1
00:00:00,000 --> 00:00:10,840
September 2025, Disney got caught collecting your kids' data illegally, $10 million fine.

2
00:00:11,480 --> 00:00:16,060
Google paid $425 million for a decade of snooping on your smartphone.

3
00:00:16,860 --> 00:00:21,460
Microsoft cut off a military unit for using their tools to survey millions of civilians.

4
00:00:22,120 --> 00:00:26,380
A Chinese toy company was caught tracking children's locations without telling parents.

5
00:00:27,200 --> 00:00:29,500
And while government hit corporations with fines,

6
00:00:29,740 --> 00:00:32,560
they're simultaneously pushing digital ID systems

7
00:00:32,560 --> 00:00:35,500
that would make corporate surveillance look like child's play.

8
00:00:36,120 --> 00:00:37,940
Here's what you need to understand.

9
00:00:38,440 --> 00:00:41,040
Your privacy isn't dying from a thousand cuts.

10
00:00:41,460 --> 00:00:44,360
It's under coordinated attack from two directions at once.

11
00:00:45,040 --> 00:00:46,780
Corporations want your data for profit.

12
00:00:47,420 --> 00:00:48,840
Governments want it for control.

13
00:00:48,840 --> 00:00:52,960
And September 2025 is the month when the surveillance shifted

14
00:00:52,960 --> 00:00:59,560
from corporate to government, from voluntary to mandatory, from profit-driven to power-driven.

15
00:01:00,260 --> 00:01:05,600
This is Trust Revolution. I'm Sean Yeager, and today we're connecting the dots on why

16
00:01:05,600 --> 00:01:09,860
corporate surveillance is crumbling while government surveillance is being built in its

17
00:01:09,860 --> 00:01:17,440
place, and what you can do to escape both before the trap closes. Over 19 episodes across two

18
00:01:17,440 --> 00:01:24,100
seasons so far, we've talked to builders creating alternatives. John Robb on decentralized networks,

19
00:01:24,620 --> 00:01:30,420
Mark Secure Enclaves protecting your privacy by design, Max Hillebrand and Matthias Boos proving

20
00:01:30,420 --> 00:01:35,920
that peer-to-peer systems work at scale, Fran's Zap Store bypassing App Store monopolies,

21
00:01:36,520 --> 00:01:42,800
OpenState exposing how financial regulations create surveillance nets, Nicholas Anthony and Alex

22
00:01:42,800 --> 00:01:48,160
Newman showing how centralized control threatens freedom. Jeffrey Tucker breaking the spell of

23
00:01:48,160 --> 00:01:54,000
consensus thinking. But why are these alternatives suddenly urgent? Because both the corporate

24
00:01:54,000 --> 00:01:58,640
surveillance model and the government control model are reaching their breaking points

25
00:01:58,640 --> 00:02:04,560
simultaneously. One through enforcement and public backlash, the other through increasingly

26
00:02:04,560 --> 00:02:11,520
aggressive digital ID mandates that would centralize surveillance even further. Let me show you what

27
00:02:11,520 --> 00:02:17,240
happened just this month and what's coming. On September 3rd, the FTC took action against a

28
00:02:17,240 --> 00:02:23,080
Chinese robot toy maker, Aperture Technology, for allowing a third party to collect geolocation

29
00:02:23,080 --> 00:02:30,120
data from children without parental consent. Kids ages 6 through 14 bought these educational robots,

30
00:02:30,760 --> 00:02:35,140
downloaded the companion app, and the company was secretly sharing their precise location

31
00:02:35,140 --> 00:02:40,500
with servers in China through a software kit called JPush. Parents had no idea.

32
00:02:41,380 --> 00:02:51,620
That same day, Disney agreed to pay $10 million to settle allegations that the company enabled unlawful collection of children's personal data on YouTube.

33
00:02:52,100 --> 00:03:02,660
Disney failed to properly label videos as made for kids, which allowed targeted advertising and data collection from children under 13 without parental consent.

34
00:03:03,580 --> 00:03:05,580
Two enforcement actions in a single day.

35
00:03:06,340 --> 00:03:09,540
One against a Chinese company tracking kids' physical locations.

36
00:03:09,540 --> 00:03:13,980
won against Disney, one of the most sophisticated media companies on earth,

37
00:03:14,180 --> 00:03:16,220
for failing to protect kids online.

38
00:03:17,240 --> 00:03:19,160
This isn't about fining bad actors.

39
00:03:19,660 --> 00:03:22,100
It's about admitting the system is broken.

40
00:03:22,480 --> 00:03:25,420
If Disney, with unlimited resources and legal teams,

41
00:03:25,520 --> 00:03:29,800
can't figure out how to comply with privacy laws meant to protect children,

42
00:03:30,420 --> 00:03:32,680
what does that tell you about the model itself?

43
00:03:32,680 --> 00:03:46,580
On September 4th, a federal jury ordered Google to pay $425.7 million for improperly snooping on people's smartphones during a nearly decade-long period of intrusions.

44
00:03:47,000 --> 00:03:54,540
Your smartphone, the device in your pocket right now, Google was tracking you even when you thought you'd turn tracking off.

45
00:03:55,160 --> 00:03:57,340
And it took a jury to make them pay for it.

46
00:03:57,340 --> 00:04:03,820
Not regulators, a jury of regular people who heard the evidence and said, this is unacceptable.

47
00:04:04,840 --> 00:04:06,660
And it's not just U.S. companies.

48
00:04:06,880 --> 00:04:14,160
On September 25th, Microsoft announced it had disabled services to a unit within the Israeli military

49
00:04:14,160 --> 00:04:22,420
after a company review determined its AI and cloud computing products were being used to help carry out mass surveillance of Palestinians.

