As the Nazis marched into the Netherlands to occupy it in 1940, Jaap van Leeuwen started memorizing names. Just earlier that year, he’d started a magazine for gay men called Levensrecht (Right to Life), and he knew, as we know now, that queers are among the first targets for fascism. So he memorized the names and addresses of every one of the 190 subscribers to the magazine and then burned the list. It’s good that he did—he spent seven months in captivity during the occupation and his home was scoured by the fascists.
He, like so many people living in Europe in the 1940s, led a double life during the occupation so that his resistance activities couldn’t be tracked. He and his friends, though, had a distinct advantage at this: they were used to living double lives—they were gay. They lived one life aboveground, one underground.
When the occupation ended, he wrote down those 190 names and the magazine resumed publication to those who had survived.
Under an authoritarian regime, we need different protocols for security than we do under capitalist democracy. And in an era of algorithmic policing and surveillance, aboveground and underground might no longer be enough. We might need something in between. We might need a version of ourselves that is not as secure as an underground life but is obscure to algorithmic tracking. Between the aboveground and the underground, we need a demiground.
We all know, on some level, what our digital footprints look like. They are reflected back to us as advertising, as recommended songs and videos, as the social media posts that are served up to us, catered to our interests.
In an era where corporations have a distinct set of interests from the state, there might not seem like much danger in volunteering our data to be scraped by companies like Google, Apple, Meta, Spotify, Amazon, and others. For those of us in the United States at least, though, we are entering an era of outright fascism. Billionaires, representing the tech industries, are lining up behind Trump, more than happy to bend the knee to the state to protect their corporate interests. We are entering an era of automated policing, of algorithmic surveillance. It behooves us to behave accordingly.
For the purpose of this essay, we will distinguish between “secure” and “obscure.” Secure communication is intended to be entirely unreadable by adversaries. Obscure is simply meant to be harder to find and catalog. This is not a guide to a secure, underground life, but instead first notes towards an obscure, demiground life.
This security method proposes imagining our lives (at least our digital lives) divided into three categories. The A life, the B life, and the C life. Your A life is your aboveground life, one that is easily traced and whose data is routinely fed into algorithmic tracking. This life leaves a huge digital footprint. Your C life is your underground life. It is meant to leave no footprint at all, and is the realm in which any actual crime you might want to commit (such as direct resistance to a fascist state) would take place. Your B life is your demiground life, where, under an authoritarian regime, most of your socializing and online life ought to probably take place. Here, you will leave some footprints, but not ones that are easily categorized and sorted by machines.
A Life
Your A life (your Algorithm life) includes your lease, your mortgage, your car loans, and all your paperwork. It includes all publicly available social media, certainly including X, Facebook, Instagram, and TikTok (and includes your private accounts, since your data is not private to the companies that run the platforms). You A life includes financial transactions through credit cards or apps like Venmo and Cashapp (and not only transactions visible to the public). Your A life includes all of your rewards cards besides the punch cards at your local cafe. Your A life includes anything you send by unencrypted email, especially gmail. Your A life includes anything you type into google or anything you do in other tabs while you’re signed in to google (unless you use some sort of container to keep it isolated). Your A life builds a profile on you, one that is normally available to advertisers but is likely available to police and the state.
The brighter the light, the deeper the shadows. The purpose of your A life is to shine bright enough to obscures the rest of your activities. The state, reliant on automated profiles, might not notice the activity that is harder to scrape.
It’s useful to have an A life. If someone disappears entirely off of all platforms overnight, that could easily raise red flags to surveillance mechanisms.
For most people and for most purposes, the goal of your A life isn’t to appear squeaky clean and patriotic. Sure, people who are committed to a life of resistance might want to make their aboveground persona as palatable as possible, but in general there a value to having disagreement with the status quo be quite visible. Queers and other marginalized people disappearing from public life is what the fascists want, and I am not in the habit of encouraging people to give the fascists what they want.
C Life
Most people are unlikely to need a C life (your Crime life). Your C life includes everything that you hope is completely untraceable. This essay is not a guide to a C life, to the level of security necessary to act in criminal ways within a modern authoritarian state. At the very least it would require end-to-end encryption with disappearing messages and/or meeting in person without phones present, but there is far more to evading the modern state when it is actively searching for you. I have never done so and have no advice here.
B Life
I wasn’t able to come up with something cute that “B life” would stand for, unfortunately, but it is the primary subject of this essay. The purpose of the B life, the demiground, is to live as full and normal of a life as possible while controlling and limiting your digital footprint. In order to populate the demiground, we need to make it as inviting as possible. It needs to be clear that not only is there political value in being obscure to the state, but that it is also a better and more fulfilling way to live.
Note that this essay is not a complete set of instructions of how to live in the demiground, simply a set of principles and a draft of first steps we might take.
Some ideas about how to participate in the demiground:
Prioritize in-person communication and socializing
Message only by Signal: no digital communication is totally secure, but end to end encrypted communication can’t be fed into algorithms
Avoid social media: any online discussion that is not specifically encrypted should only happen on platforms that allow for anonymity, do not track what is written, and are not publicly visible.
Pay for everything in cash: anything purchased with a card or online account is an A life transaction.
Degoogle your life: While it might be necessary to maintain a gmail account for your A life (for work, for government paperwork, or other purposes), move all other email correspondence to non-google accounts, especially end-to-end solutions like Protonmail.
Use a secure browser: Firefox and Brave are built with security and privacy in mind. Brave is more single-mindedly privacy focused, but is built on google architecture. Use containers to isolate websites that attempt to track you.
Encrypt your hard drive and use only encrypted cloud storage
Distribute media in alternative ways: this essay, posted on Substack, is not part of demiground culture. Demiground culture is not posted on social media, but instead distributed through signal loops, encrypted email, and most especially in person. Magazines could be distributed through announcement-only signal groups or at in-person social events.
Signpost for the demiground in the aboveground: the goal of building a demiground culture is to help more people leave tracking behind. Participating in the aboveground in order to encourage people to join the demiground is worth doing.
There are other steps that may or may not be necessary or advisable, like moving to Linux from Windows or MacOS. Historically, companies like Google and Apple have actually been rather valuable from a security standpoint, as it has been in their best interests to protect their corporate clients from government overreach. It is hard to say exactly how secure they are and will remain in the modern era as tech companies cozy up to the state. And some of the specifics of how to interact with the demiground will change overtime as new tools are developed (like a system of digital payments that cannot so easily be traced).
There are people living in some version of the demiground now, of course. Direct action activists, sex workers, and criminals have developed tools and best practices for living semi-underground over the course of generations. This is not an idea I have invented, but it is one that I think might need to be more widely adopted in counter to rising authoritarianism.
Fascism is no longer on the horizon, it is here. Part of keeping ourselves and our communities safe is making ourselves less transparent to the state without disappearing completely. And part of keeping ourselves and our communities safe is being ready to memorize and burn some lists of names.
And if we’re able to build stronger in-person ties in the process, all the better.
I’m very grateful for this article and how the information is presented; it felt readable and like good, actionable advice. Do you know of resources for people who are pretty new to countering surveillance and are perhaps not that savvy with tech but want to take some of your advice further than what could be shared here? I have been listening to your podcast episode with Daly from EFF and that has been helpful, but even with that I did feel at times a bit intimidated and under-resourced, even as I would like to take steps for the safety of myself and family and community. I know you’re busy. Any help is appreciated.
Appreciate the thoughtfulness! Where would you put invitation-only groups hosted by something like Discord on these lists?