They don't burn books. They deplatform. They demonetize. They restrict reach and silently disappear inconvenient voices from the feeds of millions. The new censorship is invisible, deniable, and algorithmically precise. The answer is cryptographic.
The internet was designed to be unkillable. Paul Baran's 1962 RAND memoranda described a distributed communication network capable of surviving nuclear attack by routing around damage. The key insight was architectural: decentralized, packet-switched, redundant. Any node could route around any other. No single point of control, no choke point. The vulnerability of prior communications infrastructure — the telephone exchange, the broadcast transmitter, the cable head — had been designed out of the system.
What emerged over the following decades was unprecedented. SMTP allowed anyone to send email to anyone. HTTP made publishing trivially cheap. NNTP and USENET created distributed discussion systems with no owner and no moderator. IRC enabled real-time communication across continents. The protocols were open, the standards were public, and anyone with a server participated as a full peer. The architecture was genuinely egalitarian in a way no communication system in history had been. It was, briefly, the closest thing to a free press that had ever existed.
The enclosure began in the mid-2000s. Facebook was not the open web — it was a walled garden whose value was proportional to how effectively it trapped social graphs inside its perimeter. Users could receive messages from Facebook. They could not receive messages from Myspace. The social graph — the map of who knows whom, whose relationship data had been freely given — was transformed from a commons into a proprietary asset. Twitter, YouTube, and Google became the discovery and distribution infrastructure for the open web, but infrastructure controlled by private entities with their own interests and their own rules.
The independent publisher, the political dissident, the small creator came to depend on these platforms for traffic, for audience, for economic survival — and in doing so gave those platforms the power of the printing press monopoly their technology was supposed to have made impossible. The internet routed around censorship for a decade. Then it became the censorship infrastructure.
Censorship in the platform era is technically legal under most constitutional frameworks because it is private. The First Amendment constrains governments, not corporations. When an algorithm reduces a post's reach to 3% of its usual audience without notification, the user is not banned. The content is not removed. The speech is technically permitted. It simply reaches no one. The speaker continues performing for an invisible audience. The performance continues; the connection does not.
The mechanisms operate in layers. The most overt is removal. More common is de-amplification. Most insidious is shadow banning — the practice of reducing distribution without notifying the user. The economic layer is often more effective than the speech layer: advertiser pressure has produced sweeping category-based demonetization policies, entire topics made economically worthless regardless of the political orientation of the creator. Payment processors, advertising networks, hosting providers, and domain registrars each independently apply financial pressure that suppresses speech without requiring a single "censored" flag to be raised.
The regulatory dimension has grown explicit. The EU's Digital Services Act requires platforms to remove "illegal content" and "disinformation" — terms defined with sufficient vagueness to be weaponized against political dissent. The UK's Online Safety Act imposes criminal liability on executives for "harmful" content. The Australian eSafety Commissioner has ordered global content removal. The international pressure campaign on speech infrastructure is increasingly coordinated, increasingly backed by the threat of criminal prosecution. The private architecture of censorship and the public architecture of censorship are converging into a single coordinated apparatus with no meaningful seam between them.
Nostr is a protocol. Not a platform, not a company, not a service. This distinction is everything. A platform can be pressured to deplatform users. A company can be acquired, regulated, or defunded. A service can be shut down. A protocol can be forked, cloned, run on any server, accessed through any client, and continues to operate as long as any node remains active. This is what makes Nostr different from every "alternative social media" that has preceded it: alternative platforms are still platforms. Nostr is infrastructure.
The design is radical in its simplicity. Every user has a public/private key pair. The public key is their identity. The private key is their signature authority. Messages are signed with the private key and verified by anyone with the public key. No username. No password. No account registered with any server. Your identity is a cryptographic key, and you own it completely. No corporation can revoke it. No government can confiscate it. No platform migration can leave it behind.
The network operates through relays — servers that receive, store, and forward signed messages. Anyone can run a relay. Users connect to multiple relays simultaneously. If one relay bans you, your messages propagate through all the others. If a relay is shut down, your content continues to exist on every relay that stored it. If every relay in one jurisdiction is forced to comply with local regulations, you route through relays that operate in others. The network cannot be deplatformed because there is no platform to deplatform.
The contrast with alternatives is architectural, not political. Mastodon, Truth Social, and every alternative social network that has emerged as a response to Twitter/X are still platforms with central owners, terms of service, jurisdictions of incorporation, and banking relationships that can be pressured. They have different moderators. They do not have a different architecture. Nostr has a different architecture. The key is yours. The signed message is yours. The network is no one's. This is what decentralization actually means when it is realized at the architectural level rather than merely at the political one.
