Souvereign on Digital Sovereignty

Sovereignty is about being your own leader, thinking for yourself, taking responsibility for your own navigation and stopping your dependency on external agency that was chosen out of ‘ease’ for not ‘having to deal with’ or the notion that it was ‘free’ and so-called ‘so user friendly!’.

Humanity at large has grossly outsourced and abdicated its sovereign ability to navigate Life consciously and be the masters of our own individual and collective manifestations consciously. It all sounded good at the start (advertisements & propaganda) and for most we were simply born into an entropic world based on the false notions of lack and scarcity, coupled with the false notion of the “need” for competition, that through years of deducation, has shaped many peoples perceptions and ways of navigating in the world of Man as we know it.

The time of a great bifocation and compressing expressed in the effects of this abdication is becoming prevalent all around the world as the plandemic theater drives many so called bureaucratic government systems to express draconian overrule like we have never seen before. Censorship galore. The big tech companies are very clearly part of this extremely sick and diseased control orientated mindvirus. But it can only play into our weakness if it is still there from long ago, all the way back to the womb…

AWAKENING FROM THE DREAMSPELL

I could give you a simple list on what services to start using that are respecting you as a human being, or have been developed by humans to assist others in retaining and protecting your privacy from (by now) radically invasive online mass data harvesting technologies that are only deployed to increase profits with no foreseeable end other than the transhumanism agenda in full force activated and deployed.

Reclaiming self sovereignty, however, goes well beyond becoming aware of the unconscious/ unexamined dependency on third parties, or the ‘stop asking permission’ mentalities, that each can arrest in our own minds as it stretches itself into every aspect of our lives where we engage with others, agencies, or so-called external authorities.

Since you are part of the Reclaim Your Lives Freedom Family I’d like you to ask yourself: is (for instance) your constellation with your online email service provider a syntropic/symbiotic/ a natural healthy energetic exchange that is mutually beneficial?  And is it, moreover, respectful of your human sovereignty, your natural right to privacy and does it vow to transparency and your private data protection?

Unless a company, like Protonmail, explicitly expresses their focus and commitment on your privacy protection and data security you can rest assured that ALL your user data can and will be sold to third party interlopers. The full reality is that it is up to you if you want to support the Corporate Giants and all the intrusive technologies they have developed or support platforms and online services that have your best, self sovereignty, interest truly at the core of their business orientations.

When you understand Trauma Based Mind Control and Mk-Ultra Programming, also simply known as socially engineered believe systems, you will know that it is not necessarily easy to make ‘comfort zone changes’. Again. Do you want to be and feel more sovereign and in charge or do you want others to that for you?

I have written my own personal experience of my process of reclaiming my sovereign space in the digital world and have made use of all the ‘Big Brother is watching you’ triggers to feel totally un-contractable and free. This has online process has been an extension of the ‘Re-enabling my Nature’ process around which I currently share weekly through www.bravenewlife.net where you can get the access link for our private zoom meetings where digital sovereignty, syntropy, new earth based Human Ecology and so much more is explored openly and thouroughly. If you want to read my sharing on Digital Sovereignty and how the absence of it is intimately linked with early childhood trauma you can access a private link for that here: https://souvereignsharing.net/souvereign-on-digital-sovereignty/

PRACTICAL NAVIGATION BASED ON EXPANDED AWARENESS

Enhancing your digital sovereignty is simply practical navigation and is part of waking up from the dreamspell of compliance, comfortability and the (unconsciously cultured) dis-empowered state of relating to the clarity of OUR OWN will-ful choices and desires in what we actually want to support, enhance and see thrive in this digital age.

The subject is deeper explored during our Community Conversations  light can be shown on the unconsciously participated in (cultprogrammed) programs of belief that are often based on fear the ‘stepping out of line’, being ‘different’. Well since when are we each not unique?!

Sovereignty is about being your own leader, thinking for yourself, taking responsibility for your own navigation and stopping your dependency on external agency that was chosen out of ‘ease’ for not ‘having to deal with’ or the notion that it was ‘free’ and so-called ‘so user friendly!’.

Unless a company, like Protonmail, explicitly expresses their focus and commitment on your privacy protection and data security you can rest assured that ALL your user data can and will be sold to third party interlopers. The full reality is that it is up to you if you want to support the Corporate Giants and all the intrusive technologies they have developed or support platforms and online services that have your best, self sovereignty, interest truly at the core of their business orientations.

The outcome of the dystopian transhumanism fantasy is really only up to us, humans, living men and women of the living soil, so we encourage you to explore this subject further. Please watch: Shoshana Zuboff on Surveillance Capitalism a VPRO Documentary .You can ask for a detailed article and report on digital sovereignty by emailing info@reclaimyourlives.com with the subject ‘Digital Sovereignty’



Below are some resources. You may want to research each subject for yourself to see what works for you. If you find something should be added please email us directly at info@reclaimyourlives.com:

First off stop using the Big Tech company services like Google products.

Privacy Analyzer

SURVEILLANCE

SELF-DEFENSE

TIPS, TOOLS AND HOW-TOS FOR SAFER ONLINE COMMUNICATIONS

https://ssd.eff.org/

https://privacy.net/guides/

Secure Messaging and Email

If you want to know how to encrypt text messages, this is the section for you. We’ll be running through the most secure messaging apps for your phone and desktop. While they’re different, both use the same basic protection concepts, so make sure to read our guide to email security to get up to speed.

Obviously, email security at rest and in transit are two factors we looked at. In addition, we looked at the commitments that the email provider makes in its privacy policy and other documents. The first two factors are technical in nature and any email service can offer those if they choose. The purpose of digging through the privacy policies, terms of service, and other documents is to try and characterize a provider’s behavior. Do they read your email? Do they share it with others?

Search Engines: DuckDuckGo

DuckDuckGo is a privacy-focused search engine and since last two years has witnessed a whopping 600% growth, especially after the NSA leaks. DuckDuckGo goes by catchphrase of “the search engine that doesn’t track you.” https://duckduckgo.com/ 

VPNs

A virtual private network secures your internet connection with military-grade encryption and other VPN security measures, protecting you from internet service provider or government snooping. The best VPN providers come with a no-logging policy, too, meaning that your traffic is untraceable. Undoubtedly, this is the first line of defense in protecting your online privacy.

https://windscribe.com/?affid=l1wz75r9

Password Managers

Password managers are the antithesis of VPNs. While they also increase your privacy and security online, there is a sea of free options that are excellent. In most cases, you’ll be restricted in the number of entries, but the low price of the best password managers usually means upgrading can be justified.

Unlike the previous section, some of the best options are free.

https://www.cloudwards.net/goto/26051/www.avg.com

Secure Messaging and Email

If you want to know how to encrypt text messages, this is the section for you. We’ll be running through the most secure messaging apps for your phone and desktop. While they’re different, both use the same basic protection concepts, so make sure to read our guide to email security to get up to speed.

Obviously, email security at rest and in transit are two factors we looked at. In addition, we looked at the commitments that the email provider makes in its privacy policy and other documents. The first two factors are technical in nature and any email service can offer those if they choose. The purpose of digging through the privacy policies, terms of service, and other documents is to try and characterize a provider’s behavior. Do they read your email? Do they share it with others?

ProtonMail is a quite popular Swiss-based email service which follows an ad-free model to protect your privacy. It lets you specify an expiration time for an email to self-destruct itself. In addition to all the security features, it is open source in nature. So, you can review the open-source encryption libraries or other stuff to be sure.

Signal

Like the rest of the apps on this list, Signal is available for Android, iOS,  Windows, Mac and Debian-based Linux systems. There’s also a Chrome extension. Since it’s open-source, anyone can look at its source code, meaning security experts can analyze it for vulnerabilities. It’s the best choice for privacy, according to journalists and other experts, including Edward Snowden.

Web Browsers

use Dissenter https://dissenter.com/

TOR

The Onion Router, more famously known as TOR, is by far one of the best ways to protect your online privacy. TOR is a free software that directs the Internet traffic through more than 6,000 relays worldwide. TOR conceals your identity and encrypts your query, thus, giving you safe passage inside the world wide web.https://www.torproject.org/ 

TOR saves you from the direct cyber attack. You will be amazed to see the intensity of cyber attacks across the globe in the Norse Map taking place right now.

Published by Souvereign

Free, self sovereign human Life expressing and sharing natural comprehensions around human Nature and how Life Functions in all its aspects, expressions and forms by simply questioning the function.

One thought on “Souvereign on Digital Sovereignty

%d bloggers like this: