Content and layout update.

This commit is contained in:
2025-07-22 18:13:04 -07:00
parent 396dd976d9
commit 13bc51d443
15 changed files with 161 additions and 318 deletions

View File

@@ -2,4 +2,9 @@
Balkanization Balkanization
commoditized commoditized
CSTF CSTF
Elon
Forkability Forkability
Laitupa
Sahrul
Snowden
Zuckerberg

View File

@@ -862,9 +862,6 @@ body.zen-mode-enable {
.mt-20 { .mt-20 {
margin-top: calc(var(--spacing) * 20); margin-top: calc(var(--spacing) * 20);
} }
.mt-48 {
margin-top: calc(var(--spacing) * 48);
}
.mt-\[-2px\] { .mt-\[-2px\] {
margin-top: -2px; margin-top: -2px;
} }
@@ -886,9 +883,6 @@ body.zen-mode-enable {
.mr-3 { .mr-3 {
margin-right: calc(var(--spacing) * 3); margin-right: calc(var(--spacing) * 3);
} }
.mr-4 {
margin-right: calc(var(--spacing) * 4);
}
.mr-5 { .mr-5 {
margin-right: calc(var(--spacing) * 5); margin-right: calc(var(--spacing) * 5);
} }
@@ -1056,9 +1050,6 @@ body.zen-mode-enable {
.h-0 { .h-0 {
height: calc(var(--spacing) * 0); height: calc(var(--spacing) * 0);
} }
.h-1 {
height: calc(var(--spacing) * 1);
}
.h-1\/2 { .h-1\/2 {
height: calc(1/2 * 100%); height: calc(1/2 * 100%);
} }
@@ -1113,24 +1104,9 @@ body.zen-mode-enable {
.max-h-3 { .max-h-3 {
max-height: calc(var(--spacing) * 3); max-height: calc(var(--spacing) * 3);
} }
.max-h-8 {
max-height: calc(var(--spacing) * 8);
}
.max-h-10 {
max-height: calc(var(--spacing) * 10);
}
.max-h-64 {
max-height: calc(var(--spacing) * 64);
}
.max-h-80 { .max-h-80 {
max-height: calc(var(--spacing) * 80); max-height: calc(var(--spacing) * 80);
} }
.max-h-82 {
max-height: calc(var(--spacing) * 82);
}
.max-h-85 {
max-height: calc(var(--spacing) * 85);
}
.max-h-\[5rem\] { .max-h-\[5rem\] {
max-height: 5rem; max-height: 5rem;
} }
@@ -1263,9 +1239,6 @@ body.zen-mode-enable {
.shrink-0 { .shrink-0 {
flex-shrink: 0; flex-shrink: 0;
} }
.flex-grow {
flex-grow: 1;
}
.grow { .grow {
flex-grow: 1; flex-grow: 1;
} }
@@ -1363,21 +1336,9 @@ body.zen-mode-enable {
.justify-end { .justify-end {
justify-content: flex-end; justify-content: flex-end;
} }
.gap-2 {
gap: calc(var(--spacing) * 2);
}
.gap-4 { .gap-4 {
gap: calc(var(--spacing) * 4); gap: calc(var(--spacing) * 4);
} }
.gap-6 {
gap: calc(var(--spacing) * 6);
}
.gap-8 {
gap: calc(var(--spacing) * 8);
}
.gap-10 {
gap: calc(var(--spacing) * 10);
}
.space-y-2 { .space-y-2 {
:where(& > :not(:last-child)) { :where(& > :not(:last-child)) {
--tw-space-y-reverse: 0; --tw-space-y-reverse: 0;
@@ -1453,9 +1414,6 @@ body.zen-mode-enable {
.scroll-smooth { .scroll-smooth {
scroll-behavior: smooth; scroll-behavior: smooth;
} }
.\!rounded-full {
border-radius: calc(infinity * 1px) !important;
}
.\!rounded-lg { .\!rounded-lg {
border-radius: var(--radius-lg) !important; border-radius: var(--radius-lg) !important;
} }
@@ -1632,9 +1590,6 @@ body.zen-mode-enable {
.bg-neutral-300 { .bg-neutral-300 {
background-color: rgba(var(--color-neutral-300), 1); background-color: rgba(var(--color-neutral-300), 1);
} }
.bg-neutral-500 {
background-color: rgba(var(--color-neutral-500), 1);
}
.bg-neutral-500\/50 { .bg-neutral-500\/50 {
