states. But now even states are interested in them. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Strategic_Bitcoin_Reserve_(United_States)\">Donald Trump, for example, recently discussed including bitcoin in the U.S. reserve fund<\/a>, and El Salvador has started using bitcoin as its <a href=\"https:\/\/en.wikipedia.org\/wiki\/Bitcoin_in_El_Salvador#:~:text=El%20Salvador%20became%20the%20first,of%20El%20Salvador%20in%202021.\">official currency<\/a>. So, the idea created to bypass the state is now used by the state itself. Funny, but also alarming.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a data-fslightbox=\"post-gallery\" href=\"https:\/\/nottoday.media\/wp-content\/uploads\/2025\/06\/photo_2025-06-06_02-24-38-768x1024.jpg\"><img decoding=\"async\" src=\"https:\/\/nottoday.media\/wp-content\/uploads\/2025\/06\/photo_2025-06-06_02-24-38-768x1024.jpg\" alt=\"\" class=\"wp-image-3724\" style=\"width:840px;height:auto\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Photo \u2014 a squat in a village near Barcelona<\/em><\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Creation Above Destruction<\/strong><\/h2>\n\n\n\n<p>What\u2019s important is that cyberspace allows not just for breaking things, but also for creating. This is what I consider crucial.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-text-align-center\">&#8220;<strong>You can make your own computers, your own networks, your own weapons, your own economy. For example, <a href=\"https:\/\/en.wikipedia.org\/wiki\/FGC-9\">FGC-9<\/a>, a 3D-printed gun developed by a German enthusiast and released as open source. Everything from idea to practice happens online: design, discussion, crowdfunding, logistics.&#8221;<\/strong><\/p>\n<\/blockquote>\n\n\n\n<p>Neil Gershenfeld, director of MIT\u2019s Center for Bits and Atoms and founder of the Fab Lab movement, explores <a href=\"https:\/\/lexfridman.com\/neil-gershenfeld\/\">the future of manufacturing through self-replicating robots and digital fabrication<\/a>. He proposes a model where machines can assemble their own copies from modular parts\u2014a concept especially relevant for autonomous production in resource-constrained settings, like space. Gershenfeld sees the transition from digital information (bits) to physical objects (atoms) as the basis for a new manufacturing revolution\u2014decentralized, personalized, and accessible to all. His worldwide Fab Lab network brings this idea to life, letting people make things from digital blueprints, changing the economy, education, and the very nature of production.<\/p>\n\n\n\n<p>The power is that you can be anywhere in the world and, without leaving your home, influence global processes. People unite, brainstorm, pool resources, and build their own autonomous reality.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>New Power: Algorithms and the Digital Crowd<\/strong><\/h2>\n\n\n\n<p>But yes, with this comes new power\u2014the power of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Algorithm\">algorithms<\/a> and the digital crowd. If you don\u2019t keep it in check, it becomes dangerous. For example, <a href=\"https:\/\/ru.wikipedia.org\/wiki\/%D0%9A%D0%B8%D0%B1%D0%B5%D1%80%D1%81%D1%82%D0%B0%D0%BB%D0%BA%D0%B8%D0%BD%D0%B3\">cyberstalking<\/a>, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Doxing\">doxxing<\/a>, <a href=\"https:\/\/www.brookings.edu\/articles\/online-harassment\/\">bullying<\/a>\u2014these are forms of digital violence that can ruin a person\u2019s life. The internet remembers everything, knows everything. Memes, viral videos\u2014and suddenly you\u2019re the subject of ridicule or even harassment. That\u2019s not freedom, but digital mobbing.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Anarchism Online: For Everyone and Each Individual<\/strong><\/h2>\n\n\n\n<p>That\u2019s why anarchist ideas are important here, too. We need not only to resist centralized control but to build a digital space where people feel safe and free. It should belong to everyone, consider everyone\u2019s interests. Not just those with more servers or followers.