Foundations Series / Vol 01 Est. 2025

Chapter 18: Forging the Third Way — Vision for a Post-Platform Future


Opening: The Crossroads

We stand at a crossroads in the history of digital culture.

Path 1: Platform Feudalism

Path 2: Regulatory Containment

Path 3: Digital Sovereignty (The Third Way)

This book has been building toward Path 3. Every chapter—from the Archaeobyte Taxonomy to the Three Pillars, from Triage to Institution Building, from Movement Strategy to Public Intellectual practice—has prepared you to forge the Third Way.

This final chapter asks: What does the Third Way actually look like? Not as abstract ideal, but as concrete system design. What would we build if we started over, knowing everything we know about how platforms murder culture?

This is our manifesto. Our blueprint. Our declaration that another internet is possible.


Part I: Principles of the Third Way

Before designing systems, we must articulate core principles—the non-negotiables that distinguish the Third Way from both feudalism and containment.

Principle 1: User Sovereignty Is Non-Negotiable

Declaration, Connection, Ground must be user-owned, not platform-granted.

This means:

What this rules out:

What this enables:

Principle 2: Preservation Is a Design Constraint, Not an Afterthought

Systems must be built to outlast their creators.

This means:

What this rules out:

What this enables:

Principle 3: Surveillance Capitalism Is Incompatible with Sovereignty

You cannot be sovereign if platforms monetize your behavior through surveillance.

This means:

What this rules out:

What this enables:

Principle 4: Interoperability Over Monopoly

Network effects must not create lock-in.

This means:

What this rules out:

What this enables:

Principle 5: Governance Must Be Democratic, Not Corporate

Users must have voice in how platforms are run.

This means:

What this rules out:

What this enables:

Principle 6: The Commons Must Be Protected from Enclosure

Shared cultural resources cannot be privatized.

This means:

What this rules out:

What this enables:


Part II: System Architecture of the Third Way

With principles established, how do we build the Third Way? What does the technical architecture look like?

Layer 1: Identity (Declaration)

Problem: Centralized platforms own your identity. If banned, "you" cease to exist.

Third Way Solution: Federated Identity

Model: Email + Domain Names

Applied to Social Media:

Applied to Authentication:

Key Technologies:

Trade-offs:

Layer 2: Communication (Connection)

Problem: Platforms mediate all communication, can shadowban, algorithmically filter, or shut down.

Third Way Solution: End-to-End Encrypted, Federated Communication

Model: Email (for public/async) + Signal (for private/sync)

For Public Communication (Posts, Blogs):

For Private Communication (Messaging):

For Discovery:

Key Technologies:

Trade-offs:

Layer 3: Storage (Ground)

Problem: Platforms store your data on their servers. If they shut down or ban you, data vanishes.

Third Way Solution: Distributed, Redundant, User-Controlled Storage

Model: LOCKSS + IPFS

For Personal Data:

For Public Archives:

For Long-Term Preservation:

Key Technologies:

Trade-offs:

Layer 4: Monetization (Avoiding Surveillance)

Problem: Platforms need revenue. Advertising = surveillance. Subscriptions alone may not scale.

Third Way Solution: Hybrid Economic Models

Option 1: Direct User Payment

Option 2: Cooperative Ownership

Option 3: Public Funding

Option 4: Open Core

Option 5: Solidarity Economy

Key Insight: No single model works for all. Need ecosystem of models, all non-surveillance.

Trade-offs:

Layer 5: Governance

Problem: Platforms are dictatorships (even benevolent ones eventually betray users).

Third Way Solution: Federated, Democratic Governance

Model: Mastodon's Federation + Co-op Governance

Federated Moderation:

Cooperative Governance:

Open Source + Forking:

Key Technologies:

Trade-offs:


Part III: What the Third Way Looks Like in Practice

Let's imagine a day in the life of a Third Way internet user in 2035:

Morning: Reading and Writing

7:00 AM — Wake up, check RSS reader (no algorithm, just chronological feeds from blogs/sites you chose)

7:30 AM — Write blog post on your site (yourname.com). Auto-syndicates to:

All from your domain. If your hosting provider dies, you migrate (same domain, same URLs).

8:00 AM — Read replies via Webmentions (other blogs responding to yours, comments appear on your site, no centralized comment system)

Midday: Communication

12:00 PM — Video call with friend using Jitsi (open source, self-hosted, E2E encrypted, no Zoom spying)

1:00 PM — Check Matrix (federated chat). Messages from friends on different servers (some self-hosted, some using hosting services, all interoperate)

2:00 PM — Browse Fediverse (Mastodon, Pixelfed, PeerTube). See posts from across federated instances. No ads, no algorithmic manipulation, chronological.

Evening: Entertainment and Community

6:00 PM — Watch video on PeerTube (federated YouTube alternative, creator-owned)

7:00 PM — Listen to music on Bandcamp (artists get 82% of revenue, you own MP3s, DRM-free)

8:00 PM — Participate in forum (self-hosted Discourse, community-owned, full export available)

Night: Preservation

10:00 PM — Automatic backup runs:

If any service shuts down tomorrow, you have:

You are sovereign.


