

Prepping is about surviving the collapse of the system.
Resistance Infrastructure is about replacing the functions of the system so it doesn’t matter if it collapses or not.
just a creacher on the internet


Prepping is about surviving the collapse of the system.
Resistance Infrastructure is about replacing the functions of the system so it doesn’t matter if it collapses or not.


This is the “Gray Man” strategy. If you have zero digital footprint in 2026, that absence of data becomes a data point itself. Anomalies get investigated.
I think we need to separate Camouflage from Logistics.
I’m not suggesting you delete your digital existence and live in a Faraday cage. By all means, keep the normie accounts. Post the cat photos on Instagram. Keep a Gmail address for the spam. Feed the algorithm just enough “conformist” content to look boring. That is your camouflage.
But Resistance Infrastructure isn’t about hiding, it’s about capability.
It’s about ensuring that when the “system” decides to de-platform your community group, or lock your bank account, or shut off the internet in your region during a protest, you still have a way to function.


Yeah that is quite the reality check… honestly thanks for being blunt. I spent way too many years writing tech support manuals and documentation so that “teacher voice” is basically burned into my brain at this point. I definitely see how the fancy formatting appears now. From now on I’ll just talk like I don’t know how 2 spekl


Look, man, you can keep checking my syntax all night, but at the end of the day, I’m just a guy in Canada who checked the news and saw something terrible happen and thought how we could prevent something like this from happening again.
I wrote that post because I was genuinely curious (and maybe a little bit desperate) to know if I was feeling alone in this. I wanted to know if other people saw the same connection between the data we give away and the way it’s being used as a weapon. And more importantly, how we proceed moving forwards as people and a community, not for silly reasons you’d likely suspect from a bad actor. I do get where you come from though, this is going to be my final word on this matter. Now, I’m going to stop arguing about my sentence structure and continue actually helping people build


I’m a “malicious actor” because I’m telling people to stop giving their data to big tech and hide it on a local server? That is the least efficient data collection scam in history. If I wanted your data, I’d tell you to sign up for a “Free Privacy Newsletter” on a Google Form. Telling you to run an encrypted Vaultwarden instance literally locks me out too.


It’s hard to call it anything else when you see the actual human cost on the street. But the most “antagonistic” thing we can do right now isn’t just venting, it’s making surveillance models obsolete.


I’m definitely a human, just a concerned poster who actually gives a damn about what’s happening to our digital privacy.
I’ll take the “AI” comments as a compliment to my grammar, I guess, but it’s a bit sad that we’ve reached a point where structured thoughts and bullet points make people suspicious. I use the dashes and lists because I want this info to be readable, not because I’m a bot running on a server somewhere.
I’ve spent enough time working in tech and volunteering with seniors to know that if you don’t lay things out clearly, the message gets lost. I’m just someone trying to help people get their tech privacy back. No LLM required. Just a lot of caffeine and a genuine annoyance with where Big Tech is heading.


You’re right that Google’s infrastructure is more hardened than individual deployments. But security and sovereignty are different problems. Google’s security protects against external threats, it’s designed to be transparent to Google and compliant with government requests. Your email experience actually proves my point: hobbyist sysadmins running free services for friends doesn’t work. I agree completely. What I’m proposing is professional infrastructure for organizations that actually need it; small businesses, non-profits, community orgs. Not favors for friends who don’t care. Not trying to out-secure Google. Just viable alternatives for entities where corporate access to their data is a real threat, not a theoretical privacy concern. The non-profit handling immigrant legal aid? The community health clinic? They need this. Your friends checking Gmail don’t.