50
00:04:23,420 --> 00:04:32,600
Microsoft voluntarily shut down a paying customer because the reputational and legal risk of enabling surveillance outweighed the revenue.

51
00:04:33,320 --> 00:04:40,260
Think about that. The risk of being associated with surveillance is now higher than the revenue from enabling it.

52
00:04:40,260 --> 00:04:55,440
On September 23rd, Canadian privacy authorities released findings that TikTok's efforts to keep children off the platform and prevent the collection and use of their sensitive personal information are, quote, inadequate.

53
00:04:56,120 --> 00:05:07,020
The investigation found TikTok was collecting data on hundreds of thousands of Canadian children who shouldn't have been on the platform at all, including biometric information like facial and voice data.

54
00:05:07,800 --> 00:05:13,520
Meanwhile, authorities in Australia say social media platforms should not require age verification

55
00:05:13,520 --> 00:05:19,800
for all users when a ban on children under 16 having accounts goes into effect in December.

56
00:05:20,620 --> 00:05:25,300
Australian eSafety Commissioner Julie Inman Grant said on September 16th

57
00:05:25,300 --> 00:05:30,520
that it would be, quote, unreasonable for platforms to re-verify everyone's age.

58
00:05:31,140 --> 00:05:32,960
Now, notice the impossible position.

59
00:05:33,640 --> 00:05:42,880
Regulators say platforms must keep kids off, but they can't require invasive age verification because that creates more privacy violations for everyone.

60
00:05:43,380 --> 00:05:45,620
It is a catch-22 by design.

61
00:05:46,080 --> 00:05:48,460
And this brings us to the other shoe-dropping.

62
00:05:49,100 --> 00:05:54,860
Governments using this exact problem as justification for centralized digital ID systems.

63
00:05:55,460 --> 00:05:56,680
So what's the pattern?

64
00:05:57,560 --> 00:05:58,260
Three things.

65
00:05:58,880 --> 00:06:02,500
First, corporate surveillance is collapsing under its own weight.

66
00:06:02,960 --> 00:06:06,600
Bigger penalties, faster enforcement, no mercy for big brands.

67
00:06:06,980 --> 00:06:11,320
The business model that made big tech rich is becoming legally untenable.

68
00:06:12,540 --> 00:06:15,980
Second, governments are using this collapse as an opportunity.

69
00:06:16,760 --> 00:06:20,340
The companies can't be trusted with your data, so give it to us instead.

70
00:06:21,080 --> 00:06:25,660
Digital IDs, biometric verification, centralized identity systems,

71
00:06:25,660 --> 00:06:29,540
all sold as solutions to the corporate surveillance problem.

72
00:06:29,540 --> 00:06:33,280
Third, you're being offered a false choice

73
00:06:33,280 --> 00:06:36,060
Corporate surveillance or government control

74
00:06:36,060 --> 00:06:37,860
Facebook or digital ID

75
00:06:37,860 --> 00:06:41,860
But there's a third option nobody in power wants you to know about

76
00:06:41,860 --> 00:06:45,400
Systems that don't require you to trust anyone

77
00:06:45,400 --> 00:06:48,160
And that's what this episode is really about

78
00:06:48,160 --> 00:06:52,780
While corporations are getting fined for surveillance

79
00:06:52,780 --> 00:06:56,280
Governments worldwide are accelerating digital ID mandates

80
00:06:56,280 --> 00:07:03,640
And they're using the exact problems we just discussed, age verification, identity theft, fraud, as justification.

81
00:07:04,380 --> 00:07:08,400
Let me walk you through what's happening globally because this is not isolated.

82
00:07:08,740 --> 00:07:09,860
This is coordinated.

83
00:07:10,880 --> 00:07:14,800
The EU is mandating digital identity wallets for all member states.

84
00:07:14,800 --> 00:07:28,320
By 2026, every EU citizen is supposed to have access to a government-issued digital wallet that stores identity credentials, driver's licenses, educational certificates, health records, everything.

85
00:07:29,000 --> 00:07:36,560
The pitch? One secure place for all your documents. Convenience, security, protection against identity theft.

86
00:07:36,560 --> 00:07:47,880
The reality, a centralized system where every interaction, logging into websites, proving your age, accessing services gets routed through government infrastructure.

87
00:07:48,540 --> 00:07:50,680
Every verification creates a data trail.

88
00:07:51,160 --> 00:07:52,860
Every transaction gets logged.

89
00:07:53,260 --> 00:07:56,020
And unlike corporate surveillance, you cannot opt out.

90
00:07:56,280 --> 00:07:57,200
It's government mandated.

91
00:07:58,720 --> 00:08:11,216
Australia is implementing a ban on social media for children under 16 effective December 10 of this year And here the catch Authorities say platforms shouldn require age verification for all users to comply

92
00:08:11,676 --> 00:08:16,216
So how do you prove someone's under 16 without verifying everyone's age?

93
00:08:16,796 --> 00:08:24,476
You can't, which means either platforms implement invasive verification anyway and get sued for privacy violations,

94
00:08:24,476 --> 00:08:31,756
or the government steps in with a centralized age verification system tied to digital IDs.

95
00:08:32,156 --> 00:08:33,536
Guess which way this is heading.

96
00:08:34,196 --> 00:08:38,196
Australia is already piloting government-backed age verification systems.

97
00:08:38,676 --> 00:08:43,396
Your ID, your age, your access to platforms, all controlled through a government gateway.

98
00:08:44,296 --> 00:08:49,636
The UK has been building its digital identity and attributes trust framework, great name there,

99
00:08:50,076 --> 00:08:53,816
a system for verifying identity across public and private services.

