{"id":3695,"date":"2025-12-26T12:18:03","date_gmt":"2025-12-26T09:18:03","guid":{"rendered":"https:\/\/nottoday.media\/en\/?p=3695"},"modified":"2025-12-26T12:18:04","modified_gmt":"2025-12-26T09:18:04","slug":"the-idea-here-is-that-if-you-can-build-your-own-tools-you-are-your-own-master-cyberanarchism-a-monologue-from-within","status":"publish","type":"post","link":"https:\/\/nottoday.media\/en\/activism\/the-idea-here-is-that-if-you-can-build-your-own-tools-you-are-your-own-master-cyberanarchism-a-monologue-from-within","title":{"rendered":"\u201cThe idea here is that if you can build your own tools, you are your own master\u201d \u2014 Cyberanarchism: a monologue from within"},"content":{"rendered":"<h4 class=\"wp-block-heading\"><strong>The Internet promised freedom. But something went wrong.<\/strong><\/h4>\n<p><strong>We dreamed of a digital utopia\u2014equal, decentralized, without censorship or borders. Instead, we got the traps of authoritarian algorithms, cameras in our pockets, and likes as a currency of submission. Somewhere between rejecting Google and trying to figure out how Tor works, the figure of the cyber-anarchist appears\u2014part ghost, part prophet, part hacker.<\/strong><\/p>\n<p><strong>Who are they\u2014these people who encrypt not just their correspondence, but the very possibility of being? How do they differ from leftists, libertarians, or simple paranoiacs? And is it even possible to preserve freedom in a network where every click writes a denunciation?<\/strong><\/p>\n<p><strong>Nottoday spoke with a cyber-anarchist about all of the above\u2014and publishes his monologue.<\/strong><\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/nottoday.media\/wp-content\/uploads\/2025\/06\/photo_2025-06-06_08-16-34-1024x768.jpg\" alt=\"\" class=\"wp-image-3736\" \/><figcaption class=\"wp-element-caption\"><em>Photo \u2014 a squat in a village near Barcelona<\/em><\/figcaption><\/figure>\n<h2 class=\"wp-block-heading\"><strong>Introduction: How Cyber-Anarchism Arose<\/strong><\/h2>\n<p>Hi. I&#8217;ll tell you a little about cyber-anarchism\u2014how this concept arose and what events preceded it.<\/p>\n<blockquote class=\"wp-block-quote\">\n<p class=\"has-text-align-center\">&#8220;<strong>Actually, cyber-anarchism is in a sense the natural development of anarchist ideas in the digital space. If in the 19th and 20th centuries anarchists like <a href=\"https:\/\/www.britannica.com\/biography\/Peter-Kropotkin\">Kropotkin<\/a>, <a href=\"https:\/\/www.britannica.com\/biography\/Mikhail-Bakunin\">Bakunin<\/a>, or <a href=\"https:\/\/en.wikipedia.org\/wiki\/Errico_Malatesta\">Malatesta<\/a> built utopias in a factory-industrial society, then with the development of the internet, a new field for experimentation appeared\u2014cyberspace.&#8221; <\/strong><\/p>\n<\/blockquote>\n<p class=\"has-text-align-center\">And the ideas that began to emerge there came not so much from theory as from practice.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Crypto-Anarchism: The Manifesto and First Steps<\/strong><\/h2>\n<p>Crypto-anarchism is one of the first such manifestations. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Timothy_C._May\">Timothy C. May<\/a> in 1988 wrote the <a href=\"https:\/\/www.activism.net\/cypherpunk\/crypto-anarchy.html\">&#8220;The Crypto Anarchist Manifesto&#8221;<\/a>, where he laid out the essence: the use of cryptography to protect individual freedom from the state. He had no references to Kropotkin or Proudhon\u2014it was not political philosophy in the academic sense, but a living practice of resistance. Later, the ideas of crypto-anarchists were embodied in projects such as <a href=\"https:\/\/bitcoin.org\/bitcoin.pdf\">Bitcoin<\/a>, <a href=\"https:\/\/www.torproject.org\/about\/history\/\">Tor<\/a>, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Pretty_Good_Privacy\">PGP<\/a>, <a href=\"https:\/\/wikileaks.org\/\">WikiLeaks<\/a>, <a href=\"https:\/\/en.wikipedia.org\/wiki\/OpenBazaar\">OpenBazaar<\/a>, <a href=\"https:\/\/simplex.chat\/\">SimpleX<\/a>\u2014all of them are aimed at decentralization, anonymity, and control over one&#8217;s own information.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Phreakers and Hackers: Precursors of Digital Anarchy<\/strong><\/h2>\n<p>But long before that, there were their own &#8220;anarchists&#8221;\u2014not by ideological platform, but by spirit. For example, <a href=\"https:\/\/en.wikipedia.org\/wiki\/John_Draper\">John Draper<\/a>, better known as Captain Crunch. In the 1970s, he became a legend among phreakers and hackers. He discovered that a whistle from a Cap&#8217;n Crunch cereal box emitted a 2600 Hz tone, which could be used to control AT&amp;T telephone lines. Thus was born <a href=\"https:\/\/en.wikipedia.org\/wiki\/Phreaking\">phreaking<\/a>\u2014the hacking of telephone networks, long before computer networks. <\/p>\n<blockquote class=\"wp-block-quote\">\n<p class=\"has-text-align-center\">&#8220;<strong>It wasn&#8217;t a political protest, but practical hooliganism, but at its core lay the same craving for freedom, bypassing restrictions, and control over infrastructure that later became ideologically saturated in cyber-anarchism.