What I think

  • A ‘Must Read’ For Us All

    This manifesto is a ‘must-read’ because it asserts that privacy in the digital age is non-negotiable for a free society. It distinguishes privacy from secrecy and rejects relying on big organizations to grant it.

    To contribute, the call to action is clear: ‘Cypherpunks write code.’ You must build and deploy free, worldwide systems for anonymous transactions and cryptography. Get involved by coding or using FOSS tools like Flux, VeraCrypt, or Zcash to defend your own privacy and foster the common good.

    Enjoy!!

    A Cypherpunk’s Manifesto
    by Eric Hughes
    Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. A private matter is something one doesn’t want the whole world to know, but a secret matter is something one doesn’t want anybody to know. Privacy is the power to selectively reveal oneself to the world.

    If two parties have some sort of dealings, then each has a memory of their interaction. Each party can speak about their own memory of this; how could anyone prevent it? One could pass laws against it, but the freedom of speech, even more than privacy, is fundamental to an open society; we seek not to restrict any speech at all. If many parties speak together in the same forum, each can speak to all the others and aggregate together knowledge about individuals and other parties. The power of electronic communications has enabled such group speech, and it will not go away merely because we might want it to.

    Since we desire privacy, we must ensure that each party to a transaction have knowledge only of that which is directly necessary for that transaction. Since any information can be spoken of, we must ensure that we reveal as little as possible. In most cases personal identity is not salient. When I purchase a magazine at a store and hand cash to the clerk, there is no need to know who I am. When I ask my electronic mail provider to send and receive messages, my provider need not know to whom I am speaking or what I am saying or what others are saying to me; my provider only need know how to get the message there and how much I owe them in fees. When my identity is revealed by the underlying mechanism of the transaction, I have no privacy. I cannot here selectively reveal myself; I must always reveal myself.

    Therefore, privacy in an open society requires anonymous transaction systems. Until now, cash has been the primary such system. An anonymous transaction system is not a secret transaction system. An anonymous system empowers individuals to reveal their identity when desired and only when desired; this is the essence of privacy.

    Privacy in an open society also requires cryptography. If I say something, I want it heard only by those for whom I intend it. If the content of my speech is available to the world, I have no privacy. To encrypt is to indicate the desire for privacy, and to encrypt with weak cryptography is to indicate not too much desire for privacy. Furthermore, to reveal one’s identity with assurance when the default is anonymity requires the cryptographic signature.

    We cannot expect governments, corporations, or other large, faceless organizations to grant us privacy out of their beneficence. It is to their advantage to speak of us, and we should expect that they will speak. To try to prevent their speech is to fight against the realities of information. Information does not just want to be free, it longs to be free. Information expands to fill the available storage space. Information is Rumor’s younger, stronger cousin; Information is fleeter of foot, has more eyes, knows more, and understands less than Rumor.

    We must defend our own privacy if we expect to have any. We must come together and create systems which allow anonymous transactions to take place. People have been defending their own privacy for centuries with whispers, darkness, envelopes, closed doors, secret handshakes, and couriers. The technologies of the past did not allow for strong privacy, but electronic technologies do.

    We the Cypherpunks are dedicated to building anonymous systems. We are defending our privacy with cryptography, with anonymous mail forwarding systems, with digital signatures, and with electronic money.

    Cypherpunks write code. We know that someone has to write software to defend privacy, and since we can’t get privacy unless we all do, we’re going to write it. We publish our code so that our fellow Cypherpunks may practice and play with it. Our code is free for all to use, worldwide. We don’t much care if you don’t approve of the software we write. We know that software can’t be destroyed and that a widely dispersed system can’t be shut down.

    Cypherpunks deplore regulations on cryptography, for encryption is fundamentally a private act. The act of encryption, in fact, removes information from the public realm. Even laws against cryptography reach only so far as a nation’s border and the arm of its violence. Cryptography will ineluctably spread over the whole globe, and with it the anonymous transactions systems that it makes possible.

    For privacy to be widespread it must be part of a social contract. People must come and together deploy these systems for the common good. Privacy only extends so far as the cooperation of one’s fellows in society. We the Cypherpunks seek your questions and your concerns and hope we may engage you so that we do not deceive ourselves. We will not, however, be moved out of our course because some may disagree with our goals.

    The Cypherpunks are actively engaged in making the networks safer for privacy. Let us proceed together apace.

    Onward.

    Eric Hughes

    9 March 1993


  • Staying Safe Online: Simple Steps for Stronger Security

    In today’s digital world, online security can feel like a daunting task. We’re constantly bombarded with news of data breaches and phishing scams, making it easy to feel overwhelmed. But protecting yourself online doesn’t have to be complicated! By taking a few simple, proactive steps, you can significantly enhance your digital safety.

    Here are a couple of crucial things you can do right now to boost your online security:

    **1. Embrace the Power of Strong, Unique Passwords (and a Manager!)**

    Think of your passwords as the keys to your digital life. Using the same key for every door makes it incredibly easy for an intruder to gain access to everything if they get their hands on just one. The same goes for your online accounts!

    * **Make them strong:** Aim for passwords that are at least 12 characters long and include a mix of uppercase and lowercase letters, numbers, and symbols. Avoid easily guessable information like birthdays, pet names, or common words.
    * **Make them unique:** Never reuse passwords across different accounts. If one service gets compromised, all your other accounts are at risk.
    * **Consider a password manager:** Remembering dozens of complex, unique passwords is impossible for most of us. A reputable password manager (like LastPass, 1Password, or Bitwarden) can securely store all your login credentials, generate strong new ones, and even auto-fill them for you. You only need to remember one master password!

