Foundations Series / Vol 01 Est. 2025

Chapter 4: The Three Pillars of Digital Sovereignty — Declaration, Connection, Ground


Opening: The Ghost in the Machine

In 2007, a woman named Sara lost her husband to cancer. For months afterward, she found comfort in reading through their old emails—thousands of messages spanning 15 years of marriage. Love letters, vacation plans, inside jokes, mundane logistics that now felt precious. The emails were stored in her AOL account, which she'd had since 1996.

In 2013, AOL announced it would delete inactive email accounts. Sara's husband's account had been inactive for six years. She frantically tried to log in to save his emails, but she'd never known his password. AOL's customer service said they couldn't help—policy was policy. On the deletion date, every email her husband had ever sent vanished.

Sara's husband had no Declaration—his identity was AOL's property, revocable at their discretion. Their conversations had no Connection—all communication was mediated and stored by a corporation. They had no Ground—the emails lived on AOL's servers, subject to AOL's rules.

When the servers deleted his account, it was as if he'd never existed.

This is what happens when we build our digital lives on platforms we don't own. We become tenants in digital space, vulnerable to eviction at any moment. Our identities, relationships, and memories exist only as long as corporations permit them to.

The Three Pillars offer an alternative vision: a model for digital existence where you own your identity, control your connections, and possess your ground. Not as a tenant, but as a sovereign.

This chapter explores each Pillar in depth—what it means, why it matters, and how to achieve it.


The Three Pillars: Origins and Philosophy

Philosophical Roots

The Three Pillars draw on multiple intellectual traditions:

1. Property Rights (Locke, Rousseau)

2. Autonomy (Kant)

3. Sovereignty (Political Philosophy)

4. The Commons (Ostrom)

Contemporary Influences

Cory Doctorow: "Adversarial Interoperability"

Lawrence Lessig: "Code Is Law"

Bruce Schneier: "Feudal Security"

Shoshana Zuboff: "Surveillance Capitalism"

The Three Pillars as Synthesis

The Three Pillars synthesize these ideas into a practical framework:

  1. Declaration (I Am): Self-owned identity and voice

  2. Connection (Instant Message): Direct, unmediated relationships

  3. Ground (Digital Real Estate): Owned infrastructure and data

Together, they define digital sovereignty—the ability to exist, communicate, and build in digital space without corporate gatekeeping.


Pillar 1: Declaration (I Am)

Core Principle

You should be able to declare your identity and existence without permission from any platform or intermediary.

Your name, your voice, your presence—these should be self-originating, not granted by Facebook, Twitter, or Google.

What Declaration Means in Practice

Identity Ownership

Voice

Presence

Historical Context: How We Lost Declaration

Era 1: Early Internet (1990s)

Era 2: Platform Consolidation (2000s-2010s)

Era 3: Attempted Reclamation (2010s-present)

Case Study: The Real Name Policy Wars

Facebook's Real Name Policy (2014)

Community Response

Sovereignty Analysis

Case Study: Twitter Handle Squatting and Seizure

The Problem

Examples

Sovereignty Analysis

Achieving Declaration: Practical Steps

Step 1: Own a Domain

Step 2: Use Domain-Based Identity

Step 3: Self-Host or Use Portable Hosting

Step 4: Archive Everything You Publish

Spectrum of Sovereignty

Platform Identity Portability Control Declaration Score
Facebook facebook.com/you None Platform ★☆☆☆☆
Twitter @you None Platform ★☆☆☆☆
Medium medium.com/@you Export possible Platform ★★☆☆☆
Ghost you.ghost.io or custom domain Full export Hybrid ★★★☆☆
Mastodon (hosted) @you@instance.social Account migration Instance admin ★★★☆☆
Mastodon (own instance) @you@yourdomain.com Full You ★★★★☆
Self-hosted site yourdomain.com Full You ★★★★★

Critiques and Limitations

Critique 1: "Not everyone can afford domains"

Critique 2: "Most people don't want to manage infrastructure"

Critique 3: "Domains can be seized too" (government, ICANN, registrars)

Critique 4: "Pseudonymity is harder with domains"


Pillar 2: Connection (Instant Message)

Core Principle

You should be able to communicate directly with others without a platform mediating, monitoring, or monetizing your relationships.

