The Good Tech Companies - Fight Against Fascism and Tyranny With These Free Software Tools - and Support Them With Kivach

Episode Date: March 13, 2025

This story was originally published on HackerNoon at: https://hackernoon.com/fight-against-fascism-and-tyranny-with-these-free-software-tools-and-support-them-with-kivach. ... We’ll explore here some open-source and free software tools available for anyone to use against fascist and tyrannical governments all around the world. Check more stories related to society at: https://hackernoon.com/c/society. You can also check exclusive content about #tyranny-fascism-and-technology, #open-source-software, #free-software, #free-privacy-software, #kivach, #cryptocurrency-donations, #obyte, #good-company, and more. This story was written by: @obyte. Learn more about this writer by checking @obyte's about page, and for more stories, please visit hackernoon.com. Software can be used to fight back against fascist and tyrannical governments. Free software can protect your identity, your files, your communications, your connections, and more. You’d be able to organize your community to defend yourselves.

Transcript
Discussion (0)
Starting point is 00:00:00 This audio is presented by Hacker Noon, where anyone can learn anything about any technology. Fight against fascism and tyranny with these free software tools, and support them with Kiva, by Obite. Greater than, fascism. A far-right, authoritarian, and ultra-nationalist political ideology greater than in movement, characterized by a dictatorial leader, centralized autocracy, greater than militarism, forcible suppression of opposition, belief in a natural social greater than hierarchy, subordination of individual interests for the perceived good of the greater than nation or race, and strong regimentation of society and the economy. Greater than Wikipedia. Greater than tyranny. Cruel and oppressive government or rule. Refugees fleeing tyranny greater than an oppression, Oxford dictionaries.
Starting point is 00:00:46 At this point in history, we only have to look around to discover the embodiment of these concepts in more than a few places, in all its disgusting splendor. In the middle of it, software, all kinds of software, really, has been used forville, but also for good. We can fight back, with something more than ranting on social media, and it's time to pick our team and resources. Those resources, of course, can include software specially designed to preserve our rights. We'll explore here some open-source and free software tools available for anyone to use against fascist and tyrannical governments all around the world. They work to protect your identity, your files, your communications, your connections, and more, so you can avoid censorship, surveillance, and oppression online. You'd be able to organize your community to defend yourselves and engage
Starting point is 00:01:34 in activism if you wish. In the end, if you find them useful, you can support them with another useful software tool, Kiva. This open platform lets any open source project on GitHub receive decentralized cryptocurrencies for funding, without major setups or requirements. Let's start, Invisible Internet Project, I2P. Originally created by Lance James in 2002, the Invisible Internet Project, I2P, has grown in the hands of a whole team of dedicated open-source developers. Its primary goal is to create an anonymous network layer that enables censorship-resistant, peer-to-peer, P2P, communication.
Starting point is 00:02:13 By encrypting user traffic and routing it through a global network of volunteer-run computers, ITU pentshers that both the sender's and receiver's identities remain concealed, promoting secure and private interactions online. ITU P offers a range of features designed to enhance user privacy. It supports various applications, including anonymous web hosting, known as, EAP sites, email, instant messaging, and file sharing. The network employs end-to-end encryption and utilizes unidirectional tunnels, encrypted pathways, for data transmission, making it challenging for third parties to trace communications.
Starting point is 00:02:48 Additionally, I2P uses a distributed network database based on the Kademli algorithm, eliminating central points of failure and enhancing the network's resilience. Unlike similar projects, like Tor, I2P doesn't have a proper organizational structure to receive donations, but that doesn't mean they don't appreciate support from its community. Indeed, they entirely rely on global volunteers and ERG contributors to fund secondary applications or hire others to work on I2P. You can support their developers on GitHub, directly donating to them via Kiva.
Starting point is 00:03:21 Briar. This is a private messaging application introduced in 2018 by Michael Rogers. It's tailored for activists, journalists, and individuals seeking a secure and dependable communication method. Unlike conventional messaging platforms that depend on central servers, Briar facilitates direct device-to-device synchronization, ensuring that conversations remain confidential and resistant to censorship. One of Briar's standout features is its adaptability in various connectivity scenarios. When internet access is available, it utilizes the Tor network to safeguard users' identities and communications.
Starting point is 00:03:56 In situations where the internet is inaccessible, Briar can synchronize messages via Bluetooth or Wi-Fi, ensuring uninterrupted information flow during crises. All communications are protected with end-to-end encryption, and data is securely stored on users' devices, eliminating reliance on cloud services. The development of this software has been supported by various organizations dedicated to Internet freedom and open source initiatives. Notable contributors include the Small Media Foundation, the Open Internet Tools Project, the Open Technology Fund, the Next Generation Internet Program, and the ISC Project. They also accept donations in cryptocurrency, and
Starting point is 00:04:35 you can send them some coins via Kiva. Securedrop, at some point between 2010 and 2011, Aaron Swartz, a known hacktivist, decided to download a large number of academic papers from the digital library JS Tour using MITS Network, allegedly without permission. He intended to make them freely available but was charged with computer fraud and unauthorized access, even threatened with 35 years in prison for it. He refused a plea bargain, admission of being guilty, for a sentence of six months and took his own life in January 2013. That's the American justice system in action. Before his tragic death, along with Kevin Poulsen and James Dolan, he was Deve Loping Dead Drop,
