<style>
/* Table styles ripped from Github */
table {
width: 80%;
border-spacing: 0;
}
tbody {
display: table-row-group;
vertical-align: middle;
border-color: inherit;
}
table th {
font-weight: 600;
}
table td,
table th {
border: 1px solid #dfe2e5;
padding: 6px 13px;
border-bottom: 0;
border-top: 0;
border-right: 0;
}
th:first-child {
border-left: 0;
}
td:first-child {
border-left: 0;
}
/* End of table styles */
</style>
<!-- .slide: data-background-color="#000" -->
# The Architecture of Autonomy
## How Platforms Turned Shields Into Snares
---
<!-- .slide: data-background-color="#8B0000" -->
## It's a Trap!
Digital platforms ensnare & extract.
* They profit the platforms.
* They profit the shareholders.
* You are the product.
---
<!-- .slide: data-background-color="#8B0000" -->
## I Helped Build This Trap
<font size=6>
I wanted to create the Architecture of Autonomy.
* I built cryptographic foundations, protocols, standards.
* Now they are being used to extract from you.
<font size=7>
***This is my warning—and your guide to escape.***
</font>
</font>
---
<!-- .slide: data-background-color="#8B0000" -->
### You Are One Decision From Digital Death
<font size=6>
A single platform decision can destroy your digital life.
* **Content flagged?** Years of archives vanish forever.
* **Account banned?** Professional network erased instantly.
* **Payments blocked?** Economic survival becomes impossible.
No human review. No appeal. No recourse.
</font>
---
<!-- .slide: data-background-color="#000" -->
<font size=6>
<hr>
***"We believed that technology could protect people by preserving autonomy. That it could be a shield against coercion, rather than a conduit for it. We were wrong."***
<hr>
</font>
---
<!-- .slide: data-background-color="#1a1a2e" -->
## The Warning Signs Are All Around
<font size=6>
* A father lost a decade of family photos when Google mistook medical images for abuse
* Canadian truckers watched their bank accounts freeze without trial.
* The Australian "Robodebt" system drove three people to suicide with false accusations.
* WikiLeaks faced financial blockade that no court could achieve.
</font>
---
<!-- .slide: data-background-color="#000" -->
<font size=6>
<hr>
***"Infrastructure plus money equals power — and digital platforms have captured both."***
<hr>
</font>
---
<!-- .slide: data-background-color="#8B0000" -->
## The Economic Foundation
<font size=6>
All digital rights depend on economic infrastructure
* **Freedom of speech** dies when payment processors block media.
* **Freedom of assembly** ends when accounts freeze.
* **Freedom of movement** stops when transactions fail.
* **Privacy rights** vanish when forced onto surveilled rails.
</font>
---
<!-- .slide: data-background-color="#16213e" -->
## The Shield That Never Was
<font size=6>
Tools we built for digital autonomy were **captured** before we could assemble them, leaving the Architecture of Autonomy incomplete.
* Open protocols became proprietary platforms.
* The town square became the shopping mall.
* Building blocks for freedom became infrastructure for extraction.
</font>
---
<!-- .slide: data-background-color="#8B0000" -->
## The Six Inversions
### How Law Became Its Opposite
---
<!-- .slide: data-background-color="#2F1B14" -->
### Inversion 1:</br>Property → Privilege
<font size=6>
<br>
| **Physical World** | **Digital World** |
|:----:|:----:|
| You hold it<br>You control it | You "own" nothing |
</font>
---
<!-- .slide: data-background-color="#2F1B14" -->
### Inversion 1:</br>Property → Privilege
<font size=6>
* Files can be deleted without notice.
* Assets can be revoked without appeal.
* Even "self-custodied" crypto relies on interfaces that can vanish.
* You arene click away from dispossession.