100
00:08:53,816 --> 00:08:56,136
The pitch is public-private partnership.

101
00:08:56,896 --> 00:09:01,676
The reality is government-certified identity providers acting as gatekeepers.

102
00:09:02,796 --> 00:09:03,996
Want to open a bank account?

103
00:09:04,416 --> 00:09:05,416
Digital ID verification.

104
00:09:06,116 --> 00:09:07,096
Want to rent an apartment?

105
00:09:07,496 --> 00:09:08,196
Digital ID.

106
00:09:08,596 --> 00:09:09,796
Access government services?

107
00:09:10,056 --> 00:09:10,696
Digital ID.

108
00:09:11,196 --> 00:09:13,176
Prove you're old enough to view certain content?

109
00:09:13,496 --> 00:09:14,316
Digital ID.

110
00:09:15,056 --> 00:09:20,216
Every verification creates a record, every record gets stored, and every interaction

111
00:09:20,216 --> 00:09:21,236
becomes traceable.

112
00:09:22,136 --> 00:09:26,976
The U.S. doesn't have a federal digital ID mandate yet, but states are moving fast.

113
00:09:27,536 --> 00:09:31,776
Several states are already issuing mobile driver's licenses, digital IDs stored on your phone.

114
00:09:32,536 --> 00:09:33,776
The pitch? Convenience.

115
00:09:34,516 --> 00:09:43,416
The reality, your government-issued ID is now connected to a device that tracks your location, your app usage, your communications.

116
00:09:44,076 --> 00:09:45,536
And here's where it gets darker.

117
00:09:45,536 --> 00:09:54,216
The Real ID Act already created a de facto national ID system through standardized driver's licenses with machine-readable data.

118
00:09:54,896 --> 00:10:00,576
Digital IDs are the next step, connecting that standardized data to online verification systems.

119
00:10:01,516 --> 00:10:06,336
Some states are piloting these for age verification on adult websites and social media.

120
00:10:07,436 --> 00:10:11,136
Once the infrastructure exists for age verification, it gets expanded.

121
00:10:11,396 --> 00:10:11,936
Okay.

122
00:10:15,536 --> 00:10:21,576
Always, mission creep isn't a bug, it's a feature.

123
00:10:22,496 --> 00:10:27,476
Now, connect this to what Nicholas Anthony told us about central bank digital currencies.

124
00:10:28,076 --> 00:10:30,436
CBDCs are programmable government money.

125
00:10:31,076 --> 00:10:33,716
Digital IDs are the authentication layer.

126
00:10:34,456 --> 00:10:35,076
Combine them.

127
00:10:35,436 --> 00:10:39,136
You get programmable money and government verified identity.

128
00:10:39,836 --> 00:10:42,956
And the result is total financial surveillance and control.

129
00:10:43,716 --> 00:10:51,796
Every purchase tied to your identity, every transaction logged and traceable, every financial decision subject to government policy.

130
00:10:52,496 --> 00:10:54,796
Sorry, you've exceeded your carbon allowance this month.

131
00:10:55,076 --> 00:10:56,136
Transaction denied.

132
00:10:56,556 --> 00:10:58,336
Sorry, you're not eligible to purchase that.

133
00:10:58,636 --> 00:10:59,436
Transaction blocked.

134
00:10:59,976 --> 00:11:01,636
This isn't a conspiracy theory.

135
00:11:01,776 --> 00:11:06,276
This is the stated goal of multiple CBDC pilot programs.

136
00:11:06,736 --> 00:11:09,436
China's digital yuan already does this.

137
00:11:09,436 --> 00:11:14,336
the EU's digital euro proposals include identity verification requirements.

138
00:11:14,936 --> 00:11:16,096
The pieces are being assembled.

139
00:11:17,116 --> 00:11:18,756
Here's how governments are selling this.

140
00:11:19,176 --> 00:11:21,876
Step one, point to corporate surveillance abuses.

141
00:11:22,376 --> 00:11:25,116
Big tech cannot be trusted with your data, they say.

142
00:11:25,656 --> 00:11:28,456
Step two, offer government-controlled alternatives.

143
00:11:28,836 --> 00:11:32,336
We'll protect you with secure, verified digital IDs.

144
00:11:33,216 --> 00:11:38,096
Step three, mandate adoptions for safety, for security, for the children.

145
00:11:38,876 --> 00:11:40,536
Step four, expand the scope.

146
00:11:41,136 --> 00:11:45,896
Now that we have the infrastructure, let's use it for age verification, financial transactions,

147
00:11:46,136 --> 00:11:48,376
healthcare access, voting, benefits.

148
00:11:49,196 --> 00:11:51,016
It's the same playbook every time.

149
00:11:51,416 --> 00:11:54,616
Crisis, solution, mandate, expansion.

150
00:11:55,736 --> 00:11:56,476
And here's the kicker.

151
00:11:57,096 --> 00:12:00,816
Unlike corporate surveillance where you can switch platforms or use alternatives,

152
00:12:01,416 --> 00:12:03,476
government surveillance is backed by law.

153
00:12:03,476 --> 00:12:05,376
You can delete Facebook.

154
00:12:05,996 --> 00:12:07,776
You cannot delete your government.

155
00:12:09,016 --> 00:12:11,756
Corporate surveillance is bad. We've established that.

156
00:12:12,356 --> 00:12:14,936
But government surveillance is categorically different.

157
00:12:15,676 --> 00:12:18,556
Corporations want your data for profit. That's constraining.

158
00:12:18,956 --> 00:12:20,996
They won't do things that destroy the business model.

159
00:12:21,716 --> 00:12:25,216
Governments want your data for control. That is unbounded.

