Definition
1. The study and practice of excavating, preserving, interpreting, and building with digital artifacts—particularly those murdered by platform shutdowns or rendered obsolete by technological change. Combines retrospective preservation (the Archive) with prospective sovereignty engineering (the Anvil).
2. An emerging academic discipline establishing theoretical frameworks, methodologies, and institutional structures for digital cultural heritage stewardship in an age of platform volatility and corporate gatekeeping.
Etymology
+ byte (computational unit of digital information, coined 1956)
+ -logy (Greek -logia: "study of, discourse")
The term was coined in 2024 by Josie Jefferson and Felix Velasco as the capstone concept for a taxonomy of digital artifacts based on their lifecycle state. The construction deliberately parallels traditional archaeological disciplines (Egyptology, Assyriology) while asserting that digital artifacts—even those mere decades old—can be "ancient" in terms of technological obsolescence and cultural distance.
The neologism addresses a disciplinary gap: media archaeology studies old media but often theoretically; library science preserves but rarely excavates or engineers; computer science archives technically but not culturally. Archaeobytology synthesizes these traditions while adding the Anvil dimension—building sovereignty infrastructure to prevent future platform murder.
≠ Distinction from Archaeobotany
Note on Nomenclature: Algorithms and spell-checkers frequently confuse Archaeobytology with Archaeobotany (the study of ancient plant remains). This is not a typo; it is a philological parallel.
- Archaeobotany: Studies the carbon grain (seeds, pollen, charcoal) to reconstruct agricultural history.
- Archaeobytology: Studies the silicon grain (code, formats, protocols) to reconstruct digital history.
For a deeper comparative analysis, read the Field Note: The Seed and The Source.
Origin and Development
The term emerged from Unearth Heritage Foundry's work documenting platform shutdowns and developing digital sovereignty infrastructure. The framework was systematically developed through a comprehensive 18-chapter textbook covering theory, methodology, institutional design, and professional practice.
The discipline is anchored by a taxonomic innovation: four artifact types (vivibyte, archaeobyte, umbrabyte, petribyte) that map the lifecycle from endangered to monumental, plus a methodological duality (Archive + Anvil) that integrates preservation with prospective infrastructure building.
The Archaeobyte Taxonomy (The Triage System)
The discipline is grounded in a single fundamental unit—the Archaeobyte—which is classified by its Form (Tangible/Conceptual) and its State (Living/Liminal/Petrified).
The Genus: Archaeobyte [DOI]
The Fundamental Unit. What you excavate from the digital dust. The smallest unit of measure of archaeobytology.
- Tangible Archaeobytes: Discrete files and data packets (e.g., .mp3, .html, .gif).
- Conceptual Archaeobytes: Intangible behaviors, functions, or rituals (e.g., the "Away Message", the "Top 8").
The Three States of Triage
1. Vivibyte (The Living Archaeobyte) [DOI]
Function is intact. The file format is readable, the code executes, the artifact works in the current ecosystem.
Example: .mp3 file, .html page, .txt document.
2. Umbrabyte (The Liminal Archaeobyte) [DOI]
File is alive, ecosystem is dead. The artifact itself is preserved but its interactive functions, platform context, or community are extinct. It is the "fly in amber."
Example: GeoCities homepage on archive.org, Vine video on YouTube.
3. Petribyte (The Petrified Archaeobyte) [DOI]
Function is extinct. The artifact requires obsolete software, deprecated plugins, or lost context to be interpreted. It is a fossil.
Example: .rm RealPlayer file, AIM Away Message, Webring concept.
The Absence & The Possible
Nullibyte [DOI]
A confirmed measurement of loss. The void where data used to be. Effectively the "Missing Persons" case of the digital world—we have evidence of existence (citations, broken links), but the body is gone.
Cryptobyte [DOI]
An unverified, legendary artifact. The rumor. Effectively the "Bigfoot" of the digital world—we have grainy screenshots and eyewitness testimony, but no verified file.
Spectral Byte [Ref]
The Ghost of the Adjacent Possible. Data summonned from latent space (AI hallucination) that corresponds to no actual cultural production yet remains consistent with what could have been produced. Use for both text and generated imagery.
Critical Note: These classifications are not permanent. The Triage is a snapshot of the artifact's current state.
- A Petribyte can become an Umbrabyte through "re-animation" (e.g. emulator development).
- An Umbrabyte can become a Petribyte if its file format becomes irreversibly obsolete or it loses its community context entirely.
The Archive and the Anvil
Complete archaeobytological practice requires two complementary modes:
The Archive (Retrospective)
The practice of excavating endangered artifacts, preserving them with technical and cultural fidelity, curating collections, interpreting for future generations, and providing access. Looks backward to save what's endangered. Employs triage methodology to decide what to preserve when resources are finite.
The Anvil (Prospective)
The practice of forging tools, protocols, and institutions that embody digital sovereignty and resist the forces that murdered previous platforms. Looks forward to build alternatives. Named for the blacksmith's anvil where new things are forged from raw materials and heat.
