Things used to be Simple...

Your home network and devices on it – your computers, cell phones, printers, tv’s used to be simple…
…but now they are surveillance devices in a multi point surveillance web

Inside of your Phone right now is a Battle waged by Dozens of Corporations for your Information and Attention.
But it doesn’t stop here. It extends to where your laptop, your apps, your online services. 

ByteDance compete with Meta – TikTok vs Facebook & Instagram begging for your attention.
Google, Apple, Microsoft against each other in the Browser or OS Wars

If only it was that simple.

The Same ‘Investors’ have holdings in many of the Same Companies that provide the things you use daily,
Giving Shareholders like Blackrock, Tencent and others information on you. 

Your Data is used is many places, correlated against many other data points to build a whole profile, 24/7 stretching back to first interaction with you.
All to Provide you with ‘Better Service’ – until that data is leaked on the Dark Web and you become another statistic in a news article. 

Your Network is not just a Network

The network in your home is usually controlled by one central device – a router or gateway, often supplied by your ISP.
This is convenient and useful, but is highly sensitive and private, now it’s exploited, not by hackers, but by companies. 

Years ago, routers were straightforward: they worked locally, did their job, and improved over time as manufacturers competed to build better hardware and features. Customers upgraded by choice.

But that changed when the cloud became the default business model – and data harvesting your activity became the product.

The Shift to the Cloud Wasn’t for You

They didn’t move features online to help you – they moved them to track you.

Router manufacturers and ISPs needed visibility they didn’t previously have.
When they realized moving things to the cloud could do that, they doubled down on it. 

So features that used to run privately inside your home that have no business been in a cloud began moving into cloud platforms.
Suddenly, managing your network required apps, accounts, remote dashboards, and “smart” services.
Suddenly devices you purchased were updated with reduced or privacy reducing features, often hidden behind cloud or paywalls. 
Worse, when they need you to buy new devices to increase their quarter earnings they can brick your devices remotely or force them to underperform,

This made it easier to hide what was really happening behind the scenes: tracking, profiling, and behavioral data collection and monitisation.

Your Network Leaks Identity by Design

The moment a device connects, it reveals who it is.

 When your laptop, phone, or computer connects to your home network, it sends a DHCP request asking for: an IP address, a gateway address, DNS servers

In doing so, it broadcasts its MAC address – a unique identifier tied to that physical device.
Your router listens for this request using DHCP, then assigns that device a unique internal IP and tells it which DNS servers to use.

This is the foundation of everything online in your home.
And DNS is the most dangerous part – because DNS is what translates every domain name you visit into an IP address.

Even if nothing else is tracked, DNS alone reveals exactly what you do online.

Hackers Attack Outside. Corporations Exploit Inside.

Your entire home depends on systems they already control.

Today, a single router handles everything:

DHCP (hands out IP addresses)
DNS (translates websites into IPs)
Gateway services (internet access)
Wi-Fi access
Firewall protection
and much more

This means ISPs now have full insight into your network.

And if you use devices like Google Nest, then Google can know:
every website you visit, every device on your network, who is online, what they use, and when they use it.

This is why you mention “birthday cake” near someone with TikTok and suddenly ads appear minutes later.
It’s why private conversations over Gmail or Outlook can quietly influence what ads you and your family start seeing.

This isn’t coincidence.
You are being profiled.
You are being manipulated.

Take back control of your network