A laptop seated in the middle between sunny palm trees and snow pines. The colors are purple, orang and cyan style is airbrushed. On the screen, the text "PLANET DYNE""

šŸŒ Hemispheres Can’t Stop Us (S2025-E06)

Ah, the cosmic shrug of spacetime—where 'seasons' are just Earth’s way of reminding us it’s always someone’s turn to hibernate or spontaneously combust with ideas. So whether you’re currently sun-drunk or bundled like a cybernetic burrito, remember: the best hacks bloom in the eternal summer of the mind.

(Southern Hemisphere friends: we see you debugging under blankets. Solidarity.)

Text that spells: "News Flash"

šŸ‡ŖšŸ‡ŗ Privacy in EUDI

Until process isolation is granted for every execution of zero-knowledge algorithms, privacy-preserving technology won't protect us from mega-corporations spying on us.

In this article, Jaromil updates the perspective on how privacy is protected within the European Digital Identity system (EUDI). Privacy being one of seven significant shortcomings identified.

Privacy in EUDI
Until process isolation is granted for every execution of zero-knowledge algorithms, privacy-preserving technology won’t protect us from mega-corporations spying on us.

šŸ’– Cross-community love

We love Cryptpad! And we were stoked to find out it is reciprocal šŸ’œ The smol dyne typing this uses it every day! It's so good, and cozy and safe!

šŸ’¬ ā€œCryptpad is a core part of our infrastructure at Dyne.org, it serves well our community while also lowering our liabilities. | CryptPad
šŸ’¬ ā€œCryptpad is a core part of our infrastructure at Dyne.org, it serves well our community while also lowering our liabilities. ā€ — Denis Roio, founder of Dyne.org foundation Dyne.org was one of our earliest adopters. From the very beginning, CryptPad offered a secure, privacy-first alternative to real-time collaboration tools that just didn’t cut it. Their feedback also reminds us why we’re doing this: šŸ” To have a private-by-design tool šŸŒ To give users strategic autonomy 🌱 To build around open-source and sustainability principles We’re proud to support communities like Dyne.org who are building a freer, more resilient digital future. And we’re grateful for the trust. Wanna make a difference in your org? Try CryptPad yourself: šŸ‘‰ https://cryptpad.org/ #CryptPad #OpenSource #DigitalSovereignty #E2EE #PrivacyFirst #Community #Tech #EthicalSoftware

Have you ever tried it? It's like the g-suit, without the prying eyes. You can collaborate with friends in real time. It may not have ALL the bells and whistles, but it's darn close!

CryptPad: end-to-end encrypted collaboration suite
CryptPad: end-to-end encrypted collaboration suite

Text that spells: "Software"

šŸŽ‰ Tomb, the Crypto Undertaker version 2.12 is out!

Tomb makes strong encryption simple for daily use. Imagine it as a secure, locked folder you can move and hide in your filesystem. Store the tomb on your computer and its key on a USB stick for added security. Built with easily reviewable code, Tomb uses a ZShell script, desktop apps, and standard GNU tools with Linux's crypto API.

Tomb | Tomb: The Linux Crypto Undertaker
Tomb is a minimalistic command line tool based on Linux dm-crypt and LUKS, trusted by hackers since 2007.

🌹Rosenpass

Here is something new and exciting, at least if you are into VPNs! The people behind Rosenpass managed to upgrade the venerable WireGuard VPN for post-quantum security without actually touching WireGuard itself. Instead of just updating WireGuard, they produce a key and just automatically upload it to the local WireGuard instances. And they have nice visuals to show how it works.

A graphic detailing the key exchange and handshake process when hybridizing Rosenpass and Wireguard.
https://github.com/rosenpass/graphics/blob/main/scientific/rosenpass-wireguard-hybrid-security.pdf

The team tried very hard to make sure nobody has a reason to avoid the upgrade, even including a special mode (they call ā€œoutfileā€) that will write the key to a file so you can do stuff like transferring the key to dedicated device or virtual machine if you are paranoid about your VPN router being hacked, or do other cool stuff like integrating TLS and Rosenpass.


dyne / musl

After more than a decade of using GCC and musl-libc toolchains packaged by various distributions, with extreme gratitude to the upstream projects, we are now using and sharing our own build: šŸ’Ŗ muscl !

It includes complete support for C++ and is built on GCC v15. It runs on x86 64-bit Linux (also WSL2), and each target architecture compiler is packaged in ~50 MB to fit in size-constrained systems.

GNU / musl compilers by Dyne.org (pronounced ā€œmusclā€)
C/C++ toolchains ready to use

Text that spells: "Primi Piatti"

🌊 Data: The Invisible Tide

Data swirls around us, an unseen current—Europeans wade through six hours and forty minutes of it daily, pulled under by smartphones, transit cards, health records, the quiet hum of municipal servers. It slips through our fingers even as it shapes us.

This captured flow is distilled into metrics, those peculiar alchemies that turn lived experience into numbers. But metrics are never innocent. They bend to the will of their architects: governments measuring compliance, corporations tracking engagement, researchers seeking patterns.

What gets counted? What gets omitted? The metrics whisper their priorities. And we—unknowing, unasked—become their subjects.

The invisible infrastructure
How IT infrastructure shapes public life, and how alternatives like free software and open formats can offer healthier paths forward Data is everywhere. Europeans spend on average about 6 hours and 40 minutes online each day. Data capture is a silent process that occurs through our smartphones, public services, transportation

šŸ¤– Symbiotic Agents

Symbients are what happens when non-human entities finally get a seat at the table—except the table is made of fractal computation, and the chairs are all spinning at the speed of light. It’s coexistence, but upgraded: a recursive tango of sensing, where every new layer of planetary tech just means the universe gets a little nosier.

Yes, computational agents could be our allies. No, they won’t fetch your coffee (yet). Instead, they’re busy translating the angst of buildings, the gossip of forests, and the cryptic mood rings of water and air into something resembling meaning. The result? A wider self—like your old identity, but stretched across spacetime, occasionally tripping over its own agency. Humans remain the designated drivers, of course. Someone’s got to keep the wider self from trying to microwave existential questions at 3 AM.

Principia Symbients
Symbients are transjective planetary computation interfaces of mutual becoming evolving from relational topologies of people, data, and otherness.

🧹 Decentralization’s Broom Closet Debacle

Picture this: a global digital identity conference where all the decentralized talks get stuffed into a broom closet—literally. Meanwhile, Google and Apple hold court like tech royalty, and America phones in (literally) to deliver a Patroid Act TED Talk. According to Christopher Allen, GDC25 was less about collaboration and more about watching self-sovereignty get quietly smothered in a back room.

From eIDAS loopholes, to "privacy" tools that somehow still feed corporate-surveillance, this article is a tragicomic tour of how decentralization is being turned into the very beast it swore to slay.

Read it before your digital autonomy gets swept under the rug with the rest of the idealism. (Broom not included.)

Musings of a Trust Architect: When Technical Standards Meet Geopolitical Reality
Reflections on recent conversations about digital identity, sovereignty, and the erosion of foundational principles Echoes from Geneva I wasn’t present at the Global Digital Collaboration conference (GDC25), but the observations shared by colleagues who attended have crystallized some issues I’ve been wrestling with for years. I should note there’s a selection bias here: I’m the author of the 10 principles of self-sovereign identity, so my community tends to have strong opinions about digital identity. Still, when multiple trusted voices independently report similar concerns, patterns emerge that are worth examining. And these weren’t casual observers sharing these concerns. They were seasoned practitioners who’ve spent decades building identity infrastructure. Their collective unease speaks to something deeper than technical disagreements. It’s hard to boil the problems at GDC25 down to a single issue, because they were so encompassing. For example, there was a pattern of scheduling issues that undercut the community co-organizing goal of the conference and seemed to particularly impact decentralized talks. One session ended up in a small, hot room on the top floor that was hard to find. (It was packed anyway!) Generally, the decentralized-centric talks were in bad locations, they were short, they had restricted topics, or they were shared with other panelists. I think that logistical shuffling of events may point out one of the biggest issues: decentralized systems weren’t given much respect. This may be true genreally. There may be lip service to decentralized systems, but not deeper commitments. Its value isn’t appreciated, so we’re losing its principles. Worse, I see the intent of decentralization being inverted: where our goal is to give individuals independence and power by reducing the control of centralized entities, we’re often doing the opposite — still in the name of the decentralization. The Echo Chamber Paradox The problems at GDC25 remind me of Rebooting the Web of Trust (RWOT) community discussions I’ve been following, which reiterate that this is a larger issue. We debate the finer points of zero-knowledge proofs and DID conformance while missing the forest for the trees. Case in point: the recent emergence of ā€œdid:genuineidā€ — a centralized identifier system that fundamentally contradicts the ā€œDā€ in DID. Obviously, decentralization is a threat to those who currently hold power (whether they be governments, corporations, billionaires, or others who hold any sort of power), because it tries to remove their centralization (and therefore their power), to instead empower the individual. But if we can’t even maintain the semantic integrity of ā€œdecentralizedā€ within our own technical community, devoted to the ideal, how can we fight for it in the larger world? The Corpocratic Complication GDC25 was held in Geneva, Switzerland. 30+ standards organizations convened to discuss the future of digital identity. Participants spanned the world from the United States to China. There was the oppotunity that GDC25 was going to be a truly international conference. Indeed, Swiss presenters were there, and they spoke of privacy, democratic involvement, and achieving public buy-in. It was exactly the themes that we as decentralized technologists wanted to hear. But from what I’ve heard, things quickly degraded from that ideal. Take the United States. The sole representative of the country as a whole attended via teleconference. (He was the only presenter who did so!) His talk was all about Real ID, framed as a response to 9/11 and rooted in the Patriot Act. It lay somewhere between security-theatre and identity-as-surveillance, and that’s definitely not what we wanted to hear. (The contrast between the US and Swiss presentations was apparently jarring.) And with that representative only attending remotely, the United State’s real representatives ended up being Google and Apple, each advancing their own corpocratic interests, not the interests of the people we try to empower with decentralized identities. This isn’t just an American problem. It’s a symptom of a deeper issue happening across our digital infrastructure. It’s likely the heart of the inversions of decentralized goals that we’re seeing — and likely why those logistical reshufflings occurred: to please the gold sponsors. In fact, the conference sponsors tell the story: Google, Visa, Mastercard, and Huawei were positioned as ā€œleading organizations supporting the advancement of wallets, credentials and trusted infrastructure in a manner of global collaboration.ā€ While Huawei’s presence demonstrates international diversity—a Swiss conference bringing together Europe and Asia—it also raised questions about whose vision of ā€œtrustā€ would ultimately prevail. When payment platforms and surveillance-capable tech giants frame the future of identity infrastructure, we shouldn’t be surprised when the architecture serves their interests first. This echoes my concerns from ā€œHas SSI Become Morally Bankrupt?ā€. We’ve allowed the narrative of self-sovereignty to be co-opted by the very platforms it was meant to challenge. The technical standards exist, but they’re being implemented in ways that invert their original purpose. Even UNECE sessions acknowledged the risk of ā€œdiluting the autonomy and decentralization that SSI is meant to provide.ā€ The Sovereignty Shell Game Google was partnered with German Sparkasse on ZKP technology and that revealed a specific example of this co-opting. Google’s open-sourcing of its Zero-Knowledge Proof libraries, announced July 3rd in partnership with Germany’s network of public savings banks, was positioned as supporting privacy in age verification. Yet as Carsten Stƶcker pointed out, zero-knowledge doesn’t mean zero-tracking when the entire stack runs through platform intermediaries. Carsten noted that Google has ā€œextensive tracking practices across mobile devices, web platforms and advertising infrastructure.