Skip to Content

KB-Big-Tech Separation Protocol (BTSP)

This system is built upon Frappe Framework’s ERPNext, Nextcloud and Baserow for information control. For communications, Zulip, SIP and XMPP are used. The result is a high functioning communications system both in and out of band. If something goes wrong, there is still a way to communicate amongst the team.

01. IDENTITY

There are several underlying internet software and infrastructure systems that are created to know your identity and then follow you around. We have practices, methods and tools to eliminate and mitigate this effect.

02. AUTHENTICATION

There are multiple ways to authenticate into the various systems we use. This section lays out the options and how to keep them organized.

03. BROWSERS

Most of the tracking that happens on non-mobile devices is via the browser. We will show you how this happens and how to stop it.

04. PHONE

By far the greatest threat any of us have is our phones. They are a wonderful spy contraption, with amazing vectors for your exploitation. One of the effects we have learned about doing this work, is that the resultant phone is faster and less complex after putting the practices in place.

05. WORKSTATION

Most all of us use laptops, or even some, may use a desktop workstation. Like the mobile devices, these require methods of use that keep us from being exploited, targeted and made less efficient.

06. SERVER

Some of the options require a server to act between multiple devices. This can be as simple as an old laptop left powered up, all the way to high-availability clusters.

07. NETWORK

The network you setup at your office, home and worksite requires some consideration to keep you private and functional.

08. COMMUNICATIONS

The most convenient things are often the most harmful. This is true with mobile phone and texting. It is best to get outside the SMS and iMessage world and into one you can control and keep private.

09. CONFIGURATIONS

How various devices, software, networks and what-nots are configured determines how well things will work and if we leave unintended holes. While this is not a very exciting area, and may seem too miscellaneous, it is a very important part of making and keeping things right. After getting things setup, there must be a practice and place to store those configurations as managed objects for later use.

10. APPLICATIONS

The software applications is where all the work is done. It is then important which ones are selected, learned and then managed.

11. FILE-SYSTEMS & MEDIA

You need a place for files, photos, video, etc. Concerns such as space, encryption, access, syncing, speed and sharing must be expertly dealt with.

12. MEDIA

How you use media is important because it is where you meet the rest of the world. Some people seek to take from you. Let’s block them before they can even get in.

13. CYBERSECURITY

Any computing device and the network it rides on opens massive amounts of places where you can be harmed. Let’s reveal what those are and what realistically can be done.

14. PRIVACY

All of this is for you privacy. This is very complicated. That’s why this stack exists