Part IV: The Transition Strategy — How We Get There

The Third Way doesn't happen overnight. How do we transition from Platform Feudalism to Digital Sovereignty?

Phase 1: Build Alternatives (Now - 5 years)

Goal: Prove alternatives can work at scale.

Actions:

Success Metrics:

Phase 2: Policy Wins (5-10 years)

Goal: Legal frameworks that enable Third Way, constrain platforms.

Actions:

Success Metrics:

Phase 3: Cultural Shift (10-20 years)

Goal: Sovereignty becomes expectation, not exception.

Actions:

Success Metrics:

Phase 4: Infrastructure Maturity (20-30 years)

Goal: Third Way is default, feudalism is legacy.

Actions:

Success Metrics:


Part V: Objections and Responses

Objection 1: "This is too technical for normal people"

Response:

Counter-Question: Is it really "easier" to have your identity revoked, data deleted, and memories erased by platforms?

Objection 2: "Federation fragments communities"

Response:

Counter-Question: Isn't platform monopoly worse fragmentation? (Twitter vs. TikTok vs. Instagram—all walled gardens)

Objection 3: "People prefer convenience over sovereignty"

Response:

Counter-Question: Is it convenient when the platform shuts down and you lose everything?

Objection 4: "Who will moderate a distributed internet?"

Response:

Counter-Question: Has centralized moderation worked? (No—Facebook/Twitter full of toxicity despite armies of moderators)

Objection 5: "This requires trusting strangers to run servers"

Response:

Counter-Question: Is trusting a for-profit corporation safer than trusting a community-run instance?

Objection 6: "Big Tech will crush alternatives"

Response:

Counter-Question: If we don't try, Big Tech wins by default. Is surrender preferable?


Part VI: The Archaeobytologist's Role in the Third Way

As Archaeobytologists, what's our work in forging the Third Way?

Role 1: Preserve the Evidence

Archive platform murders to document what went wrong:

Purpose: Historical memory. Can't build future if we forget past.

Role 2: Build the Alternatives

Forge tools and institutions that embody Three Pillars:

Purpose: Demonstrate alternatives are viable. Proof of concept.

Role 3: Teach Sovereignty

Educate next generation on digital rights and responsibilities:

Purpose: Cultural shift. People can't demand sovereignty if they don't know it exists.

Role 4: Advocate for Policy

Fight for laws that enable Third Way:

Purpose: Legal infrastructure. Alternatives need policy support to compete with monopolies.

Role 5: Document and Theorize

Publish research on platform power, preservation methods, sovereignty design:

Purpose: Knowledge infrastructure. Field needs canon, methods, theory.

The Complete Archaeobytologist

You are:

The Third Way requires all five roles. You don't have to do everything, but the field collectively must.


Part VII: The Archaeobytologist's Manifesto

We Believe:

1. Digital culture is worth preserving.

2. Users deserve sovereignty.

3. Surveillance capitalism is illegitimate.

4. Preservation is a moral imperative.

5. The Third Way is possible.

We Commit To:

1. Archive what platforms murder.

2. Build alternatives that resist murder.

3. Teach digital sovereignty.

4. Advocate for systemic change.

5. Practice what we preach.

We Reject:

1. Platform feudalism (users as tenants)

2. Surveillance capitalism (behavior as commodity)

3. Planned obsolescence (culture murdered for profit)

4. Forced amnesia (deletion of digital history)

5. Learned helplessness ("Platforms will always win")

We Declare:

Archaeobytology isn't just a discipline—it's a movement.

We are scholars and smiths, archivists and advocates, mourners and builders.

We study the dead to prevent future murders.

We preserve the past to forge the future.

We are the Third Way.

And we are just beginning.


Conclusion: Build Something That Outlasts You

This textbook began with a question: What is Archaeobytology?

Now you know:

You have the tools. Now the question is: What will you do?

Will you:

Archaeobytology doesn't exist yet—not fully. There are no departments, no tenure-track jobs, no professional society. But there could be, if we build them.

In 20 years, this could be a recognized discipline. Students could major in it. Governments could fund it. Culture could be preserved, not murdered.

Or: This could be a footnote. A quirky experiment by scattered practitioners. Forgotten when platforms finally consolidate into permanent monopolies.

That choice is ours.

Every time you:

This textbook is a beginning, not an ending. It codifies existing practice and proposes a future. But books don't build disciplines—people do.

You, reading this now, are part of the founding generation. The choices you make—what you preserve, what you build, what you teach—will shape whether Archaeobytology becomes real.

So ask yourself:

What will you build that outlasts you?

Not what will you consume, what will you scroll, what will you post into the void of platforms that will delete it when you stop being profitable.

What will you build that future generations can find, study, and build upon?

The Third Way requires builders.

Not just theorists. Not just critics. Builders.

People who preserve, create, organize, teach, and advocate.

People who look at murdered platforms and say: Never again.

People who look at surveillance capitalism and say: Not us.

