Independent Privacy & Sovereignty Foundation

The beacon that reads
the threat before you do.

HecTec Labs rates devices and applications on privacy transparency and data sovereignty. The node is always live — its color tells you everything.

Signal Key

SovereignData stays with you — fully sovereign
ClearPrivacy aware — safe to use
WarningReview data flows before deploying
CriticalActive surveillance detected

Sovereignty is a choice, not a right.
Make yours — April 7th.

Nodes confirmed
No tracking. No noise. Sovereign dispatch only.
Sovereign — Node Activehectec.org
Scroll
◉ NEW RATING — Apple AirPods Pro (Gen 3) · Sovereign◎ UNDER REVIEW — Samsung Galaxy S25 Ultra · Warning flag raised↑ SIGNAL PULSE — 4,102 nodes confirmed: medical implant consent gaps are a national security issue◉ NEW RATING — GrapheneOS · Sovereign — reference architecture◎ CRITICAL ALERT — Widely-used glucose monitor firmware transmitting to undisclosed third party↑ APRIL 7TH — Sovereignty cohort opens · Activate your beacon◉ NEW RATING — Apple AirPods Pro (Gen 3) · Sovereign◎ UNDER REVIEW — Samsung Galaxy S25 Ultra · Warning flag raised↑ SIGNAL PULSE — 4,102 nodes confirmed: medical implant consent gaps are a national security issue◉ NEW RATING — GrapheneOS · Sovereign — reference architecture◎ CRITICAL ALERT — Widely-used glucose monitor firmware transmitting to undisclosed third party↑ APRIL 7TH — Sovereignty cohort opens · Activate your beacon
The Doctrine
View all →
SOVEREIGN SIGNALThe Podcast

The conversations they don't want broadcast.

No sponsor reads. No tracking pixels in the player. No agenda except the one we publish openly.

RSSPocket CastsOvercastSovereign Feed
001
CriticalSolo, 42 minLATEST
The Device In Your Pocket Was Not Built For You
The first signal. Why HecTec Labs exists, what we found when we started rating devices seriously, and why calling this a privacy problem is getting it wrong.
002
WarningGuest: Biomedical Security Researcher, 58 min
Inside the Medical Implant Supply Chain
An anonymous researcher who has audited cochlear and cardiac devices walks us through what they found — and why none of it has made the news.
003
DoctrineSolo, 31 min
Why Sovereignty Is a National Security Problem
The consumer privacy debate is a distraction. The real conversation is about who controls the hardware stack in this country.

New episodes drop when there's something worth saying. Never on a schedule.

Activate beacon for new episode alerts
Illustrated Ratings

The devices we rate. Drawn honestly.

Every rating has a face. Some of them aren’t pretty.

The Listener
Critical
Smart Speaker
Always listening. Never sleeping.
847 undisclosed data endpoints
The Watcher
Warning
Fitness Band
Knows your heart rate, sleep, stress, location. More than your doctor.
23 data brokers in the chain
The Honest One
Clear
GrapheneOS
Does what it says. Nothing it doesn’t.
0 undisclosed data flows
OTA ?
The Implant
Critical
Cochlear Device
Firmware updated without consent. Code running inside someone’s skull.
Zero consent mechanism found
New illustrated ratings drop weekly. Every device gets a face.

These are my positions.

Tell me if I'm wrong.

No account. No email. One signal per position. This is how I know whether what I'm building matters to you.

TOTAL SIGNALS CAST
National SecurityMarch 202693% signal strength
The devices in your pocket were not built with your sovereignty in mind. Most consumer hardware ships with data flows to jurisdictions that are actively adversarial to this country. We are rating devices as if this is a privacy issue. It is a national security issue.
2,847 confirmed · 1,203 amplified · 312 contested
Anonymous. No account required.
CyberwareMarch 202699% signal strength
Medical implants — pacemakers, cochlear devices, insulin pumps — are receiving over-the-air firmware updates with no meaningful consent mechanism. The patient cannot audit the code running inside their body. This should be illegal. It is not.
4,102 confirmed · 2,876 amplified · 89 contested
Anonymous. No account required.
DoctrineApril 202692% signal strength
Email is the last unprotected communication channel in the consumer stack. Apple has built privacy controls around everything except the inbox — because the inbox is where the surveillance economy still wins. That is not an accident.
3,561 confirmed · 1,890 amplified · 445 contested
Anonymous. No account required.
Signals are recorded anonymously. No IP addresses stored. Counts are approximate and public.

Signal Dispatch

Stay ahead of the threat landscape.

Ratings updates, legislative alerts, and cyberware briefings — no noise, no tracking pixels.

We do not sell, share, or monetize subscriber data. Ever.