    **2. Turn on Two-Factor Authentication (2FA) Everywhere You Can**

    Even the strongest password can sometimes be cracked. That’s where two-factor authentication comes in as your digital superhero. 2FA adds an extra layer of security by requiring a second form of verification in addition to your password.

    Imagine trying to open a locked door: your password is the key, and 2FA is a secret code you need to type into a keypad right next to the lock. Even if someone has your key, they can’t get in without that code.

    * **How it works:** Typically, after you enter your password, the service will send a unique code to your phone (via SMS, an authenticator app like Google Authenticator or Authy) or prompt a hardware key. You then enter that code to complete your login.
    * **Why it’s vital:** 2FA makes it exponentially harder for unauthorized users to access your accounts, even if they manage to steal your password. It’s a critical defense against phishing and credential stuffing attacks.

    **Stay Vigilant, Stay Safe**

    Online security is an ongoing process, not a one-time setup. Be wary of suspicious emails or links, keep your software updated, and regularly review your privacy settings on social media and other platforms. By implementing these simple steps, you’ll be well on your way to a safer and more secure online experience.

    What are your go-to online security tips? Share them in the comments below!

  • Host WordPress on Flux

    Revolutionize Your Website: The Features and Benefits of Hosting WordPress on Flux

    WordPress powers over 40% of the internet, but relying on traditional, centralized web hosting leaves your site vulnerable to single points of failure, downtime, and deplatforming. Enter Flux, the decentralized cloud infrastructure that is fundamentally changing how we think about website hosting. By merging the world’s most popular Content Management System (CMS) with the power of Web3, Flux offers a hosting solution that is faster, more secure, and truly uncensored.

    If you’re ready to future-proof your website and harness the latest in decentralized technology, hosting your WordPress site on Flux provides a unique and compelling combination of cutting-edge features and tangible benefits.


    Key Features: Decentralization Meets Performance

    Hosting WordPress on Flux isn’t just about moving your files; it’s about deploying your site across a globally distributed network of user-operated FluxNodes. This decentralized architecture offers several powerful features that traditional hosting simply can’t match:

    1. True Redundancy and Unstoppable Uptime 🛡️

    Traditional hosting relies on a few massive data centers. If one fails, your site goes down. Flux eliminates this single point of failure by deploying every WordPress site on a minimum of three instances across its global network. This triple redundancy means that if one node experiences an issue, your site seamlessly remains online and accessible through the other replicas. For business owners, this translates to guaranteed high-availability and uninterrupted service, no matter what.

    2. Uncapped Performance and Scalability 🚀

    The Flux network is built on enterprise-grade hardware provided by thousands of nodes worldwide. This distributed resource pool ensures that your WordPress site benefits from lightning-fast response times and superior performance.

    • Global Distribution: With geolocation support, you can deploy resources in specific geographical regions to ensure your site is always closest to your highest concentration of users, minimizing latency.
    • Unmetered Bandwidth: All plans come with uncapped bandwidth, so you never have to worry about surprise overage charges or your site slowing down—or worse, being suspended—due to a sudden surge in traffic.

    3. Enhanced Security and Censorship Resistance

    By design, decentralization is the ultimate protection against control. Because your site is replicated across thousands of independent nodes, no single entity can shut it down or censor your content. Furthermore, the inherent structure of the Flux network provides an additional layer of security, shielding your WordPress installation from common centralized attack vectors and offering enhanced privacy and data protection.


    Tangible Benefits for WordPress Users

    These advanced features translate directly into significant benefits for bloggers, developers, and business owners running WordPress:

    Benefit 1: Superior Cost-Effectiveness

    The Flux decentralized network operates more efficiently than massive, centralized cloud providers. This competitive cost structure allows Flux to offer powerful hosting plans—complete with dedicated CPU, RAM, and SSD resources—at a fraction of the cost of many traditional alternatives. The promise of “Cheaper and Better” means you get high-end, scalable hosting without the prohibitive price tag.

    Benefit 2: Seamless, Low-Code Deployment (Plug-and-Play Web3)

    While the underlying technology is complex, deploying WordPress on Flux is surprisingly user-friendly and requires little to no technical Web3 expertise. With a streamlined, one-click process, you can launch a fully distributed WordPress instance in minutes. This simplicity is crucial for ensuring that anyone, from a casual blogger to an enterprise developer, can easily migrate their site and start leveraging decentralized hosting.

    Benefit 3: Focus on Content, Not Maintenance

    Flux manages the infrastructure and redundancy, allowing you to focus entirely on creating and growing your online presence. All plans typically feature automated updates and 24/7 customer service, ensuring your WordPress core and infrastructure are always running smoothly and securely on the latest versions without manual hassle.

    By choosing to host your WordPress site on Flux, you are making a conscious decision to move beyond the limitations of Web2 hosting. You gain a platform that is not only robust and highly performant but is also aligned with the principles of an open, censorship-resistant internet. It is the definitive step toward a faster, more secure, and truly resilient digital future for your website.

  • Watch it Morph

    I am about to continue a journey I started some time ago. Create a website/blog on my own. Through this I had simply hoped to get closer to technology. I find it so fascinating. Especially how fast it is going. You get tugged different directions and down different rabbit holes and well, that is what happened to me and this website. I will try to chronicle it here as the website morphs from nothing to, well, let’s just see. All being done by a guy who is not too techy, but sure likes to tinker.
  • Why networking and security?

    Why networking and security?

    We have arrived at a place in the internet age where strong decisions must be made to either take full control of our own lives and along with that, all data that belongs to it. Or, we do nothing and allow others to do it for us which will inevitably be a government. Not necessarily the government of the country in which you currently reside. The choice is yours, I have made my choice already.