Appendix A – Core Definitions

Appendix A – Core Definitions

This appendix defines the foundational terms used throughout the CARS Digital Privacy System, including narrative metaphors, structural elements, and terminology from training and profile specifications.

NOTE: Some of these terms originated before the formal CARS Profile Specification was finalised. Earlier drafts — such as the Step 2 Training Document — reflect conceptual language that helped shape the system but may differ from SLOT-enabled profiles. These materials remain useful for training, teaching, and onboarding.


🔐 Big Tech

A collective term for dominant technology corporations that profit from surveillance capitalism, data mining, behavioural tracking, and platform monopolies.

  • In the CARS narrative, Big Tech is represented by The Saboteur — the force of distraction, dependency, and digital bait.

🏛 Big Brother

A metaphor for governments, institutions, and regulatory frameworks that aim to enforce digital control systems through surveillance, compliance, and mandatory identity.

  • In the CARS story, Big Brother is The Enforcer — building the rules, walls, and checkpoints of the Digital Prison.

🧱 Digital Prison

The end-state of centralised digital control, where your identity, currency, data, and access to services are fully monitored, regulated, and conditioned.

  • Escaping the Digital Prison is the mission of CARS.

🚪 Exit

A viable pathway out of a Big Tech–dominated service, workflow, or platform.

  • Exits allow escape from systems before they become mandatory or irreversible.
  • Each CAR is built around protecting and using a specific exit.

🛻 CARS (Compartmentalisation, Alternatives, Responsibility, Security)

A CARS Profile is a digital escape vehicle — a structured identity-technology-purpose bundle designed to isolate, protect, and operate one part of your digital life with privacy and intention.

Every CAR includes:

  • Driver – The identity or persona (real or synthetic)
  • Vehicle – The technologies and tools used
  • Destination – The intended task, outcome, or area of life compartmentalised

🧑‍✈️ Driver

The identity operating a CAR.
May be:

  • Real – True name or verified self
  • Anonymous – Pseudonym with no traceable connection
  • Fake – Generated persona with strategic misinformation
  • Alter-Ego – Role-based digital representation (e.g., creator, admin)

Drivers include risk profiles, anonymity strategies, and operating protocols.


🔧 Vehicle

The hardware, software, and services used to operate a CAR.
Includes:

  • Device Type (e.g., phone, laptop, Raspberry Pi)
  • Operating System (Linux, GrapheneOS, etc.)
  • Network Stack (VPN, Tor, I2P, mesh)
  • Application Stack (Browser, messaging, storage, etc.)

Vehicles are how the CAR is “driven” — they carry the identity and perform the function.


🗺 Destination

The mission or compartment this CAR is designed to protect.
Can be:

  • A category (e.g., financial, research, medical)
  • A goal (e.g., anonymous publishing, secure collaboration)
  • A toolset (e.g., private messaging, offline productivity)

🧩 SLOT

A predefined modular sub-profile that replaces one or more required Level 2 subheadings.
SLOTs allow:

  • Profile reuse
  • AI-generated profile segments
  • Risk-verified trust inheritance
  • Workflow automation

Examples:

  • Virtual Driver’s License SLOT
  • Risk Profile SLOT
  • Tech Stack Pit Crew SLOT

🧠 CARS Profile

A full profile document (Markdown format) representing one CAR.
Built using the 10-section structure, each with Level 2 modularity and SLOT-enabled replacement logic. Profiles can be:

  • Manually built
  • AI-assisted
  • Trusted and validated with integrity marks

🧱 Roadblock

Any internal or external obstacle that prevents the user from making progress in the mission of digital privacy.
Examples:

  • Fear of breaking something
  • Misinformation about security
  • Apathy (“It’s too late to fix anything”)
  • Overload from too many options

Roadblocks are featured throughout training and are tied to CAR Sections like Risk, Driver, and Privacy.


🛠 Digital Freedom Technologies (DFTs)

Tools, platforms, protocols, or services that:

  • Respect privacy by design
  • Avoid surveillance capitalism
  • Support decentralised or user-owned infrastructure
  • Prioritise freedom, not profit

Includes: FOSS apps, self-hosted tools, mesh networks, P2P platforms, and identity-free services.


🧑‍💻 Digital Freedom Assistant (DFA Assistant)

AI tools trained to help build, validate, and manage CARS. They:

  • Suggest SLOTs
  • Validate Profile Consistency
  • Offer migration guidance
  • Help identify threats or duplication

🏁 The Race

The narrative metaphor behind the 10-Step Training:
You are in a race to escape before 2027, when the Zero Trust Internet becomes a global reality.
This race involves:

  • Finding exits
  • Building and deploying CARS
  • Reaching Digital Freedom Destinations
  • Avoiding the Digital Prison’s final lock-in

🔒 Zero Trust Internet (ZTI)

The future digital infrastructure requiring verified identity for nearly all online access.

  • Backed by government, financial, and corporate stakeholders
  • The 2027 deadline represents the “exit sealing” point
  • Once ZTI is deployed, escape becomes significantly harder