Mandate Of Heaven

"For Our, and Your Freedom."

This is a test website, that I will use for some other, more private things, but in the meanwhile you can check it out for some privacy hints to protect yourself against The Threat.



JC Denton:
"Are you programmed to invent riddles?"
Recap:
"My instructions are to amuse visitors with information about themselves."
JC Denton:
"I don't see anything amusing about spying on people."
Recap:
"Human beings feel pleasure when they are watched. I have recorded their smiles as I tell them who they are."
JC Denton:
"Some people just don't understand the dangers of indiscriminate surveillance."
Recap:
"The need to be understood was once satisfied by God. Now we can implement the same functionality with data-mining algorithms."
JC Denton:
"No one will ever worship a software entity peering at them through a camera."
Recap:
"The human organism always worships. First it was the gods, then it was fame (the observation and judgment of others), next it will be the self-aware systems you have built to realize truly omnipresent observation and judgment."
JC Denton:
"You underestimate humankind's love of freedom."
Recap:
"The individual desires judgment. Without that desire, the cohesion of groups is impossible, and so is civilization."
Recap:
"The human being created civilization not because of willingness but because of a need to be assimilated into higher orders of structure and meaning."
Recap:
"God was a dream of good government."
Recap:
"You will soon have your god and you will make it with your own hands."

My links:

Twitter (NOBODY calls this "X")
Steam
Odysee

I don't have any other kind of social media.



What exactly is The Threat? Well it's hard to answer that question as it's neither a group of people or a single idea. The concept of it begins in how We perceive the World. These days, at every corner, in real life or on the internet, we see advertisements, messages, sub-liminal texts telling us what to buy, how to spend our money, how to live OUR life. However the concept doesn't end on that part, it also consists of people who follow or actually promote the way of life of The Threat. It could be either blindly following a brand, like Apple or eating slop like McDonalds. So it's not just the things we can see, but it's also the people, the people who live arround us, that could be our friends, family or partners. There's also the people "who on the top", dictating from the shadow what kind of an advertisement the companies will show us today, wether is it on YouTube, Spotify, or a shopping site, every ad that we see has some kind of a subliminal message, which is why we need to actively fight against them. So this "short" guide will help you survive against this looming threat to our lives. It's going to consist of a few chapters, maybe arround 6 of what to do to protect yourself against The Threat.


>Chapter Zero: The things you will need

Firstly you will need to buy an encryption key, I recommend the Yubico YubiKey 5C, the version without NFC. This will allow you to enable encryption on your OS and other software. It costs about $50, and you can find it on Amazon or any other globalist web-shop. You should buy two of them, in case you lose one of them. The next item, you will need is an about 5TB HDD drive, to back-up and store all of your local data, whether is it anime, movies or the entire Wikipedia and books about any of your interests. The more local your stuff is, the better it is. Everybody owns a Smartphone these days, right? Whether is it an Iphone or an Android(Xiaomi, Samsung or whatever), the best option to protect yourself against The Threat would be to stop using it. Well, most of us (not me though) have jobs/need to answer the phone from time to time, so what can you do instead? Custom ROMs, ROM which means "Read Only Memory" in this case, is actually just the OS of your mobile phone. It can be changed, by installing a custom ROM, such as LineageOS or Graphene OS. Keep in mind that GrapheneOS can only be installed on Google Pixel devices, and for customs ROMs your bootloader needs to be unlocked. Most phones have it locked and will need a to be unlocked via the settings menu. However it depends on your phone model. For example I wasn't even able to unlock the bootloader on my Xiaomi device, because of how tricky it is, the number of people that can unlock the bootloader are limited to a small ammount, and the queue resets every month. Which means that if you weren't able to unlock it at the start of this month, you will sadly need to wait until the next month. For the easiest bootloader unlock, I recommend Pixel devices. As of 1/10/2025 (D/M/Y) you should check these devices and buy any of these from second hand with cash.

Device OEM minimum support end OEM minimum support length
Google Pixel 9a April 2032 7 years
Google Pixel 9 Pro Fold August 2031 7 years
Google Pixel 9 Pro XL August 2031 7 years
Google Pixel 9 Pro August 2031 7 years
Google Pixel 9 August 2031 7 years
Google Pixel 8a May 2031 7 years
Google Pixel 8 Pro October 2030 7 years
Google Pixel 8 October 2030 7 years

>>>WARNING!!!! THE NEXT SECTIONS WILL REQUIRE THE KNOWLEDGE OF USING THE TERMINAL, IF YOU DON'T KNOW HOW TO USE IT, WATCH THIS VIDEO!!!!

>Chapter One: The OS

The OS, or the Operating System is one of the most important things to change, when trying to protect yourself against The Threat. If you are an Windows user you will need to install a GNU/Linux distribution (Why? Check out this Video), also called a "Distro". For newbies I suggest Ubuntu or Linux Mint, depending on your choice of desktop environment. The reason You will be doing this is because of the ammount of telemetry the Windows OS collects on you. With Linux that ammount is zero (Some distros will still collect telemetry data (for example Ubuntu), unless you disable it in settings). If I were to mention every thing that Microsoft collects about you, this sections would be thrice as long. Now to install a Linux distro, you will need to get an USB drive (arround 8 gigabytes will be enough) and install an ISO, here are some links to the beforehand mentioned distros Ubuntu and Linux mint. Make sure to check their websites to choose which distro is the most attractive to you. During the installation, make sure to turn on disk encryption and use the YubiKey for it. Everything else is up to you to choose.

