Trust Revolution

Trust Revolution

https://feeds.fountain.fm/OIYZniSDb9jd3Pb78CpF
0 Followers 36 Episodes Claim Ownership
Unfiltered conversations with builders, thinkers, and operators in Bitcoin and beyond. Exploring the systems we trust, why they work (or don't), and what comes next.

Episode List

Your Data's Already Gone. Now What? | James Lee

Feb 26th, 2026 1:00 PM

“You cannot have data compromised that you do not have.” James Lee has spent two decades watching breach transparency collapse—from near-total disclosure in 2020 to just 30 percent today. The president of the nation's leading identity crime nonprofit breaks down why your Social Security number is worthless on the black market. Why your driver's license isn't and what individuals can actually do when the system designed to protect them has already failed. Episode Summary James Lee has seen the identity crisis from both sides. He was a senior executive at ChoicePoint when a 2005 data breach triggered the first wave of breach notification laws in the United States. He now leads the Identity Theft Resource Center, the nation's only nonprofit providing free identity crime victim assistance. The ITRC's 20th annual data breach report, released weeks before this conversation, tracked a record 3,322 compromises in 2025—a 79 percent jump over five years—while 70 percent of breach notices failed to disclose how the attack happened. Lee walks through the real economics of stolen identity: Social Security numbers carry zero resale value because the market is so flooded, while driver's license numbers command $150 to $2,000 depending on the state, a direct consequence of pandemic-era digital verification expanding their use far beyond the DMV. The conversation moves through the limits of KYC, the case for data minimization over data hoarding, and why the ITRC advocates for more friction in financial transactions. What it means is that breached data from years ago is being recycled into new attacks. Lee makes the case that individuals, organizations, and government all need to act—and none can solve identity crime alone. About the Guest James E. Lee is president of the Identity Theft Resource Center (ITRC), the nation's leading nonprofit dedicated to supporting victims of identity crime at no cost. Before joining ITRC's staff in 2020 as COO, Lee served over a decade on its board of directors, including three years as chairman. His career spans senior leadership at ChoicePoint (now LexisNexis), where he navigated the landmark 2005 data breach, and Irish cybersecurity firm Waratek. He chaired two ANSI working groups on identity management and privacy and has testified before the Senate Commerce Committee on identity crime trends. Lee holds credentials from the University of Texas Center for Identity, the Wharton School, and the University of Arkansas. LinkedIn: James E. Lee ITRC: idtheftcenter.org ITRC on X: IDTheftCenter Key Quotes “You cannot have data compromised