diff --git a/content/articles/independent-technology/index.md b/content/articles/independent-technology/index.md
index 32e5c49..0f579b1 100644
--- a/content/articles/independent-technology/index.md
+++ b/content/articles/independent-technology/index.md
@@ -7,69 +7,69 @@ featureImageCaption: "Photo by NASA on Unsplash"
+
---
The Civil Society Technology Foundation (CSTF) holds the following positions regarding technology, digital rights, and civil society. These statements represent our core beliefs and guide our work.
diff --git a/content/articles/why-digital-sovereignty-matters/index.md b/content/articles/why-digital-sovereignty-matters/index.md
index 76c585a..3a61039 100644
--- a/content/articles/why-digital-sovereignty-matters/index.md
+++ b/content/articles/why-digital-sovereignty-matters/index.md
@@ -5,196 +5,124 @@ summary: Digital sovereignty is essential for individuals, communities, and civi
featureImageCaption: "Photo by Vladislav Klapin on Unsplash"
---
-## What Is Digital Sovereignty?
+## What is digital sovereignty?
Digital sovereignty is the ability of individuals, communities, and organizations to exercise meaningful control over their digital lives. It means having genuine authority over your data, the software you use, and the infrastructure that powers your online activities.
True digital sovereignty includes:
-- **Data control**: Determining what information you share, with whom, and under what conditions
-- **Software freedom**: Using, examining, modifying, and sharing the code that runs your digital tools
-- **Infrastructure ownership**: Having the ability to operate your own servers and services
-- **Knowledge access**: Understanding how your technology works and being able to make informed choices
-- **Governance participation**: Having a voice in how digital systems are designed and regulated
+- **Data control**: Determining what information you share, with whom, and under what conditions.
+- **Software freedom**: Using, examining, modifying, and sharing the code that runs your digital tools.
+- **Infrastructure ownership**: Having the ability to operate your own servers and services.
+- **Knowledge access**: Understanding how your technology works and being able to make informed choices.
+- **Governance participation**: Having a voice in how digital systems are designed and regulated.
Digital sovereignty exists on a spectrum from complete dependency to full autonomy. The Civil Society Technology Foundation works toward shifting the balance away from centralized control and toward individual and community empowerment.
-## Why Sovereignty Is Under Threat
+## The threat to digital sovereignty
Most people today have very little digital sovereignty. Consider your typical online experience:
-- Your personal information is collected, analyzed, and monetized by corporations without meaningful consent
-- The software you use is controlled by distant companies that can change terms, features, or access at any time
-- Your content and connections depend on platforms that can censor, amplify, or derank what you share
-- Critical services like email, calendars, and file storage are hosted on corporate infrastructure that you cannot inspect or control
-- Algorithms shape what you see and how you communicate in ways designed to maximize corporate profit
+- Your personal information is collected, analyzed, and monetized by corporations without meaningful consent.
+- The software you use is controlled by distant companies that can change terms, features, or access at any time.
+- Your content and connections depend on platforms that can censor, amplify, or de-rank what you share.
+- Critical services like email, calendars, and file storage are hosted on corporate infrastructure that you cannot inspect or control.
+- Algorithms shape what you see and how you communicate in ways designed to maximize corporate profit.
-This lack of sovereignty is not accidental—it's the result of business models and regulatory environments that incentivize centralization and data extraction. The trend toward concentration has accelerated as digital technology has become essential to nearly every aspect of modern life.
+This lack of sovereignty is not accidental--it's the result of business models and regulatory environments that incentivize centralization and data extraction. The trend toward concentration has accelerated as digital technology has become essential to nearly every aspect of modern life.
-## Why Digital Sovereignty Matters for Individuals
+## Individuals need digital sovereignty
For individuals, digital sovereignty affects fundamental aspects of daily life:
-### Privacy and Security
+### Privacy and security
-Without digital sovereignty, your personal information is vulnerable:
+Without digital sovereignty, your personal information becomes vulnerable to exploitation. Your browsing history, location data, and private communications transform into corporate assets, traded and monetized without meaningful consent. Intimate details of your life face constant exposure through data breaches and surveillance, creating a permanent digital record that can be weaponized against you at any time.