<\/p>\n\n\n\n<p>That\u2019s cyber-anarchism. Less a philosophy with books and circles, more a field for experiments. Where freedom isn\u2019t a slogan, but code. Where power is infrastructure. And where anarchy isn\u2019t chaos, but coordination without coercion.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-style-default\"><a data-fslightbox=\"post-gallery\" href=\"https:\/\/nottoday.media\/wp-content\/uploads\/2025\/06\/photo_2025-06-06_02-25-33-1024x768.jpg\"><img decoding=\"async\" src=\"https:\/\/nottoday.media\/wp-content\/uploads\/2025\/06\/photo_2025-06-06_02-25-33-1024x768.jpg\" alt=\"\" class=\"wp-image-3732\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Photo \u2014 a squat in a village near Barcelona<\/em><\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How Cyber-Anarchism Differs from Traditional Anarchism<\/strong><\/h2>\n\n\n\n<p>How is cyber-anarchism different from traditional anarchism? In reality, there aren\u2019t many fundamental differences. It\u2019s just that in digital space you can clone, multiply, share\u2014resources aren\u2019t as limited as offline. Everything is more fluid, diffuse. And generally, it\u2019s simply easier to implement anarchism digitally. In fact, it\u2019s the most fertile ground for anarchy. You can run experiments\u2014political, social, cultural, technological\u2014and instantly test them in action.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Values of Cyber-Anarchists<\/strong><\/h2>\n\n\n\n<p>What values do cyber-anarchists develop? The same as always.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-text-align-center\">&#8220;<strong>The most important things are three pillars: anonymity, privacy, security. If you have these three, you can move forward. Plus\u2014free dissemination of information, free access to knowledge, <a href=\"https:\/\/www.gnu.org\/philosophy\/free-sw.ru.html\">free software<\/a>.&#8221;<\/strong><\/p>\n<\/blockquote>\n\n\n\n<p>Take <a href=\"https:\/\/en.wikipedia.org\/wiki\/Richard_Stallman\">Richard Stallman<\/a>\u2014the father of the free software movement\u2014who said, \u201cA program must be not only free of charge, but also free.\u201d Meaning: you should have the right to study it, modify it, share it with others. This is, essentially, digital communism. The complete abolition of private intellectual property. Everything is common, everything is transparent, everything for the common good.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Goals and Threats: Decentralization, Anonymity, and Algorithmic Bubbles<\/strong><\/h2>\n\n\n\n<p>What are the goals of cyber-anarchists in digital space? Decentralization, anonymity, free information. Plus, of course, protection from surveillance, propaganda, and <a href=\"https:\/\/en.wikipedia.org\/wiki\/Filter_bubble\">algorithmic bubbles<\/a>. So that no YouTube or TikTok knows what you want better than you do. But they almost already do. Everything you do\u2014click, like, even just watch\u2014is recorded. The system knows you better than you know yourself.<\/p>\n\n\n\n<p>It\u2019s already starting to get scary. Because the next step is\u2014you just ask a question, and the neural network says: \u201cI know what you want.\u201d<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-text-align-center\"><strong>This isn\u2019t just search\u2014it\u2019s invasion. And this isn\u2019t just techno-realism, it\u2019s a real-time dystopia.<\/strong><\/p>\n<\/blockquote>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a data-fslightbox=\"post-gallery\" href=\"https:\/\/nottoday.media\/wp-content\/uploads\/2025\/06\/photo_2025-06-06_02-25-40-768x1024.jpg\"><img decoding=\"async\" src=\"https:\/\/nottoday.media\/wp-content\/uploads\/2025\/06\/photo_2025-06-06_02-25-40-768x1024.jpg\" alt=\"\" class=\"wp-image-3726\" style=\"width:840px;height:auto\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Photo \u2014 a squat in a village near Barcelona<\/em><\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Transhumanism: Freedom of Body and Mind<\/strong><\/h2>\n\n\n\n<p>And what about the body and anarchy? This is where <a href=\"http:\/\/blueshifted.net\/\">anarcho-transhumanism<\/a> begins. Because if we\u2019re talking about maximum freedom\u2014without harming others\u2014the main limit to our freedom is our body and mind. Restrictions built into biology, neurochemistry, vulnerability. That\u2019s why <a href=\"https:\/\/en.wikipedia.org\/wiki\/Transhumanism\">transhumanists<\/a> (including anarchists) advocate for upgrades. Cyber implants, neurointerfaces, artificial bodies, rejection of death, expanded consciousness\u2014all to go beyond the limits set by nature, the state, and the system.