160
00:12:25,216 --> 00:12:27,036
They'll do whatever serves power.

161
00:12:27,896 --> 00:12:32,396
You can choose not to use Facebook. You can't choose not to have a government.

162
00:12:33,556 --> 00:12:35,256
Corporations compete with each other.

163
00:12:35,256 --> 00:12:38,496
If one platform gets too invasive, you can switch.

164
00:12:39,236 --> 00:12:40,876
Government monopolizes identity.

165
00:12:41,176 --> 00:12:43,056
There's no alternative provider.

166
00:12:44,196 --> 00:12:46,156
Corporate surveillance creates business risk.

167
00:12:46,616 --> 00:12:49,216
Data breaches, lawsuits, reputational damage.

168
00:12:49,916 --> 00:12:52,576
Government surveillance creates existential risk.

169
00:12:53,136 --> 00:12:56,836
Political persecution, financial control, social engineering.

170
00:12:57,836 --> 00:12:59,456
And the two are converging.

171
00:12:59,896 --> 00:13:01,676
Governments mandate digital IDs.

172
00:13:02,396 --> 00:13:05,756
Corporations are required to verify users through those IDs.

173
00:13:06,576 --> 00:13:13,816
Now your government knows every platform you use, every service you access, every transaction you make.

174
00:13:14,416 --> 00:13:17,556
One system, total visibility, no escape.

175
00:13:18,636 --> 00:13:19,936
This is the trap.

176
00:13:20,416 --> 00:13:24,236
You're being offered a choice between corporate surveillance and government control.

177
00:13:24,236 --> 00:13:26,816
Mark Zuckerberg or your national government.

178
00:13:27,556 --> 00:13:30,996
Amazon tracking you or a digital ID system tracking you.

179
00:13:30,996 --> 00:13:33,756
But that is a false binary.

180
00:13:34,496 --> 00:13:38,416
There's a third option, systems that do not require surveillance at all.

181
00:13:38,616 --> 00:13:41,696
Peer-to-peer verification instead of centralized databases.

182
00:13:42,376 --> 00:13:44,976
Zero-knowledge proofs instead of data collection.

183
00:13:45,556 --> 00:13:46,596
These aren't theoretical.

184
00:13:47,016 --> 00:13:51,676
They exist, they work, and they're being deliberately kept out of the conversation

185
00:13:51,676 --> 00:13:56,976
because neither corporations nor governments benefit from systems they cannot surveil.

186
00:13:56,976 --> 00:14:05,556
While governments push digital IDs, they're simultaneously passing privacy laws that make corporate data collection increasingly difficult.

187
00:14:06,256 --> 00:14:12,276
The result? A compliance nightmare that will drive more companies toward government-provided solutions.

188
00:14:13,076 --> 00:14:18,796
By the end of 2025, 16 comprehensive state privacy laws will be in force in the U.S.

189
00:14:19,376 --> 00:14:23,996
Each state is ratcheting up requirements. It's a race to the top, not the bottom.

190
00:14:24,656 --> 00:14:27,896
Companies can't just pick the weakest standard and apply it everywhere.

191
00:14:28,856 --> 00:14:30,636
State enforcers are ramping up.

192
00:14:30,976 --> 00:14:32,336
Data brokers are under siege.

193
00:14:32,336 --> 00:14:42,536
The data broker ecosystem that powers target and advertising credit scoring and, quote, personalization is being dismantled piece by piece and not fast enough.

194
00:14:42,916 --> 00:14:43,836
But here's what's happening.

195
00:14:44,476 --> 00:14:48,396
Privacy regulations make corporate surveillance harder and more expensive.

196
00:14:49,236 --> 00:14:53,196
Companies look for easier ways to verify identity and comply with laws.

197
00:14:53,916 --> 00:14:57,676
Governments offer centralized digital ID systems as the solution.

198
00:14:58,516 --> 00:14:59,916
It's a deliberate compression.

199
00:15:00,556 --> 00:15:02,616
Squeeze the private sector with regulations.

200
00:15:03,196 --> 00:15:05,476
Offer government infrastructure as relief.

201
00:15:05,956 --> 00:15:06,436
The result?

202
00:15:07,036 --> 00:15:10,376
Surveillance shifts from corporate to government, but it doesn't decrease.

203
00:15:10,856 --> 00:15:11,856
It centralizes.

204
00:15:12,776 --> 00:15:15,776
And once it's centralized, it's much harder to escape.

205
00:15:16,716 --> 00:15:21,056
For 20 years, the surveillance economy worked on a simple equation.

206
00:15:21,056 --> 00:15:28,216
revenue from data exploitation greater than the cost of compliance plus the risk of fines.

207
00:15:28,856 --> 00:15:35,196
That equation just broke. Google, half a billion dollars. Disney, 10 million. Apatour, half a

208
00:15:35,196 --> 00:15:41,356
million. Data brokers, settlements over location data, compliance costs multiplied now by 16 states.

209
00:15:42,036 --> 00:15:48,776
Reputational damage, Microsoft cutting off major government customers. And here's what people miss.

210
00:15:48,776 --> 00:15:50,996
These are just the cases we know about.

211
00:15:51,756 --> 00:15:56,916
For two decades, we've been told, give us your data, trust us to protect it.

212
00:15:57,456 --> 00:15:58,776
People are done trusting.

213
00:15:59,396 --> 00:16:00,476
And here's the deeper shift.

214
00:16:01,056 --> 00:16:11,812
People are realizing they shouldn have to trust That what Open State was getting at about financial surveillance The system is designed to require trust which creates power asymmetries

215
00:16:12,192 --> 00:16:14,432
It's what Bronwyn Williams told us about

216
00:16:14,432 --> 00:16:17,772
when discussing the unraveling cycles of society.