that you do not have. So data breaches go down right there. Data breaches go down, victims go down. Data breaches go down, cybersecurity attacks go down.” — James Lee “That one percent of revenue put a hundred percent of the enterprise at risk.” — James Lee “Your driver's license has become the de facto social security number because the social security number is so compromised.” — James Lee Key Takeaways Breach transparency is collapsing, and it's by design: In 2020, nearly 100 percent of organizations disclosed root cause details in breach notices. By 2025, only 30 percent did—leaving individuals unable to assess their own risk or take informed action. Your Social Security number is worthless, but your driver's license isn't: SSNs are so widely compromised they're given away free in stolen data bundles. Driver's license numbers, newly valuable because of pandemic-era digital verification, sell for $150 to $2,000 on criminal marketplaces. Data minimization beats data security: The most effective defense against breaches isn't better encryption—it's collecting less data in the first place. If you don't need it, don't collect it. If the purpose is fulfilled, delete it. Freeze your credit and adopt passkeys today: Credit freezes are free, take minutes, and are the single most effective step individuals can take. Passkeys eliminate the credential-reuse problem that fuels most account takeovers. Timestamps [00:04] The ChoicePoint breach: what a 2005 data disaster taught James Lee about institutional accountability [09:26] Are data brokers a net positive? The uncomfortable tradeoff between utility and risk [12:07] Breach notice fatigue: when data breach letters become a humiliation ritual [15:24] From ChoicePoint to ITRC: how James Lee ended up on the other side of the table [18:42] Breach transparency on the decline: better legal cover, worse consumer protection [23:33] The golden age of identity crime: what ITRC advisors hear from victims today [28:27] Recycled stolen data: old breaches fueling new attacks at scale [30:21] Why your driver's license is now worth more than your Social Security number [33:42] KYC under pressure: app-based identity verification getting duped by stolen credentials [38:13] The case for friction: why instant payments make fraud easier [44:44] Government data sharing: DOGE, SSA, and the fight over federal databases [48:18] Data minimization: should anyone be holding this much data in the first place? [53:19] Credit freezes, passkeys, and individual control over identity [57:33] Redesigning identity from scratch: ITRC's new vision [1:01:06] Three things to do today if you've been breached Mentioned in Episode: ITRC 2025 Annual Data Breach Report — ITRC's 20th edition tracking record 3,322 compromises in 2025 Identity Theft Resource Center — Free victim assistance via phone, text, or live chat: 888.400.5530 Podcast: Subscribe: https://podcast.trustrevolution.co Music: More Ghost Than Man