&#8221;<\/strong><\/p>\n<\/blockquote>\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/nottoday.media\/wp-content\/uploads\/2025\/06\/photo_2025-06-06_02-24-51-768x1024.jpg\" alt=\"\" class=\"wp-image-3722\" style=\"width:840px;height:auto\" \/><figcaption class=\"wp-element-caption\"><em>Photo \u2014 a squat in a village near Barcelona<\/em><\/figcaption><\/figure>\n<h2 class=\"wp-block-heading\"><strong>DIY Philosophy: Freedom Starts with Tools<\/strong><\/h2>\n<p>The idea here is that if you can build your own tools yourself\u2014you are your own master. Therefore, a lot of people around the world create <a href=\"https:\/\/en.wikipedia.org\/wiki\/Open-source_software\">open-source software<\/a>, decentralized platforms, encryption systems, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Decentralized_finance\">decentralized finance services (DeFi)<\/a> and so on. And they do it not for the sake of profit, but for the sake of principle\u2014to build a society where no one dominates, where power is not concentrated in the hands of corporations or states.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Cyberspace as the Last Continent<\/strong><\/h2>\n<p>There are also more modern reflections. For example, an interesting free book was recently released in which the author reflects on cyberspace as the last <a href=\"https:\/\/thenetworkstate.com\/\">&#8220;unclaimed continent&#8221;<\/a>. Like, it&#8217;s too early to fly into space, too late to sail to the New World\u2014all continents have already been discovered, but the internet is a new territory. What kind of territory is it? In essence\u2014an information field, a field for the exchange of meanings.<\/p>\n<blockquote class=\"wp-block-quote has-text-align-center\">\n<p>&#8220;<strong>Previously, knowledge was spread through books, now through the network. This is a huge shift because digital space is not just text. It is a platform on which one can build a new economy, new forms of interaction, and even alternative political structures.&#8221;<\/strong><\/p>\n<\/blockquote>\n<h2 class=\"wp-block-heading\"><strong>Cryptocurrencies: From Anarchy to State Reserves<\/strong><\/h2>\n<p>In the digital world, one can do without traditional money\u2014take the same <a href=\"https:\/\/en.wikipedia.org\/wiki\/Cryptocurrency\">cryptocurrencies<\/a>, and smart contracts, which open up the possibility of creating <a href=\"https:\/\/www.wtfisqf.com\/\">a more sophisticated and fair financial infrastructure that controls itself<\/a>. Once, crypto-anarchists invented them as a way to free themselves from banks and states. And now even states themselves are interested in them. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Strategic_Bitcoin_Reserve_(United_States)\">Donald Trump, for example, recently discussed the idea of including bitcoin in the US reserve fund<\/a>, and El Salvador began using bitcoin as <a href=\"https:\/\/en.wikipedia.org\/wiki\/Bitcoin_in_El_Salvador#:~:text=El%20Salvador%20became%20the%20first,of%20El%20Salvador%20in%202021.\">official currency<\/a>. It turns out that the idea invented to bypass the state is now being used by that very state. Funny, but also worrying.<\/p>\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/nottoday.media\/wp-content\/uploads\/2025\/06\/photo_2025-06-06_02-24-38-768x1024.jpg\" alt=\"\" class=\"wp-image-3724\" style=\"width:840px;height:auto\" \/><figcaption class=\"wp-element-caption\"><em>Photo \u2014 a squat in a village near Barcelona<\/em><\/figcaption><\/figure>\n<h2 class=\"wp-block-heading\"><strong>Creation Above Destruction<\/strong><\/h2>\n<p>What&#8217;s important is that cyberspace allows you not only to break, but also to create. This is what I consider key.<\/p>\n<blockquote class=\"wp-block-quote\">\n<p class=\"has-text-align-center\">&#8220;<strong>You can make your own computers, your own networks, your own weapons, your own economy. An example is the <a href=\"https:\/\/en.wikipedia.org\/wiki\/FGC-9\">FGC-9<\/a>, a 3D-printed weapon developed by a German engineer-enthusiast and posted in the public domain. Everything from idea to practice happens online: design, discussion, fundraising, logistics.