Welcome to SKYN3T!
A digital safe haven providing anonymity against global dragnet surveillance networks
ABOUT: SKYN3T is a platform to escape the orewellian place that the mainstream internet has now become. We provide several secure and anonymous services avaiable for use to the public. Due to security policies SKYMAIL, SKYDRIVE and SKYMEDIA are nonpublic. You can apply to have an account registered on these services by emailing firstname.lastname@example.org or join the SKYN3T Mumble server / register for SKYCHAT. We always welcome new members with unique perspectives and skillsets.
ACCOUNT CREATION PROCEDURE: If you request a SKYMAIL and/or SKYDRIVE account please provide a username of your choice (if available) and a random password will be generated for you and sent via an encrypted email. The default quota for SKYDRIVE is 5GB and SKYMAIL is 1GB. Access to SKYMEDIA currently requires a plex account. You can sign up at plex.tv and send the plex email/username to email@example.com to get access.
ACCOUNT DELETION: If requested accounts will be terminated and deleted with all data.
LOGGING POLICY: SKYN3T anonymizes all logs by removing the last 2 octets of your IP addresses e.g. 192.168.42.11 becomes 192.168.0.0. Logs are automatically cleared and deleted every 48 hours.
COOKIES: SKYN3T stores cookies in your browser for authentication purposes (remembering passwords) and user prefrences ONLY. Cookies are not utilized for any other purpose then the two previously stated.
The Declaration Of Digital Independence
Humanity has been contemptuously used by vast digital empires. Thus it is now necessary to replace these empires with decentralized networks of independent individuals, as in the first decades of the Internet. As our participation has been voluntary, no one doubts our right to take this step. But if we are to persuade as many people as possible to join together and make reformed networks possible, we should declare our reasons for wanting to replace the old.
We declare that we have unalienable digital rights, rights that define how information that we individually own may or may not be treated by others, and that among these rights are free speech, privacy, and security. Since the proprietary, centralized architecture of the Internet at present has induced most of us to abandon these rights, however reluctantly or cynically, we ought to demand a new system that respects them properly. The difficulty and divisiveness of wholesale reform means that this task is not to be undertaken lightly. For years we have approved of and even celebrated enterprise as it has profited from our communication and labor without compensation to us. But it has become abundantly clear more recently that a callous, secretive, controlling, and exploitative animus guides the centralized networks of the Internet and the corporations behind them.
The long train of abuses we have suffered makes it our right, even our duty, to replace the old networks. To show what train of abuses we have suffered at the hands of these giant corporations, let these facts be submitted to a candid world.
They have practiced in-house moderation in keeping with their executives notions of what will maximize profit, rather than allowing moderation to be performed more democratically and by random members of the community.
They have banned, shadow-banned, throttled, and demonetized both users and content based on political considerations, exercising their enormous corporate power to influence elections globally.
They have adopted algorithms for user feeds that highlight the most controversial content, making civic discussion more emotional and irrational and making it possible for foreign powers to exercise an unmerited influence on elections globally.
They have required agreement to terms of service that are impossible for ordinary users to understand, and which are objectionably vague in ways that permit them to legally defend their exploitative practices.
They have marketed private data to advertisers in ways that no one would specifically assent to.
They have failed to provide clear ways to opt out of such marketing schemes.
They have subjected users to such terms and surveillance even when users pay them for products and services.
They have data-mined user content and behavior in sophisticated and disturbing ways, learning sometimes more about their users than their users know about themselves; they have profited from this hidden but personal information.
They have avoided using strong, end-to-end encryption when users have a right to expect total privacy, in order to retain access to user data.
They have amassed stunning quantities of user data while failing to follow sound information security practices, such as encryption; they have inadvertently or deliberately opened that data to both illegal attacks and government surveillance.
They have unfairly blocked accounts, posts, and means of funding on political or religious grounds, preferring the loyalty of some users over others.
They have sometimes been too ready to cooperate with despotic governments that both control information and surveil their people.
They have failed to provide adequate and desirable options that users may use to guide their own experience of their services, preferring to manipulate users for profit.
They have failed to provide users adequate tools for searching their own content, forcing users rather to employ interfaces insultingly inadequate for the purpose.
They have exploited users and volunteers who freely contribute data to their sites, by making such data available to others only via paid application program interfaces and privacy-violating terms of service, failing to make such freely-contributed data free and open source, and disallowing users to anonymize their data and opt out easily.
They have failed to provide adequate tools, and sometimes any tools, to export user data in a common data standard.
They have created artificial silos for their own profit; they have failed to provide means to incorporate similar content, served from elsewhere, as part of their interface, forcing users to stay within their networks and cutting them off from family, friends, and associates who use other networks.
They have profited from the content and activity of users, often without sharing any of these profits with the users.
They have treated users arrogantly as a fungible resource to be exploited and controlled rather than being treated respectfully, as free, independent, and diverse partners.
We have begged and pleaded, complained, and resorted to the law. The executives of the corporations must be familiar with these common complaints; but they acknowledge them publicly only rarely and grudgingly. The ill treatment continues, showing that most of such executives are not fit stewards of the public trust.
The most reliable guarantee of our privacy, security, and free speech is not in the form of any enterprise, organization, or government, but instead in the free agreement among free individuals to use common standards and protocols. The vast power wielded by social networks of the early 21st century, putting our digital rights in serious jeopardy, demonstrates that we must engineer new but old-fashioned decentralized networks that make such clearly dangerous concentrations of power impossible.
We hold that to embrace these principles is to return to the sounder and better practices of the earlier Internet and which were, after all, the foundation for the brilliant rise of the Internet. Anyone who opposes these principles opposes the Internet itself. Thus we pledge to code, design, and participate in newer and better networks that follow these principles, and to eschew the older, controlling, and soon to be outmoded networks.
We, therefore, the undersigned people of the Internet, do solemnly publish and declare that we will do all we can to create decentralized social networks; that as many of us as possible should distribute, discuss, and sign their names to this document; that we endorse the preceding statement of principles of decentralization; that we will judge social media companies by these principles; that we will demonstrate our solidarity to the cause by abandoning abusive networks if necessary; and that we, both users and developers, will advance the cause of a more decentralized Internet.
-----BEGIN PGP PUBLIC KEY BLOCK-----
-----END PGP PUBLIC KEY BLOCK-----