Your Money, Your Data, Your Mind | Jesse Posner

Feb 19th, 2026 1:00 PM

“If somebody gets control over your personal AI — all your health data, all your financial data, all your emails, everything you've thought about — they own you.” Jesse Posner built FROST threshold signatures and shipped BitKey at Block. Now he's building Vora because he realized individual self-custody is still a LARP — and the stakes are about to get much higher. Episode Summary Most people think a hardware wallet means they've solved self-custody. Jesse Posner spent years at Coinbase and Block learning exactly why that's wrong. Without a full node, your wallet leaks your balance and IP address to third-party servers. Without physical security integration, your keys are one wrench attack away from worthless. Without verifiable hardware, your entire setup might be compromised from the factory floor. Vora is building the integrated answer: a sovereign device combining a full Bitcoin node, air-gapped hardware wallet, tamper detection, and emergency response — all designed so that attacking a Bitcoiner becomes more expensive than it's worth. But Posner isn't stopping at money. He argues the next frontier of self-custody is your mind. As personal AI agents accumulate our most intimate data — health records, financial decisions, private thoughts — whoever controls that AI controls the person. Vora's “guardian AI” architecture uses hardware-backed isolation to guarantee that no prompt injection can reach your most trusted model, while still letting you harness frontier cloud models for non-sensitive tasks. The same cypherpunk principles that protect Bitcoin keys now protect the most valuable asset of all: your autonomy. About the Guest Jesse Posner is CEO and co-founder of Vora, a startup building Bitcoin-grade self-custody for both digital assets and AI. A trained lawyer turned cryptographic engineer, Posner spent over four years at Coinbase on key management, then helped build BitKey at Block. He created the first BIP-340 compatible implementation of FROST (Flexible Round-Optimized Schnorr Threshold Signatures), supported by a Brink grant. His work sits at the intersection of cryptography, constitutional law, and physical security — bringing an unusually broad lens to the question of individual sovereignty in the digital age. X/Twitter: jesseposner Nostr: jesseposner on Primal LinkedIn: Jesse Posner GitHub: jesseposner Company: Vora Key Quotes “We wanted to make self-sovereignty real — where you can control your Bitcoin, maintain your privacy, protect yourself from physical attacks, and resist government seizure.” — Jesse Posne “If somebody gets control over your personal AI, they own you. You could literally lose control of your identity.” — Jesse Posner “The nation-state system is like a dead man walking — the ground has already shifted and we're just seeing the slow collapse.” — Jesse Posner Key Takeaways A hardware wallet without a full node is a privacy leak: Every time your wallet checks your balance through a third-party server, it reveals your UTXOs and IP address — giving attackers a map to your Bitcoin and your front door. Self-custody must include physical security, not just key management: Vora integrates tamper detection, time-delayed spending, and emergency dispatch into the custody system itself, making the economics of attacking a Bitcoiner unprofitable. FROST threshold signatures eliminate the privacy and cost penalties of multi-sig: Traditional multi-sig reveals your entire key setup on-chain. FROST produces a single signature indistinguishable from a solo signer, with the ability to refresh, revoke, and add key shares without moving Bitcoin. Your personal AI is the next self-custody frontier: As AI agents accumulate intimate personal data and gain the ability to act on your behalf, controlling that AI becomes as critical as controlling your keys — and the same cypherpunk architecture applies. Timestamps [00:00] Introduction and Jesse's background at Coinbase and Block [03:16] How institutional vs. individual self-custody differs [06:30] Executive Order 6102 and constitutional resistance to government seizure [09:05] Physical security: integrating alarms, tamper detection, and emergency response [14:31] The $5 wrench attack problem and why it gets worse as Bitcoin appreciates [17:53] Why a full node matters for privacy — your wallet is leaking data [22:48] Supply chain attacks and the case for verifiable hardware [27:23] Trusted execution environments: powerful but not impervious [32:40] How FROST threshold signatures work and why they matter [39:29] Proactive security: refreshing key shares without moving Bitcoin [44:37] Self-custody of AI: why controlling your mind is the next frontier [48:58] Prompt injection attacks and the “lethal trifecta” [52:47] Guardian AI architecture: hardware-isolated models that can't be corrupted [54:57] Fiduciary AI: confidentiality and undivided loyalty in a single concept [1:06:02] Vora's product roadmap: AI product this year, Vora Vault next year [1:09:34] Why the modern state has already collapsed — topos and nomos [1:14:24] Five-year vision: sovereign hardware, personal drones, and a renaissance of human flourishing Resources & Links Vora — Bitcoin-grade self-custody for digital assets and AI FROST Implementation — Jesse's BIP-340 compatible FROST in secp256k1-zkp Brink — Open-source Bitcoin development funding (supported Jesse's FROST work) Bunny's hardware verification research — Non-destructive chip imaging for verifiable hardware Distrust / Enclave OS — Security contractors building the isolation OS for Vora Podcast Subscribe: https://podcast.trustrevolution.co Music: More Ghost Than Man

S03E04 John Robb — Total Surveillance Is One Switch Away

Feb 13th, 2026 1:00 PM

“All it takes is the political will or the political mistake to turn it on. And it's there.” John Robb maps the path from post-national identity collapse to automated totalitarian surveillance—and explains why most of the tools people are counting on won't stop it. Episode Summary The systems holding society together are breaking down faster than most people realize. John Robb returns to Trust Revolution to connect two accelerating forces: the collapse of shared national identity that made trust and governance possible and the rise of autonomous AI that makes population-scale surveillance trivially cheap. When common identity dissolves, everyone treats the state as a system to loot—and those benefiting from the looting need tools to maintain control. That tool is what Robb calls “the long night”: AI assigned to every individual, building profiles, manipulating behavior, punishing dissent, all automated by a small group with network access. Musk buying Twitter delayed but didn't prevent it. Asked whether Bitcoin, encryption, or decentralized networks can counter state-level AI surveillance, Robb is blunt: probably not. What individuals can do is leverage AI aggressively for personal economic advantage, build persistent AI agents they actually control, and resist the emotional manipulation that makes authoritarian lockdown feel necessary. Robb gives the window at roughly ten years before the economic singularity separates those who paired with AI from those who didn't. About the Guest John Robb is the editor of the Global Guerrillas Report on Substack and Patreon, where he publishes predictive frameworks at the intersection of war, technology, and politics. A former USAF special operations pilot who flew Tier 1 missions with Delta and SEAL Team 6, Robb later earned his MPPM from Yale, became Forrester Research's first internet analyst, and co-founded Gomez Advisors (sold to Compuware for $295 million). He is the author of Brave New War, a military strategy classic on open-source warfare. His work focuses on how networked systems create both unprecedented fragility and opportunity for individuals navigating institutional collapse. X/Twitter: https://twitter.com/johnrobb Substack: https://johnrobb.substack.com Patreon: https://www.patreon.com/johnrobb LinkedIn: https://www.linkedin.com/in/john-robb-97518/ Key Quotes “We don't trust each other anymore. Everything anyone else says, you treat it like an attack.” — John Robb “If you find yourself being enraged—absolutely anything, even if you think it's justified—walk away. You are being played.” — John Robb “Every investment [of data] you make is going to be siphoned off to the cloud and used by them to compete against you.” — John Robb Key Takeaways The surveillance state doesn't require a conspiracy — just a switch: Corporations already built every component of totalitarian AI surveillance through normal product development. Automated, individualized manipulation at population scale is now a matter of political will, not technical capability. Bitcoin and encryption probably won't stop the long night: Robb is direct — decentralized tools can't match the degree of control a fully deployed AI surveillance system would exert. The political and social dynamics driving demand for that control are stronger than the technical countermeasures available. AI leverage is the individual's economic lifeline: The gap between those who pair with persistent AI agents and those who don't will widen into an unbridgeable economic divide within a decade. The priority is building AI tools you control locally — centralized services siphon your intelligence and use it to compete against you. Empathy triggers are weaponized at network speed: Viral content manufactures tribal identity in days — what took nation-states years of propaganda. Recognizing when you're being conscripted into an emotional swarm is a core survival skill for anyone navigating algorithmic media. Timestamps [00:28] Why post-nationalism and AI autonomy are the two forces reshaping everything [03:19] What autonomous AI actually means — and why current systems fall apart after eight hours [07:58] The long night: what a modern totalitarian surveillance state looks like [14:58] Why Musk buying Twitter only delayed the surveillance threat [17:08] How the end of the Cold War began the structural replacement of the middle class [20:44] Surveillance as a service — what job it does for the cosmopolitan elite [28:31] Why Bitcoin and encryption probably can't counter state-level AI surveillance [29:17] Data ownership as the missed opportunity — sharecroppers on your own land [38:25] Building persistent AI agents as personal economic leverage [45:21] Top 10% now drive half of consumer spending — what that means for technology development [54:13] Empathy swarms: how viral content manufactures tribal identity in days [1:01:10] Staying connected, staying skeptical, and screening your family's AI exposure [1:07:14] Expanding the Dunbar number through AI trust proxies Resources & Links Mentioned in Episode: Global Guerrillas Report — Robb's Substack with frameworks on war, technology, and politics Brave New War — Robb's book on open-source warfare and decentralized conflict Maneki Neko by Bruce Sterling — Short story about an AI-mediated gifting economy that displaces traditional markets Murderbot Diaries by Martha Wells — Science fiction series exploring autonomous AI and corporate security Podcast: Subscribe: https://podcast.trustrevolution.co Music: More Ghost Than Man

S03E03 Aaron van Wirdum – Bitcoin's Origin Story and the Unfinished Fight

Feb 6th, 2026 1:00 PM

“The cypherpunks who tried to build digital cash before Bitcoin might one day be remembered like America's founding fathers.” Aaron van Wirdum spent five years writing The Genesis Book—and warns the fight for money outside of government control isn't over. EPISODE SUMMARY Bitcoin didn't appear from nowhere. For decades before Satoshi, a scrappy band of cryptographers, privacy activists, and heterodox economists tried to build digital cash that could operate outside government control. They all failed—until one anonymous inventor synthesized their ideas into a system that actually worked. Aaron van Wirdum, author of The Genesis Book and former editor-in-chief of Bitcoin Magazine, traces this lineage from David Chaum's DigiCash in the early 90s through Nick Szabo's Bit Gold to Satoshi's breakthrough: using proof of work for consensus rather than as currency itself. But the origin story doesn't end with invention. Van Wirdum covered the 2015-2017 block size wars in real time—when miners, exchanges, and venture-backed startups controlling 80% of economic activity tried to change Bitcoin's rules and lost to anonymous node runners in basements. Today, the threat has shifted. Mining is concentrated, privacy developers face prison, and incremental regulation slowly suffocates self-custody. The question isn't whether Bitcoin can survive a 51% attack. It's whether it can survive becoming as monitored and controlled as email. ABOUT THE GUEST Aaron van Wirdum is the author of The Genesis Book: The Story of the People and Projects That Inspired Bitcoin and former editor-in-chief of Bitcoin Magazine's print edition. He discovered Bitcoin in 2013 and spent over a decade documenting its technical evolution and governance battles, including real-time coverage of the block size wars. Based in the Netherlands, van Wirdum studied journalism and the historical influence of technology on social structures at Utrecht University. He left X/Twitter and is now active on Nostr. Nostr: https://primal.net/AaronvanW Book: https://thegenesisbook.com KEY QUOTES “The market decides what is Bitcoin. That is ultimately what it comes down to.” — Aaron van Wirdum “The big concern is sort of the emailification of Bitcoin—where the protocol is still out there, but no one's actually interacting with it directly because everything is happening through [custodial solutions and regulated entities.]” — Aaron van Wirdum “Bitcoin is the best form of money ever invented, if it all keeps working as intended.” — Aaron van Wirdum KEY TAKEAWAYS Bitcoin is an evolutionary step, not a lucky accident: Satoshi synthesized decades of failed attempts—Hashcash's proof of work, DigiCash's privacy, Bit Gold's decentralized registry—into a system where the pieces finally fit together. The difficulty adjustment algorithm and using proof of work for consensus (rather than as currency) were the crucial breakthroughs. The block size wars proved Bitcoin's immune system works: When 50 companies representing 80% of economic activity tried to change the rules in 2017, fork futures markets revealed the market valued the conservative version. The users—not the miners or corporations—ultimately decide what Bitcoin is. Individual miners refusing transactions is annoying, not existential: F2Pool censoring OFAC-sanctioned transactions means slightly longer confirmation times. The real threat is miners refusing to build on blocks that include those transactions—that's when censorship becomes enforced. Regulatory suffocation is the most plausible failure mode: Not a protocol attack, but incremental KYC/AML rules that make self-custody harder, privacy tools illegal, and Bitcoin's actual use as digital cash impossible while ETFs and “institutional allocators” hold a version that's no different from any other financial asset. TIMESTAMPS [00:01] Introduction and the cypherpunk vision of building money outside government control [03:44] Tim May's radical vision: the internet as a new frontier for institutions [11:26] David Chaum and DigiCash: how the first working digital cash almost became a banking standard [17:15] Nick Szabo's Bit Gold: inching toward Bitcoin and why it couldn't quite work [21:07] Bitcoin's known weakness: the 51% attack and mining centralization today [25:27] The block size wars: how close Bitcoin came to capture or destruction in 2017 [33:58] Transaction censorship: when it matters and when it doesn't [38:25] The OP_RETURN debate: harm reduction versus fighting spam [47:54] Why Aaron's still here after 13 years: “What is more important than money?” [54:46] The dimming torch: privacy as Bitcoin's underemphasized origin story [56:15] The most plausible failure mode: incremental regulation and the emailification of Bitcoin [60:54] Practical advice: get a wallet, get some Bitcoin, just try it RESOURCES & LINKS Mentioned in Episode: Bitcoin Magazine - Aaron van Wirdum's articles - His coverage of Bitcoin over the past decade New York Agreement (Bitcoin Wiki) - The 2017 scaling proposal that 50+ companies tried to force through How David Chaum's eCash Spawned a Cypherpunk Dream - Van Wirdum's deep dive on DigiCash history DigiCash (Wikipedia) - Background on the first digital cash system Podcast: Subscribe: https://podcast.trustrevolution.co Music: More Ghost Than Man

S03E02 Jason Hughey – Companies Don't Keep Promises. People Do.

