<style> /* Table styles ripped from Github */ table { width: 80%; border-spacing: 0; } tbody { display: table-row-group; vertical-align: middle; border-color: inherit; } table th { font-weight: 600; } table td, table th { border: 1px solid #dfe2e5; padding: 6px 13px; border-bottom: 0; border-top: 0; border-right: 0; } th:first-child { border-left: 0; } td:first-child { border-left: 0; } /* End of table styles */ </style> <!-- .slide: data-background-color="#000" --> # The Architecture of Autonomy ## How Platforms Turned Shields Into Snares --- <!-- .slide: data-background-color="#8B0000" --> ## It's a Trap! Digital platforms ensnare & extract. * They profit the platforms. * They profit the shareholders. * You are the product. --- <!-- .slide: data-background-color="#8B0000" --> ## I Helped Build This Trap <font size=6> I wanted to create the Architecture of Autonomy. * I built cryptographic foundations, protocols, standards. * Now they are being used to extract from you. <font size=7> ***This is my warning—and your guide to escape.*** </font> </font> --- <!-- .slide: data-background-color="#8B0000" --> ### You Are One Decision From Digital Death <font size=6> A single platform decision can destroy your digital life. * **Content flagged?** Years of archives vanish forever. * **Account banned?** Professional network erased instantly. * **Payments blocked?** Economic survival becomes impossible. No human review. No appeal. No recourse. </font> --- <!-- .slide: data-background-color="#000" --> <font size=6> <hr> ***"We believed that technology could protect people by preserving autonomy. That it could be a shield against coercion, rather than a conduit for it. We were wrong."*** <hr> </font> --- <!-- .slide: data-background-color="#1a1a2e" --> ## The Warning Signs Are All Around <font size=6> * A father lost a decade of family photos when Google mistook medical images for abuse * Canadian truckers watched their bank accounts freeze without trial. * The Australian "Robodebt" system drove three people to suicide with false accusations. * WikiLeaks faced financial blockade that no court could achieve. </font> --- <!-- .slide: data-background-color="#000" --> <font size=6> <hr> ***"Infrastructure plus money equals power — and digital platforms have captured both."*** <hr> </font> --- <!-- .slide: data-background-color="#8B0000" --> ## The Economic Foundation <font size=6> All digital rights depend on economic infrastructure * **Freedom of speech** dies when payment processors block media. * **Freedom of assembly** ends when accounts freeze. * **Freedom of movement** stops when transactions fail. * **Privacy rights** vanish when forced onto surveilled rails. </font> --- <!-- .slide: data-background-color="#16213e" --> ## The Shield That Never Was <font size=6> Tools we built for digital autonomy were **captured** before we could assemble them, leaving the Architecture of Autonomy incomplete. * Open protocols became proprietary platforms. * The town square became the shopping mall. * Building blocks for freedom became infrastructure for extraction. </font> --- <!-- .slide: data-background-color="#8B0000" --> ## The Six Inversions ### How Law Became Its Opposite --- <!-- .slide: data-background-color="#2F1B14" --> ### Inversion 1:</br>Property → Privilege <font size=6> <br> | **Physical World** | **Digital World** | |:----:|:----:| | You hold it<br>You control it | You "own" nothing | </font> --- <!-- .slide: data-background-color="#2F1B14" --> ### Inversion 1:</br>Property → Privilege <font size=6> * Files can be deleted without notice. * Assets can be revoked without appeal. * Even "self-custodied" crypto relies on interfaces that can vanish. * You arene click away from dispossession. </font> --- <!-- .slide: data-background-color="#000" --> <font size=6> <hr> ***"When ownership becomes licensing,<br>property becomes a revocable privilege."*** <hr> </font> --- <!-- .slide: data-background-color="#2F1B14" --> ## Inversion 2:</br>Contract → Coercion <font size=6> <br> | **Physical World** | **Digital World** | |:----:|:----:| | Voluntary exchange<br>between equals | Nonnegotiable demands | </font> --- <!-- .slide: data-background-color="#2F1B14" --> ## Inversion 2:</br>Contract → Coercion <font size=6> * Click "agree" or be excluded from digital life. * Terms are unreadable and change without notice. * There is no negotiation, no alternatives. * Participation is mandatory for survival. <br> --- <!-- .slide: data-background-color="#000" --> <font size=6> <hr> ***"This is ritualized consent — a form without substance.<br>If a system cannot hear you say no, it was never built for freedom."*** <hr> </font> --- <!-- .slide: data-background-color="#2F1B14" --> ## Inversion 3:</br>Justice → Absolutism <font size=6> <br> | **Physical World** | **Digital World** | |:----:|:----:| | Due process<br>Appeals<br>Proportionality|Execution without trial| </font> --- <!-- .slide: data-background-color="#2F1B14" --> ## Inversion 3:</br>Justice → Absolutism <font size=6> * Bots revoke access instantly. * Systems delete content without review. * Algorithms ban accounts with no appeal. * Australia's "Robodebt" kills before courts can intervene. * "Sludge" makes appeals so exhausting you give up. </font> --- <!