-- Your browsing history, location data, and private communications become corporate assets
-- Intimate details of your life can be exposed through data breaches or surveillance
-- Your digital footprint creates a permanent record that can be used against you
+Digital sovereignty changes this dynamic fundamentally. When you control your digital infrastructure, you determine what information you share and with whom. Encryption and privacy-preserving tools become standard practice rather than specialized knowledge. You can maintain clear boundaries between different aspects of your digital life, protecting both your current privacy and your future autonomy.
-With digital sovereignty, you can:
+### Personal autonomy
-- Determine what information you share and with whom
-- Use encryption and privacy-preserving tools as a matter of course
-- Maintain boundaries between different aspects of your digital life
+Without digital sovereignty, your choices become systematically constrained by forces beyond your control. Algorithms shape not just what information you see, but what options appear available to you. Design patterns constantly nudge you toward behaviors that benefit platforms rather than yourself, while essential tasks increasingly require surrendering privacy as the price of participation.
-### Personal Autonomy
+Digital sovereignty restores meaningful choice to your daily life. You can make decisions based on diverse information sources that you've actively chosen rather than algorithmic curation. Your tools serve your needs rather than exploiting your attention for profit. Most importantly, you can participate fully in digital society without surrendering your fundamental rights or personal dignity.
-Without digital sovereignty, your choices are constrained:
+### Economic security
-- Algorithms shape what information you see and what options seem available
-- Design patterns nudge you toward behaviors that benefit platforms, not yourself
-- Essential tasks increasingly require using services that compromise your privacy
+Without digital sovereignty, you face growing economic vulnerabilities in an increasingly digital economy. Your skills and livelihood become dependent on proprietary platforms that can change terms or revoke access arbitrarily. Economic opportunities remain subject to the whims of platform policies, while the value you create online flows primarily to distant corporate owners rather than building your own wealth or community resources.
-With digital sovereignty, you gain freedom:
+Digital sovereignty builds genuine economic resilience. You develop portable skills that transcend any specific corporate platform, ensuring your capabilities remain valuable regardless of technological shifts. You can create and connect through systems you help govern, participating in cooperative economic models that distribute value more equitably among those who generate it.
-- Make decisions based on diverse information sources you've chosen
-- Use tools designed to serve your needs rather than exploit your attention
-- Participate online without surrendering your rights or dignity
+## Communities need digital sovereignty
-### Economic Security
+Communities, from local neighborhoods to identity groups to civil society organizations, face particular challenges in the digital age.
-Without digital sovereignty, you face growing vulnerabilities:
+### Community autonomy
-- Skills and livelihoods become dependent on proprietary platforms
-- Your access to economic opportunities can be arbitrarily restricted
-- The value you create online is captured primarily by platform owners
+Without digital sovereignty, communities lose fundamental self-determination as their governance structures become subordinated to platform rules and algorithms. Local knowledge and cultural context get systematically flattened by global platforms designed for mass consumption rather than community specificity. Meanwhile, community resources flow steadily toward distant corporations instead of circulating locally to strengthen community bonds and capacity.
-With digital sovereignty, you build resilience:
+Digital sovereignty enables communities to truly thrive on their own terms. They can design digital spaces that authentically reflect local values and meet specific community needs. Community standards and practices remain intact without corporate override or algorithmic interference. Most importantly, digital infrastructure becomes a genuine community asset that builds collective wealth and capacity rather than extracting value.