Your connections—friendships, communities, audiences—should be portable and platform-independent, not locked inside corporate silos.

What Connection Means in Practice

Direct Communication

Portable Relationships

Intentional Discovery

Historical Context: How We Lost Connection

Era 1: Email and Forums (1990s-2000s)

Era 2: Platform Silos (2000s-2010s)

Era 3: Attempted Reopening (2010s-present)

Case Study: Facebook's Closed Graph

The Problem

Example: The 2021 Exodus

Sovereignty Analysis

What Sovereignty Would Look Like

Case Study: Twitter's Algorithmic Feed

The Problem

User Impact

Sovereignty Analysis

Case Study: WhatsApp's End-to-End Encryption (Partial Sovereignty)

What WhatsApp Did Right

What WhatsApp Still Controls

Sovereignty Analysis

Better Model: Matrix

Achieving Connection: Practical Steps

Step 1: Use Federated Platforms

Step 2: Export Your Social Graph Regularly

Step 3: Use Open Protocols

Step 4: Support Interoperability Legislation

Spectrum of Sovereignty

Platform Communication Graph Portability Interoperability Connection Score
Facebook Messenger Mediated, surveilled None None ★☆☆☆☆
WhatsApp E2E encrypted Phone number only None ★★☆☆☆
Twitter DMs Mediated, surveilled Export limited None ★☆☆☆☆
Signal E2E encrypted Phone number Signal-only ★★★☆☆
Email Direct or federated Address book exportable Full (SMTP) ★★★★☆
Matrix E2E encrypted, federated Exportable Full (Matrix protocol) ★★★★★
Mastodon Federated, public Account migration Full (ActivityPub) ★★★★☆

Critiques and Limitations

Critique 1: "Network effects make leaving impossible"

Critique 2: "Federated platforms have moderation problems"

Critique 3: "Privacy and portability can conflict"

Critique 4: "Most people prioritize convenience over sovereignty"


Pillar 3: Ground (Digital Real Estate)

Core Principle

You should own the infrastructure your digital life is built on—not rent it from a landlord who can evict you.

Your data, your files, your websites, your history—these should exist on ground you control, portable and independent from any single platform's survival.

What Ground Means in Practice

Data Ownership

Infrastructure Control

Persistence

Historical Context: How We Lost Ground

Era 1: Personal Ownership (1990s)

Era 2: Platform Enclosure (2000s)

Era 3: The Cloud (2010s)

Era 4: Reclamation Movements (2010s-present)

Case Study: GeoCities as Loss of Ground

What Happened

Why It Happened

Sovereignty Analysis

What Could Have Prevented This

Case Study: Google Photos' Unlimited Storage Reversal

The Bait

The Switch

Sovereignty Analysis

Case Study: The Notion Migration Crisis

Background

The Fear

User Response

Sovereignty Analysis

Case Study: The IndieWeb Movement (Ground Reclamation)

Principles

  1. Own your domain: yourname.com is your identity

  2. Own your content: original posts on your site (syndicate to platforms if you want reach)

  3. Own your data: keep local backups, use open formats

Practices

Example: A Day in the IndieWeb Life

  1. Write blog post on your-domain.com

  2. Auto-syndicate to Twitter, Mastodon, Reddit

  3. Replies on those platforms appear as comments on your blog (via webmention)

  4. If platforms die, your original post survives (on your domain)

  5. If you switch hosting, same domain works (portability)

Sovereignty Assessment

Achieving Ground: Practical Steps

Level 1: Renters with Good Backups

Level 2: Portable Tenants

Level 3: Self-Hosted Sovereigns

Level 4: Distributed Ground

Spectrum of Sovereignty

Platform Data Ownership Export Quality Domain Control Ground Score
Facebook Platform license Limited HTML None ★☆☆☆☆
Twitter Platform license JSON export None ★★☆☆☆
Medium Retain rights Markdown export None ★★☆☆☆
Ghost (hosted) You own Full export Custom domain ★★★★☆
WordPress (self-hosted) You own Full (database) Your domain ★★★★★
Static site (Netlify/Vercel) You own (in Git) Full Your domain ★★★★★
IPFS-hosted site Distributed Full Your domain + content hash ★★★★★

Critiques and Limitations

Critique 1: "Self-hosting is too technical for most people"

Critique 2: "Distributed storage is expensive/slow"

Critique 3: "My domain can still be seized"

Critique 4: "What about backup redundancy?"