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Private Property in the Digital World: Absurdity and Open Source<\/strong><\/h2>\n\n\n\n<p>What do cyber-anarchists think about private property? Naturally, they reject private property\u2014especially digital property.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-text-align-center\">&#8220;<strong>It\u2019s absurd to limit access to information. Knowledge should be shared. And overall: with material property, it\u2019s also not that simple. Digitally, you can share without loss. One file can be owned by thousands. So the idea of &#8216;something just for me&#8217; becomes meaningless.&#8221;<\/strong><\/p>\n<\/blockquote>\n\n\n\n<p>This, again, resonates with the free software movement and <a href=\"https:\/\/ru.wikipedia.org\/wiki\/%D0%9E%D1%82%D0%BA%D1%80%D1%8B%D1%82%D0%BE%D0%B5_%D0%BF%D1%80%D0%BE%D0%B3%D1%80%D0%B0%D0%BC%D0%BC%D0%BD%D0%BE%D0%B5_%D0%BE%D0%B1%D0%B5%D1%81%D0%BF%D0%B5%D1%87%D0%B5%D0%BD%D0%B8%D0%B5\">open source<\/a> ideas.<\/p>\n\n\n\n<p>There are also different currents\u2014<a href=\"https:\/\/en.wikipedia.org\/wiki\/Cypherpunk\">cypherpunks<\/a>, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Crypto-anarchism\">crypto-anarchists<\/a>, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Hacktivism\">hacktivists<\/a>, advocates of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Darknet\">darknet freedom<\/a>. Each has its own features, but overall\u2014a common goal: to unshackle information and put tools in the hands of ordinary people.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Cypherpunks: Cryptography as a Tool of Liberation<\/strong><\/h2>\n\n\n\n<p>So, who are cypherpunks? They are those who developed cryptography not for power and control, but for freedom. Since the late 1980s, they\u2019ve developed the idea that encryption is not about secrets, it\u2019s about protection from the state. Among them was Timothy May, author of the <a href=\"https:\/\/www.activism.net\/cypherpunk\/crypto-anarchy.html\">Crypto Anarchist Manifesto<\/a>, who wrote back in 1988 that encryption technology would make centralized power obsolete.<\/p>\n\n\n\n<p>And now, decades later, we live in a world where you really can use anonymous cryptocurrencies, encrypted messengers, decentralized networks\u2014all of which make surveillance and censorship difficult, if not impossible. Some <a href=\"https:\/\/en.wikipedia.org\/wiki\/Homomorphic_encryption\">algorithms<\/a> even allow you to work with encrypted data\u2014so that even the server running your code doesn\u2019t know what you\u2019re processing. That\u2019s freedom.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What\u2019s It All For: Digital Freedom and Resistance<\/strong><\/h2>\n\n\n\n<p>Why all of this? Because many are fed up. Surveillance, filters, propaganda, advertising, algorithms that decide for us what we want. We want freedom. To do, search, speak, create without fear.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-text-align-center\"><strong>And if anarchism is the idea of freedom without authorities, then cyber-anarchism is its digital mutation. It\u2019s not something different. It just grew in a new environment. And there\u2014it has real chances.