-- Develop portable skills that aren't tied to specific corporate platforms
-- Create and connect through systems you help govern
-- Participate in cooperative economic models that distribute value more equitably
+### Resilience against censorship
-## Why Digital Sovereignty Matters for Communities
+Without digital sovereignty, communities face systematic silencing through mechanisms that appear neutral but consistently harm marginalized voices. Platform policies regularly restrict legitimate speech, with enforcement patterns that disproportionately affect those with the least institutional power. Commercial content moderation systems cannot possibly reflect the nuance and context of diverse community standards, leading to decisions that undermine rather than protect community discourse.
-Communities—from local neighborhoods to identity groups to civil society organizations—face particular challenges in the digital age:
+Digital sovereignty preserves community voice through infrastructure independence. Communities can operate their own communication systems that resist external censorship while developing content moderation approaches appropriate to their specific context and values. They maintain fallback channels that cannot be easily blocked, ensuring continuity of communication even under pressure.
-### Community Autonomy
+### Collective memory
-Without digital sovereignty, communities lose self-determination:
+Without digital sovereignty, community history becomes dangerously precarious as it depends entirely on corporate platforms with their own priorities and lifespans. When platforms shut down or change direction, they take irreplaceable community archives with them. Algorithmic sorting continuously buries historically important content, while corporate priorities rather than community values determine what gets preserved for future generations.
-- Community governance gets usurped by platform rules and algorithms
-- Local knowledge and context get flattened by global platforms
-- Community resources flow to distant corporations rather than circulating locally
+Digital sovereignty strengthens cultural continuity by giving communities control over their own historical record. They can maintain archives and documentation according to their own standards and priorities. Knowledge transfer between generations happens on community terms rather than through corporate intermediaries. Digital artifacts remain accessible and meaningful even as underlying technologies evolve, ensuring that community memory persists across technological transitions.
-With digital sovereignty, communities thrive:
+## Civil society needs digital sovereignty
-- Design digital spaces that reflect local values and needs
-- Maintain community standards and practices without corporate override
-- Build digital infrastructure as a community asset
+For the non-profit and non-governmental bodies that form the backbone of democratic society, digital sovereignty is particularly crucial.
-### Resilience Against Censorship
+### Independence from corporate control
-Without digital sovereignty, communities face silencing:
+Without digital sovereignty, civil society becomes fundamentally compromised in its mission and effectiveness. NGOs find themselves forced to accept surveillance and data extraction as the price of accessing essential digital tools, undermining their ability to protect the communities they serve. Advocacy organizations become dependent on platforms that may actively oppose their values, while corporate philanthropy increasingly shapes which digital infrastructure gets built, prioritizing donor interests over community needs.
-- Platform policies can restrict legitimate speech, especially from marginalized groups
-- Arbitrary enforcement affects those with the least power most severely
-- Commercial content moderation cannot reflect the nuance of community standards
+Digital sovereignty allows civil society to maintain its integrity and independence. Organizations can choose and use tools that genuinely align with their mission and values rather than contradicting them. Advocacy work can proceed without platform-imposed limitations that undermine effectiveness, while infrastructure development responds to actual community needs rather than market incentives or corporate priorities.
-With digital sovereignty, communities maintain their voice:
+### Operational security
-- Run their own communication infrastructure resistant to external censorship
-- Develop community-appropriate content moderation
-- Create fallback channels that cannot be easily blocked
+Without digital sovereignty, civil society organizations face escalating security risks that threaten their core work. Sensitive communications and confidential data must reside on vulnerable commercial platforms designed for profit rather than protection. Critical organizational workflows become dependent on services that can be withdrawn or modified without notice, while organizational data gets integrated into commercial AI training sets without consent or oversight.
-### Collective Memory
+Digital sovereignty dramatically improves operational security by returning control to the organizations themselves. They can maintain direct oversight of sensitive information rather than trusting corporate intermediaries. Communication channels become resistant to surveillance and interference, while infrastructure resilience protects against both technical disruption and political pressure.