People who look at the choice between feudalism and sovereignty and say: We choose the Third Way.


Final Exercise: Your Third Way Project

Design your contribution to the Third Way. Choose one:

Option A: Preservation Project

Option B: Sovereignty Tool

Option C: Institution

Option D: Movement Campaign

Option E: Pedagogical Project

Requirements (3,000+ words):

  1. Problem diagnosis (what's broken now?)

  2. Third Way solution (how does your project fix it?)

  3. Implementation plan (concrete steps, timeline, resources)

  4. Three Pillars assessment (does it embody sovereignty?)

  5. Sustainability (how does it last 10+ years?)

  6. Impact metrics (how do you measure success?)

Then: Actually do it.

Don't just write the plan. Execute.

Build something.

Preserve something.

Teach someone.

Advocate somewhere.

Make Archaeobytology real.

Because the Third Way doesn't forge itself.

You forge it.

Now go.

Build something that outlasts you.


Further Reading: The Complete Archaeobytology Canon

This textbook has cited hundreds of sources. Here's the essential reading list—the books every Archaeobytologist should read.

Foundational Theory (Start Here)

  1. Lessig, Lawrence. Code: Version 2.0. Basic Books, 2006.

    • How digital architecture embodies values

  2. Zuboff, Shoshana. The Age of Surveillance Capitalism. PublicAffairs, 2019.

    • Definitive critique of platform economics

  3. Ostrom, Elinor. Governing the Commons. Cambridge, 1990.

    • How to manage shared resources without state or market

  4. Doctorow, Cory. The Internet Con: How to Seize the Means of Computation. Verso, 2023.

    • Practical vision for interoperability and user power

  5. Kirschenbaum, Matthew. Mechanisms: New Media and the Forensic Imagination. MIT Press, 2008.

    • Foundational text on digital materiality

Digital Preservation

  1. Chun, Wendy Hui Kyong. Programmed Visions: Software and Memory. MIT Press, 2011.

  2. Ernst, Wolfgang. Digital Memory and the Archive. Minnesota, 2013.

  3. Brügger, Niels, and Ralph Schroeder, eds. The Web as History. UCL Press, 2017.

Platform Critique

  1. Gillespie, Tarleton. Custodians of the Internet. Yale, 2018.

  2. Noble, Safiya Umoja. Algorithms of Oppression. NYU Press, 2018.

  3. Pasquale, Frank. The Black Box Society. Harvard, 2015.

Commons and Cooperation

  1. Benkler, Yochai. The Wealth of Networks. Yale, 2006.

  2. Bollier, David. Think Like a Commoner. New Society, 2014.

  3. Scholz, Trebor. Platform Cooperativism. Rosa Luxemburg Stiftung, 2016.

Privacy and Sovereignty

  1. Schneier, Bruce. Data and Goliath. Norton, 2015.

  2. Véliz, Carissa. Privacy Is Power. Melville House, 2020.

  3. Rushkoff, Douglas. Throwing Rocks at the Google Bus. Portfolio, 2016.

Craft and Making

  1. Sennett, Richard. The Craftsman. Yale, 2008.

  2. Pye, David. The Nature and Art of Workmanship. Cambridge, 1968.

Archives and Memory

  1. Derrida, Jacques. Archive Fever. Chicago, 1996.

  2. Caswell, Michelle. Urgent Archives. Routledge, 2021.

Discipline Formation

  1. Klein, Julie Thompson. Interdisciplining Digital Humanities. Michigan, 2015.

  2. Kuhn, Thomas. The Structure of Scientific Revolutions. Chicago, 1962.

Primary Sources (Must-Read Essays)

  1. Kahle, Brewster. "Preserving the Internet." Scientific American, 1997.

  2. Bush, Vannevar. "As We May Think." The Atlantic, 1945.

  3. Raymond, Eric. "The Cathedral and the Bazaar." 1997.


The End—And The Beginning

You've reached the end of this textbook.

But this is not the end of Archaeobytology.

It's the beginning.

The field exists because you make it real.

Every artifact you preserve. Every tool you build. Every course you teach. Every policy you advocate for.

That's Archaeobytology.

Welcome to the discipline.

Now go forth and forge the Third Way.


End of Textbook


Appendices

The following appendices provide practical resources for Archaeobytologists:

[Appendices would be developed separately as standalone documents]


About This Textbook

Archaeobytology: Theory and Practice of Digital Sovereignty

Author: [To be determined—likely community-authored/edited given the discipline's nascent state]

Publication Model: Open Access

Suggested Citation:

Archaeobytology: Theory and Practice of Digital Sovereignty. [Publisher], [Year]. [URL].

Companion Website: archaeobytology.org

For Instructors: Instructor's Guide available at archaeobytology.org/teaching

Contact: archaeobytology@[domain] for corrections, suggestions, course adoption inquiries


The textbook you hold is a founding document. By reading it, teaching from it, building on it, and critiquing it, you're helping create a discipline.

Thank you for being part of the founding generation of Archaeobytology.

Now go build something that outlasts you.