Welcome to 10 Steps to Escape the Big Tech Digital Prison

(currently being built around us)

Walkawayinbabysteps

Introduction

Walk Away in Baby Steps

Baby Steps = Digital Privacy broken down
into small easy to understand and follow lessons guiding you towards Digital Freedom

Baby Steps

G’day, I’m The Virtual Webmaster and and I have been around IT and emerging technologies for 45 years. I have worked for several Corporations, and both Cybersecurity and Technical Support have always been a critical part of everything I have done.

I grew up in a world without computers. As a child, I remember watching cartoons like the Jetsons, which portrayed a futuristic, high tech utopian world with flying cars, robots with artificial intelligence, video calls, smart homes, and instant food machines.

It inspired me to dream of an exciting future where technology would solve many of the world’s problems and improve our lives.

My childhood dream has fast been turning into a nightmare.

Over the past decade, I have become increasingly alarmed at the takeover of IT and the Internet by Big Tech. I have watched as Big Tech has crept into almost every aspect of our digital lives.

Instead of solving problems and improving our lives, Big Tech has made the internet a divisive place, full of echo chambers created by addictive algorithms designed to maximise engagement.

Increasingly, there is one official narrative, and any other view is labeled misinformation, AKA wrong-think.

A growing number of people are waking up concerned about the increased censorship and the erosion of online privacy.

The problem is most people don’t know where to start.

This is not because there is a lack of good alternatives or information on how to protect your online privacy. There is way too much information out there already, but most people have no way to filter the good from the bad and determine what is suitable for their needs.

Following the wrong or incomplete advice can be more dangerous than doing nothing if you are lulled into believing you are secure and private when you are not.

For most people, it’s all been just way too hard!

I can clearly see the walls of a Big Tech digital prison being built around us all in real time.

I knew I had to do something to help people find better alternatives and regain their online privacy. I thought about making my own how-to type online guides, but I knew that at the end of the day, I would be reinventing the wheel, and just adding to that information overload.

I realised what was missing, a simple framework and methodology to follow, or to put it in simple English;

A way for people to know how to navigate to the right information, find alternatives best suited to their needs, and then have a process to follow to safely implement them.

I have created 10 Steps to Escape the Big Tech Digital Prison to provide that framework and methodologies that you can use to create your escape plan by taking control of your Digital Life.

A DIFFERENT APPROACH:

The guide is different from other guides on digital security and privacy.

Most only focus on limited aspects of cybersecurity and often take you step-by-step through a process of changing settings or installing software that you don’t really understand.

Blindly following some general recommendations and implementing a few measures that might not be appropriate to your needs will most likely leave huge holes in your security.

The biggest danger with this approach is being lulled into a false sense of security where people might engage in risky online activity believing they are fully protected or even anonymous.

The problem is most people do not even know what their needs are or what are the real threats.

The Good News and the Bad News

First the bad news:

Nothing is going back to the way it was before

We’re not trying to boycott Big Tech or reform it, nor are we aiming to regain control over current platforms. The reality is, that existing Big Tech platforms are beyond reform because they’re already obsolete. They offer nothing needed, as everything they provide can be replaced with better, more ethical alternatives. Let’s walk away and build something new.

There is No magic software that is going to do this for you

There is no magic software that will do everything for you. The 10-Steps is not going to simply recommend specific security software and configurations so you can continue doing what you do now. The 10-Step approach is not focused on particular tools or technologies, as these change constantly. It does not promote any commercial products or services but instead prioritizes free and open-source solutions.

No one is coming to save us

Especially not politicians who will be co-wardens of the digital prison.

    • These people (insert image) are not not fighting for your Digital Freedom!
    • The Bad News – we are on our own

NO ONE IS GOING TO DO THIS FOR US

Now for the Good news:

We Win this war and gain digital freedom simply by taking responsibility for, and control over our digital lives.

The good news is much easier to do than most people believe.

YOU HAVE POWER and the power is literary at your fingertips.

It’s the choices you make.

The applications and services you use

It’s the information you share

I will introduce you to a secret weapon, a powerful yet little-known method to help you do this and achieve a high level of privacy, without having to lock down your accounts or change lots of settings.

This includes learning how to isolate Big Tech and Big Brother from the rest of your digital life.

This method also provides the absolute best defence against identity theft and many other cybersecurity threats.


BABY STEPS

Baby steps are about breaking down larger steps into smaller steps enabling continuous small incremental improvements.

This escape plan is designed to give you control over your digital life – one baby step at a time. By focusing on specific aspects whether it’s an online activity, a piece of software, or a service, you will continue to make small incremental improvements with minimal disruption to your digital routine.

SELF PACED

You are in full control and proceed at a pace that you are comfortable with.

THIS ESCAPE PLAN IS FOR EVERYONE!

This escape plan is for everyone, whether you’re a tech newcomer or net savvy user. Everyone can make progress, and every step counts.

ONE SIZE DOES NOT FIT ALL 

Everyone’s Escape plan will be unique based on their circumstances, resources, skills, concerns, priorities and level of paranoia, so you’ll build an escape plan that’s right for you.

START WHERE YOU ARE WITH WHAT YOU HAVE

You don’t need to buy new devices or software to start your journey to digital freedom. In fact, if you’re considering new tech, hold off until you complete the 10 Steps – you’ll be better informed about what aligns with your privacy and security needs.

NO FEAR-MONGERING

You’re here because you already have concerns about Big Tech’s influence and intrusion into our digital lives.

We are not here to scare you with all the nefarious stuff Big Tech is up to. There will be some stuff we will need to inform you about but we will keep the fear factor to a minimum.

Instead, we’ll focus on solutions in the form of practical steps you can take but understand that whatever concerns you have about the Big Tech Digital Prison, the reality could be much worse if you allow yourself to be trapped within it.

EVERGREEN SKILL & KNOWLEDGE

The digital landscape is always changing, and new privacy threats arise regularly. This course gives you a solid framework and a repeatable method, covering:

  • Core principles of digital privacy and security
  • How to identify the best alternatives to Big Tech products and services for your needs
  • A step-by-step process for safely implementing those changes
  • Reliable sources for up-to-date information

BASED ON 12 PRINCIPLES OF DIGITAL FREEDOM

The Digital Freedom Alliance have developed 12 Principles of Digital Freedom that are used to evaluate technologies.  This training material is based on those principles. 

The 12 Principles of Digital Freedom offer a practical foundation for achieving digital privacy and autonomy. This training follows these principles closely, equipping participants with clear steps to claim control of their digital lives.

  1. Digital Autonomy
    This principle advocates for a decentralized internet where no single entity can control digital spaces, fostering an open, balanced environment for diverse expression. The training emphasizes tools and strategies to build and use digital ecosystems outside Big Tech’s monopolistic grip, enabling participants to cultivate their own digital freedom.
  2. Digital Self-governance
    With a focus on individual and community self-governance, this principle supports digital spaces where users set their own rules. Training modules encourage participants to explore and establish virtual communities where they can collectively determine standards, helping create a vibrant, self-regulated online landscape.
  3. Private Digital Spaces
    Supporting the right to create and control one’s own digital spaces, the training guides participants on how to set up secure, private online environments aligned with their personal values. This respects both individual autonomy and freedom of expression within these spaces.
  4. Freedom of Expression
    Upholding the freedom to express ideas online, this principle promotes finding or creating platforms that support personal expression while respecting others’ private spaces. Training steps focus on providing practical alternatives to mainstream platforms that allow individuals to freely share opinions without imposing on others.
  5. Digital Transparency
    Digital transparency is essential, especially with open-source technologies that can be independently reviewed for alignment with privacy standards. The training promotes the use of open-source software, enabling participants to trust and, when possible, verify the technologies they use.
  6. Access to Information
    This principle underscores the unrestricted right to access online information, balanced by the individual’s control over what they see. Training helps users bypass unnecessary censorship and understand how to curate their digital experience while protecting access to unbiased information.
  7. Right to Anonymity
    Anonymity online safeguards privacy and expression. Training modules emphasize methods for using the internet without revealing personal identity, teaching participants how to navigate online spaces securely without fear of surveillance or retaliation.
  8. Control Over Personal Data
    Control over personal data is central to digital freedom. Training covers how to manage, access, and secure one’s digital footprint, empowering participants to make informed decisions about their personal information and protect it from unauthorized use.
  9. Open Standards & Interoperability
    Supporting open standards allows individuals to move freely across platforms without vendor lock-in. The training introduces platforms and tools based on open standards, ensuring users maintain control and flexibility over their data.
  10. Digital Security & Safety
    Security is foundational to privacy and freedom. Training modules provide practical security skills, ensuring participants can safeguard their data and digital activities while engaging in private and secure online experiences.
  11. Decentralized Ecosystems
    Decentralized systems offer freedom from traditional gatekeepers, allowing for innovation and privacy in digital transactions. This training encourages participation in decentralized ecosystems, such as peer-to-peer networks, fostering autonomy and innovation.
  12. Universal Right to Digital Freedom
    Access to digital freedom technologies is a right, not a privilege. The training strives to make this knowledge accessible to all, regardless of skill level, encouraging participants to share and support the spread of digital freedom tools within their communities.

This training is structured to empower individuals, giving them the tools to make choices that support their personal digital freedom. By fostering self-reliance and practical skills, participants can navigate, interact, and thrive in digital spaces beyond the reach of Big Tech’s centralized controls.

BIG TECH CORPORATE TAKEOVER

Corporate takeover of the Internet

The Big Tech takeover of the internet mirrors the gradual takeover of our local economies by corporate chains, edging out independent businesses for years until few are left.

How did we get here?

Free Cheese

Big Tech Free cheese
The Big Tech cheese was not free

We were drawn in by promises of cheaper prices, more choice, and greater convenience. We told ourselves this shift was inevitable, a part of progress.

But what did we really gain?

In reality, local communities became poorer, and corporations grew richer. Lockdowns and recent events dealt a final blow to many surviving small businesses.

The Digital Takeover

I’ve observed this same corporate takeover process happening online for years. And, just as with our local businesses, the corporate grip on the internet tightened dramatically in the past few years. We saw increasing censorship, shadow banning, and the silencing of “wrong think.”

NOT CONETNT WANT IT ALL

But there’s more at stake than many realize. The looming threat isn’t just censorship – it’s an internet where everything you see and do is controlled by AI. An internet where “misinformation” simply won’t exist because alternative perspectives will be algorithmically erased. It could be a world where, quite literally, we “own nothing, not even our own thoughts, and are expected to be happy about it.”

This isn’t a world I wanted to see, so I began creating this escape plan to help others—and built “Walk Away from Big Tech” as a resource. Back then, it felt like we had time. Today, I’m not so sure; a name like “Run Away from Big Tech” might be more fitting because their digital prison is much closer than many realize.

Zero Trust Internet by 2027

A warning: the U.S. Department of Defense has announced the implementation of a Zero Trust Internet by 2027. After this date, a government-issued global digital ID will be required to access the internet. Combine this with the upcoming rollout of Central Bank Digital Currencies (CBDCs), “smart” 15-minute cities, and social and carbon credit scoring, and we can see how this digital prison could take shape quickly.

No More Exits

Right now, the path leads directly into a Big Tech digital prison – but we still have time to choose another route.

The urgency to escape this digital prison has never been greater but

Don’t Panic!

We still have time – and, more importantly, we have a plan.

WHO IS BUILDING THE DIGITAL PRISON?

10 Step plan to escape the Big Tech Digital Prison

In this training, we frame Big Tech as a powerful corporate force shaping the digital world, driven by Big Money in a corporate takeover of the internet.

While theories about deeper motives abound, this course remains neutral and focused on practical solutions. Instead of delving into conspiracy theories, we focus on the concrete, observable impact of Big Tech and its backers on our digital freedoms.

A clear understanding of Big Tech is essential for anyone seeking to escape its digital prison. Detailed definitions and further resources are available on the Digital Freedom Alliance website for reference.

Big Tech’s Influence: Understanding the Network

Big Tech consists of five dominant companies that have a massive impact on nearly every aspect of digital life. With vast resources and an interconnected network, they exert control across industries and geographies, striving to create a tightly regulated digital ecosystem, often with “Big Brother” as a co-warden. This “digital prison” is built around the idea that access to information, services, and social platforms is increasingly governed by algorithms and possibly future social credit scoring systems based on compliance.

Key Aspects of Big Tech’s Control

  • Financial Power: These companies hold vast market capital and wield substantial financial influence.
  • Global Presence: Operating worldwide, they affect the lives of billions daily.
  • Technological Control: They act as gatekeepers for emerging technologies, steering industry trends and setting standards.
  • Media and Communication Influence: They control the flow of information and public discourse, shaping how we communicate and consume media.

The Five Big Tech Giants

  1. Amazon: Known for its dominance in online shopping, cloud storage, artificial intelligence, and streaming services.
  2. Apple: Famed for iPhones, iPads, Macs, and a suite of software and digital services.
  3. Meta (Facebook): Dominates social media with Facebook and Instagram and leads in exploring virtual reality.
  4. Google (Alphabet): Leads in internet search, online advertising, cloud services, and an array of other tech fields.
  5. Microsoft: Integral to both business and personal tech with its software, cloud services, and hardware products.

The Big Tech Umbrella: A Network Beyond the Giants

Big Tech’s influence extends far beyond these five core companies, creating a vast “Big Tech Umbrella” that includes:

  • Big Tech Central Companies: The five primary corporations at the heart of Big Tech.
  • Big Tech Subsidiaries: Smaller companies directly owned or controlled by the Big Tech giants.
  • Big Tech Strategic Partnerships: Collaborations with other companies to develop new products, services, or technologies.
  • Big Tech Dependencies: Many smaller companies rely on Big Tech for platforms and services, including operating systems, cloud infrastructure, online advertising, and tools that are deeply embedded in the digital ecosystem.

Escaping the Digital Prison

As Big Tech’s reach grows, so does the need for alternative solutions that promote privacy, autonomy, and digital freedom. The 10 Steps training will guide you through the practical actions you can take to regain control over your digital life.

Digital Freedom Tube – DYOR

DIGITAL FREEDOM TUBE
(follow the white rabbit)

The following results have been automatically generated for you from the DIGITAL FREEDOM TUBE based on terms matching the major topics discussed in this part.

No posts

No posts

Content
(Course Notes)

Course PDF – Download
redpillorbluepill-c
Do you want to escape?
RED PILL BLUE PILL

Are you ready to take your first step towards DIGITAL FREEDOM?

IT’S TIME TO CHOOSE!

Hint – Select the Red Pill if you want to escape

COMPLETED: Step 1 – Part 2

Version 2.0 – December 2023

Dedicated to my brother “Max” who gave me my start in IT

jmb-1937-2021

1937 – 2021