The Three Pillars in Practice: Sovereignty Audit

How to Audit Your Own Sovereignty

For each part of your digital life, ask:

Declaration:

Connection:

Ground:

Example Audit: Personal Blog

Aspect Platform Blog (Medium) Sovereign Blog (Self-hosted WordPress)
Declaration medium.com/@username (not yours) yourdomain.com (yours)
Identity portability None Full (domain stays)
Archive control Platform can delete You control
Connection Medium network only RSS, email newsletter, federated
Reader relationships Platform-mediated Direct (email subscribers)
Discovery Medium algorithm SEO, RSS, direct links
Ground Data licensed to Medium You own
Export Markdown (good) Full database (perfect)
Persistence Medium's discretion As long as you pay hosting

Sovereignty Score:

Example Audit: Social Media Presence

Aspect Facebook Mastodon (own instance)
Declaration facebook.com/username @username@yourdomain.com
Identity ownership Facebook's Yours (via domain)
Account seizure risk High (TOS violations) Low (you control server)
Connection Facebook only ActivityPub (any compatible platform)
Friend portability None Account migration
E2E encryption Messenger has it Depends on instance config
Ground Data on Facebook servers Data on your server
Export quality Limited JSON Full database
Control Facebook's rules Your rules (your instance)

Sovereignty Score:


Building Systems That Embody the Three Pillars

Design Checklist for Sovereign Systems

When building tools, platforms, or institutions, ask:

Declaration:

Connection:

Ground:

Case Study: Matrix Protocol (High Sovereignty)

Declaration:

Connection:

Ground:

Sovereignty Score: ★★★★★ (all three pillars strong)

Case Study: ENS (Ethereum Name Service) (Partial Sovereignty)

Declaration:

Connection:

Ground:

Sovereignty Score: ★★★☆☆ (strong Declaration, neutral Connection, weak Ground due to cost/complexity)


Conclusion: The Architecture of Freedom

The Three Pillars aren't just philosophical ideals—they're design principles for building a different kind of digital future.

Every platform murder, every account suspension, every data breach is a failure of sovereignty. These crises happen because we've built digital infrastructure on feudal principles: users as tenants, platforms as landlords.

The Three Pillars offer an alternative:

Together, they constitute digital freedom—not as abstract right, but as practical architecture.

In the next chapter, we'll explore Triage Methodology—how to decide what to save when everything is endangered. The Three Pillars will guide these decisions: artifacts and systems that embody sovereignty deserve prioritization.

For now, audit your own digital life. Where do you have Declaration? Connection? Ground? And where are you vulnerable—a tenant on borrowed land, subject to eviction at any moment?

The architecture of freedom begins with seeing the chains. And then, systematically, building your way out.


Discussion Questions

  1. Personal Audit: Conduct a Three Pillars audit of your primary digital platforms (social media, email, cloud storage, blog). Where are you sovereign? Where are you vulnerable?

  2. Trade-offs: Would you accept less convenience for more sovereignty? What's the breaking point? (e.g., self-host email vs. use Gmail)

  3. Collective Action: Can individual sovereignty exist without collective action? If everyone stays on Facebook, does your Mastodon account matter?

  4. Privilege: Is digital sovereignty a luxury for technical elites? How do we make it accessible to everyone?

  5. Necessity: Are the Three Pillars truly necessary? Can you be "free enough" using corporate platforms with good export tools?

  6. Future Scenario: Imagine 2035. What does a maximally sovereign digital life look like? What compromises remain?


Exercise: Design a Sovereign Alternative

Task: Choose a platform you currently use (Twitter, Instagram, Notion, Discord, etc.). Design a sovereign alternative that embodies all Three Pillars.

Part 1: Critique Current Platform (500 words)

Part 2: Design Alternative (1000 words)

Part 3: Adoption Strategy (500 words)

Part 4: Reflect (300 words)


Further Reading

On Digital Sovereignty

On Infrastructure and Architecture

On Property and Ownership

On The IndieWeb

Primary Sources


End of Chapter 4

Next: Chapter 5 — Triage Methodology: The Custodial Filter and Ethical Preservation