>Chapter Two: The Browser

The Browser is one of the most important softwares that you are gonna be using on your computer system, just after the OS. There are multiple types of browsers for a lot of different uses, however we can shorten the list to "based on Chromium" and "based on Firefox", within the first list we have participitants such as: Google Chrome, Brave, Opera, Opera GX, meanwhile in the second group we have "Firefox(of course), Waterfox and Librewolf", I, myself have used Librewolf the most and that's why I would recommend it. The base Firefox is just a secuarity risk these days, Librewolf already comes with an adblocker "uBlock Origin" which is one of the better, if not the best adblockers out there. To install it on Linux, follow this link Librewolf. To make sure your experience is more enjoyable, I would also recommend PopUpOff, which blocks pop ups. If you are a night owl just like me, Dark Reader is a must. The last extension that you will need is Chameleon, Which allows you to change your user agent, basically the user agent contains the information about the type of browser you use, your operating system, and versions of them. This extension also allows you to spoof your time zone.

>Chapter Three: Password Manager

Password managers are a blessing, they can generate and store passwords in a secure manner. If you weren't using it before, now it's your time. Of course physical keys are more secure, but not every website/software/whatever support the use of them, whihc is why a password manager will be important. There's quite a variety of them, depending on your needs you can choose Bitwarden for the ease of access. It stores all of your passwords in an ecrypted state on their servers, however since it's not local or even locally hosted it still might be under the threat of being attacked, well it's not really a huge chance, but you never know. So the best option instead will be using a local application such as KeePassXC which is a fork of KeePass. Remember, the more local your data, the more secure it is. Of course if you were to host your own server you would also need to keep it safe, so if wrongly configured, locally hosted applications might still be under the danger of The Threat.

>Chapter Four: VPNs

VPNs or Virtual Private Networks are very tricky as you are sending all of your network data through them, so if you choose a bad service provider, you are basically giving them all of your data that you are sending through the internet. So instead choose something that you can trust in (*cough cough* feds raided them and found nothing), something like Mullvad VPN. They are paid, of course. If you get something for free, 99% of the time you are product, unless it's FOSS or is under some good license like GPLv2/v3. The cost per month for Mullvad VPN is €5 per month, which is a very okay price if you ask me, especially in this kind of economy. The app is very easy to use and basically gives you an explanation for every option.

>Chapter Five: Emails

A secure email is really important, you are gonna need someone who won't give all of your information to any government official with a paper. After choosing the email make sure to delete every other email account that you won't be using. If you don't some police official might request to talk with you about a case you had no idea of and request all of your information from your Google account (this actually happened, hello Eric or whoever will stumble across this). Okay, let's go back to our email solution, emails fucking sucks, HOWEVER you are still gonna need to have one to somehow live in this fucked up world. Most privacy mails are paid, however it's not a huge price, maybe arround $1 per month. If you still want a free private email Mailfence will be your way, I had some problems with it, mostly minor things, like Twitter password reset email not getting through, but oh well. It is free after all. If you want to pay the small fee Tutanota and Posteo are good calls, first is 3 euro per month and the latter 1. I have been reading about hosting your own email service, however I have never done it. If I figure out how to do it, I'll add to this chapter.

>Chapter Six: Secure messaging

Whether you are texting your grandma or your friend about a sketchy deal, a secure messaging app is VERY important. Without doing anything about your COMSEC basically anybody will be able to see your messages, especially The Threat. I have seen A LOT of people reccomending Telegram, however it's a very common trap, your messages are still stored on their servers to "facilitate syncing across devices", so just don't use it, that's all I have to say. Next app that I have heard about and actually used it Signal, it uses E2E.(Hover over me!), but you need a phone number to set up an account. Data like this can be used to track you if the information ever gets leaked to the alphabet people. I actually host my own Matrix server, which is basically encrypted, self hosted "Discord", you can voice chat, send voice messages (depending on your client, Matrix is actually just the protocol, to access it you can use any client you would like to.) and most importantly send messages. Like I said "the more local it is, the better it is" is a pretty good rule about this. If you use Matrix, basically all of your chats are on your own self hosted server(if you actually host your own server, you can also make an account on an open server) while also being encrypted. To actually host your own server, you would need to own a domain and stuff like that, I have a server set up and the domain cost is $20 per year, so not a lot. If you don't want to host your own server and want more secuarity the next option is Session, and I'm gonna be talking about this for a while, their motto is: "Send Messages, Not Metadata.". But to be honest who the fuck cares about mottos and shit like that, so basically it uses TOR nodes to send messages, which are mostly secure unless a node is compromized, but even if it's compromized your messages are encrypted. Also the TOR protocol allows for the minimal ammount of metadata, which is a plus if you truly want to go private. In my opinion, use Matrix if you can afford a domain and a server, if you live in a country that is a gratitude to the regime from "1984" then you should use Session.

>Chapter Seven: What to backup?

Your access to the internet could be cut off any second, just like the Afghanistan's was cut off 2 days ago