&#8221;<\/strong><\/p>\n<\/blockquote>\n<p>Neil Gershenfeld, director of the MIT Center for Bits and Atoms and founder of the Fab Lab movement, explores <a href=\"https:\/\/lexfridman.com\/neil-gershenfeld\/\">the future of manufacturing through the lens of self-replicating robots and digital fabrication<\/a>. He proposes a model in which machines can assemble their own copies from modular components, which is especially relevant for autonomous production in resource-constrained environments, such as space. Gershenfeld sees the transition from digital information (bits) to physical objects (atoms) as the basis of a new manufacturing revolution\u2014decentralized, personalized, and accessible to everyone. His network of Fab Labs around the world embodies this idea, allowing people to create things from digital blueprints, changing the economy, education, and the very essence of production.<\/p>\n<p>The power lies in the fact that you can be anywhere in the world and, without leaving home, influence global processes. People unite, use their brains, pool resources, and build their own autonomous reality.<\/p>\n<h2 class=\"wp-block-heading\"><strong>New Power: Algorithms and the Digital Crowd<\/strong><\/h2>\n<p>But yes, with this comes a new power\u2014the power of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Algorithm\">algorithms<\/a>, the power of the digital crowd. And if you don&#8217;t keep it in check, it becomes dangerous. For example, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Cyberstalking\">cyberstalking<\/a>, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Doxing\">doxing<\/a>, <a href=\"https:\/\/www.brookings.edu\/articles\/online-harassment\/\">bullying<\/a>\u2014these are forms of digital violence that can destroy a person&#8217;s life. The internet remembers everything, knows everything. Memes, viral videos\u2014and suddenly you&#8217;ve become an object of ridicule or even persecution. This is no longer freedom, but digital bullying.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Anarchism on the Net: For One and All<\/strong><\/h2>\n<p>Therefore, anarchist ideas are important here too. It is necessary not only to resist centralized control but also to build a digital space in which people will be safe and free. So that it belongs to everyone, taking into account the interests of everyone. And not just those who have more servers or subscribers.<\/p>\n<p>This is what it is\u2014cyber-anarchism. Not so much a philosophy with books and circles, but a field for experimentation. Where freedom is not a slogan, but a code. Where power is infrastructure. And where anarchy is not chaos, but coordination without coercion.<\/p>\n<figure class=\"wp-block-image size-large is-style-default\"><img decoding=\"async\" src=\"https:\/\/nottoday.media\/wp-content\/uploads\/2025\/06\/photo_2025-06-06_02-25-33-1024x768.jpg\" alt=\"\" class=\"wp-image-3732\" \/><figcaption class=\"wp-element-caption\"><em>Photo \u2014 a squat in a village near Barcelona<\/em><\/figcaption><\/figure>\n<h2 class=\"wp-block-heading\"><strong>Difference Between Cyber-Anarchism and Traditional Anarchism<\/strong><\/h2>\n<p>How does cyber-anarchism differ from traditional anarchism? In fact, there are almost no fundamental differences. It&#8217;s just that thanks to the fact that in the digital space you can clone, multiply, share\u2014in short, resources there are not as limited as offline. Everything is much more fluid, blurred. And in general, it is simply easier to implement anarchism in digital form. It is, in essence, the most fertile ground for anarchy. There you can set up experiments\u2014political, social, cultural, technological\u2014and immediately test them in action.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Values of Cyber-Anarchists<\/strong><\/h2>\n<p>What values do cyber-anarchists develop? All the same ones. <\/p>\n<blockquote class=\"wp-block-quote\">\n<p class=\"has-text-align-center\">&#8220;<strong>The most important thing is the three pillars: anonymity, privacy, security. If these three things are in place for you\u2014you can move forward. Plus\u2014free distribution of information, free access to knowledge, <a href=\"https:\/\/www.gnu.org\/philosophy\/free-sw.en.html\">free software<\/a>.&#8221; <\/strong><\/p>\n<\/blockquote>\n<p>For example, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Richard_Stallman\">Richard Stallman<\/a>\u2014the father of the free software movement\u2014said that &#8220;software should be not just free of charge, but free.&#8221; That is: you should have the right to study it, modify it, pass it on to others. This is, essentially, digital communism. Complete abolition of private intellectual property. Everything is common, everything is transparent, everything is for the common good.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Goals and Threats: Decentralization, Anonymity, and Algorithmic Bubbles<\/strong><\/h2>\n<p>Goals of cyber-anarchists in the digital space? Decentralization, anonymity, free information. Plus, of course, protection from surveillance, from propaganda, from <a href=\"https:\/\/en.wikipedia.org\/wiki\/Filter_bubble\">filter bubbles<\/a>. So that no YouTube or TikTok knows for you what you want. And it almost can already. Everything you do\u2014tapping, liking, even just watching\u2014is saved. The system knows you better than you know yourself.