</font>
---
<!-- .slide: data-background-color="#000" -->
<font size=6>
<hr>
***"When ownership becomes licensing,<br>property becomes a revocable privilege."***
<hr>
</font>
---
<!-- .slide: data-background-color="#2F1B14" -->
## Inversion 2:</br>Contract → Coercion
<font size=6>
<br>
| **Physical World** | **Digital World** |
|:----:|:----:|
| Voluntary exchange<br>between equals | Nonnegotiable demands |
</font>
---
<!-- .slide: data-background-color="#2F1B14" -->
## Inversion 2:</br>Contract → Coercion
<font size=6>
* Click "agree" or be excluded from digital life.
* Terms are unreadable and change without notice.
* There is no negotiation, no alternatives.
* Participation is mandatory for survival.
<br>
---
<!-- .slide: data-background-color="#000" -->
<font size=6>
<hr>
***"This is ritualized consent — a form without substance.<br>If a system cannot hear you say no, it was never built for freedom."***
<hr>
</font>
---
<!-- .slide: data-background-color="#2F1B14" -->
## Inversion 3:</br>Justice → Absolutism
<font size=6>
<br>
| **Physical World** | **Digital World** |
|:----:|:----:|
| Due process<br>Appeals<br>Proportionality|Execution without trial|
</font>
---
<!-- .slide: data-background-color="#2F1B14" -->
## Inversion 3:</br>Justice → Absolutism
<font size=6>
* Bots revoke access instantly.
* Systems delete content without review.
* Algorithms ban accounts with no appeal.
* Australia's "Robodebt" kills before courts can intervene.
* "Sludge" makes appeals so exhausting you give up.
</font>
---
<!-- .slide: data-background-color="#000" -->
<font size=6>
<hr>
***"An algorithm can enforce fairness — but only if someone defines what fairness means. And if no one can challenge that definition, the result is not justice. It is automation without mercy."***
<hr>
</font>
---
<!-- .slide: data-background-color="#2F1B14" -->
## Inversion 4:</br>Transparency → Invisibility
<font size=6>
<br>
| **Physical World** | **Digital World** |
|:----:|:----:|
|Power has a face<br>Decisions have names|Infrastructure as <br> hidden sovereignty|
</font>
---
<!-- .slide: data-background-color="#2F1B14" -->
## Inversion 4:</br>Transparency → Invisibility
<font size=6>
* Power distributed across "the stack".
* DNS, hosting, payment rails are all potential chokepoints.
* Parler vanished from multiple layers simultaneously.
* You can't fight what you can't see.
</font>
---
<!-- .slide: data-background-color="#000" -->
<font size=6>
<hr>
***"The most dangerous system is not the one that governs without consent—it's the one that governs without being seen."***
<hr>
</font>
---
<!-- .slide: data-background-color="#2F1B14" -->
## Inversion 5:</br>Exit → Captivity
<font size=6>
<br>
| **Physical World** | **Digital World** |
|:----:|:----:|
|Walk away<br>with your resources|Departure as erasure|
</font>
---
<!-- .slide: data-background-color="#2F1B14" -->
## Inversion 5:</br>Exit → Captivity
<font size=6>
* Data non-portable, networks siloed.
* Leave social media, lose relationships.
* Switch platforms, lose reputation.
* Economic exile through payment blockade.
</font>
---
<!-- .slide: data-background-color="#000" -->
<font size=6>
<hr>
***"Exit is not escape. It is leverage—and without it, <br> consent collapses into captivity."***
<hr>
</font>
---
<!-- .slide: data-background-color="#2F1B14" -->
## Inversion 6:</br> Identity → Commodity
<font size=6>
<br>
| **Physical World** | **Digital World** |
|:----:|:----:|
|You are who you are—inalienable|You become a product|
</font>
---
<!-- .slide: data-background-color="#2F1B14" -->
## Inversion 6:</br> Identity → Commodity
<font size=6>
* Identity fragments extracted and traded.
* Algorithmic categories imposed without consent.
* You become legible to systems before yourself.
* TikTok labels you, insurance scores you, Meta exposes your hidden relationships.
</font>
---
<!-- .slide: data-background-color="#000" -->
<font size=6>
<hr>
***"A system that defines you before you understand yourself isn't recognizing you — it's preempting you."***
<hr>
</font>
---
<!-- .slide: data-background-color="#1a1a2e" -->
## These Inversions Are Not Accidental
<font size=6>
They are **structural patterns** embedded by design:
* Architectures create dependence.
