**SELF-CENSOR / THE INTERNAUTA**
In a few years, censorship will be so widespread that regulators won't even need to impose it; you will do it yourself.
You wouldn't say half of what you say today if you felt the sword of Damocles hanging over your head.
Not even on decentralized networks, because they will also know who you are.
How will that happen?
With the personal identifier that internet providers will be required to assign to every person who connects.
They will give it an appealing name and justify the need for its use for network security.
You will be the INTERNAUTA and you will have your Credential.
There are signs that we are moving in this direction.
The model already exists today.
Want an example?
The intranet in companies. You are not the administrator of the PC you use, and you connect to the internet through a company server, with your username and employee file.
**The internet will no longer be anonymous. You will be the INTERNAUTA, and your own censor.**
LiberLion
liberlion@iris.to
npub1wpzp...zs7p
Writer • Sci-Facts Thinker • 𝔸𝕀 • Ϛʁyptø • Monero • 𝙰𝚐𝚘𝚛𝚒𝚜𝚖
| 𝕏 @liberlion17 | liberlion.com | liberlion.medium.com | 84y8yKaEFfeYj5Wyh7DZvb3aMvu18zhu7XF1b8TQZFWaS4GF323jr6NJstEeajdDVKTNvAvGUzogfEbbHFKnBVJTNBQTFNX
**The Fake Cypherpunks**
ᶜᵒ⁻ᵒᵖᵗ ᵗʰᵉ ˡᵃⁿᵍᵘᵃᵍᵉ ᵃⁿᵈ ᵈᵉᶠᵃⁿᵍ ᵗʰᵉ ⁱᵈᵉᵃ
If you can't beat them, join them, and corrupt them from within. The old and well-known Trojan Horse strategy remains effective.
Every era manufactures its impostors, but ours industrialises them.
Anyone with a cryptic logo and a privacy slogan calls themselves a cypherpunk, even if their entire business model depends on pleasing regulators.
Look at the contrast.
The Tornado Cash developers published code and got hit by half the state apparatus.
Samourai Wallet promoted real and operational privacy, but ultimately faced the same authorities, with its developers ending up in jail.
Those reactions expose a simple truth: effective privacy bothers power. And whatever bothers power gets hunted down.
Now compare that with the corporate cosplay version of a 匚ㄚρђ𝑒rρuᶰķ, the Winklevoss twins.
Gemini, a fully registered exchange, Cypherpunk Technologies, a Wall Street-approved investment vehicle with heavy bets on Zcash, a chain created by a company registered with the government, which files financial statements with the IRS, and in which privacy is pre-filtered so that it never becomes a nuisance.
It is anonymity with a seatbelt, engineered not to upset the regulatory ecosystem.
The issue isn’t their existence; the issue is the narrative. They sell themselves as rebels while operating comfortably inside the palace walls. That appropriation is strategic.
Co-opt the language and defang the idea.
Fake cypherpunks don’t break rules; they manage them. They don’t challenge power; they stylize.
True #privacy lies elsewhere, in people's attitudes, in everyday practice, and far from press releases and balance sheets.
My respect and support go out to these two great developers.
#freeSamourai
But, as I have been saying for some time, when you create privacy tools, you must remain anonymous, because you are a threat to regulators and to the state itself.
No government accepts complete privacy for individuals.
If you are a privacy tool developer, remain anonymous.
The design of their software was brilliant; this was Bill and Keonne's mistake
👇


Supporting Keonne and Bill, the Samourai Wallet developers and their loved ones
Bill and Keonne aren

“There is an important societal impact” to Hill’s actions, the judge said, adding that “people should be deterred” from doing what Samourai developers did.
Do you understand?
It is not just a sentence; it is a message from the State.