-Without digital sovereignty, community history becomes precarious:
+### Ethical alignment
-- When platforms shut down, they take community archives with them
-- Algorithmic sorting buries historically important content
-- Corporate priorities determine what gets preserved
+Without digital sovereignty, civil society faces deep contradictions that undermine moral authority and organizational effectiveness. Organizations advocating for human rights often find themselves using tools that systematically violate those same rights. Digital workflows frequently contradict stated organizational values, while resource dependencies on extractive platforms compromise advocacy positions and limit strategic options.
-With digital sovereignty, cultural continuity strengthens:
+Digital sovereignty enables authentic alignment between values and practice. Technology choices can reflect and actively reinforce organizational principles rather than undermining them. Digital infrastructure embodies the world organizations are working to create, demonstrating alternative possibilities rather than perpetuating existing problems. Most importantly, consistency between means and ends strengthens moral authority and makes advocacy more credible and effective.
-- Communities maintain their own archives and historical records
-- Knowledge transfer between generations happens on community terms
-- Digital artifacts remain accessible even as technologies change
+## The path to digital sovereignty
-## Why Digital Sovereignty Matters for Civil Society
+Achieving greater digital sovereignty isn't an all-or-nothing proposition. It's a journey with practical steps that individuals and organizations can take.
-For civil society organizations—the non-profit and non-governmental bodies that form the backbone of democratic society—digital sovereignty is particularly crucial:
+### For individuals
-### Independence from Corporate Control
+1. **Start with awareness**: Learn how your current tools work and what alternatives exist.
+2. **Make incremental changes**: Replace proprietary services with open alternatives one by one.
+3. **Join communities of practice**: Connect with others on similar journeys.
+4. **Develop technical literacy**: Build skills to maintain more of your own technology.
+5. **Support and advocate**: Contribute to projects and policies that promote digital sovereignty.
-Without digital sovereignty, civil society becomes compromised:
+### For organizations
-- NGOs must accept surveillance and data extraction to use essential tools
-- Advocacy organizations depend on platforms that may not share their values
-- Corporate philanthropy shapes which digital infrastructure gets built
+1. **Audit current dependencies**: Understand where you lack digital sovereignty.
+2. **Prioritize critical systems**: Focus first on communications and sensitive data.
+3. **Invest in capacity**: Build technical skills within your organization.
+4. **Build community infrastructure**: Partner with similar organizations to share resources.
+5. **Center sovereignty in planning**: Make digital autonomy a strategic priority.
-With digital sovereignty, civil society maintains integrity:
-
-- Organizations use tools aligned with their mission and values
-- Advocacy can proceed without platform-imposed limitations
-- Infrastructure development responds to community needs, not market incentives
-
-### Operational Security
-
-Without digital sovereignty, organizations face serious risks:
-
-- Sensitive communications and data reside on vulnerable commercial platforms
-- Critical workflows depend on services that can be withdrawn without notice
-- Organization data becomes integrated into commercial AI training sets
-
-With digital sovereignty, operations become more secure:
-
-- Organizations maintain control over sensitive information
-- Communication channels resist surveillance
-- Infrastructure resilience protects against disruption
-
-### Ethical Alignment
-
-Without digital sovereignty, civil society faces contradictions:
-
-- Organizations advocating for rights often use tools that undermine those rights
-- Digital workflows can contradict organizational values
-- Resource dependencies compromise advocacy positions
-
-With digital sovereignty, values and practices align:
-
-- Technology choices reflect and reinforce organizational principles
-- Digital infrastructure embodies the world organizations are working to create
-- Consistency between means and ends strengthens moral authority
-
-## The Path to Digital Sovereignty
-
-Achieving greater digital sovereignty isn't an all-or-nothing proposition. It's a journey with practical steps that individuals and organizations can take:
-
-### For Individuals
-
-1. **Start with awareness**: Learn how your current tools work and what alternatives exist
-2. **Make incremental changes**: Replace proprietary services with open alternatives one by one
-3. **Join communities of practice**: Connect with others on similar journeys
-4. **Develop technical literacy**: Build skills to maintain more of your own technology
-5. **Support and advocate**: Contribute to projects and policies that promote digital sovereignty
-
-### For Organizations
-
-1. **Audit current dependencies**: Understand where you lack digital sovereignty
-2. **Prioritize critical systems**: Focus first on communications and sensitive data
-3. **Invest in capacity**: Build technical skills within your organization
-4. **Build community infrastructure**: Partner with similar organizations to share resources
-5. **Center sovereignty in planning**: Make digital autonomy a strategic priority
-
-The Civil Society Technology Foundation's Wild Cloud project provides a reference implementation for organizations seeking to regain digital sovereignty. It demonstrates that practical steps toward greater independence are possible today, even with limited resources.