* Economic models support extraction.
* Governance systems substitute access for autonomy.
But most developers don't realize what they're building.
</font>
---
<!-- .slide: data-background-color="#000" -->
<font size=6>
<hr>
***"We do not own what we use.<br/>We do not consent to what we sign.<br/>We cannot contest enforcement.<br/>We do not know who governs us.<br/>We cannot leave.<br/>We do not even own ourselves."***
<hr>
</font>
---
<!-- .slide: data-background-color="#16213e" -->
## The Window Is Closing
<font size=6>
**2025-2030** represents our last clear chance
* Every day, network effects compound.
* Regulatory capture deepens.
* New generations normalize extraction.
After this window, escape is technically impossible, economically irrational, and politically unthinkable.
</font>
---
<!-- .slide: data-background-color="#8B0000" -->
## The Path Forward
<br>
The Architecture of Autonomy was never completed.
<br>
***We can still build it!***
---
<!-- .slide: data-background-color="#1a1a2e" -->
## What Autonomy Requires
<font size=6>
* **Accountability mechanisms**
* Platforms must answer to users.
* **Interoperability mandates**
* Break the lock-in.
* **Fiduciary obligations**
* Duties are required to those who depend.
* **Cryptographic possession**
* Wyoming proved it's possible
* **Principal authority**
* Utah shows government can recognize, not issue.
* **Human review**
* Life-changing decisions require oversight.
</font>
---
<!-- .slide: data-background-color="#2F1B14" -->
## Three User Segments
### Three Strategies
<font size=6>
* **5% pioneers**
* Give them tools now, don't convince
* **25% experimenters**
* Lower barriers, demonstrate benefits
* **70% majority:**
* Won't switch voluntarily
* Protect them through regulation
</font>
---
<!-- .slide: data-background-color="#8B0000" -->
## We Must Build AND Fight
<font size=6>
Neither alone can overcome network effects.
* **Build alternatives** for communities choosing dignity now.
* **Fight for regulation** so everyone has that choice.
Both together can complete the Architecture of Autonomy.
</font>
---
<!-- .slide: data-background-color="#16213e" -->
## The Coalition That Can Win
<font size=6>
* **Small businesses** crushed by arbitrary enforcement
* **Parents** watching kids manipulated by algorithms
* **Platform workers** organizing for dignity
* **International allies** facing political capture
There are crisis moments when **70%** become receptive
</font>
---
<!-- .slide: data-background-color="#000" -->
<font size=6>
<hr>
***"Crisis creates opportunity—but only for those prepared to act <br> when normal constraints break down."***
<hr>
</font>
---
<!-- .slide: data-background-color="#1a1a2e" -->
## The Next Crisis Is Coming
<font size=6>
Platforms believe they are ungovernable.
**They are wrong.**
When the next crisis hits:
* Will we be ready to shape response?
* Will we have frameworks that scale?
* Will we have coalitions that act?
</font>
---
<!-- .slide: data-background-color="#8B0000" -->
## The Choice Before Us
<br>
**Accept platform feudalism as inevitable**
OR
**Complete the Architecture of Autonomy**
---
<!-- .slide: data-background-color="#8B0000" -->
<font size=6>
<hr>
The frameworks exist.
The coalitions are forming.
The political moment is arriving.
<hr>
</font>
---
<!-- .slide: data-background-color="#000" -->
## What We Do Next Determines ...
<br>
Whether Technology Serves Human Flourishing
Or Continues Extracting From It
---
<!-- .slide: data-background-color="#16213e" -->
## Alternatives Already Work
<font size=5>
They can't compete with subsidized extraction—yet.
* **Stocksy United**: Photographers keep 50-75% vs Getty's 15-45%.
* **Drivers Cooperative NYC**: Drivers keep 85-90% vs Uber's average of 40-50%.
* **Mastodon/Bluesky**: Proof that federation can work at scale.
* **Chattanooga EPB**: Proof that communities can own infrastructure.
* **Wyoming/Utah**: States pioneering digital identity laws that preserve dignity.