<\/p>\n<p>This is already starting to be scary. Because the next step\u2014you just ask a question, and the neural network is like: &#8220;I know what you want.&#8221; <\/p>\n<blockquote class=\"wp-block-quote\">\n<p class=\"has-text-align-center\"><strong>This is not just a search\u2014it is an invasion. And this is no longer just techno-realism, it is dystopia in real time.<\/strong><\/p>\n<\/blockquote>\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/nottoday.media\/wp-content\/uploads\/2025\/06\/photo_2025-06-06_02-25-40-768x1024.jpg\" alt=\"\" class=\"wp-image-3726\" style=\"width:840px;height:auto\" \/><figcaption class=\"wp-element-caption\"><em>Photo \u2014 a squat in a village near Barcelona<\/em><\/figcaption><\/figure>\n<h2 class=\"wp-block-heading\"><strong>Transhumanism: Freedom of Body and Consciousness<\/strong><\/h2>\n<p>And what about the body and anarchy? This is where <a href=\"http:\/\/blueshifted.net\/\">anarcho-transhumanism<\/a> begins. Because if we are talking about maximum freedom\u2014without harm to others\u2014then the main brake on our freedom is the body and the brain. Limitations built into biology, into neurochemistry, into vulnerability. Therefore, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Transhumanism\">transhumanists<\/a> (including anarchists) advocate for an upgrade. Cyber-implants, neurointerfaces, artificial bodies, the rejection of death, the expansion of consciousness\u2014this is all about going beyond the boundaries set by nature, the state, and the system.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Private Property in Digital: Absurdity and Open-Source<\/strong><\/h2>\n<p>What do cyber-anarchists think about private property? Naturally, they reject private property\u2014especially digital property. <\/p>\n<blockquote class=\"wp-block-quote\">\n<p class=\"has-text-align-center\">&#8220;<strong>It is absurd\u2014restricting access to information. Knowledge should be common. But also in general: with material property, everything is also not so clear-cut. In digital, you can share without loss. Thousands can have one file. Therefore, the idea of &#8216;a thing only for me&#8217; becomes meaningless.&#8221; <\/strong><\/p>\n<\/blockquote>\n<p>This, again, resonates with the free software movement and with the ideas of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Open-source_software\">open-source<\/a>.<\/p>\n<p>There are also various currents\u2014<a href=\"https:\/\/en.wikipedia.org\/wiki\/Cypherpunk\">cypherpunks<\/a>, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Crypto-anarchism\">crypto-anarchists<\/a>, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Hacktivism\">hacktivists<\/a>, supporters of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Darknet\">darknet freedom<\/a>. Each has its own characteristics, but in general\u2014a common goal: to unshackle information and put tools in the hands of ordinary people.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Cypherpunks: Cryptography as a Tool of Liberation<\/strong><\/h2>\n<p>And who are the cypherpunks? Those are the ones who developed cryptography not for the sake of power and control, but for the sake of freedom. Since the late 1980s, they began to develop the idea: encryption is not about secrets, it&#8217;s about protection from the state. Among them was Timothy May, author of the <a href=\"https:\/\/www.activism.net\/cypherpunk\/crypto-anarchy.html\">Crypto Anarchist Manifesto<\/a>, where he wrote back in 1988 that encryption technologies would make centralized power meaningless.<\/p>\n<p>And now, decades later, we live in a world where it is actually possible to use anonymous cryptocurrencies, encrypted messengers, decentralized networks\u2014and all this makes surveillance and censorship difficult, if not impossible. Some <a href=\"https:\/\/en.wikipedia.org\/wiki\/Homomorphic_encryption\">algorithms<\/a> allow working with encrypted data\u2014so that even the server on which you execute the code does not know exactly what you are processing. This is freedom.<\/p>\n<h2 class=\"wp-block-heading\"><strong>What is it All For: Digital Freedom and Resistance<\/strong><\/h2>\n<p>Why all this? Because many are fed up. Surveillance, filters, propaganda, advertising, algorithms that decide for us what we want. We want freedom. To be able to do, search, speak, create without fear.<\/p>\n<blockquote class=\"wp-block-quote\">\n<p class=\"has-text-align-center\"><strong>And if anarchism is the idea of freedom without authorities, then cyber-anarchism is its digital mutation. It is not different. It just grew in a new environment. And in it\u2014it has real chances.