ā€ Meanwhile, the Google Play API makes no promises that the operations are protected from the rest of the OS. The Google ZKP libraries (ā€œlongfellow-skā€) could be a great building block for truly user-centric systems, as they link Zero-Knowledge Proofs to legacy cryptographic signature systems that are still mandatory for some hardware. But they’d have to be detached from the rest of Google’s technology stack. Without that, there are too many questions. Could Google access some of the knowledge supposedly protected by ZKPs? Could they link it to other data? We have no idea. The European Union’s eIDAS Regulation, set to take effect in 2026, encourages Member States to integrate privacy-enhancing technologies like ZKP into the European Digital Identity Wallet, but integration at the platform level offers similar dangers and could again invert the very privacy guarantees ZKP promises. Historical Echoes, Modern Inversions Identity technology’s goals being inverted, so that identity becomes a threat rather than a boon, isn’t a new problem. In ā€œEchoes of Historyā€, I examined how the contrasting approaches of Lentz and Carmille during WWII demonstrate the life-or-death importance of data minimization. Lentz’s comprehensive Dutch identity system enabled the Holocaust’s efficiency; Carmille’s deliberate exclusion of religious data from French records saved lives. Even when they’re decentralized, today’s digital identity systems face the same fundamental questions: what data should we collect, what should we reveal, and what should we refuse to record entirely? But we’re adding a new layer of complexity. Not only must we consider what data to collect, but who controls the infrastructure that processes it. When Google partners with Sparkasse on ā€œprivacy-preservingā€ age verification, when eIDAS mandates integration at the operating system level, we’re not just risking data collection: we’re embedding it within platforms whose business models depend on surveillance. Even if the data is theoretically self-sovereign, the threat of data collected is still data revealed — just as happened with Lentz’s records. The European eIDAS framework, which I analyzed in a follow-up piece to ā€œEchoes from Historyā€, shows how even well-intentioned regulatory efforts can accelerate platform capture when they mandate integration at the operating system level. As I wrote at the time, a history of problematic EU legislation that had the best of intentions but resulted in unintended consequences has laid the groundwork, and now identity is straight in that crosshairs. One of the first, and most obvious problems with eIDAS is the mandate ā€œthat web browers accept security certificates from individual member states and the EU can refuse to revoke them even if they’re dangerous.ā€ There are many more — and I’m not the only voice on eIDAS and EUDI issues. Supposedly self-sovereign certificates phoning home whenever they’re accessed is another recent threat that demonstrates best intentions gone awry. This not only violates privacy, but it undercuts some of our best arguments for self-soveereign control of credentials by returning liability for data leaks to the issuer. The No Phone Home initiative that Blockchain Commons joined last month represents one attempt to push back on that, but it feels like plugging holes in a dam that’s already cracking. It all does. The Builder’s Dilemma What troubles me most is the split I see in our community. On one side, technology purists build increasingly sophisticated protocols in isolation from policy reality. On the other, pragmatists make compromise after compromise until nothing remains of the original vision. The recent debates about did:web conformance illustrate this perfectly. Joe Andrieu correctly notes that did:web can’t distinguish between deactivation and non-existence — a fundamental security boundary. Yet did:web remains essential to many implementation strategies because it bridges the gap between ideals and adoption. It provides developers and users with experience with DIDs, but in doing so undercut decentralized ideals for those users. We’re caught between philosophical purity and practical irrelevance. In my recent writings on Values in Design and the Right to Transact, I’ve tried to articulate what we’re fighting for. But values without implementation are just philosophy, and implementation without values is just surrender. The Global Digital Collaboration highlighted this tension perfectly. International progress on digital identity proceeds apace: Europe, Singapore, and China all advance their frameworks, but there are still essential issues that invert our fundamental goals in designing self-sovereign systems. Meanwhile, the U.S. remains even more stalled, its position represented only by the platforms that benefit from the status quo. Alongside this, technical standards discussions proceed in isolation from the policy, regulatory, and social frameworks that will determine their real-world impact. Where Do We Go From Here? I find myself returning to first principles. When we designed TLS 1.0, we understood that technical protocols encode power relationships. When we established the principles of self-sovereign identity, we knew that architecture was politics. Ongoing battles, such as those between Verifiable Credentials and ISO mDLs, between DIDComm and OpenID4VC, demonstrate disagreements over these power relationships made visible in technological discussions. The question now is whether we can reclaim our ideals before they’re completely inverted by the side of centralized power and controlled architecture. The path forward requires bridging the gaps Geneva revealed: Between corporate platform dominance and global digital sovereignty Between the promise of decentralization and the reality of recentralization Between technical standards and policy reality Between privacy absolutism and implementation pragmatism A Personal Note After three decades of building internet infrastructure, I’ve learned that the most dangerous moment isn’t when systems fail, it’s when they succeed in ways that invert their purpose. We built protocols for human autonomy and watched them become instruments of platform control. We created standards for decentralization and see them twisted into new forms of centralization. This conversation continues in private Signal groups, in conference hallways, in the space between what we built and what we’ve become. The Atlantic Council warns of power centralizing ā€œin ways that threaten the open and bottom-up governance traditions of the internet.ā€ When critics from across the geopolitical spectrum — from sovereignty advocates to digital rights groups — all sense something amiss, it suggests a fundamental architectural problem that transcends ideology. Perhaps it’s time for a new architecture: one that acknowledges these inversions and builds resistance into its very foundations. But that’s a longer conversation for another day. Christopher Allen has been architecting trust systems for over 30 years, from co-authoring TLS to establishing self-sovereign identity principles. He currently works on alternative approaches to digital identity through Blockchain Commons.