Jan 30th, 2026 3:01 PM

Enron had “integrity” as a core value. FTX had none at all. Both collapsed. Jason Hughey argues the problem isn't whether companies state their values—it's whether those values function as actual decision-making frameworks or just motivational posters on the wall. Episode Summary Most organizations betray trust not through malice but through design. Jason Hughey breaks down the two paradigms shaping every workplace: top-down control systems that optimize for short-term extraction, and emergent systems that treat employees as contributors rather than resources. The dysfunction you've felt—being punished for good ideas, watching customer service decline to hit quarterly targets, seeing values that exist only on walls—isn't random. It's built in. Hughey works with a framework called Principle Based Management, developed by Charles Koch at Koch Industries and first codified in 1990. The core distinction: rules tell people what to do, principles empower them to decide. When you suppress the signals coming from people closest to the work, you get the same coordination failures that collapsed the Soviet economy—just at company scale. The alternative requires hiring for virtue over talent, building genuine challenge cultures, and committing to low time preference even when it's not exciting. If better money requires better principles, better organizations might too. About the Guest Jason Hughey leads business development at Satoshi Pacioli, a Bitcoin-focused accounting firm founded in 2022, where he's also driving the firm's adoption of Principle Based Management—a framework rooted in Austrian economics that treats organizations like markets rather than command structures. With over ten years in customer experience and team building, including time in the fitness industry, Hughey brings a practitioner's lens to management theory. He co-authored Called to Freedom (2016), exploring the intersection of Christianity and libertarianism. LinkedIn: https://www.linkedin.com/in/jasonhughey/ Satoshi Pacioli: https://satoshipacioli.com Substack: https://satoshipacioliaccounting.substack.com Key Quotes "Values or a company's culture becomes the motivational poster on the wall that you walk by and acknowledge and see the word integrity there, and then you forget about it." — Jason Hughey "When you are consistently using your power to shut down those signals that are emerging from people who are on the front lines doing the work, you're going to run into the problem of now we're not getting the knowledge to where it needs to go." — Jason Hughey “The value is the ideal that you live by. The virtue is the day-to-day commitment to doing it.” — Jason Hughey Key Takeaways Stated values mean nothing without lived virtue: Enron had “integrity” on the wall. The distinction between values (ideals you claim) and virtue (daily commitment to act on them) separates companies that build trust from those that betray it. Suppressing internal signals creates Soviet-style coordination failures: When employees are punished for bringing ideas or challenges forward, knowledge stops flowing to where it's needed—the same problem that collapsed centrally planned economies, just at organizational scale. Hire for virtue first, talent second: Talent can be coached; character rarely changes. If you have to choose between someone highly skilled who plays politics and someone less skilled with integrity, take the latter. Principles empower, rules constrain: Rules-based management treats employees as resources to accomplish tasks. Principle-based management gives people a framework and lets them decide—unlocking creativity, ownership, and better customer outcomes. Timestamps [00:48] Why most organizations betray trust—two competing management paradigms [04:41] FTX, Enron, Theranos: the pattern behind corporate values failures [09:16] The fifth dimension of PBM: self-actualization and meaning at work [11:34] Design choices that guarantee dysfunction—challenge culture and cult of personality [16:18] How high time preference management destroys customer service and employee trust [20:35] Information flow in broken organizations—when signals get siloed or shut down [23:49] The socialist calculation problem applied to business management [26:01] Principles vs. rules: empowering employees to decide [29:08] What local knowledge actually requires—integrity, challenge culture, knowledge systems [30:49] Virtue vs. values: the ideal you claim vs. the commitment to live it [36:06] Building scaffolding so you don't fall when times get tough [39:08] Where to start when your team shows cracks—two diagnostic questions [43:24] Hiring for virtue when everyone can perform values in an interview [49:41] What's been harder than expected implementing PBM at Satoshi Pacioli [52:21] What changes if more organizations operated this way—restoring trust [55:41] The infinite game: low time preference as competitive advantage [59:13] Legitimate organizational authority and equal application of rules Mentioned in Episode: TFTC #699: Jason Hughey on Principle Based Management (Jan 17, 2026) — Jason's conversation with Marty Bent Principle Based Management — The framework developed by Charles Koch at Koch Industries, first codified in 1990 Podcast: Subscribe: https://podcast.trustrevolution.co Music: More Ghost Than Man

Get this podcast on your phone, Free

Create Your Podcast In Minutes

  • Full-featured podcast site
  • Unlimited storage and bandwidth
  • Comprehensive podcast stats
  • Distribute to Apple Podcasts, Spotify, and more
  • Make money with your podcast
Get Started
It is Free