-- .slide: data-background-color="#000" --> <font size=6> <hr> ***"An algorithm can enforce fairness — but only if someone defines what fairness means. And if no one can challenge that definition, the result is not justice. It is automation without mercy."*** <hr> </font> --- <!-- .slide: data-background-color="#2F1B14" --> ## Inversion 4:</br>Transparency → Invisibility <font size=6> <br> | **Physical World** | **Digital World** | |:----:|:----:| |Power has a face<br>Decisions have names|Infrastructure as <br> hidden sovereignty| </font> --- <!-- .slide: data-background-color="#2F1B14" --> ## Inversion 4:</br>Transparency → Invisibility <font size=6> * Power distributed across "the stack". * DNS, hosting, payment rails are all potential chokepoints. * Parler vanished from multiple layers simultaneously. * You can't fight what you can't see. </font> --- <!-- .slide: data-background-color="#000" --> <font size=6> <hr> ***"The most dangerous system is not the one that governs without consent—it's the one that governs without being seen."*** <hr> </font> --- <!-- .slide: data-background-color="#2F1B14" --> ## Inversion 5:</br>Exit → Captivity <font size=6> <br> | **Physical World** | **Digital World** | |:----:|:----:| |Walk away<br>with your resources|Departure as erasure| </font> --- <!-- .slide: data-background-color="#2F1B14" --> ## Inversion 5:</br>Exit → Captivity <font size=6> * Data non-portable, networks siloed. * Leave social media, lose relationships. * Switch platforms, lose reputation. * Economic exile through payment blockade. </font> --- <!-- .slide: data-background-color="#000" --> <font size=6> <hr> ***"Exit is not escape. It is leverage—and without it, <br> consent collapses into captivity."*** <hr> </font> --- <!-- .slide: data-background-color="#2F1B14" --> ## Inversion 6:</br> Identity → Commodity <font size=6> <br> | **Physical World** | **Digital World** | |:----:|:----:| |You are who you are—inalienable|You become a product| </font> --- <!-- .slide: data-background-color="#2F1B14" --> ## Inversion 6:</br> Identity → Commodity <font size=6> * Identity fragments extracted and traded. * Algorithmic categories imposed without consent. * You become legible to systems before yourself. * TikTok labels you, insurance scores you, Meta exposes your hidden relationships. </font> --- <!-- .slide: data-background-color="#000" --> <font size=6> <hr> ***"A system that defines you before you understand yourself isn't recognizing you — it's preempting you."*** <hr> </font> --- <!-- .slide: data-background-color="#1a1a2e" --> ## These Inversions Are Not Accidental <font size=6> They are **structural patterns** embedded by design: * Architectures create dependence. * Economic models support extraction. * Governance systems substitute access for autonomy. But most developers don't realize what they're building. </font> --- <!-- .slide: data-background-color="#000" --> <font size=6> <hr> ***"We do not own what we use.<br/>We do not consent to what we sign.<br/>We cannot contest enforcement.<br/>We do not know who governs us.<br/>We cannot leave.<br/>We do not even own ourselves."*** <hr> </font> --- <!-- .slide: data-background-color="#16213e" --> ## The Window Is Closing <font size=6> **2025-2030** represents our last clear chance * Every day, network effects compound. * Regulatory capture deepens. * New generations normalize extraction. After this window, escape is technically impossible, economically irrational, and politically unthinkable. </font> --- <!-- .slide: data-background-color="#8B0000" --> ## The Path Forward <br> The Architecture of Autonomy was never completed. <br> ***We can still build it!*** --- <!-- .slide: data-background-color="#1a1a2e" --> ## What Autonomy Requires <font size=6> * **Accountability mechanisms** * Platforms must answer to users. * **Interoperability mandates** * Break the lock-in. * **Fiduciary obligations** * Duties are required to those who depend. * **Cryptographic possession** * Wyoming proved it's possible * **Principal authority** * Utah shows government can recognize, not issue. * **Human review** * Life-changing decisions require oversight. </font> --- <!-- .slide: data-background-color="#2F1B14" --> ## Three User Segments ### Three Strategies <font size=6> * **5% pioneers** * Give them tools now, don't convince * **25% experimenters** * Lower barriers, demonstrate benefits * **70% majority:** * Won't switch voluntarily * Protect them through regulation </font> --- <!-- .slide: data-background-color="#8B0000" --> ## We Must Build AND Fight <font size=6> Neither alone can overcome network effects. * **Build alternatives** for communities choosing dignity now. * **Fight for regulation** so everyone has that choice. Both together can complete the Architecture of Autonomy. </font> --- <!-- .slide: data-background-color="#16213e" --> ## The Coalition That Can Win <font size=6> * **Small businesses** crushed by arbitrary enforcement * **Parents** watching kids manipulated by algorithms * **Platform workers** organizing for dignity * **International allies** facing political capture There are crisis moments when **70%** become receptive </font> --- <!