217
00:16:17,772 --> 00:16:21,052
When trust in centralized institutions breaks down,

218
00:16:21,352 --> 00:16:22,472
people seek alternatives.

219
00:16:23,292 --> 00:16:26,192
The alternative is trust-minimized systems.

220
00:16:26,792 --> 00:16:27,812
Don't trust the app store,

221
00:16:28,312 --> 00:16:30,252
verify the cryptographic signature.

222
00:16:30,812 --> 00:16:32,532
Don't trust the payment processor.

223
00:16:33,012 --> 00:16:33,612
Use Bitcoin.

224
00:16:34,092 --> 00:16:36,232
Don't trust the government with your identity.

225
00:16:36,772 --> 00:16:38,272
Use zero-knowledge proofs.

226
00:16:38,572 --> 00:16:39,492
That's the future.

227
00:16:40,052 --> 00:16:46,492
And anyone still betting on the trust-us model, whether corporate or government, is on the wrong side of history.

228
00:16:47,752 --> 00:16:49,892
Here's why this matters for Trust Revolution.

229
00:16:49,972 --> 00:16:54,812
Over 19 episodes, every guest we've had isn't just complaining about surveillance.

230
00:16:55,232 --> 00:17:00,152
They're proposing or building alternatives that work without requiring you to trust them.

231
00:17:00,252 --> 00:17:03,872
Season 1 Builders showed us the foundation.

232
00:17:04,632 --> 00:17:08,832
John Robb's decentralized networks enabling coordination without central control.

233
00:17:09,332 --> 00:17:13,872
Mark's secure enclaves proving your data can stay on your device while still being useful.

234
00:17:14,552 --> 00:17:17,772
Max Hillebrand demonstrating peer-to-peer economies at scale.

235
00:17:18,432 --> 00:17:19,672
Fran building's app store.

236
00:17:19,932 --> 00:17:23,612
App distribution with zero surveillance, zero accounts, zero tracking.

237
00:17:24,272 --> 00:17:27,372
Season 1 Analysts helped us understand the stakes.

238
00:17:27,372 --> 00:17:30,412
David Strayhorn decoded how trust actually works.

239
00:17:31,032 --> 00:17:34,872
Yael Ossowski showed us the balance of power shifting toward individuals.

240
00:17:35,552 --> 00:17:40,292
Bronwyn again revealed we're in a historical cycle of institutional unraveling and renewal.

241
00:17:41,012 --> 00:17:45,412
Rashad Tobakawala reminded us that trust is the currency of the future in business.

242
00:17:46,252 --> 00:17:53,712
Are you serious? warned us about the Internet's lost promise not to let centralization capture the next wave of technology.

243
00:17:53,712 --> 00:18:18,732
And on the policy front, Stephen Pollack explained Bitcoin and American statecraft, why decentralized money threatens centralized power. Matt O'Dell gave us the full Freedom Tech stack, Signal, Tor, Bitcoin, Noster. Open State exposed how AML and KYC creates a global surveillance grid and showed us how to fight back with FOI requests, freedom of information, and transparency.

244
00:18:19,732 --> 00:18:21,752
In Season 2, we further bring it home.

245
00:18:22,132 --> 00:18:23,932
Nicholas Anthony showed us the endgame.

246
00:18:24,452 --> 00:18:27,932
CBDCs are total financial control tied to government identity.

247
00:18:28,652 --> 00:18:32,232
Matthias proved that peer-to-peer infrastructure can and is working at scale.

248
00:18:33,172 --> 00:18:39,012
Jeffrey Tucker reminds us to break out of consensus thinking and away from centralized systems.

249
00:18:39,752 --> 00:18:42,852
Alex Newman mapped paths to renewal through this trust crisis.

250
00:18:43,932 --> 00:18:45,652
Notice the pattern across all.

251
00:18:46,192 --> 00:18:49,392
Privacy by design, not privacy by policy.

252
00:18:50,072 --> 00:18:53,052
Policy-based privacy says we promise to protect your data.

253
00:18:53,552 --> 00:18:59,952
Then they get breached or sell it or get subpoenaed or change the term of service or the government mandates access.

254
00:19:00,672 --> 00:19:05,612
Design-based privacy says we architecturally cannot access your data.

255
00:19:05,612 --> 00:19:08,112
The promise isn't a policy document.

256
00:19:08,372 --> 00:19:09,072
It's in the code.

257
00:19:09,412 --> 00:19:10,432
It's not trust us.

258
00:19:10,672 --> 00:19:12,472
It's you don't have to trust us.

259
00:19:12,832 --> 00:19:14,412
Here's the cryptographic proof.

260
00:19:14,912 --> 00:19:15,812
That's the shift.

261
00:19:15,812 --> 00:19:23,032
In September of this year, the enforcement wave plus the digital ID push proves why it matters.

262
00:19:24,132 --> 00:19:33,772
The technologies exist right now to solve the problems that governments claim digital IDs are meant to solve without the centralized surveillance.

263
00:19:34,932 --> 00:19:40,952
Zero-knowledge proofs prove you're over 18 without revealing your exact age, name, or any other information.

264
00:19:41,472 --> 00:19:44,372
This is mature cryptography, not science fiction.

265
00:19:44,412 --> 00:19:54,492
Decentralized identity. Control your own credentials. Share only what's necessary for each interaction. No central database to hack or subpoena.

266
00:19:55,512 --> 00:20:02,592
Secure enclaves. Computation can happen on encrypted data without ever exposing the underlying information.

267
00:20:03,052 --> 00:20:13,392
Peer-to-peer systems. You can coordinate economic activity and build communities with Bitcoin without centralized platforms extracting your data.

268
00:20:14,212 --> 00:20:19,732
Cryptographic signatures prove authenticity without disclosure, verify without revealing.

269
00:20:20,412 --> 00:20:22,172
These are, again, not theoretical.

270
00:20:22,572 --> 00:20:23,512
They're production-ready.

271
00:20:24,052 --> 00:20:30,812
Projects like Noster, Bitcoin, the Lightning Network, Signal, Tor, these are implemented right now.

272
00:20:31,572 --> 00:20:34,992
But you won't hear about them in government digital ID proposals.

273
00:20:35,492 --> 00:20:35,772
Why?

274
00:20:35,772 --> 00:20:40,352
Because they solve the stated problem without creating the surveillance infrastructure.

275
00:20:40,352 --> 00:20:44,952
and surveillance, not solving problems, is their actual goal.

276
00:20:45,052 --> 00:20:46,852
First action I'd like you to consider taking,

277
00:20:47,092 --> 00:20:48,772
reduce your attack surface.

278
00:20:49,332 --> 00:20:50,972
Every piece of data you've shared,

279
00:20:51,212 --> 00:20:52,452
every account you've created,

280
00:20:52,612 --> 00:20:54,412
every digital trail you've left,

281
00:20:54,792 --> 00:20:57,152
it's all potential ammunition for surveillance.

282
00:20:57,852 --> 00:20:58,992
So here's some action items.

283
00:20:59,812 --> 00:21:01,472
Delete accounts you don't use.

284
00:21:01,592 --> 00:21:04,172
If you haven't logged into a service in six months,

285
00:21:04,452 --> 00:21:05,632
delete it, get rid of it.

286
00:21:06,312 --> 00:21:07,072
Audit your apps.

287
00:21:07,752 --> 00:21:09,192
Check what permissions you've granted.

288
00:21:09,192 --> 00:21:17,712
revoke everything that's not absolutely necessary. Request your data. Use GDPR, CCPA, and the like

289
00:21:17,712 --> 00:21:23,812
to request a copy of your data from major platforms. You will undoubtedly be horrified.

290
00:21:24,292 --> 00:21:30,932
Then use your right to deletion. Stop feeding the machine. Before you sign up for a new service,

291
00:21:30,932 --> 00:21:36,712
ask, do I really need this? Every new account is a new surveillance point.

292
00:21:36,712 --> 00:21:45,332
Move number two, adopt privacy-preserving tools. Start using tools that are designed for privacy,

293
00:21:45,552 --> 00:21:51,712
not designed for data extraction. Switch to Signal. End-to-end encrypted by default,

294
00:21:51,972 --> 00:21:56,972
no metadata collection. Matt O'Dell walked us through why Signal's nonprofit model makes it

295
00:21:56,972 --> 00:22:03,892
trustworthy in ways that corporate messaging can never be. Consider SimpleX for anonymous

296
00:22:03,892 --> 00:22:10,972
messaging. No phone number, no identifier, fully private. When it comes to browsing, use Brave

297
00:22:10,972 --> 00:22:17,992
Browser or Firefox with privacy extensions. Block trackers by default. Use DuckDuckGo or Brave

298
00:22:17,992 --> 00:22:25,092
Search instead of Google. Consider Kagi. No search history, no profiling. Use Tor when you need

299
00:22:25,092 --> 00:22:32,972
maximum privacy. Money. Get a Bitcoin wallet. Learn self-custody. Stephen Pollack explains why this

300
00:22:32,972 --> 00:22:39,472
matters for sovereignty, as did Matt O'Dell. Use cash more often. Every card transaction is logged,

301
00:22:39,752 --> 00:22:46,632
tracked, and tied to your identity. Speaking of identity, use email aliases for every service.

302
00:22:47,072 --> 00:22:53,032
One breach doesn't expose everything. Services like ProtonMail and others make this very easy.

303
00:22:53,832 --> 00:23:01,172
Use password managers, Bitwarden, 1Password, Proton, with end-to-end encrypted cloud services.

304
00:23:01,172 --> 00:23:07,612
The action item, pick one tool from this list this week and switch, just one.

305
00:23:08,152 --> 00:23:09,972
Then next week, add another.

306
00:23:11,272 --> 00:23:16,472
Third, and this is critical, when digital ID systems roll out in your jurisdiction,

307
00:23:16,812 --> 00:23:20,952
and they almost certainly will, resist adoption as long as possible.

308
00:23:21,692 --> 00:23:23,852
Every system depends on adoption rates.

309
00:23:24,292 --> 00:23:29,372
If 90% of people adopt digital IDs immediately, holdouts become marginalized.

310
00:23:29,372 --> 00:23:36,152
If only 50% adopt, the government can't make it truly mandatory without massive backlash.

311
00:23:37,112 --> 00:23:41,592
Your refusal matters, and it buys time for alternatives to develop.

312
00:23:42,292 --> 00:23:43,692
Here's some action items.

313
00:23:44,392 --> 00:23:46,112
Don't be an early adopter.

314
00:23:46,532 --> 00:23:51,432
When your state or country launches digital ID products, don't be a volunteer.

315
00:23:52,332 --> 00:23:54,952
Use analog alternatives wherever possible.

316
00:23:54,952 --> 00:23:57,572
Physical driver's license instead of digital.

317
00:23:57,572 --> 00:24:02,932
paper documents instead of digital wallets, cash instead of CBDCs.

