Digital Sovereignty
Folder: 05 - THE RETURN — THE COUNTER Source note: SRC - Digital Sovereignty
What This Note Is
Surveillance Capitalism documents how the attention economy was built — how your data, your behaviour, your relationships, and your psychological vulnerabilities became the product.
Digital Privacy & Protection documents what is being collected and by whom.
This note documents what you can actually do about it.
Not as a complete escape — complete escape from the digital infrastructure is impractical for most people and this note does not pretend otherwise. But as a reduction in exposure. A deliberate reclaiming of the surface area you give to systems designed to extract from you.
The tools exist. They are documented, open source, audited, and free or low cost. They were built by people who understood exactly what was being done and chose to build alternatives.
The Honest Starting Point
No tool guarantees complete privacy. This is important to state clearly.
Every privacy tool has limitations. Browsers that block trackers cannot prevent all fingerprinting. VPNs hide your IP from websites but the VPN provider can see your traffic. Tor routes your connection through volunteer servers and is the strongest anonymity tool available — but it is slower and can be deanonymized through traffic analysis in sophisticated targeted attacks.
The goal is not perfection. The goal is reducing the amount of your behaviour, attention, and data that flows into the surveillance infrastructure documented in Surveillance Capitalism. verified
Every reduction matters. Every layer of protection increases the cost to those who would extract from you.
Communication
Signal Developed by the nonprofit Signal Foundation. Uses the open source Signal Protocol — end-to-end encryption that means Signal itself cannot read your messages or listen to your calls. verified
The Electronic Frontier Foundation gave Signal a perfect score on its secure messaging scorecard — the only app at the time to achieve seven out of seven criteria including: communications encrypted in transit, end-to-end encryption with keys only held by users, ability to verify correspondent identities, forward secrecy, open source code, well-documented security design, and recent independent security audit. verified
The Signal Protocol has been independently adopted by WhatsApp, Google Messages, and Facebook Messenger for their encrypted modes — a testament to its technical credibility. The difference is that Signal is a nonprofit with no advertising revenue model. WhatsApp is owned by Meta. The encryption may be equivalent. The business model is not. verified
Signal is free. Available on iOS, Android, and desktop. Requires a phone number to register. As of 2024 you can communicate using a username without sharing your number. verified
What Signal does not protect: metadata — who you talk to and when — though Signal has invested significantly in minimising this. It does not make you anonymous, only private. verified
Browsing
The browser is where most surveillance occurs. Every click, scroll, search, and dwell time is logged by Google Chrome — the most widely used browser globally — and feeds directly into the advertising infrastructure documented in Google & Alphabet.
Brave Browser Open source. Blocks ads and trackers aggressively by default without any configuration. Includes an optional private browsing mode that routes traffic through the Tor network. Fastest and most accessible privacy browser for everyday use. verified
Firefox + uBlock Origin Mozilla Firefox is open source, developed by a nonprofit foundation. Combined with the uBlock Origin extension — a free, open source ad and tracker blocker — it provides strong tracking protection and substantial fingerprinting resistance. Highly configurable. Recommended by privacy researchers for users who want transparency and control. verified
Tor Browser Developed by the nonprofit Tor Project. Routes your connection through a network of over 6,000 volunteer-run servers globally, encrypting traffic at each step. Each server knows only the previous and next hop — no single server knows both the origin and destination. verified
Tor is the strongest anonymity tool available for everyday users. Used by journalists, activists, and whistleblowers operating in repressive environments. verified
Limitations: significantly slower than standard browsing. Some websites block Tor exit nodes. Not designed for streaming or bandwidth-intensive use. Do not install additional extensions — they break the fingerprinting resistance that makes Tor work. verified
DuckDuckGo Search engine that does not store search history, does not build user profiles, and does not track searches to deliver targeted advertising. The most accessible single change most people can make — replacing Google Search with DuckDuckGo costs nothing and immediately removes one of the most significant data collection vectors in daily life. verified
Standard email is not private. Gmail reads your email to target advertising. This is documented and has been confirmed by Google. verified
ProtonMail End-to-end encrypted email based in Switzerland, subject to Swiss privacy law rather than US jurisdiction. Free tier available. Open source. Cannot be compelled to hand over email content to US authorities without a Swiss court order. verified
Tutanota German encrypted email provider. Open source. End-to-end encrypted by default. Free tier available. Subject to German/EU privacy law. verified
Devices and Operating Systems
Aeroplane mode and router off at night The simplest and most effective reduction of electromagnetic exposure and passive data collection simultaneously. See The Natural Counter See 6G & WiFi Sensing
App permissions audit Most smartphone apps request access to microphone, camera, location, and contacts far beyond what their function requires. Reviewing and revoking unnecessary permissions costs nothing and immediately reduces the data surface available to applications operating as documented in Surveillance Capitalism. verified
GrapheneOS An open source, privacy-focused Android operating system that removes Google services entirely. Designed for people who want a fully sovereign mobile device. More technical to set up — not for everyone — but represents the furthest end of the available spectrum. credible
The Honest Assessment
These tools do not make you invisible. A sophisticated state-level adversary with enough resources and legal authority can deanonymize most users of most tools given sufficient time.
That is not the relevant threat model for most people.
The relevant threat model is: corporations harvesting your attention, behaviour, relationships, and psychological vulnerabilities to sell you things, influence your beliefs, and accumulate power over information systems.
Against that threat model — the one documented in detail throughout this vault’s technology pillar — these tools are highly effective.
Signal removes your private communications from Meta’s reach. DuckDuckGo removes your search history from Google’s reach. Brave removes your browsing behaviour from the advertising infrastructure’s reach. ProtonMail removes your correspondence from US surveillance jurisdiction.
None of these is a revolution. Together they represent a deliberate reduction in the amount of yourself you give to systems that were not built for your benefit.
That is worth doing.
Linked Notes
Surveillance Capitalism · Digital Privacy & Protection · Google & Alphabet · Meta · Social Platforms · The Planetary Nervous System · 6G & WiFi Sensing · The Natural Counter · Palantir · I. The Observer · SRC - Digital Sovereignty