You’re right that if the state really wants you, they can always resort to physical force, but that’s exactly the point. In the current system, they don’t have to kick down any doors, they just send a silent request to a corporate office and get everything they need without you or your neighbors ever knowing. Forcing them to physically show up at a specific address in the real world drastically changes the “cost of surveillance,” it turns a cheap, automated dragnet into a slow, expensive, and public operation.
As for the Hillary Clinton example, that’s actually a perfect lesson in what happens when you prioritize convenience over security. Her setup was “shadow IT” at its worst, it had open ports, unencrypted connections, and none of the basic hardening we use in modern sovereign stacks like Docker or NixOS. It wasn’t built for resistance, it was built to bypass government record-keeping, and that lack of professionalism is exactly why it failed.
The “Amazon engineer” might only see bytes, but the Amazon algorithm sees your entire life story, your politics, and your vulnerabilities. If we use end-to-end encryption, it doesn’t matter if the guy hosting the box is a neighbor or a stranger, they can’t read the data anyway. We aren’t just following random guides, we are building professional-grade infrastructure that makes the “dragnet” fail by design. If the state has to kick down a door for one person’s data, the system is at least forced to follow a transparent process again.


Actually, you’re exactly right about client-side encryption being the answer, and that is the standard we are pushing for. But the reason you don’t just dump those encrypted files into a Google Drive is because of the metadata. Even if Google cannot read your “letter,” they are still mining the “envelope,” they know when you wrote it, where you were, and who you sent it to. In 2026, metadata is often more dangerous than the content itself because it is so easy to automate into a threat profile.
As for the law, you’re right that a court order is a court order, but there is a massive difference in the “cost of surveillance.” Big tech companies have dedicated departments to automate data handovers for thousands of users at a time; it is a streamlined pipeline. A private server forces the state to slow down, to get a specific warrant for a specific physical machine, and to actually do the legwork. It turns a massive dragnet into a targeted investigation, which is exactly how the system is supposed to work.
And regarding the “Amazon engineer” versus a neighbor, an engineer might not know my name, but the Amazon algorithm knows my pulse, my politics, and my habits better than anyone. If I use E2EE, the person hosting the hardware doesn’t have the keys anyway, so they are just a landlord for my digital safe, not a spy.


You nailed it, the “I’m not techy” thing is often just a shield people use because they are simply exhausted by this economy, and time is the one resource Big Tech steals that we can’t ever get back. I’ve spent a lot of time teaching seniors at a library program, and I’ve seen firsthand how that “convenience” is a trap designed to keep people from even looking under the hood to see what’s actually happening to their data.
You are right about the remote admin headache too, that’s exactly why the movement needs to shift from just “hobbyist favors” to actual, reliable infrastructure that doesn’t break every time an adult in the house clicks a link. If we don’t make these sovereign nodes as easy as a light switch, people will always fall back into the arms of a corporation just to get through their Monday. We have to be the ones who put in the work to make the “resistance” feel like less of a chore and more like a utility.


That means a lot, the force multiplier thing is exactly why I posted this. Building for yourself is a great start, but bringing others along with you is how we actually scale the resistance. We need more nodes in the network, so keep doubling down.


That’s a big question because individual action only goes so far before you hit a wall, for the heavy-duty legal and policy stuff, the Electronic Frontier Foundation (EFF) is still the gold standard, and I really respect The Calyx Institute for actually providing hardware and internet access that doesn’t track you. Also look at Tactical Tech, they do amazing work on digital literacy for activists, and the Matrix.org Foundation is building the actual backbone for the communication side.
But honestly, I think the most important “organizations” are the ones we haven’t built yet, the local community networks where people help their neighbors get off the corporate grid. My time teaching at the library with a digital literacy program for seniors taught me that we need people who can translate this tech into something a regular person can actually use, so the movement needs to be as much about education as it is about code, we have to be the infrastructure we want to see, one node at a time.


