The Sovereign Rerouter

Rerouter? The Rerouter service is a physical shipping service that acts as a privacy preserving package routing service. The process: You decide on the item/vendor you want to order and place the order with the Sovereign Stack team. ( ) The SovStack team orders the item for you. None of your information is used… Continue reading The Sovereign Rerouter

Building Your Sovereign Money Network

How do you first become sovereign without having control of your money? How do you become ungovernable by relenting power over your money to the state? What do you do should you be banned from using the banking system? If you decide to opt out of the banking system, What options are available to you?… Continue reading Building Your Sovereign Money Network

How to Make Your Food Supply Chain Anti-Fragile

TL:DR There is a manufactured food crisis taking place across the globe where costs are rising and products hard to come by. Find local farmers and ranchers near you to buy food directly from them (resources at the bottom).Build a strong network of like-minded people where you can help each other get a variety of… Continue reading How to Make Your Food Supply Chain Anti-Fragile

How to Privately Buy a Private Phone (A Primer)

​Before diving in, check out the previous post about the privacy issues of mobile devices. This post will address specific strategies around obtaining private mobile phones and plans. TL;DR Use cash for all transactions.Obtain a factory unlocked mobile phone from retail store (bonus for face mask purchase).Put phone in Faraday bag when it's not in… Continue reading How to Privately Buy a Private Phone (A Primer)

Why Privately Purchased Phones Benefit You

By now, you know your phone is a live tracking device. To what extent though? Both the GPS and the internal antenna expose your physical location. It's best to assume your mobile phone carrier and manufacturer can access this information. And if they can, you better assume malicious actors can as well. Ok so your… Continue reading Why Privately Purchased Phones Benefit You

Let’s Talk About Decentralized Messaging Platforms

First, why encrypted apps? You shouldn't have to worry about middlemen accessing your personal conversations. So we look for apps that are end-to-end encrypted and are zero-knowledge based services. There are a bunch of different encrypted messaging applications that offer good security. Signal is now a well-known end-to-end encrypted messenger. You can have fully encrypted… Continue reading Let’s Talk About Decentralized Messaging Platforms

How to Think About Private Mail Drops

TL:DR Making purchases online comes with privacy implications.Here's how to avoid having a profile built on you based on your purchase and shipping data.Set up a PO BOX/UPS box with an alias name/company.Use private Bitcoin or Monero to order from online retailer sto alias name/company. You need to consider the privacy implications when buying things… Continue reading How to Think About Private Mail Drops

Avoid Databases and Centralized Systems

TL;DR Avoid inputting data about yourself where ever possible. Look for other solutions. It's not as convenient as we've grown accustomed to, but with a little search you'll find tools like: and Or visit our Privacy Resources page where we've done some of the leg work. Databases pose massive risks to your privacy.… Continue reading Avoid Databases and Centralized Systems

Financial Obsolescence

A new financial reporting requirement has been introduced alongside the hotly debated incoming infrastructure bill. The reporting requirements allows the government further insight into any bank accounts with cashflows of a minimium $600. You can assume "structuring" also plays a functionary role here. Assuming here, $600 is not the lower bound. Financial surveillance is certainly one of… Continue reading Financial Obsolescence