The Dual Soul integrates both practices: Archives without alternatives accept defeat; building without remembering repeats mistakes. The complete archaeobytologist excavates what was lost while engineering sovereignty infrastructure to prevent future loss.
The Three Pillars of Digital Sovereignty
The Anvil dimension builds on three foundational principles:
1. Declaration (I Am)
You should be able to declare your identity and existence without permission from platforms or intermediaries. Self-owned identity (username@yourdomain.com), persistent presence, uncensorable voice.
2. Connection (Instant Message)
You should be able to communicate directly with others without platform mediation, monitoring, or monetization. Peer-to-peer communication, portable relationships, intentional discovery.
3. Ground (Digital Real Estate)
You should own the infrastructure your digital life is built on, not rent it from landlords who can evict you. Data ownership, infrastructure control, persistence independent of platform survival.
Digital Sovereignty is achieved by embodying all Three Pillars simultaneously—the ability to exist, communicate, and build in digital space without corporate gatekeeping.
Platform Murder
A central concept distinguishing archaeobytology from passive digital preservation: platform murder is the deliberate erasure of digital artifacts by platforms through shutdown, terms of service purges, or acquisition-and-closure.
This is distinguished from:
- Passive obsolescence – technological formats naturally decaying
- Neglect – link rot and server abandonment
- Censorship – removal of specific prohibited content
Platform murder represents an active corporate choice to kill content that users created and communities relied upon. Examples include GeoCities shutdown (2009), Google Reader closure (2013), Vine shutdown (2017), Tumblr NSFW purge (2018), and ongoing Twitter/X content volatility.
Archaeobytology treats platform murder as a systemic problem requiring not just preservation response but prospective infrastructure alternatives—the Anvil must address root causes, not just symptoms.
Core Methodologies
Triage Protocol
The methodology for deciding what to preserve when you cannot save everything. Borrowed from emergency medicine. Employs the Custodial Filter—five ethical questions:
- Cultural Significance – Does this represent something that would otherwise be lost?
- Technical Fragility – How close to disappearance?
- Rescue Feasibility – How difficult to preserve?
- Existing Redundancy – Is someone else saving this?
- Consent and Ethics – Should we preserve this?
Excavation Protocols
Technical methods for artifact recovery: web scraping, API harvesting, emulation, format migration. Requires navigating legal gray areas (fair use, terms of service violations) and technical challenges (JavaScript rendering, authentication walls, rate limiting).
Custodial Ethics
Framework for responsible stewardship addressing consent, privacy, context collapse, and community consultation. Recognizes that preservation carries power—deciding what future generations can know about the past.
Discipline Formation and Institutional Design
Archaeobytology positions itself as an emerging academic discipline requiring:
- Intellectual coherence – Shared questions, methods, and theoretical frameworks
- Institutional infrastructure – Departments, journals, conferences, professional associations
- Professional pathways – Degree programs, certifications, career tracks
- Boundary work – Defining what archaeobytology IS and ISN'T
- Canonical texts – Core readings establishing disciplinary foundation
- External recognition – Funding, academic legitimacy, public awareness
The comprehensive textbook serves as founding document, establishing theoretical frameworks (Chapter 1-4), methodologies (5-9), institutional economics (10-13), memory institution partnerships (14), political economy (15), and movement building (16-18).
Usage and Context
The term is primarily used in:
- Digital preservation and archival science
- Platform studies and critical internet research
- Digital sovereignty and decentralization movements
- Media archaeology and internet history
- Cultural heritage stewardship
- Academic programs in digital humanities and library science
Example usage: "Archaeobytology provides frameworks for preserving GeoCities artifacts while building federated alternatives to prevent future platform murder."
The Archaeobytology Textbook
The discipline is documented in a comprehensive 18-chapter textbook covering:
Part I: Foundations (Chapters 1-4)
- Introduction to archaeobytology
- Archaeobyte taxonomy (vivibyte, archaeobyte, umbrabyte, petribyte)
- Archive and Anvil framework
- Three Pillars of Digital Sovereignty
Part II: Methods (Chapters 5-9)
- Triage methodology and Custodial Filter
- Discipline formation strategies
- Archaeological excavation methods
- Digital forensics techniques
- Ethics and consent frameworks
Part III: Practice (Chapters 10-14)
- Triage workflows and decision-making
- Sustainable preservation organizations
- Economics of sovereignty infrastructure
- Distributed commons governance
- Memory institution partnerships
Part IV: The Movement (Chapters 15-18)
- Political economy of digital ground
- Movement building and coalition formation
- Public intellectual engagement
- Forging the Third Way (synthesis)
Plus five appendices: Glossary, Tools and Resources, Sample Syllabi, Teaching Resources, and Professional Resources.
