mirror of
http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/opsec-blogposts.git
synced 2025-07-02 10:46:40 +00:00
fix logos
This commit is contained in:
parent
8a42f82534
commit
b1128e473f
7 changed files with 41 additions and 40 deletions
|
@ -187,7 +187,7 @@ To change things like speech, you can use [local LLMs](../stylometry/index.md) a
|
|||
|
||||
## **The Enemies of Anonymity: Surveillance, KYC procedures and Centralisation**
|
||||
|
||||
 The first the and foremost enemy of Anonymity is Surveillance of any kind. **Privacy is a REQUIREMENT if you want Anonymity**.
|
||||
 The first the and foremost enemy of Anonymity is Surveillance of any kind. **Privacy is a REQUIREMENT if you want Anonymity**.
|
||||
|
||||
|
||||
Example:
|
||||
|
@ -202,7 +202,7 @@ To change things like speech, you can use [local LLMs](../stylometry/index.md) a
|
|||
|
||||
Surveillance CANNOT be tolerated when you want Anonymity. So before you try to learn to be anonymous online, learn why and how to get Privacy online [here](../privacy/index.md).
|
||||
|
||||
The other major enemy of Anonymity is **Know Your Customer (KYC) Procedures** , these are ways for services to force their customers to identify themselves, whether they like it or not.
|
||||
The other major enemy of Anonymity is **Know Your Customer (KYC) Procedures** , these are ways for services to force their customers to identify themselves, whether they like it or not.
|
||||
|
||||
|
||||
Example:
|
||||
|
@ -225,7 +225,7 @@ Surveillance CANNOT be tolerated when you want Anonymity. So before you try to l
|
|||
|
||||
|
||||
|
||||
 But the root cause of surveillance and KYC procedures, is that **every centralised entity (any public or private business) will be eventually forced to comply to their government's requests** , at the expense of their users.
|
||||
 But the root cause of surveillance and KYC procedures, is that **every centralised entity (any public or private business) will be eventually forced to comply to their government's requests** , at the expense of their users.
|
||||
|
||||
**There are only 2 possible long-term outcomes for Centralisation** : **
|
||||
|
||||
|
@ -250,9 +250,9 @@ As we have discussed [previously](../governments/index.md), for a government's l
|
|||
|
||||
And for the laws to be enforced, governments need:
|
||||
|
||||
1. To know what happened (lack of Privacy, using Surveillance )
|
||||
1. To know what happened (lack of Privacy, using Surveillance )
|
||||
|
||||
2. To know who did it (lack of Anonymity, using KYC procedures )
|
||||
2. To know who did it (lack of Anonymity, using KYC procedures )
|
||||
|
||||
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue