#TechnocracySeries –Episode 6 ᴬⁿᵃˡʸᶻᵉ ʰⁱˢᵗᵒʳʸ ᵗᵒ ᵘⁿᵈᵉʳˢᵗᵃⁿᵈ ᵗʰᵉ ᵖʳᵉˢᵉⁿᵗ ᵃⁿᵈ ᵃⁿᵗⁱᶜⁱᵖᵃᵗᵉ ᵗʰᵉ ᶠᵘᵗᵘʳᵉ FROM CAPITAL TO CALCULATION: THE REPLACEMENT OF THE FINANCIAL ELITE BY THE TECHNOLOGICAL OLIGARCHY This excerpt I am about to show you was published in July 1989 in a magazine by Technocracy Inc. entitled “The Words And Wisdom Of Howard Scott” (Volume I). It contains speeches by the creator of the technocratic movement, in the context of the height of the Great Depression of the 1930s, when capitalism seemed to have collapsed and unemployment was rampant. This movement (Technocracy) sought to replace politicians and economists with engineers and scientists. In his speech, he used medical and psychiatric language (“pathology,” “early dementia”) to delegitimize the humanities and politics, presenting them as viruses that prevent the social “machine” from functioning. It was an attempt to apply the industrial efficiency of factories to the management of an entire continent, eliminating scarcity through technical planning. He declared that politics is “unprecedented” in the technological age, invalidating democratic debate and the negotiation of interests: if everything is an engineering problem, there is only one “correct” solution calculated by experts. The incentive was to shift power from the financial elites (owners of debt) to a new technical caste (owners of energy calculations). The system sought to eliminate market uncertainty. By measuring income in ergs (energy) rather than currency, the technocratic state gains absolute control over production and consumption, transforming citizens into units of energy expenditure within a closed and predictable system. Do you see any similarities with what governments are seeking today? The public debt is enormous, and AI promises "abundant intelligence" to solve this from a technical standpoint. Add to this the efficiency of the crypto industry.
Follow the money trail to understand the destination... and the intention.
Many Bitcoin maximalists are buying Monero. But make no mistake, these Bitcoiners are not seeking individual sovereignty; they are looking for a casino that accepts Monero. They talk big about ethics and privacy because VCs made it trendy, but in the darkness of their home banking, they are the number one fans of fiat money. Their "principles" are as temporary as their stay in XMR: as soon as the price circus reaches its peak, the revolution is over and they run to take refuge in the system they claim to hate. They are maximalists, yes, but of the dollar. Thank you Larry, thank you Michael, thank you Donald for so much!
YOUR PRIVACY IS THEIR CAMOUFLAGE: FOLLOWING THE MONEY BEHIND TOR The Tor Paradox: Why the Pentagon Funds Your Anonymity We live in a WORLD of SIMULATION ᴿᵉᵃˡⁱᵗʸ ⁱˢ ʰⁱᵈᵈᵉⁿ ⁱⁿ ˡᵃʸᵉʳˢ What is Tor? You’ve likely heard of the "Onion Router." It’s the go-to tool for those seeking anonymity: journalists, activists, and anyone looking to dodge the trackers. No, it’s not just another VPN. The technical difference is crucial: a VPN is a direct tunnel to a single company; you’re trusting that company not to log your data. Tor is decentralized: your traffic bounces through three volunteer-run servers (nodes). With a VPN, you trust a brand. With Tor, you trust the network’s architecture. It works through layers (hence the "Onion"): each node only knows where the packet came from and where it’s going next, but none knows the full path. This provides a level of anonymity that no commercial VPN can match by design. This is where I activate the "the money trail" analysis, and things get spicy. Tor wasn’t born in a rebel hacker’s basement. It was designed and developed by the U.S. Naval Research Lab (NRL). Yes, the "anti-establishment" tool came straight from the heart of the military. Follow the money trail. Even today, the Tor Project is an NGO, but the vast majority of its funding still comes from the U.S. Federal Government (via the State Department and defense agencies). Why would Uncle Sam pay for something that prevents him from spying? The answer lies in the logic of the "Anonymity Set." If the U.S. government used a private network for its spies, any trace of that network would be a massive red flag for its enemies. A lone spy on an empty network is a compromised spy. To operate in the shadows, agents need "noise." If Tor is filled with ordinary people, activists, and privacy-conscious users, an intelligence agent's traffic becomes invisible. It blends into the crowd. The conclusion is stark: Your privacy is their camouflage. The state doesn’t fund Tor out of the goodness of its heart; it does so because it needs you to be there so its own movements don’t stand out. You are the forest where they hide. If the government finances a large part of the infrastructure, it does not need to "hack" the network. It is enough for them to statistically observe the entry and exit points that they themselves help to maintain. Key fact: In cases such as Silk Road or Playpen, it was shown that the FBI used Network Investigative Techniques (NITs) to plant malware on users and force them to reveal their location. Does this mean Tor is useless? Not at all. The encryption is solid, and for the average user, it remains a powerful privacy tool. But understanding the incentives is key: you are a user of an infrastructure that serves state interests far larger than your own anonymity. In the information age, sovereignty means understanding who built the house you're hiding in. Absolute privacy is hard to find when the provider of the tool is the same entity with the greatest incentive to watch. Nothing is free; especially anonymity. #SovereignIndividual
Many Bitcoiners are understanding what is happening... Many more will understand because Bitcoin will be totally co-opted by the bankers. image
In the current world order, bankers are the main architects of the global system: analog “democracy.” Well-known figures such as The Rothschild dynasty, J.P. Morgan, the Rockefeller family, Paul Warburg, Larry Fink, Tim Buckley, Jamie Dimon, and Agustín Carstens. In the New World Order, which is being implemented with the 2030 agenda, the main architects of the global system, algorithmic “democracy” (technocracy), are techno-oligarchs such as Elon Musk, Jeff Bezos, Mark Zuckerberg, Larry Page & Sergey Brin, Jensen Huang, Sam Altman, Peter Thiel, Bill Gates, Tim Cook, Larry Ellison, Pony Ma (Ma Huateng): Tencent (WeChat, Riot Games), Zhang Yiming: ByteDance (TikTok, Douyin), Jack Ma: Alibaba Group, Ant Group, Colin Huang: PDD Holdings (Pinduoduo, Temu), Robin Li: Baidu, Ren Zhengfei: Huawei, Lei Jun: Xiaomi, and William Ding: NetEase.
Over a year ago, I wrote about Proof of Humanity (PoH). In the current context of governments seeking to implement digital identity, you will see how this publication makes more sense. In the article, I explored the development of digital identity validation and the role of AI in improving security. I posed a paradox in which #AI becomes a threat: as it gains independence, it may attempt to acquire a “human identity” to achieve the autonomy that humans do not grant it. Here is my article: Proof Of Humanity: A Nightmarish Identity Validation System https://liberlion.medium.com/proof-of-humanity-a-nightmarish-identity-validation-system-67097b20c556 image
THE SYNTHETIC TRAP The internet is mutating from an open and anonymous space to a closed one, with identity and right of admission. From a global agora to an automated theater of psychological warfare. A space contaminated by synthetic noise from bots that are designed to justify the digital identity managed by the technological oligarchy for governments.