318
00:24:03,532 --> 00:24:18,568
Support businesses that don require digital verification Understand your rights In many jurisdictions digital IDs cannot legally be made mandatory for basic services at least not yet Know the law Push back when

319
00:24:18,568 --> 00:24:24,848
you're pressured. This isn't luddism. This is strategic resistance. Every day you delay adoption

320
00:24:24,848 --> 00:24:31,188
is a day you maintain privacy. Every person who resists makes it harder to normalize

321
00:24:31,188 --> 00:24:39,208
this surveillance infrastructure. Fourth, educate yourself on the technologies that solve problems

322
00:24:39,208 --> 00:24:45,648
without surveillance. Here are some action items. Learn what zero-knowledge proofs are. Understand

323
00:24:45,648 --> 00:24:49,848
that you can prove things without revealing information. It's math, and it breaks the

324
00:24:49,848 --> 00:24:56,828
surveillance model. Understand how Bitcoin works, not as an investment, but as a system. How does

325
00:24:56,828 --> 00:25:03,388
money work without banks? How does trust work without central authorities? Bitcoin is the proof

326
00:25:03,388 --> 00:25:09,208
of concept for all decentralized systems. And beyond proof of concept, it is in production

327
00:25:09,208 --> 00:25:16,108
and has been for 15 years. Explore Noster. It's a protocol for censorship-resistant communication.

328
00:25:16,848 --> 00:25:22,748
See how social media works without data collection. Fran built ZapStore on it. That's how robust it is.

329
00:25:22,748 --> 00:25:24,928
Understand secure enclaves

330
00:25:24,928 --> 00:25:28,008
Mark showed us how computation can happen on your data

331
00:25:28,008 --> 00:25:30,848
Without anyone ever seeing the raw information

332
00:25:30,848 --> 00:25:33,268
Take Maple AI for a trial

333
00:25:33,268 --> 00:25:35,868
You don't need to become a cryptographer

334
00:25:35,868 --> 00:25:38,548
You just need to understand that solutions exist

335
00:25:38,548 --> 00:25:40,808
Because once you know they're possible

336
00:25:40,808 --> 00:25:44,108
You can't be fooled into thinking surveillance is inevitable

337
00:25:44,108 --> 00:25:47,328
Fifth, talk about this

338
00:25:47,328 --> 00:25:49,528
Most people don't know what's happening

339
00:25:49,528 --> 00:25:51,448
Here are the action items

340
00:25:51,448 --> 00:25:52,728
Share this episode

341
00:25:52,728 --> 00:25:57,208
Send it to friends who care about privacy, but don't follow the details.

342
00:25:57,988 --> 00:25:58,968
Have conversations.

343
00:25:59,688 --> 00:26:06,748
When digital IDs get proposed in your area, your jurisdiction, talk to people about what really means.

344
00:26:07,228 --> 00:26:10,208
Not in tinfoil hat terms, in practical terms.

345
00:26:11,048 --> 00:26:12,828
Support privacy-focused projects.

346
00:26:13,448 --> 00:26:14,308
Donate to Signal.

347
00:26:14,668 --> 00:26:15,408
Use Noster.

348
00:26:15,948 --> 00:26:18,168
Buy from companies that respect privacy.

349
00:26:18,888 --> 00:26:20,548
And pressure representatives.

350
00:26:20,548 --> 00:26:23,908
When digital ID legislation comes up, call them.

351
00:26:24,548 --> 00:26:29,488
Open State showed us how FOI requests can expose what governments don't want you to know,

352
00:26:29,848 --> 00:26:31,148
and it makes them uncomfortable.

353
00:26:31,768 --> 00:26:32,528
Use these tools.

354
00:26:33,548 --> 00:26:37,488
The surveillance infrastructure only succeeds if people don't resist.

355
00:26:38,188 --> 00:26:40,128
Your voice matters. Use it.

356
00:26:41,648 --> 00:26:43,428
Now, let's say you do nothing.

357
00:26:43,668 --> 00:26:46,088
You keep using the same surveillance-based tools.

358
00:26:46,428 --> 00:26:48,408
You adopt digital IDs when they're offered.

359
00:26:48,408 --> 00:26:53,608
you trust governments and corporations to, quote, protect your privacy. What happens?

360
00:26:54,588 --> 00:26:59,248
The short term, over the next six to 12 months, more digital ID pilots launch,

361
00:26:59,648 --> 00:27:04,948
more jurisdictions make them optional but encouraged, more companies get hit with privacy

362
00:27:04,948 --> 00:27:12,108
fines, more data breaches expose your information. You notice services requiring digital verification

363
00:27:12,108 --> 00:27:19,868
to access. Over the medium term, the next one to three years, digital IDs become mandatory for an

364
00:27:19,868 --> 00:27:26,288
increasing number of services, banking, health care, social media, travel. Your government now

365
00:27:26,288 --> 00:27:32,228
has a complete profile of your online activity, financial transactions, and your physical

366
00:27:32,228 --> 00:27:38,968
movements. Alternative systems still exist, but they're marginalized, harder to use, socially

367
00:27:38,968 --> 00:27:46,448
stigmatized. Over the long term, the next three to five years, CBDC's launch tied to digital IDs,

368
00:27:47,168 --> 00:27:53,768
every financial transaction is tracked, logged, and subject to government policy. Social credit

369
00:27:53,768 --> 00:28:00,748
systems emerge. Your behavior affects your access to services. The infrastructure is now complete.

370
00:28:01,408 --> 00:28:08,288
Dissent becomes more costly. Privacy becomes virtually impossible. This isn't dystopian

371
00:28:08,288 --> 00:28:15,688
fiction. China already has this. The EU is actively building it. Australia is implementing pieces.

