Appendix A – Core Definitions
This appendix defines the foundational terms used throughout the CARS Digital Privacy System, including narrative metaphors, structural elements, and terminology from training and profile specifications.
NOTE: Some of these terms originated before the formal CARS Profile Specification was finalised. Earlier drafts — such as the Step 2 Training Document — reflect conceptual language that helped shape the system but may differ from SLOT-enabled profiles. These materials remain useful for training, teaching, and onboarding.
🔐 Big Tech
A collective term for dominant technology corporations that profit from surveillance capitalism, data mining, behavioural tracking, and platform monopolies.
- In the CARS narrative, Big Tech is represented by The Saboteur — the force of distraction, dependency, and digital bait.
🏛 Big Brother
A metaphor for governments, institutions, and regulatory frameworks that aim to enforce digital control systems through surveillance, compliance, and mandatory identity.
- In the CARS story, Big Brother is The Enforcer — building the rules, walls, and checkpoints of the Digital Prison.
🧱 Digital Prison
The end-state of centralised digital control, where your identity, currency, data, and access to services are fully monitored, regulated, and conditioned.
- Escaping the Digital Prison is the mission of CARS.
🚪 Exit
A viable pathway out of a Big Tech–dominated service, workflow, or platform.
- Exits allow escape from systems before they become mandatory or irreversible.
- Each CAR is built around protecting and using a specific exit.
🛻 CARS (Compartmentalisation, Alternatives, Responsibility, Security)
A CARS Profile is a digital escape vehicle — a structured identity-technology-purpose bundle designed to isolate, protect, and operate one part of your digital life with privacy and intention.
Every CAR includes:
- Driver – The identity or persona (real or synthetic)
- Vehicle – The technologies and tools used
- Destination – The intended task, outcome, or area of life compartmentalised
🧑✈️ Driver
The identity operating a CAR.
May be:
- Real – True name or verified self
- Anonymous – Pseudonym with no traceable connection
- Fake – Generated persona with strategic misinformation
- Alter-Ego – Role-based digital representation (e.g., creator, admin)
Drivers include risk profiles, anonymity strategies, and operating protocols.
🔧 Vehicle
The hardware, software, and services used to operate a CAR.
Includes:
- Device Type (e.g., phone, laptop, Raspberry Pi)
- Operating System (Linux, GrapheneOS, etc.)
- Network Stack (VPN, Tor, I2P, mesh)
- Application Stack (Browser, messaging, storage, etc.)
Vehicles are how the CAR is “driven” — they carry the identity and perform the function.
🗺 Destination
The mission or compartment this CAR is designed to protect.
Can be:
- A category (e.g., financial, research, medical)
- A goal (e.g., anonymous publishing, secure collaboration)
- A toolset (e.g., private messaging, offline productivity)
🧩 SLOT
A predefined modular sub-profile that replaces one or more required Level 2 subheadings.
SLOTs allow:
- Profile reuse
- AI-generated profile segments
- Risk-verified trust inheritance
- Workflow automation
Examples:
- Virtual Driver’s License SLOT
- Risk Profile SLOT
- Tech Stack Pit Crew SLOT
🧠 CARS Profile
A full profile document (Markdown format) representing one CAR.
Built using the 10-section structure, each with Level 2 modularity and SLOT-enabled replacement logic. Profiles can be:
- Manually built
- AI-assisted
- Trusted and validated with integrity marks
🧱 Roadblock
Any internal or external obstacle that prevents the user from making progress in the mission of digital privacy.
Examples:
- Fear of breaking something
- Misinformation about security
- Apathy (“It’s too late to fix anything”)
- Overload from too many options
Roadblocks are featured throughout training and are tied to CAR Sections like Risk, Driver, and Privacy.
🛠 Digital Freedom Technologies (DFTs)
Tools, platforms, protocols, or services that:
- Respect privacy by design
- Avoid surveillance capitalism
- Support decentralised or user-owned infrastructure
- Prioritise freedom, not profit
Includes: FOSS apps, self-hosted tools, mesh networks, P2P platforms, and identity-free services.
🧑💻 Digital Freedom Assistant (DFA Assistant)
AI tools trained to help build, validate, and manage CARS. They:
- Suggest SLOTs
- Validate Profile Consistency
- Offer migration guidance
- Help identify threats or duplication
🏁 The Race
The narrative metaphor behind the 10-Step Training:
You are in a race to escape before 2027, when the Zero Trust Internet becomes a global reality.
This race involves:
- Finding exits
- Building and deploying CARS
- Reaching Digital Freedom Destinations
- Avoiding the Digital Prison’s final lock-in
🔒 Zero Trust Internet (ZTI)
The future digital infrastructure requiring verified identity for nearly all online access.
- Backed by government, financial, and corporate stakeholders
- The 2027 deadline represents the “exit sealing” point
- Once ZTI is deployed, escape becomes significantly harder