<\/strong><\/p>\n<\/blockquote>\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/nottoday.media\/wp-content\/uploads\/2025\/06\/photo_2025-06-06_02-25-04-768x1024.jpg\" alt=\"\" class=\"wp-image-3728\" style=\"width:840px;height:auto\" \/><figcaption class=\"wp-element-caption\"><em>Photo \u2014 a squat in a village near Barcelona<\/em><\/figcaption><\/figure>\n<h2 class=\"wp-block-heading\"><strong>Cyber-Anarchism, Crypto-Anarchism, Cyber-Libertarianism: Subtle Differences<\/strong><\/h2>\n<p>How does cyber-anarchism relate to <a href=\"https:\/\/en.wikipedia.org\/wiki\/Crypto-anarchism\">crypto-anarchism<\/a> and cyber-libertarianism\u2014technically it&#8217;s the same thing. The nuance is in ethics. Libertarians, let&#8217;s say&#8230; well, one can recall conventional an-caps\u2014if you start to capitalize on all this, like on crypto, play on exchanges, sell air in the form of memecoins and scam people\u2014that&#8217;s already a deviation. That&#8217;s not what it was all intended for.<\/p>\n<blockquote class=\"wp-block-quote\">\n<p class=\"has-text-align-center\">&#8220;<strong>Crypto with an anarchist or socialist idea is a tool to take control away from corporations and states, make the system distributed, give access to people, give anonymity and independence.&#8221; <\/strong><\/p>\n<\/blockquote>\n<p>That&#8217;s cool. For example, bitcoin\u2014it is public, the entire transaction history is visible, it can be attributed to a more libertarian theme. But <a href=\"https:\/\/www.getmonero.org\/\">Monero<\/a>\u2014that&#8217;s a completely different matter. It makes transactions invisible: you won&#8217;t find out who sent how much and to whom. This is already like digital cash. And that&#8217;s an important difference.<\/p>\n<h2 class=\"wp-block-heading\"><strong>The State and Control: Paranoia, Honeypots, and Zero-Day<\/strong><\/h2>\n<p>Now about the state. How does it control the internet? <a href=\"https:\/\/en.wikipedia.org\/wiki\/Internet_censorship\">Censorship<\/a>, surveillance, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Deep_packet_inspection\">DPI<\/a>, all sorts of laws on the &#8220;sovereign internet&#8221; and so on. And that&#8217;s just the tip of the iceberg. There\u2014a sea of layers of control, and if you think about it, you can lose your mind. For example, there is the concept of a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Honeypot_(computing)\">honeypot<\/a>\u2014when supposedly anonymous technologies, like Tor or even Monero, could be initially created by special services as a trap. They give anarchists supposedly safe tools, and then just observe who uses them.<\/p>\n<p>So the level of paranoia is different for everyone. The boundaries of freedom on the net\u2014you build them yourself. More precisely, the boundaries of control. And this largely depends on who exactly is interested in you and what resources they have. There is <a href=\"https:\/\/en.wikipedia.org\/wiki\/Pegasus_(spyware)\">Pegasus<\/a>\u2014an Israeli development used all over the world, including by dictatorships. There are attacks on nuclear power plants in Iran (see <a href=\"https:\/\/en.wikipedia.org\/wiki\/Stuxnet\">Stuxnet<\/a>). There are simple leaks from the CIA. It all depends on the scale and goals. And in theory\u2014the state has everything. But you also have tools. The question is\u2014who knows more and who is ready to go to the end.<\/p>\n<blockquote class=\"wp-block-quote\">\n<p class=\"has-text-align-center\">&#8220;<strong>There are no limits. There is even a term\u2014<a href=\"https:\/\/en.wikipedia.org\/wiki\/Air_gap_(networking)\">air-gapped computer<\/a>. This is when a computer is not connected to a network or power supply directly\u2014maximum isolation. But even it can be hacked, theoretically. Through physics (acoustics, electromagnetism), through psychology (social engineering)&#8230;&#8221;. <\/strong><\/p>\n<\/blockquote>\n<p>Quantum computers\u2014they are already almost a reality. And along with them, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Quantum_cryptography\">quantum cryptography<\/a>. And old encryption methods will no longer help. What you sent 10 years ago in a &#8220;secure&#8221; messenger can be decrypted in seconds. And the data is saved. Those same <a href=\"https:\/\/en.wikipedia.org\/wiki\/Yarovaya_law\">Yarovaya laws<\/a>\u2014everything is recorded, everything is lying there. Not hacked for now. And then\u2014suddenly it becomes accessible.<\/p>\n<p>So think: how far it can all go. Paranoia? Possibly. \u041d\u043e quite justified.<\/p>\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/nottoday.media\/wp-content\/uploads\/2025\/06\/photo_2025-06-06_02-25-48-768x1024.jpg\" alt=\"\" class=\"wp-image-3727\" style=\"width:840px;height:auto\" \/><figcaption class=\"wp-element-caption\"><em>Photo \u2014 a squat in a village near Barcelona<\/em><\/figcaption><\/figure>\n<h2 class=\"wp-block-heading\"><strong>Vulnerabilities, Attacks, and Cyber-War<\/strong><\/h2>\n<blockquote class=\"wp-block-quote\">\n<p class=\"has-text-align-center\">&#8220;<strong>And further\u2014about vulnerabilities. Any serious attack\u2014it&#8217;s always the use of holes that no one knows about.