The Rage
William Hill Sentenced To Four Years In Prison
People should be deterred from doing what the Samourai Wallet developers did, Judge Cote stated in court.
What does this mean?
A message from the government: if you are a developer, don't dare challenge our surveillance.
My message: if you are a developer, anonymity is the solution.
View quoted note →
What does this mean?
A message from the government: if you are a developer, don't dare challenge our surveillance.
My message: if you are a developer, anonymity is the solution.
View quoted note →
**Well done, guys! You're getting it done on time and in the right way!**
😈
The digital euro arrives “to modernize payments”, yet somehow its pilot lands in 2027, launch in 2029, tidy limit of 3,000–4,000 euros “for your safety”, and even smaller offline caps “to prevent crime”. And, what a coincidence, perfectly on schedule for the 2030 Agenda.
Control never misses a deadline.


European Central Bank
Eurosystem moving to next phase of digital euro project
The European Central Bank (ECB) is the central bank of the European Union countries which have adopted the euro. Our main task is to maintain price...
What would have happened if Sigartis had posted on #Nostr using vpn instead of 𝕏?
**Nothing, he would have been able to sleep peacefully without the police at his house.**
The G7 countries will be the first to meet the #Technocracy #Agenda2030
Surveillance will be extreme.
ᴸᵉᵗ ᵀʰᵉʳᵉ ᴮᵉ ᴰᵃʳᵏ🏴a³
Lunarpunk🌒
That's why #Monero
#agorist #monerist
#SovereignIndividual
View quoted note →
**Soft on the surface, dense underneath**
L3 is my main research protocol.
L3 is my way of reading the world without getting fooled by the shine.
First comes the **surface**, the visible layer, the easy story anyone can repeat.
Then I drop into the **depths**, where context, incentives and hidden actors start to shape the picture.
Finally, I reach the **underlying structure**, the uncomfortable layer that reveals why everything above is arranged as it is.
L3 isn’t about certainties, it’s about signals and patterns.
And once the patterns show up, you start seeing that very little is accidental.
**All That Is Missing Is One “Interoperability” Law.**
The quiet part is that we already built the system ourselves.
We handed over our faces to the bank because “it’s faster”.
We let the health app store our vaccines because “it’s convenient”.
We show our driver’s license on a screen because “it’s modern”.
We accept identity checks in wallets because “it gives cashback”.
We swipe transport passes that log our movement because “everyone does”.
We give universities biometric access because “it avoids cards”.
And we drop our national ID into Apple Wallet because “the phone is always with me”.
Individually harmless, collectively structural.
None of these steps feels coercive, and that is precisely the mechanism.
Incentives work better than mandates, especially when the narrative is efficiency, security, and fraud prevention. In the background, banks, telcos, insurers, platforms, and the state are aligning formats, verifying identity against shared sources, and stitching together what used to be isolated databases.
This is how centralization evolves now, not with force but with UX.
The point isn’t that a government will force you into a digital identity.
The point is, they won’t need to.
The infrastructure is already here, distributed across the apps you installed willingly. The state only needs to pass a single line in a technical bill requiring “interoperability between verified identity providers”, and every fragment collapses into one unified profile. No massive buildout, no grand announcement, no controversy. Just a merge.
A mandatory digital identity born from a thousand voluntary taps.
By the time society realizes the shift, it will feel like a natural extension of what people have been doing for years. And that’s the quiet efficiency of the model: a complete portrait of the individual, assembled piece by piece, with user consent as the camouflage.
When control scales through convenience, resistance looks irrational.
This note is extremely important.
TAKE 5 MINUTES TO READ AND REFLECT.
Germany Turns an X Post Into a Police Raid at Dawn
I will apply my L3 research protocol.
L1 -The Surface: Obviously, the first layer of analysis is censorship... totally detestable.
Regulators use arguments such as “hate speech” or “incitement to violence” to justify censorship. We all know that it is a manipulation of the masses.
L2 -The Depth: How were they able to identify the owner of X's account, which is anonymous, to raid the home?
The account has not published any personal information according to Grok: https://x.com/i/grok/share/nEz2I44kDPL00LpaPMzCWmuXf
Through the IP address because the user did not use a VPN?
Then the user's internet service provider identified the account's activity and linked it to the person.
Or perhaps another form of identification was possible. If you pay attention, the account has the blue verification mark, so it is likely (the articles I read about this state attack do not state otherwise) that the German authorities ordered X to disclose the account's billing information, address, and the name of the account holder.
It should be noted that the account on X was not blocked for violating the social network's terms of use.
L3 -Hidden Structure: Technocracy is underway, and for that, Digital Identity is necessary; otherwise, the implementation of digital control and surveillance is impossible. Digital identification is being gradually installed. It began some time ago, initially voluntarily, in applications such as social networks and centralized communication platforms in general. Identification will then become mandatory on these platforms, to be integrated in a final phase with the State Digital Identity. Of course, the evolution will be different in different countries, as will the degree of control.

