Everything you need to know about Snowden's book "Permanent Record", and why he's being sued for it

in snowden •  5 years ago 

Snowden's new book "Permanent Record" is a brilliantly insightful commentary on the state of the world. It's a chilling examination of the current global surveillance apparatus that he helped to build, and a nostalgic look at the early internet and everything that we've lost since then.

I go over my favorite passages, and my biggest takeaways from the book.
Also, visit the organization Snowden is President of: https://freedom.press/

1:17 - why the book is important, Snowden's philosophical view, why we might not want to trust what the government tells us

3:28 - bitcoin, today's crash, DOJ suit will "be good for bitcoin", Snowden's bitcoin usage (more in this interview with Snowden here:

), how private is bitcoin?

6:44 - this book will be good for bitcoin, why the govt wants to ban the book, how to donate crypto to Snowden, learning about encryption and privacy techniques at Snowden's organization visit https://freedom.press/

9:22 - encryption is important (for everything, not just money), how the internet functions (different protocols), why you shouldn't use credit cards or bank cards: use cash and hard money

12:52 - First thoughts on book - I went from thinking sovereignty of money was the most important thing we can do as a society, to realizing that maintaining privacy was just as important -- not just for ourselves, but to protect everyone

15:54 - Our superficial understanding of surveillance and how it goes much deeper than we realize. We understand PRISM intellectually since 2013, but the scope of surveillance outlined in this book is mind boggling. Every single phone call, email, photo, conversation had close to a microphone, thing typed on a keyboard (even if never searched for) is recorded and stored FOREVER in a permanent record and this information is accessible and easily searchable by huge numbers of NSA workers who have "the keys to the kingdom" with almost no oversight, and no prosecution for breaking the law and searching our private histories (because to charge these people would be to admit these illegal govt programs exist). Google created an index so this database can be easily searched, pulling up recordings and even screen recordings of your computer/phone.

27:48 - the solution is encryption. "Deleting" things doesn't delete them. Encrypt, don't delete. Rely on yourself, don't rely on a broken system to fix the problem they created.

30:15 - history of the cypherpunks. They knew cryptography was the answer. What happened since? How was the early internet different from today? "To this day, I consider the 1990s online to have been the most pleasant and successful anarchy I've ever experienced."

36:05 - Move from early internet of freedom to current internet where online identity is inextricably linked to real identity. How it creates a more polarized society. How a permanent record hurts children growing up in the digital age, and enforces "fidelity to memory, identarian consistency, and ideological conformity"

43:00 - difference between your country and the state. The deep state is not the underground cabal we expect. We're in the Orwellian nightmare we always dreaded, we just haven't figured it out yet because it's comfortable.

47:50 - We need to face the fact that we're in an Orwellian surveillance state, reject the idea that "it's not that bad" because it's already sinister and going to get progressively worse for our children, and start taking individual responsibility and make informed choices. Snowden's first encounter with "the chain of command" and "proper channels", and how these failed him because our system is broken.

53:33 - Why the system is designed to never allow change, why our democracy currently isn't work, and those in power are disincentivized to change regardless of the opinions of the majority. "Getting its rules changed to serve the interests of the majority would involve persuading the rule makers to put themselves at a purposeful disadvantage ... the people who create the rules have no incentive to act against themselves."

Recommended Books:

Permanent Record - Edward Snowden
https://amzn.to/305negc

What has the government done to our money - Rothbard
https://amzn.to/2KMzmcu

Naomi's Privacy Bag: some of my favorite products to help protect your privacy!

Use the Brave browser! https://brave.com/nao076

Faraday bag wallet (signal stopping, to protect your fob, credit card, and phone)
https://amzn.to/2SUkPhu

Data Blocker (if you're charging your phone in an unknown port, use this so that no data is transferred)
https://amzn.to/2SVh0J2

Computer privacy screen (use your computer in public? Keep your information safe!)
https://amzn.to/2SXYHmf

Phone privacy screen (don't let people in public see your private data)
https://amzn.to/2YyJMnH

Camera cover (for computers and phones, so no one can access your camera without you knowing)
https://amzn.to/2Mt7Hic

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
Sort Order:  

O crap! I had no idea that it was so bad...

Posted using Partiko iOS

Yeah pretty chilling stuff

Awesome video, Naiomi!

I've gotta start using Steemit again, I've gotta start taking my crypto security seriously, and I've gotta watch your full history of youtube videos. :)

Some crater tonight, huh? I wanted some cheaper EOS anyways....

haha you've got a lot of videos to catch up on ;)

I really appreciate your videos on Snowden's book. Thanks

Yes. Encryption helps. Another option is to manually write over the data you deleted. Well, that process may not be guaranteed to completely change and transform the deleted file into a new file, but it may work to some extent, at least in theory.

Yeah that's another good option if you're not encrypting!

Wireless Ethernet:

Wireless Ethernet would be a great invention, assuming there isn't anything like that already, as WIFI is mapped out. I mean like a two-way walky talky device. Specifically, I would design the hardware to plug into the modem. The hardware would act like a wireless router. However, the software would be designed to connect to a virtual port that is actually wireless. But, hypothetically, if that is possible, that could be a compromise between Ethernet and the vulnerability found in WIFI. I'm just hypothesizing. I know that anything wireless is still vulnerable to an extent. I know there still may be hardware spyware, software spyware, viruses, backdoors, etc. But regardless, I'm just looking for options for people who may not want to be limited to Ethernet, to being plugged-in all the time.

Cordless Landline Phones

If a cordless landline phone is not mapped out at all or not to the same extent or in the same ways that WIFI is, then there has to be a way to adapt tech. I wonder if Blue Tooth is mapped out on public websites like WIFI networks are.

Wireless TV Remotes

I assume TV remote controls are not charted on websites. Therefore, there has to be a way to have wireless without violating any privacy or perhaps excessive amounts of privacy at least.