-- .slide: data-background-color="#000" --> <font size=6> <hr> ***"Crisis creates opportunity—but only for those prepared to act <br> when normal constraints break down."*** <hr> </font> --- <!-- .slide: data-background-color="#1a1a2e" --> ## The Next Crisis Is Coming <font size=6> Platforms believe they are ungovernable. **They are wrong.** When the next crisis hits: * Will we be ready to shape response? * Will we have frameworks that scale? * Will we have coalitions that act? </font> --- <!-- .slide: data-background-color="#8B0000" --> ## The Choice Before Us <br> **Accept platform feudalism as inevitable** OR **Complete the Architecture of Autonomy** --- <!-- .slide: data-background-color="#8B0000" --> <font size=6> <hr> The frameworks exist. The coalitions are forming. The political moment is arriving. <hr> </font> --- <!-- .slide: data-background-color="#000" --> ## What We Do Next Determines ... <br> Whether Technology Serves Human Flourishing Or Continues Extracting From It --- <!-- .slide: data-background-color="#16213e" --> ## Alternatives Already Work <font size=5> They can't compete with subsidized extraction—yet. * **Stocksy United**: Photographers keep 50-75% vs Getty's 15-45%. * **Drivers Cooperative NYC**: Drivers keep 85-90% vs Uber's average of 40-50%. * **Mastodon/Bluesky**: Proof that federation can work at scale. * **Chattanooga EPB**: Proof that communities can own infrastructure. * **Wyoming/Utah**: States pioneering digital identity laws that preserve dignity. **But they prove different relationships are possible.** </font> --- <!-- .slide: data-background-color="#16213e" --> ## States Are Leading the Way <font size=6> * **Wyoming**: "Principal Authority" * You delegate, but never surrender control. * **Utah**: "Recognizer Not Issuer" * Government validates, doesn't create identity. * **California**: "California Consumer Privacy Act (CCPA)" * Forced global privacy changes (Brussels/California Effect). * **Vermont**: Public service obligations for digital infrastructure. * **Estonia/Taiwan**: Proving algorithmic democracy works at scale. These aren't experiments—they're blueprints for digital dignity. </font> --- <!-- .slide: data-background-color="#000" --> # The Diagnosis Is Complete ## The Prescription Begins Now --- <!-- .slide: data-background-color="#1a1a2e" --> ### Start This Week: Personal Actions <font size=6> **Value Digital Autonomy?** * Use Signal, Mastodon, Bluesky over surveillance platforms. * Pay for ProtonMail, Fastmail, Kagi. * Don't be the product. * Donate to Tor, Signal, Let's Encrypt, Blockchain Commons. * Even $5/month matters. * Warning: Signal needs $50M/year from one donor. * Support what you use! </font> --- <!-- .slide: data-background-color="#1a1a2e" --> ### Start This Week: Personal Actions <font size=6> **Technically Savvy?** * Support open source. * Even documentation helps. * Run your own servers, nodes, infrastructure. * Donate to HRF, EFF. * Fund project at Blockchain Commons, DIF. * Help non-technical friends migrate to privacy tools. </font> --- <!-- .slide: data-background-color="#1a1a2e" --> ### Start This Week: Collective Power <font size=6> **Create or Work Online?** * Document platform exploitation. * Deplatforming, wage theft, unfair rules changes. * Document the "sludge". * 17-step appeals designed to exhaust you. * Join platform worker organizations like Drivers Cooperative. * Share your stories: make abstract harm concrete. </font> --- <!-- .slide: data-background-color="#1a1a2e" --> ### Start This Week: Political Action <font size=6> **Politically Engaged?** * Push state legislature to user-centric identity models. * Wyoming's "principal authority" model. * Utah's "recognizer not issuer" approach. * Contact FTC about interoperability mandates. * Demand platform taxes fund public infrastructure. * Like Chattanooga's network. * Your state law can force global change! * (The Brussels/California Effect.) </font> --- <!-- .slide: data-background-color="#1a1a2e" --> ### Start This Week: Investment Power <font size=6> **Have Investment Power?** * File shareholder resolutions for algorithmic audits. * Divest from surveillance, fund privacy alternatives. * #StopHateForProfit proved pressure works. </font> --- <!-- .slide: data-background-color="#8B0000" --> ## These Aren't Suggestions ## They're Survival Tactics --- <!-- .slide: data-background-color="#000" --> ## The Window Is Open ## The Tools Exist ## The Coalition Is Gathering --- <!-- .slide: data-background-color="#000" --> <font size=6> <hr> ***"If a system cannot hear you say no, it was never built for freedom. <br> When no one can be heard, everyone is at risk."*** <hr> </font> --- <!-- .slide: data-background-color="#8B0000" --> ## We Are Human Beings ## Not Digital Serfs ### Build Systems That Remember This— ### Before Our Children Forget How To --- <!-- .slide: data-background-color="#000" --> # Thank You ## Questions? *The Architecture of Autonomy* *From Shield to Snare: The Six Inversions*
{"contributors":"[{\"id\":\"0b0d4b7e-e9c8-49f0-9ef4-13bc8cb215c4\",\"add\":19033,\"del\":4843,\"latestUpdatedAt\":1755117025292}]","breaks":false,"description":"View the presentation with \"Slide Mode\"","robots":"noindex, nofollow","title":"Slide: The Six Inversions (Recopied)"}
    146 views
   Owned this note