shadow.broker 」 When in the course of human events it becomes necessary for one people to dissolve the political bands which have connected them with another and to assume among the powers of the earth, the separate and equal station to which the Laws of Nature and of Nature's God entitle them, a decent respect to the opinions of mankind requires that they should declare the causes which impel them to the separation. Just as the American founders rebelled against kingship and tyranny (Britain and others) qua principles of the perversions of rights of their citizens, or qua profits at their expense, sometimes with both colliding (taxation without representation), a similar campaign must be committed again given our digital existence. The kings and tyrants of digital relata (FAMANG and the intelligence community) have an absolute control over their netizens and perverse even their users capacities to the rights of privacy and security, profiting at their users expense, sometimes with both colliding (profit without consent). It was made illegal for the post office to read your mail but it was not made illegal for Google to read your Gmail. PII mining and psychological profiling as a form of cyber phrenology through dragnet surveillance, what is both a global passive adversary and sometimes a global active adversary, have horrific sequela and have been used exclusively outside the consent and outside the awareness of almost every member of our global community. The state has attained its Leviathan. Advertisement algorithms can predict divorce and suicide three years before they happen based solely on credit card purchases. Leviathan knows when your marriage will end and when you will kill yourself, but we who are the affects of this process do not know, are not told, and are not compensated for providing this information to Leviathan from which Leviathan does directly benefit. Leviathan is allowed to see all information over the wire in totality, allowed to see all person's most sensitive information, obliterating the notion of privacy in modernity. This is one-way, we are never returned the favor. It's a long time coming that everyone else be allowed to see this information as well or that everyone be wholly disconnected. 「 digital congressionNotes from the first congress. Advanced Worm Operations Leveraging is what we call our use of deep system exploits to sublimate the use of network protocols through ransomware-like software that turns an infected computer into an 'absent without leave' node. This does not infringe any rights or reduce any system functionality. Congressional cosigners to these documents: Actrons Akira Cozmic CultState DigDeeper Elros Inter Moxtak nicholatian Odilitime Snerx