+The Civil Society Technology Foundation's [Wild Cloud project](/projects/wild-cloud) provides a reference implementation for individuals, communities, and organizations seeking to regain digital sovereignty. It demonstrates that practical steps toward greater independence are possible today, even with limited resources.
## Conclusion
-Digital sovereignty isn't a luxury—it's increasingly essential for meaningful participation in society, for the health of communities, and for the independence of civil society. As digital technology becomes more deeply embedded in every aspect of our lives, the question of who controls that technology becomes more urgent.
+Digital sovereignty isn't a luxury, it's increasingly essential for meaningful participation in society, for the health of communities, and for the independence of civil society. As digital technology becomes more deeply embedded in every aspect of our lives, the question of who controls that technology becomes more urgent.
The challenges are significant, but practical alternatives exist. By taking incremental steps toward greater sovereignty, we can build a digital future that enhances rather than undermines human agency, community resilience, and democratic values.
-Digital sovereignty matters because it determines whether technology will serve as a tool of liberation or a mechanism of control. The choice between these futures is still ours to make—if we act with purpose and clarity about what's at stake.
+Digital sovereignty matters because it determines whether technology will serve as a tool of liberation or a mechanism of control. The choice between these futures is still ours to make--if we act with purpose and clarity about what's at stake.
diff --git a/content/projects/wild-cloud/index.md b/content/projects/wild-cloud/index.md
index 6b88e73..0563a1e 100644
--- a/content/projects/wild-cloud/index.md
+++ b/content/projects/wild-cloud/index.md
@@ -5,65 +5,44 @@ alias:
- /projects/
---
-Wild Cloud is the Civil Society Technology Foundation's reference implementation for personal and organizational self-hosted infrastructure. This project empowers individuals and organizations to run their own digital services without dependency on centralized corporate platforms.
+Wild Cloud is the Civil Society Technology Foundation's reference implementation for self-hosted "cloud" infrastructure. This project empowers individuals, communities, and organizations to run their own digital services without dependency on centralized corporate platforms.
-## Overview
+When released later this year, Wild Cloud will become a complete, accessible solution for operating essential digital services on infrastructure you control. It combines carefully selected open-source components into a cohesive system providing the functionality needed for self-hosted cloud services.
-Wild Cloud provides a complete, accessible solution for operating essential digital services on infrastructure you control. It combines carefully selected open-source components into a cohesive system that balances security, usability, and maintainability.
+By deploying Wild Cloud, individuals, communities, and organizations can:
-By deploying Wild Cloud, organizations can:
+- Host their own cloud services.
+- Maintain full control over their data and communications.
+- Reduce or eliminate dependencies on surveillance-based platforms.
+- Build technical capacity.
+- Participate in a community of practice around independent infrastructure.
-- Host their own email, calendar, file storage, website, and collaboration tools
-- Maintain full control over their data and communications
-- Reduce or eliminate dependencies on surveillance-based platforms
-- Build technical capacity and digital sovereignty
-- Participate in a community of practice around independent infrastructure
+The Wild Cloud project aims to start you with a simple self-hosted cloud solution that gets you set up quickly and lets you easily manage your cloud. However, it is a full solution. None of the technical foundations are stripped away. You can go deeper and extend your cloud how you see fit.