**But they prove different relationships are possible.**
</font>
---
<!-- .slide: data-background-color="#16213e" -->
## States Are Leading the Way
<font size=6>
* **Wyoming**: "Principal Authority"
* You delegate, but never surrender control.
* **Utah**: "Recognizer Not Issuer"
* Government validates, doesn't create identity.
* **California**: "California Consumer Privacy Act (CCPA)"
* Forced global privacy changes (Brussels/California Effect).
* **Vermont**: Public service obligations for digital infrastructure.
* **Estonia/Taiwan**: Proving algorithmic democracy works at scale.
These aren't experiments—they're blueprints for digital dignity.
</font>
---
<!-- .slide: data-background-color="#000" -->
# The Diagnosis Is Complete
## The Prescription Begins Now
---
<!-- .slide: data-background-color="#1a1a2e" -->
### Start This Week: Personal Actions
<font size=6>
**Value Digital Autonomy?**
* Use Signal, Mastodon, Bluesky over surveillance platforms.
* Pay for ProtonMail, Fastmail, Kagi.
* Don't be the product.
* Donate to Tor, Signal, Let's Encrypt, Blockchain Commons.
* Even $5/month matters.
* Warning: Signal needs $50M/year from one donor.
* Support what you use!
</font>
---
<!-- .slide: data-background-color="#1a1a2e" -->
### Start This Week: Personal Actions
<font size=6>
**Technically Savvy?**
* Support open source.
* Even documentation helps.
* Run your own servers, nodes, infrastructure.
* Donate to HRF, EFF.
* Fund project at Blockchain Commons, DIF.
* Help non-technical friends migrate to privacy tools.
</font>
---
<!-- .slide: data-background-color="#1a1a2e" -->
### Start This Week: Collective Power
<font size=6>
**Create or Work Online?**
* Document platform exploitation.
* Deplatforming, wage theft, unfair rules changes.
* Document the "sludge".
* 17-step appeals designed to exhaust you.
* Join platform worker organizations like Drivers Cooperative.
* Share your stories: make abstract harm concrete.
</font>
---
<!-- .slide: data-background-color="#1a1a2e" -->
### Start This Week: Political Action
<font size=6>
**Politically Engaged?**
* Push state legislature to user-centric identity models.
* Wyoming's "principal authority" model.
* Utah's "recognizer not issuer" approach.
* Contact FTC about interoperability mandates.
* Demand platform taxes fund public infrastructure.
* Like Chattanooga's network.
* Your state law can force global change!
* (The Brussels/California Effect.)
</font>
---
<!-- .slide: data-background-color="#1a1a2e" -->
### Start This Week: Investment Power
<font size=6>
**Have Investment Power?**
* File shareholder resolutions for algorithmic audits.
* Divest from surveillance, fund privacy alternatives.
* #StopHateForProfit proved pressure works.
</font>
---
<!-- .slide: data-background-color="#8B0000" -->
## These Aren't Suggestions
## They're Survival Tactics
---
<!-- .slide: data-background-color="#000" -->
## The Window Is Open
## The Tools Exist
## The Coalition Is Gathering
---
<!-- .slide: data-background-color="#000" -->
<font size=6>
<hr>
***"If a system cannot hear you say no, it was never built for freedom. <br> When no one can be heard, everyone is at risk."***
<hr>
</font>
---
<!-- .slide: data-background-color="#8B0000" -->
## We Are Human Beings
## Not Digital Serfs
### Build Systems That Remember This—
### Before Our Children Forget How To
---
<!-- .slide: data-background-color="#000" -->
# Thank You
## Questions?
*The Architecture of Autonomy*
*From Shield to Snare: The Six Inversions*
{"contributors":"[{\"id\":\"0b0d4b7e-e9c8-49f0-9ef4-13bc8cb215c4\",\"add\":19033,\"del\":4843,\"latestUpdatedAt\":1755117025292}]","breaks":false,"description":"View the presentation with \"Slide Mode\"","robots":"noindex, nofollow","title":"Slide: The Six Inversions (Recopied)"}