Reclaim The Net
Germany Turns an X Post Into a Police Raid at Dawn
A single post lost in the noise of X becomes a case study in how modern states turn minor speech into major control.
Two of the best Monero Explorers:
1. Onion Monero Blockchain Explorer:
2. MoneroWatch:
https://monerowat.ch/

Onion Monero Blockchain Explorer

Signals of #Technocracy #Agenda2030
View quoted note →
**The obituary for representative democracy is already written; we’re just pretending not to read it.**
Representative democracy depends on scarcity: limited information, limited reach, limited surveillance.
That world is gone.
Modern states now sit atop AI systems that can model entire populations with a precision no intelligence service in the 20th century could dream of.
Once you can simulate society, you no longer need to represent it. Algorithmic governance becomes the “efficient upgrade,” a technocracy wearing the mask of data-driven objectivity.
Power doesn’t expand by accident; it expands because incentives push it there. Every political structure gravitates toward centralization when the tools allow it, and AI is the ultimate tool: prediction, classification, and real-time behavioral oversight.
The old limit, human capacity, evaporates. What used to cap authoritarianism at 10–20% surveillance becomes 100% visibility by default.
Not out of malice, but out of system logic.
You don’t vote your way out of an algorithm.
Here’s the uncomfortable truth: efficiency is the story they’ll tell you. Governance “optimized,” friction eliminated, participation automated.
But efficiency always asks for one more dataset, one more biometric link, one more layer of behavioral telemetry. And people, lulled by convenience, rarely notice when freedom becomes a deprecated feature.
The future isn’t a coup; it’s an upgrade.
And upgrades rarely roll back.
By plugging tens of billions of phone numbers into WhatsApp’s contact discovery tool, researchers found “the most extensive exposure of phone numbers” ever—along with profile photos and more.
Phone Numbers?
Nah!
That's why Session Messenger.