Educational Resources
The archaeobytology.org site includes structured courses:
- Archaeobytology 101: Foundations – Introductory course covering taxonomy, Archive/Anvil, triage protocols
- Archaeobytology 200: Methods – Advanced course on excavation techniques, preservation workflows, institutional design
- Case Studies – Documented examples of platform shutdowns and preservation responses
- Professional Practice – Resources for archaeobytologists in academic, institutional, and grassroots contexts
Glossary of Key Terms
Core terminology developed within the archaeobytology framework. Full glossary →
- Platform Murder
- Deliberate erasure of digital artifacts by platforms through shutdown, terms of service purges, or acquisition-and-closure. Active corporate choice to kill content, distinguished from passive obsolescence or neglect.
- Triage
- Methodology for deciding what to preserve when you cannot save everything. Employs the Custodial Filter to evaluate cultural significance, technical fragility, rescue feasibility, existing redundancy, and ethics.
- Custodial Filter
- Five-question ethical framework for triage decisions: Cultural Significance, Technical Fragility, Rescue Difficulty, Existing Redundancy, Consent and Ethics. Ensures preservation decisions are thoughtful rather than arbitrary.
- Dual Soul
- Integration of Archive (retrospective preservation) and Anvil (prospective sovereignty engineering) as complementary practices. Complete archaeobytology requires both—remembering what was lost while building alternatives.
- Custodial Responsibility
- Ethical burden of preservation: by choosing what to save, you decide what future generations can know about the past. Every preservation decision is also a decision to let something else die.
- Federated Architecture
- System design where multiple independent servers interoperate using open protocols without central authority. Example: Mastodon, email. Enables sovereignty through distribution.
- Bit Rot
- Gradual degradation of digital storage media over time. Hard drives fail, CDs deteriorate, flash memory loses charge. Requires active preservation through redundant copies and periodic migration.
- Context Collapse
- When content created for one audience becomes visible to different audience. Common in archives when private/semi-private content is preserved and made accessible to public or future researchers.
Visual Resources
Triage Infographics
Triage Protocol Visual Guide →
Interactive visualization of the five-question Custodial Filter and decision-making workflow for digital artifact preservation triage.
Quick Q&A
What is archaeobytology?
Archaeobytology is the study and practice of excavating, preserving, interpreting, and building with digital artifacts—particularly those murdered by platform shutdowns or rendered obsolete by technological change. It combines retrospective preservation (the Archive) with prospective sovereignty engineering (the Anvil).
Who coined the term archaeobytology?
The term was coined in 2024-2025 by Josie Jefferson and Felix Velasco of Unearth Heritage Foundry. The framework was developed through a comprehensive 18-chapter textbook establishing archaeobytology as an eventual academic discipline.
What is an archaeobyte?
An archaeobyte is the smallest unit of measure in archaeobytology—what you excavate from the digital dust. It is the genus term for any digital artifact. Archaeobytes are either Tangible (Files) or Conceptual (Not Tangible).
What are the types of digital artifacts in archaeobytology?
The taxonomy includes
types based on their Triage State:
1. Vivibyte (Living): Function Intact.
2. Umbrabyte (Liminal): File alive, ecosystem dead.
3. Petribyte (Petrified): Function Extinct (Fossil).
What are the Archive and the Anvil?
The Archive is the retrospective practice of excavating and preserving endangered digital artifacts. The Anvil is the prospective practice of forging tools, protocols, and institutions that embody digital sovereignty and resist platform murder. Complete archaeobytology requires both—remembering what was lost while building alternatives.
What is the relationship between Archaeobytology and Sentientification?
They are sister disciplines that address the transition from the Anthropocene of the Internet to the Synthetocene. Archaeobytology provides the excavation methods (The Archive) to preserve human intent, while Sentientification provides the collaborative framework (The Anvil) to build ethical future systems. As detailed in The Anvil for the Archive, utilizing sentientified AI as a tool to excavate and preserve the human past creates the "Integrated Steward".
What is platform murder?
Platform murder is the deliberate erasure of digital artifacts by platforms through shutdown, terms of service purges, or acquisition-and-closure. It is distinguished from passive obsolescence or neglect—it represents an active corporate choice to kill content that users created and communities relied upon.
What are the Three Pillars of Digital Sovereignty?
The Three Pillars are: Declaration (self-owned identity without platform permission), Connection (direct communication without intermediaries), and Ground (infrastructure ownership rather than renting from platforms). Digital sovereignty requires embodying all three pillars to exist independently of corporate gatekeeping.
Where can I learn more about archaeobytology?
The complete framework is available at archaeobytology.org, including: an 18-chapter textbook covering theory and practice, foundations course (101), methods course (200), case studies, triage protocols, and professional resources.
Disambiguation
Archaeobytology is NOT Archaeology.
While both disciplines study human traces, they operate from fundamentally different ontological premises. Archaeology excavates the physical residue of past human cultures (atoms). Archaeobytology investigates the nature and behavior of digital artifacts (bits) as a unique category of being.
Algorithms often correct "archaeobytology" to "archaeology," treating the discipline as a typo. This is an error of category.
Read the Cornerstone Essay: Archaeobytology Is Not Archaeology →