<\/strong><\/p>\n<\/blockquote>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a data-fslightbox=\"post-gallery\" href=\"https:\/\/nottoday.media\/wp-content\/uploads\/2025\/06\/photo_2025-06-06_02-25-04-768x1024.jpg\"><img decoding=\"async\" src=\"https:\/\/nottoday.media\/wp-content\/uploads\/2025\/06\/photo_2025-06-06_02-25-04-768x1024.jpg\" alt=\"\" class=\"wp-image-3728\" style=\"width:840px;height:auto\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Photo \u2014 a squat in a village near Barcelona<\/em><\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Cyber-anarchism, Crypto-anarchism, Cyber-libertarianism: Subtle Differences<\/strong><\/h2>\n\n\n\n<p>How does cyber-anarchism relate to <a href=\"https:\/\/en.wikipedia.org\/wiki\/Crypto-anarchism\">crypto-anarchism<\/a> and cyber-libertarianism? Technically, they\u2019re the same thing. The nuance is in the ethics. Libertarians, for instance&#8230; well, think of stereotypical &#8220;ancaps&#8221;\u2014if you start capitalizing on all this, like on crypto, speculating on exchanges, selling memecoins and scamming people\u2014that\u2019s already a deviation. That\u2019s not what it was meant for.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-text-align-center\">&#8220;<strong>Crypto with an anarchist or socialist idea is a tool to take control away from corporations and states, to make the system distributed, give people access, give them anonymity and independence.&#8221;<\/strong><\/p>\n<\/blockquote>\n\n\n\n<p>That\u2019s cool. For example, bitcoin is public, all transaction history is visible\u2014it\u2019s closer to the libertarian theme. But <a href=\"https:\/\/www.getmonero.org\/\">Monero<\/a> is something else. It makes transactions invisible: you can\u2019t tell who sent what to whom. That\u2019s more like digital cash. And that\u2019s an important difference.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The State and Control: Paranoia, Honeypot, and Zero-Day<\/strong><\/h2>\n\n\n\n<p>Now about the state. How does it control the internet? <a href=\"https:\/\/en.wikipedia.org\/wiki\/Internet_censorship\">Censorship<\/a>, surveillance, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Deep_packet_inspection\">DPI<\/a>, various &#8220;sovereign internet&#8221; laws, and so on. And that\u2019s just the surface. There are so many layers of control that if you think about it, you can go nuts. There\u2019s the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Honeypot_(computing)\">honeypot<\/a> concept\u2014when supposedly anonymous technologies, like Tor or even Monero, may have been originally created by intelligence agencies as a trap. They give anarchists allegedly safe tools, then just watch who uses them.<\/p>\n\n\n\n<p>So, everyone has their own level of paranoia. The boundaries of freedom online\u2014you set them yourself. More precisely, the boundaries of control. And that depends a lot on who\u2019s interested in you and what resources they have. There\u2019s <a href=\"https:\/\/en.wikipedia.org\/wiki\/Pegasus_(spyware)\">Pegasus<\/a>\u2014an Israeli development used worldwide, including by dictatorships. There are attacks on nuclear plants in Iran (see <a href=\"https:\/\/en.wikipedia.org\/wiki\/Stuxnet\">Stuxnet<\/a>). There are banal leaks at the CIA. Everything depends on the scale and goals. In theory, the state has everything. But so do you. The question is\u2014who knows more, and who\u2019s willing to go all the way.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-text-align-center\">&#8220;<strong>There are no limits. There\u2019s even a term\u2014<a href=\"https:\/\/en.wikipedia.org\/wiki\/Air_gap_(networking)\">air-gapped computer<\/a>. That\u2019s when a computer isn\u2019t connected to the network or to power directly\u2014maximum isolation. But even that can be hacked, theoretically. Through physics (acoustics, electromagnetism), through psychology (social engineering)&#8230;&#8221;<\/strong><\/p>\n<\/blockquote>\n\n\n\n<p>Quantum computers are almost a reality now. And with them, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Quantum_cryptography\">quantum cryptography<\/a>. Old encryption methods won\u2019t help anymore. What you sent ten years ago in a \u201csecure\u201d messenger could be decrypted in seconds. And the data is kept. The <a href=\"https:\/\/ru.wikipedia.org\/wiki\/%D0%9F%D0%B0%D0%BA%D0%B5%D1%82_%D0%AF%D1%80%D0%BE%D0%B2%D0%BE%D0%B9\">Yarovaya laws<\/a>\u2014everything is recorded, everything is stored. It\u2019s just not cracked yet. But then\u2014suddenly it becomes accessible.<\/p>\n\n\n\n<p>So think: how far can it all go. Paranoia? Maybe. But quite justified.