Starting point is 00:05:16 a free software designed for secure communications between journalists and their most vulnerable sources, whistleblowers. Swartz's legacy was taken over by the Freedom of the Press Foundation, renamed to SecureDrop, and released in October 2013. Now, it's been used by very prominent media, including The Guardian, Forbes, The Washington Post, Associated Press, The New York Times, and Bloomberg. Anyone, everywhere, can use SecureDrop to share confidential, valuable information and evidence with the journalists of any of these newspapers, without fear of being fired, everywhere, can use SecureDrop to share confidential, valuable information and evidence with the journalists of any of these newspapers, without fear of being fired, arrested, or even killed for it. This software uses Tor for anonymity, encrypts submissions, lessens metadata, and ensures
Starting point is 00:05:57 no direct contact between sources and reporters, minimizing surveillance risks and protecting confidentiality. Its team accepts contributions in the form of code and translations and also accepts donations with credit cards and PayPal through the foundation. To send them cryptocurrencies, you can find them on Kiva as Freedom of Press, Securedrop. Interplanetary File System, IPFS IPFS, short for Interplanetary File System, is a decentralized protocol designed to store and share files across a distributed network. It was created by Juan Benet and launched in February 2015.
Starting point is 00:06:33 Unlike traditional web protocols that really uncentralized servers, IPFS uses AP2P system where data is identified by its content rather than its location. This approach makes file storage and retrieval more efficient, resilient, and resistant to failures or censorship. At its core, IPFS operates using content addressing and a distributed hash table, DHT. Each file is assigned a unique cryptographic hash,
Starting point is 00:06:59 ensuring that data remains unchanged and verifiable. When a file is requested, nodes in the network search for its hash rather than a specific server, enabling efficient distribution similar to BitTorrent. Being open source, the project has evolved into numerous implementations and has enabled the creation of independent applications as well. And so far, IPFS has played a key role in bypassing online censorship, including hosting a mirror of
Starting point is 00:07:25 Wikipedia during Turkey's ban and preserving the Tornado Cash website after US sanctions. The ecosystem is supported by protocol labs, which funds core development, while independent teams contribute to alternative implementations. Filecoin, a blockchain-based storage network, also incentive IS's IPFS adoption by rewarding users for hosting data. Beyond them, a wide variety of IPFS implementations and apps can be found on GitHub, and you can support their developers via Kiva.
Starting point is 00:07:55 You'll just need to paste their repositories on the donation website. OpenSnitch OpenSnitch is a firewall application specifically designed for Linux systems, developed as an open-source alternative to macOS's Lil Snitch. It was created around 2017 by Simone Margheriteli, EvilSocket, and is currently maintained by Gustavo Onigas-Goya. Its main purpose is to monitor and control internet access at the application level, allowing users to decide which programs can connect online.
Starting point is 00:08:23 This is particularly useful for detecting software that might be transmitting data without the user's knowledge. The software works by intercepting outgoing connections from installed applications and prompting users to approve or deny them. OpenSnitch offers fine-grained control by letting users create specific rules, such as blocking a single request, an entire domain, or all connections from a particular app. It stores rules in easily editable JSON files and features a graphical interface for real-time monitoring. The firewall also supports SIEM, Security Information and Event Management, tools, making
Starting point is 00:08:58 it suitable for both personal and enterprise security. OpenSnitch can be a powerful tool against government surveillance or spyware. Asset allows users to identify and block unauthorized data transmissions. It offers a layer of protection by ensuring that no application sends data without explicit permission. As free software, it's primarily funded through community donations, which can be made via the project's GitHub page. Users can also contribute by donating crypto via Kiva.
Starting point is 00:09:26 Special mentions, freedom and privacy tools are many, and we've already mentioned several of the min previous episodes of our Kiva series. These open-source, free software projects can also work to fight against fascism and tyranny. Tor anonymizes internet traffic by routing it through multiple servers. Wonex, a privacy-focused OS that routes all traffic through Tor. Signal, a secure messaging app with end-to-end encryption. Graphene OS, a privacy-focused, hardened Android OS. Linux Kodachi, a secure Linux distribution with built-in anonymity tools.
Starting point is 00:10:01 Bertie, a decentralized, encrypted messaging app. Agorakit, a self-hosted collaboration tool for activists, communications and events. Cubes OS. A security-focused OS that isolates apps in virtual machines. WireGuard, a fast, modern virtual privacy network, VPN, protocol. Cryptomator, encrypts cloud storage files for privacy. All of them, of course, are available on GitHub and Kiva as well, if you want to support their developers.
Starting point is 00:10:32 Support Freedom with Kiva Kiva makes crypto donations to open source projects easy. Just set up an obit wallet to manage tokens like USDC, ETH, BNB, or GBYTE. Then find the GitHub project you want to support, go to the platform, paste the repo, and donate. The funds stay secure in an Obite's autonomous agent, aw, until the recipient claims them with their own Obite wallet, which they'll need only after receiving the donation. You'll have to tell them about it.
Starting point is 00:11:00 This open platform empowers developers and upholds freedom. By channeling contributions to innovative projects, Kiva helps counter censorship, fascism, and tyranny. Every donation builds a stronger, democratic digital space, supporting resistance against oppression while fostering an environment of open collaboration and positive change. And remember that the whole obite ecosystem is also there as another tool for freedom, fully decentralized and available for everyone. And check out some previous lists to discover other useful software tools 5 open source projects you can donate to via kiva
Starting point is 00:11:34 Episode 4 Privacy tools 5 open source tools you can donate to via kiva Episode 6 Decentralized services 5 cybersecurity tools to use for free and donate to via Kiva. Episode 6. Decentralized Services. 5 Cybersecurity tools to use for free and donate to via Kiva. 5 Open Source software for global teams to donate via Kiva. 5 Open Source and free operating systems to donate via Kiva.
Starting point is 00:11:56 Ditch the phone line and try these 5 free and open source platforms for voice calls instead. Featured Vector image by FreePic Thank you for listening to this Hacker Noon story, read by Artificial Intelligence. Visit hackernoon.com to read, write, learn and publish.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.