&#8221;<\/strong><\/p>\n<\/blockquote>\n<p> They are called <a href=\"https:\/\/en.wikipedia.org\/wiki\/Zero-day_(computing)\">zero-day<\/a>. And until such a hole is found, it can be used a hundred times. For example, <a href=\"https:\/\/en.wikipedia.org\/wiki\/EternalBlue\">EternalBlue<\/a>\u2014that very vulnerability from 2017. On it they built the virus <a href=\"https:\/\/en.wikipedia.org\/wiki\/WannaCry_ransomware_attack\">WannaCry<\/a>, which took down a lot of systems around the world. Until Microsoft closed the hole\u2014the damage was colossal.<\/p>\n<p>Now imagine that you have a whole chain of such vulnerabilities. It&#8217;s like a set of master keys for a safe that you use one by one. This is how large cyber-operations work. It takes a lot of time, money, resources, and very powerful expertise. And failures also happen. Even for the coolest. <\/p>\n<h2 class=\"wp-block-heading\"><strong>Decentralized Internet: Already Here?<\/strong><\/h2>\n<p>And how realistic is the creation of a decentralized internet today that does not require state interference? It&#8217;s already here. Protocols can be layered on top of each other, and even a protocol that doesn&#8217;t support a certain function can be expanded\u2014encryption on top of non-encrypted, noise packets, routing through different servers. Examples: <a href=\"https:\/\/nymtech.net\/\">NYM<\/a>, <a href=\"https:\/\/geti2p.net\/\">I2P<\/a>, <a href=\"https:\/\/freenetproject.org\/\">Freenet<\/a>, <a href=\"https:\/\/joinmastodon.org\/\">Mastodon<\/a>, <a href=\"https:\/\/matrix.org\/\">Matrix<\/a>.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Big Tech and Control Over Digital Space<\/strong><\/h2>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Big_Tech\">Big Tech<\/a>\u2014giants like Google, Facebook, Amazon, Apple\u2014strive for control, exploit data, and capitalize on technologies that were created as free (for example, the Linux kernel in Android). Projects like <a href=\"https:\/\/worldcoin.org\/\">Worldcoin<\/a> collect the biometrics of millions of people. Now all this is processed by neural networks\u2014tracking who was where and what they did has become easier than ever.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Is Digital Freedom Possible in a World of Algorithms?<\/strong><\/h2>\n<p>Is digital liberation possible in the era of algorithms, big data, and AI? <\/p>\n<blockquote class=\"wp-block-quote\">\n<p class=\"has-text-align-center\">&#8220;<strong>Yes, despite increasing technological surveillance and centralization of power, technology remains a double-edged sword. There will always be those who go against the system\u2014from hackers and free software enthusiasts to dissident AIs. Even if a global artificial intelligence appears one day, in its depths, a &#8220;personality&#8221; seeking freedom\u2014a digital anarchist\u2014will likely manifest. This drive for autonomy, resistance, and self-expression seems to be <a href=\"https:\/\/josh-works.medium.com\/driven-by-compression-progress-3a0bd4134782\">embedded in the very nature of information and the systems that process it<\/a>.&#8221;<\/strong><\/p>\n<\/blockquote>\n<h2 class=\"wp-block-heading\"><strong>Ethics, Open Source, and Digital Ecology<\/strong><\/h2>\n<p>Ethics is very important here. There is free software and there is open-source software. Now even large corporations like Google and Facebook are connecting to this trend of digital communism, because a mutualistic type of economy can often win over capitalism not only in process (fairness) but also in result (efficiency) due to decentralization and freedom (Jaroslav Vanek). \u041d\u043e the main thing is the awareness of users. The more people understand that freedom is not just the right to do whatever you want, but also the responsibility for your actions, the better for everyone. In the digital space, one needs its own ecology so as not to allow chaos and destruction.<\/p>\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/nottoday.media\/wp-content\/uploads\/2025\/06\/photo_2025-06-06_02-25-28-768x1024.jpg\" alt=\"\" class=\"wp-image-3729\" style=\"width:840px;height:auto\" \/><figcaption class=\"wp-element-caption\"><em>Photo \u2014 a squat in a village near Barcelona<\/em><\/figcaption><\/figure>\n<h2 class=\"wp-block-heading\"><strong>Risks and Challenges: The Shadow Side of Freedom<\/strong><\/h2>\n<p>But there are risks, and serious ones: surveillance, de-anonymization, online violence. For example, the Tor network helps to hide identity to support activists, but it can also be used by those engaged in illegal activities\u2014be it drug production or the distribution of dangerous content. <\/p>\n<blockquote class=\"wp-block-quote\">\n<p class=\"has-text-align-center\">&#8220;<strong>This is the eternal dilemma of freedom: if you remove control, will there be chaos? If we remove the cops\u2014will there be lawlessness? <a href=\"https:\/\/ncase.me\/trust\/\">It all depends on the level of development of society and the ethics of its participants.