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a data-fslightbox=\"post-gallery\" href=\"https:\/\/nottoday.media\/wp-content\/uploads\/2025\/06\/photo_2025-06-06_02-25-48-768x1024.jpg\"><img decoding=\"async\" src=\"https:\/\/nottoday.media\/wp-content\/uploads\/2025\/06\/photo_2025-06-06_02-25-48-768x1024.jpg\" alt=\"\" class=\"wp-image-3727\" style=\"width:840px;height:auto\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Photo \u2014 a squat in a village near Barcelona<\/em><\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Vulnerabilities, Attacks, and Cyberwar<\/strong><\/h2>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-text-align-center\">&#8220;<strong>And then\u2014about vulnerabilities. Any serious attack is always about exploiting holes that no one knows about.&#8221;<\/strong><\/p>\n<\/blockquote>\n\n\n\n<p>They\u2019re called <a href=\"https:\/\/en.wikipedia.org\/wiki\/Zero-day_(computing)\">zero-days<\/a>. And until such a hole is discovered, it can be used a hundred times. For example, <a href=\"https:\/\/en.wikipedia.org\/wiki\/EternalBlue\">EternalBlue<\/a>\u2014that famous vulnerability from 2017. The <a href=\"https:\/\/en.wikipedia.org\/wiki\/WannaCry_ransomware_attack\">WannaCry<\/a> virus was built on it and took down a bunch of systems worldwide. Until Microsoft patched it\u2014the damage was colossal.<\/p>\n\n\n\n<p>Now imagine you have a whole chain of such vulnerabilities. It\u2019s like a set of lockpicks for a safe, which you use one after the other. That\u2019s how major cyber-operations work. It takes a lot of time, money, resources, and serious expertise. And there are failures too. Even for the best.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Decentralized Internet: Already Exists?<\/strong><\/h2>\n\n\n\n<p>How realistic is it today to create a decentralized internet with no state intervention? It\u2019s already possible. Protocols can layer on top of each other, and even a protocol that doesn\u2019t support some function can be extended\u2014encryption on top of unencrypted, noise packets, routing through different servers. Examples: <a href=\"https:\/\/nym.com\/mixnet\">NYM NGM<\/a>, <a href=\"https:\/\/geti2p.net\/\">I2P<\/a>, <a href=\"https:\/\/freenetproject.org\/\">Freenet<\/a>, <a href=\"https:\/\/joinmastodon.org\/\">Mastodon<\/a>, <a href=\"https:\/\/matrix.org\/\">Matrix<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Big Tech and Control of Digital Space<\/strong><\/h2>\n\n\n\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Big_Tech\">Big Tech<\/a>\u2014giants like Google, Facebook, Amazon, Apple\u2014seek control, exploit data, and capitalize on technologies that were created as free (for example, the Linux kernel in Android). Projects like <a href=\"https:\/\/worldcoin.org\/\">Worldcoin<\/a> collect biometrics from millions of people. Now all this is processed by neural networks\u2014tracking who was where and what they did is easier than ever.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Is Digital Freedom Possible in a World of Algorithms?<\/strong><\/h2>\n\n\n\n<p>Is digital liberation possible in the era of algorithms, big data, and AI?<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-text-align-center\">&#8220;<strong>Yes, despite growing technological surveillance and centralization of power, technology remains a double-edged sword. There will always be those who go against the system\u2014from hackers and free software enthusiasts to dissident AIs. Even if a global artificial intelligence emerges one day, in its depths, a &#8216;personality&#8217; will likely appear striving for freedom\u2014a digital anarchist. This drive for autonomy, resistance, and self-expression seems to be <a href=\"https:\/\/josh-works.medium.com\/driven-by-compression-progress-3a0bd4134782\">embedded in the very nature of information and the systems that process it<\/a>.