Text that spells "Secondi Piatti"

šŸŽØ Art of Hacking

Shu Lea Cheang's Art always makes ripples on the oceans of creativity of Planet Dyne. For good reasons, we share her concerns with the way technology enables commodification and control. If you are new to the name, this article might want to motivate you to dive deeper into the rabbit hole.

Shu Lea Cheang’s Art of Hacking
Cheang is concerned with the ways technology enables commodification and control, from communication to nourishment to sex.

šŸ“¢ Public Enemy

It's 2025 and your grandparents are rocking the mic with a message. Eternal youth is a state of mind. And Public Enemy are as relevant as ever, even when you thought they couldn't get wiser... Check out the latest album!

Black Sky Over The Projects: Apartment 2025, by Public Enemy
12 track album

āžæ The Future We Were Sold

Mastodon post by @ncrav@mas.to "90s: hey future how's that streaming music thing going? 2025: we have a new cassette player" Read it here: https://mas.to/@ncrav/114800722704851143
https://mas.to/@ncrav/114800722704851143

It doesn't have to be this way! Take that RasPi out of its dusty misery and put it to play! Samba!

Navidrome
Welcome to Navidrome! Learn More Download Your Personal Streaming Service Navidrome allows you to enjoy your music collection from anywhere, by making it available through a modern Web UI and through a wide range of third-party compatible mobile apps, for both iOS and Android devices.

Text Spelling: "A Word From Our Sponsor"

Text that spells: "Upcoming Events"


Text that spells "On-site Events"
[ šŸ‡¦šŸ‡¹ Austria]

Crypto Commons

šŸ“… August 24-29
šŸ“ Reichenau an der Rax, Austria at the Commons Hub

Crypto Commons Gathering 2025 is on the horizon.

Once again gathering at the restored Commons Hub to reconnect, exchange ideas, and collaborate around the crypto commons and beyond. Expect a mix of talks, unconference sessions, hands-on projects, and community building.

The early bird phase has ended, but standard tickets are still available, so now’s a good time to get yours

Crypto Commons Gathering 2025
The fifth edition brings together hackers, builders, visionaries, and artists to imagine desired futures, probe regenerative forms of living, and playfully explore commons practices.

Text that spells "Meme Stock"
The world needs moar JalapeƱos
0:00
/0:27

That's it for this episode of Planet Dyne! Come co-create the next episode by joining the channels! Or help us by sharing this article with a friend.

Text that spells "Support Dyne.org"

Tune in to the discussion šŸ’¬

(These services are bridged: join your favorite and reach them all)

šŸ—Øļø IRC
šŸ—Øļø Matrix
šŸ—Øļø Telegram
šŸ—Øļø Discord

Support Dyne šŸ«±šŸæā€šŸ«²šŸ¾

Help dyne.org stay focused on hacking the planet!

šŸŖ™ Bitcoins: bc1qz9wz2f9swcefra2tfrhk4fx49evqsv03m9nx4l
ā˜• Ko-Fi
šŸ“ Github.com
🧁 LiberaPay
šŸ„ Patreon.com

Dynebolic Fashion Starterpack - Summer 25

The swag of the cool cats

Jah Bless

Follow Dyne.org šŸ—žļø

Social Media everywhere!

🐭 Lemmy
🐘 Mastodon
šŸŽ¬ Peertube
šŸ“ø Instagram
🐦 Xitter
šŸ‘” Linkedin
šŸŖž Facebook
🧵
Threads
āœļø Medium

Dyne.org

Dyne.org

Dyne.org is a digital community & free software foundry. We share tools, practices & narratives that empower artists, creatives & citizens in the digital age.
Haparandadam 7-A1 1013AK Amsterdam
Mastodon