You’re hitting on the two biggest myths of the current era: that “legal agreements” with giants actually protect you, and that a neighbor is a bigger risk than a faceless corporation.
First, when a tech giant gets a broad subpoena, they don’t fight it for you; they automate the handover because you’re just a line in a database of billions. When you host locally, you’re a specific node. If the state wants your data from a private server, they have to physically knock on a specific door. That is a massive increase in the “cost of surveillance” compared to a silent API request sent to a corporate data center.
Second, this isn’t about “trusting a neighbor” with your plaintext data. In a proper sovereign setup, the data is end-to-end encrypted. I can host your Vaultwarden or your Nextcloud backups, but I don’t have the keys; I’m just providing the “digital real estate.” It’s the difference between giving someone your house keys and just letting them provide the land your safe sits on.
The goal isn’t to make law enforcement impossible; it’s to make the “dragnet” impossible. If they want one person’s data, they have to work for it, rather than just pulling it from a corporate warehouse.


You’re right. We’ve been traded convenience for our autonomy for way too long, and it’s created this massive power imbalance where a few tech bros basically own the digital roads we walk on. Voting with your wallet is a huge first step, but like you said, the real work starts when we actually take responsibility for our own data.
That’s exactly why I’m moving toward helping local businesses and groups build out their own nodes. It’s one thing to stop paying for a subscription, but it’s another thing entirely to stand up your own infrastructure that doesn’t report back to a corporate mother-ship. Every person who rejects the “default” and builds a private alternative is a small win for the rest of us, it’s about making the corporate extraction model fail by simply making it unnecessary.


Honestly, you’re right about the skill gap, the convenience trap is exactly how Big Tech won in the first place, but I don’t think the goal is to turn every single person into a sysadmin. My time teaching at the library with the Cyber Seniors program showed me that people don’t need to know how to flash an OS to deserve privacy, they just need a doorway that isn’t owned by a corporation.
If the 5% who actually know how this stuff works start building “community nodes” for their family, their block, or a local shop, then the 95% get all the benefits without the technical headache. We don’t need everyone to be an expert, we just need enough local infrastructure so that “the cloud” isn’t the only option left. It’s not about total purity for everyone, it’s just about building enough exit ramps so the machine becomes optional, you know?


I feel this deeply. I used to volunteer at a library teaching “Cyber Seniors” digital literacy, and the biggest hurdle was always the fear of “breaking” something. The truth is, the big tech companies want you to think it’s too hard so you’ll keep paying them with your data.
You don’t need to be a sysadmin to start. It’s not about days of fixing errors; it’s about taking one small win at a time; like setting up a password manager first. If you can follow a recipe, you can build a node. We’re working on better, no-jargon guides to make sure the “thousand little errors” don’t stand in your way. You don’t have to be an expert to be part of the resistance.


Spot on. Self-hosting is the most effective form of quiet, material protest we have. Every time your family uses Syncthing instead of OneDrive, you’re starving the machine of the telemetry it needs to function.
Running that stack for your inner circle is essentially building a “digital mutual aid” node. You’re taking the burden of surveillance off their backs and putting it on your own hardware where you can actually defend it. That’s the work.


The Charybde en Scylla analogy hits home. It is a classic mistake to think we can patch a logic flaw in society by just upgrading the hardware or switching to a new instance.
You are right about the marketplace mindset. When platforms treat humans as inventory, we start acting like products. We optimize our profiles like we are trying to rank on a search engine instead of just existing. It is exhausting and the only people winning are the ones running the servers and collecting the data. It is a full time job that pays nothing and costs us our sanity.
Living in a place where the local scene is thin makes the digital world feel like the only air available. It is easy to get stuck in the loop of looking for a perfect match online because the local options feel non-existent. But your point about being different together is interesting. Maybe the goal should not be finding a mirror image of my interests, but just finding someone who is system compatible even if they do not know their way around a config file.
I am still going to tinker with my home lab and keep my privacy stack tight, but I need to remember those are tools and not the actual life. The real exploit is figuring out how to be human in a world that wants us to be data points. Thanks for the perspective. It is a good reminder that even on the fediverse, the most important connections are the ones that happen when you actually step away from the keyboard.
I guess I wanna be that guy for my friends and family! It’s a fun past time for me haha