Speech suppression in the platform era is inseparable from financial suppression. The sequence is predictable: a creator or organization produces content that a platform or government finds politically unacceptable. The speech layer acts first — demonetization, reduced reach, content warnings. If the target remains active, the financial layer activates. PayPal terminates the account. Stripe closes the merchant relationship. The bank receives informal regulatory pressure and closes the business account. Fundraising platforms refuse campaigns. The target is not imprisoned. They are not legally silenced. They simply cannot transact.
This pattern has a name among policy researchers: Operation Chokepoint 2.0, extending the Obama-era banking pressure campaign against firearms dealers and payday lenders to a much broader and more politically diverse set of industries and individuals. It works because financial infrastructure is even more concentrated than speech infrastructure. There are four major card networks. There are fewer than a dozen major payment processors. There are six major US banking conglomerates. Pressure applied at any of these chokepoints propagates throughout the economy of anyone who depends on them — which is nearly everyone operating above ground.
The counter-strategy is the same one the cypherpunks always proposed: make the chokepoints technically irrelevant. Monero payments cannot be blocked at the processor level because there is no processor. Peer-to-peer transactions in privacy coins require no banking relationship, no merchant account, no terms of service agreement with a third-party payment platform. Lightning Network payments flow directly between parties at near-zero cost. The financial deplatforming apparatus is powerful precisely because of the concentration it exploits. Decentralized payment infrastructure dissolves that concentration at the technical layer, making the apparatus structurally inoperable against those who have exited it.
This is not a hypothetical future capability. Podcasters, writers, journalists, and organizations across the political spectrum have already built sustainable revenue models using crypto-native payment rails after being expelled from the conventional financial system. The transition is difficult — the audience that uses Monero is smaller than the audience that uses credit cards. But it is possible, it is growing, and it is the only payment infrastructure that does not include a chokepoint that a government agency can activate with a phone call and no public accountability whatsoever.
ActivityPub is the open standard that underlies Mastodon, Pixelfed, PeerTube, and Lemmy — collectively the Fediverse. Its core innovation is federation: rather than a single server hosting all users, many independent servers each host their own communities, and these instances communicate with each other using the shared protocol. A Mastodon user on one instance can follow and interact with a user on another as seamlessly as if they were on the same platform. No corporation controls the network. No single moderation policy applies to all instances.
The Fediverse represents a genuine improvement over centralized platforms on several dimensions. Instance operators set their own rules. Users who disagree with their instance's moderation can migrate to another, taking their followers with them. The open protocol enables client diversity — dozens of different apps can access the same network. And the federated model distributes the attack surface: there is no single instance to shut down, no single executive to arrest, no single hosting provider to pressure into compliance.
But federation is not decentralization in the cypherpunk sense. Each instance is still a centralized service run by a human who can be pressured. The largest Mastodon instances have demonstrated willingness to defederate from smaller instances hosting disfavored speech — recreating the walled garden problem at the federation level rather than the platform level. When large instances defederate from smaller ones, the network effect that made federation valuable dissolves. The architecture allows for exit. It does not guarantee censorship resistance when the adversary is a state with the willingness to pressure instance operators directly.
The honest assessment: ActivityPub solves the corporate concentration problem. It does not solve the state coercion problem. It is a significant improvement for those whose primary adversary is a platform they politically disagree with. For those whose adversary is a government with the capability and willingness to pressure hosting providers and instance operators, only protocol-level censorship resistance — the Nostr model, not the Mastodon model — provides meaningful protection. Use both. Understand what each one provides and what it does not.
Signal remains the gold standard for encrypted messaging. The Signal Protocol — independently audited, open-source, widely implemented — provides end-to-end encryption for messages, calls, and attachments. Its limitation is structural: Signal requires a phone number for registration, operates on centralized servers in the United States, and its operators have complied with lawful US government requests for the metadata it retains. For most users and most threat models, Signal is the correct choice. For those whose adversary has jurisdiction over Signal's infrastructure, it is insufficient.
Session extends the Signal Protocol to remove both the phone number requirement and the centralized server dependency. Session accounts are identified by a public key. Messages route through a decentralized network of service nodes rather than company-owned servers. There is no metadata trail — no record of who messaged whom, only the encrypted content of messages. Session is appropriate for higher-risk communication contexts where metadata exposure is the primary concern.
Briar goes further: it works over Bluetooth and Wi-Fi without any internet connection, enabling communication between devices in physical proximity. It routes over Tor when internet access is available. It stores no messages on servers — all data stays on devices. Briar was designed explicitly for activists in environments where infrastructure cannot be trusted. Matrix/Element provides federated, end-to-end encrypted messaging that can be fully self-hosted. For organizations that need group communication with complete control over their infrastructure, it is the correct choice. Select the tool based on your threat model, not based on what your contacts are already using. Then migrate your contacts.
The conventional web is location-addressed: a URL points to a specific server at a specific location. When that server is taken down, the content disappears. When the hosting provider terminates the account, the content disappears. When the domain registrar suspends the domain, the content disappears. Every piece of web content is ultimately a function of the continued cooperation of a chain of infrastructure providers, each of which is a potential censorship chokepoint that can be pressured independently.