WIRED
A Simple WhatsApp Security Flaw Exposed 3.5 Billion Phone Numbers
By plugging tens of billions of phone numbers into WhatsApp’s contact discovery tool, researchers found “the most extensive exposure of phone n...
If you consider yourself a Sovereign Individual, one of the best accounts to follow is @Reclaim The Net
They are installing the infrastructure of technocracy.
Digital Identity is key; without it, digital control does not exist.
People accept it for convenience, out of ignorance, or because it is not the government directly.
Then, Digital Identity will be centralized by the State.
Signals of #Technocracy #Agenda2030
View quoted note →
DECENTRALIZATION MATTERS.
In situations like these, you realize how centralized the internet is and how easy it is to block and control it.
Of course, #Nostr is not affected, and I will explain why.
Cloudflare is like that invisible layer that supports half the internet without anyone paying much attention to it. It's not “a site,” it's infrastructure: highways, tolls, shields, and caches all at once.
Cloudflare is half of the “scaffolding” of the modern web.
When one piece breaks, it's not just one site that goes down: the entire ecosystem is shaken.
CDN: speeds up sites by bringing content closer.
Security: filters attacks and bots.
DNS: directs traffic to the right servers.
Proxy: acts as a mandatory intermediary between you and the site.
Extras: captchas, optimization, balancing, and corporate access.
Nostr is federated and distributed. There is no central server or common infrastructure that everyone uses.
-Each relay is independent. If one goes down, you use another; your client continues to talk to multiple relays.
-It does not use Cloudflare to function. Some relays may use it, but the network itself does not need it.
-There is no mandatory proxy. It does not have that central layer that, if it fails, takes everything down with it.
In short, Nostr is still alive because it does not have a single “throat” that can be shut down.
Cloudflare is like that invisible layer that supports half the internet without anyone paying much attention to it. It's not “a site,” it's infrastructure: highways, tolls, shields, and caches all at once.
Cloudflare is half of the “scaffolding” of the modern web.
When one piece breaks, it's not just one site that goes down: the entire ecosystem is shaken.
CDN: speeds up sites by bringing content closer.
Security: filters attacks and bots.
DNS: directs traffic to the right servers.
Proxy: acts as a mandatory intermediary between you and the site.
Extras: captchas, optimization, balancing, and corporate access.
Nostr is federated and distributed. There is no central server or common infrastructure that everyone uses.
-Each relay is independent. If one goes down, you use another; your client continues to talk to multiple relays.
-It does not use Cloudflare to function. Some relays may use it, but the network itself does not need it.
-There is no mandatory proxy. It does not have that central layer that, if it fails, takes everything down with it.
In short, Nostr is still alive because it does not have a single “throat” that can be shut down.**How Wall Street Co‑opted the "Cypherpunk" Narrative**
Some ideas are born as a rebellion and end up being hijacked by the dominant narrative. Cypherpunk is the perfect example.
Here’s the mechanism: regulators and bankers rarely attack what they can’t control head‑on. They choose the strategy that works best, co‑opt instead of confront. Capture the symbol, empty it, polish it, and return it to the public as an official narrative.
And now the fake Cypherpunks are listed on Wall Street.
And the herd buys.
The Cypherpunk term emerged in the 1990s as a practical manifesto: mathematicians, hackers, and crypto‑anarchists obsessed with protecting individual freedom through cryptography, a movement built to resist the State, corporations, and total surveillance.
But narratives appear to absorb whatever threatens power. Once the market saw that “cypherpunk” sounded rebellious, attractive, and profitable, Wall Street turned it into a commercial label — an aesthetic for investors who want to feel anti‑system while using the comfort of a regulated custodian.
The financial equivalent of a Che Guevara T‑shirt worn by someone who never opened a history book.
This is how public companies and funds began adopting the name “Cypherpunk” to sell investment vehicles in assets dependent on centralized structures, dev taxes, and regulator approval. The word stopped describing a philosophy and started describing a product.
Gemini, run by the Winklevoss twins, fits neatly into this pattern: a brand that postures as rebellious while performing surgical compliance. A perfect bridge between libertarian language and institutional narrative. The implicit message: you can play dissident without ever leaving the safety of the system.
Then comes the latest move: the Winklevoss twins (Tyler and Cameron), Bitcoin pioneers and founders of the regulated exchange Gemini, have now embraced the cypherpunk narrative of “absolute privacy.” Through their family office, Winklevoss Capital, they led a $58.9M round for Cypherpunk Technologies (NASDAQ: CYPH) — a company that pivoted from biotech to a near‑entire treasury position in Zcash. They now hold roughly $50M in ZEC and aim to reach 5% of the total supply. A move marketed as a stand for privacy, yet fully aligned with an institutional narrative meant to domesticate a language born to question those very institutions.
The issue isn’t who founded which company. It’s the symbolic operation: capturing a term born to challenge power and recycling it as a safe, sanitized, roadshow‑friendly narrative.
The real cypherpunk movement stood for genuine decentralization, privacy as a right, resilient code, individual sovereignty, and permissionless architectures. None of that fits neatly into an institutional capital brochure.
Today, “cypherpunk” works as a corporate fragrance — a packaged narrative for investors who want to feel like part of the resistance without ever leaving the herd.
The true cypherpunks remain where they always were: writing code, not slogans.