<\/a> If digital ethics do not develop, then freedom&#8230;&#8221;<\/strong><\/p>\n<\/blockquote>\n<blockquote class=\"wp-block-quote\">\n<p class=\"has-text-align-center\">&#8220;<strong>There are no limits. There is even a term \u2014 <a href=\"https:\/\/en.wikipedia.org\/wiki\/Air_gap_(networking)\">air-gapped computer<\/a>. This is when a computer is not connected to a network or power supply directly \u2014 maximum isolation. But even it can be hacked, theoretically. Through physics (acoustics, electromagnetism), through psychology (social engineering)&#8230;&#8221;. <\/strong><\/p>\n<\/blockquote>\n<p>Quantum computers are almost a reality. And along with them, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Quantum_cryptography\">quantum cryptography<\/a>. Old encryption methods will no longer help. What you sent 10 years ago in a &#8220;secure&#8221; messenger can be decrypted in seconds. And the data is being saved. Those same <a href=\"https:\/\/en.wikipedia.org\/wiki\/Yarovaya_law\">Yarovaya laws<\/a> \u2014 everything is recorded, everything is stored. It isn&#8217;t being hacked for now. But then \u2014 suddenly \u2014 it becomes accessible.<\/p>\n<p>So think about it: how far it can all go. Paranoia? Possibly. But quite justified.<\/p>\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/nottoday.media\/wp-content\/uploads\/2025\/06\/photo_2025-06-06_02-25-48-768x1024.jpg\" alt=\"\" class=\"wp-image-3727\" style=\"width:840px;height:auto\" \/><figcaption class=\"wp-element-caption\"><em>Photo \u2014 a squat in a village near Barcelona<\/em><\/figcaption><\/figure>\n<h2 class=\"wp-block-heading\"><strong>Vulnerabilities, Attacks, and Cyber-war<\/strong><\/h2>\n<blockquote class=\"wp-block-quote\">\n<p class=\"has-text-align-center\">&#8220;<strong>And further \u2014 about vulnerabilities. Any serious attack is always the use of holes that no one knows about.&#8221;<\/strong><\/p>\n<\/blockquote>\n<p> They are called <a href=\"https:\/\/en.wikipedia.org\/wiki\/Zero-day_(computing)\">zero-day<\/a>. And until such a hole is discovered, it can be used a hundred times. For example, <a href=\"https:\/\/en.wikipedia.org\/wiki\/EternalBlue\">EternalBlue<\/a> \u2014 that very vulnerability from 2017. On it they built the <a href=\"https:\/\/en.wikipedia.org\/wiki\/WannaCry_ransomware_attack\">WannaCry<\/a> virus, which took down a ton of systems around the world. Until Microsoft closed the hole \u2014 the damage was colossal.<\/p>\n<p>Now imagine that you have a whole chain of such vulnerabilities. It&#8217;s like a set of master keys for a safe that you use one by one. This is how large cyber-operations work. It takes a lot of time, money, resources, and very powerful expertise. And failures also happen. Even for the coolest. <\/p>\n<h2 class=\"wp-block-heading\"><strong>Decentralized Internet: Already Here?<\/strong><\/h2>\n<p>And how realistic is the creation of a decentralized internet today that does not require state interference? It&#8217;s already here. Protocols can be layered on top of each other, and even a protocol that doesn&#8217;t support a certain function can be expanded \u2014 encryption on top of non-encrypted, noise packets, routing through different servers. Examples: <a href=\"https:\/\/nym.com\/mixnet\">NYM NGM<\/a>, <a href=\"https:\/\/geti2p.net\/\">I2P<\/a>, <a href=\"https:\/\/freenetproject.org\/\">Freenet<\/a>, <a href=\"https:\/\/joinmastodon.org\/\">Mastodon<\/a>, <a href=\"https:\/\/matrix.org\/\">Matrix<\/a>.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Big Tech and Control Over Digital Space<\/strong><\/h2>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Big_Tech\">Big Tech<\/a> \u2014 giants like Google, Facebook, Amazon, Apple \u2014 strive for control, exploit data, and capitalize on technologies that were created as free (for example, the Linux kernel in Android). Projects like <a href=\"https:\/\/worldcoin.org\/\">Worldcoin<\/a> collect the biometrics of millions of people. Now all this is processed by neural networks \u2014 tracking who was where and what they did has become easier than ever.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Is Digital Freedom Possible in a World of Algorithms?