IPFS — the InterPlanetary File System — replaces location-addressing with content-addressing. Rather than specifying where a file is, you specify what a file is, using a cryptographic hash of its content as the identifier. Any node that has the file can serve it. If one node is shut down, others continue serving. The content cannot be removed by targeting any single server because "the server" does not exist as a concept — the content exists wherever any node chose to store it, distributed across participants with no central point of control.
Arweave extends this with a permanent storage model. Rather than paying for ongoing hosting — a recurring cost requiring ongoing institutional cooperation — Arweave charges a one-time upfront fee in exchange for a cryptographic guarantee that content will be stored for a minimum of 200 years, enforced by the protocol's endowment mechanism. Content stored on Arweave is not "deleted when the service ends." It is a permanent addition to a public ledger. Censored journalism, banned books, government documents, and suppressed content of all kinds is already being archived on Arweave as a hedge against the institutional cooperation required to keep it accessible on conventional infrastructure.
The practical combination: publish on IPFS, archive to Arweave, access through an ENS domain that maps to your IPFS hash and is stored on the Ethereum blockchain. No hosting provider. No domain registrar. No company whose cooperation can be compelled by a government letter. A website built on this architecture cannot be taken down by any single entity because it is not hosted by any single entity. This is what censorship-resistant publication looks like when the architecture matches the stated goal rather than merely asserting it.
The full communication sovereignty stack is not a single tool. It is a layered architecture in which each layer solves a specific component of the surveillance and censorship problem. Understanding which layer does what is the prerequisite to using them correctly, because no single tool provides comprehensive protection across all threat vectors simultaneously.
The identity layer is Nostr. Your public key is your identity across every platform and client that implements the protocol. Your signed messages are yours regardless of which relay carries them. When a platform bans you, your identity persists and your followers can find you through any relay. The key is the only element that cannot be taken without your cooperation.
The network layer is Tor. It obscures your IP address, your location, and your relationship to any service you connect to. Combined with Tails OS — a live operating system that routes all traffic through Tor and leaves no trace on the host machine — it provides near-complete operational anonymity for activity that requires it. The network layer does not protect content; it protects the identity of the communicating parties.
The storage layer is IPFS and Arweave. Content-addressed, censorship-resistant, permanent. Files identified by what they contain rather than where they are stored. Content that needs to survive institutional hostility belongs on this layer rather than on any server whose operator can be pressured, coerced, or acquired.
The payment layer is Monero. Every communication stack eventually requires a payment layer, because infrastructure costs money and financial deplatforming is real. Monero provides the payment equivalent of end-to-end encryption: transactions that are private by default, unlinkable, untraceable, and not subject to processing at any intermediary that can be pressured to freeze or reverse them.
The stack is not yet seamless. The user experience of coordinating these tools is not as polished as opening Twitter. The effort required is the price of the properties they provide. That price is measurable and fixed. The price of not using them — surrendering your communication infrastructure to entities whose interests fundamentally diverge from yours — is open-ended and accelerating. The stack exists. It works. The only missing element is the decision to use it.
Every previous censorship regime in history has ultimately failed for the same reason: information wants to be reproduced, and the cost of reproduction always falls faster than the cost of suppression. The printing press defeated the scriptoria. The photocopier defeated the samizdat hunters. The early internet defeated broadcast monopolies. Each time, the defenders of controlled information underestimated the pace at which the technology of free communication would advance and the degree to which people would sacrifice convenience for freedom once they understood the alternative.
The current censorship regime is qualitatively more sophisticated than any of its predecessors — algorithmic, invisible, deniable, economically integrated, and internationally coordinated. But it shares the fundamental vulnerability of all previous regimes: it depends on controlling chokepoints, and chokepoints can be routed around. The cypherpunks identified this thirty years ago. The protocols they built, and the protocols built by those they inspired, exist precisely to route around every chokepoint that surveillance capitalism and its state partners can construct.
The communication war is not a metaphor. Specific people lose their ability to earn a living because of platform decisions made without appeal. Specific journalism disappears from the accessible web because hosting providers comply with government requests. Specific communities are dispersed when the platforms they built their social infrastructure on decide they are unacceptable. The stakes are concrete, the losses are real, and the tools that could prevent them are freely available right now.
Use Nostr. Archive on Arweave. Route through Tor. Pay in Monero. Run a relay. Host a node. The infrastructure of free communication is built and maintained by those who choose to participate in it. Every node strengthens the network. Every user who migrates from a censored platform to a protocol-based alternative makes the next censorship attempt slightly more difficult and slightly less effective. The communication war is won the same way the counter-economy grows: one voluntary, cryptographic, ungovernable transaction at a time.