Software vendors have locked users into a consumption model for decades, distributing pre-compiled binaries that cannot be modified, forcing acceptance of unwanted features, privacy invasions, and inefficiencies. This artificial scarcity ends when artificial intelligence makes source-based installation accessible to everyone. The convergence of AI coding assistants with source-based package managers like Gentoo's Portage and BSD ports creates a new model where users shape software to their exact needs through natural language, while AI agents handle the complexity of compilation, optimization, and patch maintenance.
View article →
Max
max@towardsliberty.com
npub1klkk...x3vt
Praxeologist ~ Cryptoanarchist ~ Cypherpunk
Murray Rothbard demonstrated that every government intervention reduces to exactly three forms: commanding your isolated action, compelling exchange with the state, or overriding your voluntary exchanges with others. His framework strips away the complexity of interventionist policy to reveal the hegemonic aggression beneath. Understanding this typology is essential for anyone who wishes to see through the state's infinite variety of justifications to its limited repertoire of coercion.
View article →
The productive class has always lived in two worlds. There is the official economy of permissions and taxes, where value flows upward to those who produce nothing, and there is the real economy of voluntary exchange, where those who create value find each other despite every obstacle. When the official system spits you out, it does you the inadvertent favor of revealing which economy actually sustains human flourishing.
View article →
My recent article on how holding Bitcoin is not a sign of low time preference ruffled some feathers. @Engineer wrote a fantastic article voicing the common critique.
View article →
I still think that this critique falls short. So here is a response that hopefully helps clarify some misconceptions. I'm curious about the next round of feedback, so let me know what you think!
View article →
My recent article on how holding Bitcoin is not a sign of low time preference ruffled some feathers. @Engineer wrote a fantastic article voicing the common critique.
View article →
I still think that this critique falls short. So here is a response that hopefully helps clarify some misconceptions. I'm curious about the next round of feedback, so let me know what you think!
View quoted note →
The promise of exit has always haunted those who would rule over others. From the German forest tribes who frustrated Roman legions to the digital nomads who slip between jurisdictions, humans have sought spaces where voluntary cooperation replaces coercive hierarchy.
These temporary autonomous zones arise from a simple economic calculation: when the costs of control exceed the benefits of extraction, freedom becomes possible. The state retreats because of the cold logic of diminishing returns, and in that retreat, human creativity flourishes.
View article →
We live in a curious age. Never before have so many people enjoyed such material abundance while simultaneously proclaiming their contempt for the very mechanism that makes this abundance possible. They drive automobiles purchased with money to universities funded by money where they learn from professors paid with money that money is the source of all human suffering. The contradiction is so glaring that it blinds them to its implications.
View article →
The cypherpunks wrote code, but code alone cannot adjudicate disputes between parties with different values. The missing infrastructure is legal, and the principles that compose it are older than any nation-state.
View article →
Google Project Zero just dropped a full 0-click exploit chain for Pixel 9 targeting CVE-2025-54957 in Dolby's audio decoder. Android's AI transcription features auto-decode incoming audio, so attackers just need to send you a malicious RCS message.
#GrapheneOS users aren't immune to the initial bug since it's in Dolby's proprietary blob with its own internal allocator, but hardened_malloc and improved mediacodec sandboxing make privilege escalation significantly harder. Patch to January 2026 security level now!
@Final any thoughts on this?
A 0-click exploit chain for the Pixel 9 Part 1: Decoding Dolby - Project Zero
Over the past few years, several AI-powered features have been added to mobile phones that allow users to better search and understand their messag...
The historical record proves that competent intelligence services will infiltrate any movement they consider threatening. But decades of documented cases reveal that detection-focused security culture consistently fails while breeding the very paranoia the state wants to create.
The cypherpunk solution applies here too: design systems where the adversary's presence cannot achieve its goals.
View article →
Living outside the state means living outside its protection racket. How do communities of individualists defend themselves without recreating the very structures they escaped?
The answer lies in deterrence over firepower, distributed capability over centralized protection, and vigilance toward those who claim to guard you as much as toward external threats.
View article →
Agent context files and skills designed for security audits of your software.

GitHub
GitHub - trailofbits/skills: Trail of Bits Claude Code skills for security research, vulnerability detection, and audit workflows
Trail of Bits Claude Code skills for security research, vulnerability detection, and audit workflows - trailofbits/skills