-The Soverign Cloud project aims to start you with a simple self-hosted cloud solution that gets you set up quickly and easily manage your cloud. However, it is a full solution. None of the technical foundations are stripped away. You can go deeper and extend your cloud how you see fit.
+## Philosophy
-### Architecture
+Wild Cloud embodies the Civil Society Technology Foundation's [core principles](/about/#principles), which include:
-Wild Cloud allows individuals and organizations (cloud admins) to install and manage a full Kubernetes cluster (using K3s) made of one or multiple computers on their own premises. Kubernetes manages much of the complexity of maintaining the health of your cloud and managing the applications deployed in it.
+- **Sovereignty by Design**: Users control their data and computing environment.
+- **Open Source, Always**: All components are free to use, study, modify, and share.
+- **Self-Hosting Infrastructure**: Direct control reduces dependency and vulnerability.
+- **Transparent Governance**: All components have clear, accountable governance.
+- **Forkability is Freedom**: Any component can be replaced or modified as needed.
+- **Practical Autonomy**: Infrastructure that users can understand and maintain.
-### Applications
+By providing this reference implementation, we demonstrate that digital sovereignty is not merely theoretical but practically achievable with current technology and modest resources.
-Admins can deploy various applications into their cloud, including:
+## Architecture
-- Email servers with webmail interfaces
-- Calendar and contacts synchronization
-- File storage and sharing
-- Collaborative document editing
-- Website hosting
-- Chat and communication tools
-- Knowledge management systems
-- And more, based on organizational needs
+Wild Cloud allows individuals, communities, and organizations (cloud operators) to install and manage a full, standard, Kubernetes cluster made of a few or many computers on their own premises. Kubernetes manages much of the complexity of maintaining the health of your cloud and managing the applications deployed in it. The Wild Cloud project provides a set of reference "stacks" that can be deployed on this Kubernetes cluster. These stacks combine best-of-breed open source software applications to enable productivity, communication, collaboration, and intelligence applications and more.
## Getting Started
-The Wild Cloud project is currently being built out on GitHub.
+The Wild Cloud project is currently being developed, in the open, on GitHub.
{{< github repo="civil-society-dev/wild-cloud" showThumbnail=true >}}
-## Community Support
+## Join the Community
-Wild Cloud is supported by a community of practitioners who share knowledge, troubleshooting tips, and enhancements. The Civil Society Technology Foundation provides:
-
-- Documentation and tutorials
-- Installation guides for different environments
-- Regular security advisories
-- Community forum for mutual assistance
-- Workshops and training opportunities
-
-## Philosophy
-
-Wild Cloud embodies the Civil Society Technology Foundation's core principles:
-
-- **Sovereignty by Design**: Users control their data and computing environment
-- **Open Source, Always**: All components are free to use, study, modify, and share
-- **Self-Hosting Infrastructure**: Direct control reduces dependency and vulnerability
-- **Transparent Governance**: All components have clear, accountable governance
-- **Forkability is Freedom**: Any component can be replaced or modified as needed
-- **Practical Autonomy**: Infrastructure that users can understand and maintain
-
-By providing this reference implementation, we demonstrate that digital sovereignty is not merely theoretical but practically achievable with current technology and modest resources.
+The Wild Cloud project is developed and supported by a community of practitioners. To join the community or learn more, visit the [Wild Cloud website](https://mywildcloud.org).
diff --git a/layouts/home.html b/layouts/home.html
index 44c998c..68cc152 100644
--- a/layouts/home.html
+++ b/layouts/home.html
@@ -1,10 +1,5 @@
{{ define "main" }}
-
- {{ if .Params.showBreadcrumbs | default (.Site.Params.article.showBreadcrumbs | default false) }}
- {{ partial "breadcrumbs.html" . }}
- {{ end }}
-
{{ .Content }}