372
00:28:16,408 --> 00:28:24,408
The U.S. is following. Their trajectory is clear. Now, let's say you act. What happens? In the short

373
00:28:24,408 --> 00:28:30,608
term, you reduce your surveillance exposure. Fewer data breaches affect you. Less tracking follows

374
00:28:30,608 --> 00:28:37,948
you. You start using tools that respect privacy. You resist digital ID adoption. You preserve

375
00:28:37,948 --> 00:28:44,288
optionality. In the medium term, you're part of a community using privacy-preserving tools.

376
00:28:44,788 --> 00:28:50,728
You've built resilience. When mandatory digital ID systems are proposed, there's resistance.

377
00:28:51,488 --> 00:28:57,568
Adoption is slower. Mandates are weaker. Privacy-first businesses grow because people like

378
00:28:57,568 --> 00:29:04,588
use support them. Over the long term, alternative systems mature, the technology improves,

379
00:29:05,068 --> 00:29:10,908
more people adopt them. The surveillance infrastructure fails to achieve critical mass.

380
00:29:11,828 --> 00:29:17,648
Too much resistance, too many alternatives. You've maintained your privacy, your freedom,

381
00:29:17,648 --> 00:29:23,068
and your sovereignty. And you've helped build the infrastructure that preserves it for others.

382
00:29:23,708 --> 00:29:25,788
This is the fork in the road.

383
00:29:26,408 --> 00:29:27,508
Which path do you choose?

384
00:29:28,968 --> 00:29:30,828
So, let's bring it back.

385
00:29:31,068 --> 00:29:34,868
September 2025, Disney, Google, Microsoft, Apatow,

386
00:29:35,288 --> 00:29:37,288
billions in fines for corporate surveillance,

387
00:29:37,888 --> 00:29:41,028
16 state privacy laws creating compliance nightmares,

388
00:29:41,588 --> 00:29:43,908
and simultaneously, governments worldwide

389
00:29:43,908 --> 00:29:46,908
pushing digital ID systems as the solution.

390
00:29:47,688 --> 00:29:49,288
You're being offered a false choice,

391
00:29:49,648 --> 00:29:51,588
corporate surveillance or government control.

392
00:29:51,588 --> 00:29:54,928
Mark Zuckerberg or a digital ID database.

393
00:29:55,428 --> 00:29:56,988
But there's a third option.

394
00:29:57,668 --> 00:30:00,408
Systems that don't require you to trust anyone.

395
00:30:01,108 --> 00:30:04,888
Systems built on cryptographic proof, not policy promises.

396
00:30:05,708 --> 00:30:08,768
Systems your guests on this show have been building.

397
00:30:09,588 --> 00:30:11,268
The surveillance economy is breaking.

398
00:30:11,848 --> 00:30:14,128
The question is, what replaces it?

399
00:30:14,508 --> 00:30:16,828
Government-controlled digital identity infrastructure

400
00:30:16,828 --> 00:30:20,608
or decentralized privacy-preserving alternatives?

401
00:30:21,308 --> 00:30:24,808
That decision isn't being made in Congress or by corporations.

402
00:30:25,288 --> 00:30:28,568
It's being made by millions of individual choices.

403
00:30:29,128 --> 00:30:30,928
Your choice right now.

404
00:30:31,668 --> 00:30:33,528
Here's what I want you to do this week.

405
00:30:34,288 --> 00:30:35,988
Delete one surveillance app.

406
00:30:36,328 --> 00:30:38,068
Pick the worst offender, delete it.

407
00:30:38,408 --> 00:30:40,568
Replace it with a privacy-respecting alternative.

408
00:30:41,068 --> 00:30:43,568
Learn about privacy-preserving technology.

409
00:30:44,588 --> 00:30:47,668
Bitcoin, Nostra, secure enclaves, pick one.

410
00:30:48,168 --> 00:30:49,648
Understand how it works.

411
00:30:50,628 --> 00:30:55,968
Have one conversation about digital IDs with someone who doesn't follow this stuff.

412
00:30:56,528 --> 00:30:59,608
Make them aware of what's coming and what's at risk.

413
00:31:00,928 --> 00:31:02,848
Resist one data request.

414
00:31:03,348 --> 00:31:07,088
When a website asks for information it doesn't need, do not give it.

415
00:31:07,928 --> 00:31:12,388
Subscribe to this podcast if you haven't, because we're going to keep covering the alternatives.

416
00:31:13,288 --> 00:31:15,108
September is the breaking point.

417
00:31:15,548 --> 00:31:18,248
Corporate surveillance is collapsing under fines and regulation.

418
00:31:18,248 --> 00:31:23,788
government surveillance is expanding through digital ID mandates and privacy preserving

419
00:31:23,788 --> 00:31:30,668
alternatives exist right now. The only question is, which system will you support with your choices?

420
00:31:31,508 --> 00:31:37,268
This is Trust Revolution. I'm Sean Yeager. The surveillance economy is breaking. Governments are

421
00:31:37,268 --> 00:31:42,268
offering false solutions and the real alternatives, the ones that don't require you to trust anyone,

422
00:31:42,268 --> 00:31:46,168
are being built now by people who understand what's at stake.

423
00:31:46,928 --> 00:31:49,768
Your privacy isn't a gift from corporations or governments.

424
00:31:50,088 --> 00:31:53,628
It's something you build, defend, and claim for yourself.

425
00:31:54,088 --> 00:31:56,608
The tools exist, the alternatives work,

426
00:31:56,828 --> 00:31:59,488
and your choices matter more than you think.

427
00:32:00,208 --> 00:32:02,848
We'll be back next week with another conversation

428
00:32:02,848 --> 00:32:04,748
about building those alternatives.

429
00:32:05,488 --> 00:32:08,548
Until then, protect your privacy like your freedom depends on it,

430
00:32:08,548 --> 00:32:09,668
because it does.

431
00:32:12,268 --> 00:32:14,328
you