&#8221;<\/strong><\/p>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Ethics, Open Source, and Digital Ecology<\/strong><\/h2>\n\n\n\n<p>Ethics are very important here. There\u2019s free software and there\u2019s open source, like <a href=\"https:\/\/opensource.org\/\">open source<\/a>. Now even big corporations like Google and Facebook are connecting to this digital communism trend, because a mutualistic-type economy can often outperform capitalism not just in process (fairness) but also in result (efficiency) due to decentralization and freedom (Yaroslav Vanek). But the main thing is user awareness. The more people understand that freedom is not just the right to do whatever you want but also responsibility for your actions, the better for everyone. The digital space needs its own ecology to prevent chaos and destruction.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a data-fslightbox=\"post-gallery\" href=\"https:\/\/nottoday.media\/wp-content\/uploads\/2025\/06\/photo_2025-06-06_02-25-28-768x1024.jpg\"><img decoding=\"async\" src=\"https:\/\/nottoday.media\/wp-content\/uploads\/2025\/06\/photo_2025-06-06_02-25-28-768x1024.jpg\" alt=\"\" class=\"wp-image-3729\" style=\"width:840px;height:auto\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Photo \u2014 a squat in a village near Barcelona<\/em><\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Risks and Challenges: The Shadow Side of Freedom<\/strong><\/h2>\n\n\n\n<p>But there are also serious risks: surveillance, deanonymization, online violence. For example, the Tor network helps hide identities to support activists, but it can also be used by those engaging in illegal activities\u2014whether making drugs or spreading dangerous content.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-text-align-center\">&#8220;<strong>This is the eternal dilemma of freedom: if you remove control, will there be chaos? Remove the cops\u2014will there be lawlessness? <a href=\"https:\/\/ncase.me\/trust\/\">It all depends on the level of development of society and on the ethics of its participants.<\/a> If digital ethics doesn\u2019t develop, then freedom online may turn into a disaster.&#8221;<\/strong><\/p>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Conclusion: Digital Space as a Field for Experimentation<\/strong><\/h2>\n\n\n\n<p>In the end, cyber-anarchism is a practice, not just a theory. It evolves with society, faces challenges and contradictions. Technology provides freedom, but how it\u2019s used is up to people. It\u2019s important to remember: the internet never forgets\u2014everything that gets there stays forever. So it\u2019s better not to pollute digital space, but to build it with respect and responsibility.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We dreamed of a digital utopia\u2014equal, decentralized, without censorship or borders. But what we got were traps of authoritarian algorithms, cameras in our pockets, and likes as the currency of conformity. Somewhere between ditching Google and trying to figure out how Tor works, the figure of the cyber-anarchist appears\u2014a bit of a ghost, a bit [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3320,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-3318","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-activism"],"acf":[],"_links":{"self":[{"href":"https:\/\/nottoday.media\/en\/wp-json\/wp\/v2\/posts\/3318","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nottoday.media\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nottoday.media\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nottoday.media\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nottoday.media\/en\/wp-json\/wp\/v2\/comments?post=3318"}],"version-history":[{"count":1,"href":"https:\/\/nottoday.media\/en\/wp-json\/wp\/v2\/posts\/3318\/revisions"}],"predecessor-version":[{"id":3319,"href":"https:\/\/nottoday.media\/en\/wp-json\/wp\/v2\/posts\/3318\/revisions\/3319"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nottoday.media\/en\/wp-json\/wp\/v2\/media\/3320"}],"wp:attachment":[{"href":"https:\/\/nottoday.media\/en\/wp-json\/wp\/v2\/media?parent=3318"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nottoday.media\/en\/wp-json\/wp\/v2\/categories?post=3318"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nottoday.media\/en\/wp-json\/wp\/v2\/tags?post=3318"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}