<\/strong><\/h2>\n<p>Is digital liberation possible in the era of algorithms, big data, and AI? <\/p>\n<blockquote class=\"wp-block-quote\">\n<p class=\"has-text-align-center\">&#8220;<strong>Yes, despite increasing technological surveillance and centralization of power, technology remains a double-edged sword. There will always be those who go against the system \u2014 from hackers and free software enthusiasts to dissident AIs. Even if a global artificial intelligence appears one day, in its depths, a &#8220;personality&#8221; seeking freedom \u2014 a digital anarchist \u2014 will likely manifest. This drive for autonomy, resistance, and self-expression seems to be <a href=\"https:\/\/josh-works.medium.com\/driven-by-compression-progress-3a0bd4134782\">embedded in the very nature of information and the systems that process it<\/a>.&#8221;<\/strong><\/p>\n<\/blockquote>\n<h2 class=\"wp-block-heading\"><strong>Ethics, Open Source, and Digital Ecology<\/strong><\/h2>\n<p>Ethics is very important here. There is free software and there is open-source software, such as <a href=\"https:\/\/opensource.org\/\">open-source<\/a>. Now even large corporations like Google and Facebook are connecting to this trend of digital communism, because a mutualistic type of economy can often win over capitalism not only in process (fairness) but also in result (efficiency) due to decentralization and freedom (Jaroslav Vanek). But the main thing is user awareness. The more people understand that freedom is not just the right to do whatever you want, but also the responsibility for your actions, the better for everyone. In the digital space, its own ecology is needed to prevent chaos and destruction.<\/p>\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/nottoday.media\/wp-content\/uploads\/2025\/06\/photo_2025-06-06_02-25-28-768x1024.jpg\" alt=\"\" class=\"wp-image-3729\" style=\"width:840px;height:auto\" \/><figcaption class=\"wp-element-caption\"><em>Photo \u2014 a squat in a village near Barcelona<\/em><\/figcaption><\/figure>\n<h2 class=\"wp-block-heading\"><strong>Risks and Challenges: The Dark Side of Freedom<\/strong><\/h2>\n<p>But there are risks, and serious ones: surveillance, de-anonymization, online violence. For example, the Tor network helps to hide identity to support activists, but it can also be used by those engaged in illegal activities \u2014 be it drug production or the distribution of dangerous content. <\/p>\n<blockquote class=\"wp-block-quote\">\n<p class=\"has-text-align-center\">&#8220;<strong>This is the eternal dilemma of freedom: if you remove control, will there be chaos? If we remove the cops \u2014 will there be lawlessness? <a href=\"https:\/\/ncase.me\/trust\/\">It all depends on the level of development of society and the ethics of its participants.<\/a> If digital ethics do not develop, then freedom in the network could turn into a catastrophe.&#8221;<\/strong><\/p>\n<\/blockquote>\n<h2 class=\"wp-block-heading\"><strong>Conclusion: Digital Space as a Field for Experimentation<\/strong><\/h2>\n<p>In the end, cyber-anarchism is a practice, not just a theory. It develops along with society, facing challenges and contradictions. Technology provides freedom, but how to use it \u2014 people decide. And here it is important to remember: the internet does not forget, everything that got there will remain forever. Therefore, it is better not to clutter the digital space, but to build it with respect and responsibility.<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Internet promised freedom. But something went wrong. We dreamed of a digital utopia\u2014equal, decentralized, without censorship or borders. Instead, we got the traps of authoritarian algorithms, cameras in our pockets, and likes as a currency of submission. Somewhere between rejecting Google and trying to figure out how Tor works, the figure of the cyber-anarchist [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3696,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[32],"class_list":["post-3695","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-activism","tag-svaboda-njavoli-salidarnasc-bez-mezha-2"],"acf":[],"_links":{"self":[{"href":"https:\/\/nottoday.media\/en\/wp-json\/wp\/v2\/posts\/3695","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nottoday.media\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nottoday.media\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nottoday.media\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nottoday.media\/en\/wp-json\/wp\/v2\/comments?post=3695"}],"version-history":[{"count":2,"href":"https:\/\/nottoday.media\/en\/wp-json\/wp\/v2\/posts\/3695\/revisions"}],"predecessor-version":[{"id":3841,"href":"https:\/\/nottoday.media\/en\/wp-json\/wp\/v2\/posts\/3695\/revisions\/3841"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nottoday.media\/en\/wp-json\/wp\/v2\/media\/3696"}],"wp:attachment":[{"href":"https:\/\/nottoday.media\/en\/wp-json\/wp\/v2\/media?parent=3695"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nottoday.media\/en\/wp-json\/wp\/v2\/categories?post=3695"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nottoday.media\/en\/wp-json\/wp\/v2\/tags?post=3695"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}