background-color: color-mix(in srgb, rgba(rgba(var(--color-neutral-500), 1), 1) 50%, transparent); background-color: color-mix(in srgb, rgba(rgba(var(--color-neutral-500), 1), 1) 50%, transparent);
@supports (color: color-mix(in lab, red, red)) { @supports (color: color-mix(in lab, red, red)) {
@@ -1722,15 +1677,9 @@ body.zen-mode-enable {
.p-0 { .p-0 {
padding: calc(var(--spacing) * 0); padding: calc(var(--spacing) * 0);
} }
.p-1 {
padding: calc(var(--spacing) * 1);
}
.p-1\.5 { .p-1\.5 {
padding: calc(var(--spacing) * 1.5); padding: calc(var(--spacing) * 1.5);
} }
.p-2 {
padding: calc(var(--spacing) * 2);
}
.p-4 { .p-4 {
padding: calc(var(--spacing) * 4); padding: calc(var(--spacing) * 4);
} }
@@ -2145,10 +2094,6 @@ body.zen-mode-enable {
-webkit-backdrop-filter: var(--tw-backdrop-blur,) var(--tw-backdrop-brightness,) var(--tw-backdrop-contrast,) var(--tw-backdrop-grayscale,) var(--tw-backdrop-hue-rotate,) var(--tw-backdrop-invert,) var(--tw-backdrop-opacity,) var(--tw-backdrop-saturate,) var(--tw-backdrop-sepia,); -webkit-backdrop-filter: var(--tw-backdrop-blur,) var(--tw-backdrop-brightness,) var(--tw-backdrop-contrast,) var(--tw-backdrop-grayscale,) var(--tw-backdrop-hue-rotate,) var(--tw-backdrop-invert,) var(--tw-backdrop-opacity,) var(--tw-backdrop-saturate,) var(--tw-backdrop-sepia,);
backdrop-filter: var(--tw-backdrop-blur,) var(--tw-backdrop-brightness,) var(--tw-backdrop-contrast,) var(--tw-backdrop-grayscale,) var(--tw-backdrop-hue-rotate,) var(--tw-backdrop-invert,) var(--tw-backdrop-opacity,) var(--tw-backdrop-saturate,) var(--tw-backdrop-sepia,); backdrop-filter: var(--tw-backdrop-blur,) var(--tw-backdrop-brightness,) var(--tw-backdrop-contrast,) var(--tw-backdrop-grayscale,) var(--tw-backdrop-hue-rotate,) var(--tw-backdrop-invert,) var(--tw-backdrop-opacity,) var(--tw-backdrop-saturate,) var(--tw-backdrop-sepia,);
} }
.backdrop-filter {
-webkit-backdrop-filter: var(--tw-backdrop-blur,) var(--tw-backdrop-brightness,) var(--tw-backdrop-contrast,) var(--tw-backdrop-grayscale,) var(--tw-backdrop-hue-rotate,) var(--tw-backdrop-invert,) var(--tw-backdrop-opacity,) var(--tw-backdrop-saturate,) var(--tw-backdrop-sepia,);
backdrop-filter: var(--tw-backdrop-blur,) var(--tw-backdrop-brightness,) var(--tw-backdrop-contrast,) var(--tw-backdrop-grayscale,) var(--tw-backdrop-hue-rotate,) var(--tw-backdrop-invert,) var(--tw-backdrop-opacity,) var(--tw-backdrop-saturate,) var(--tw-backdrop-sepia,);
}
.transition { .transition {
transition-property: color, background-color, border-color, outline-color, text-decoration-color, fill, stroke, --tw-gradient-from, --tw-gradient-via, --tw-gradient-to, opacity, box-shadow, transform, translate, scale, rotate, filter, -webkit-backdrop-filter, backdrop-filter, display, visibility, content-visibility, overlay, pointer-events; transition-property: color, background-color, border-color, outline-color, text-decoration-color, fill, stroke, --tw-gradient-from, --tw-gradient-via, --tw-gradient-to, opacity, box-shadow, transform, translate, scale, rotate, filter, -webkit-backdrop-filter, backdrop-filter, display, visibility, content-visibility, overlay, pointer-events;
transition-timing-function: var(--tw-ease, var(--default-transition-timing-function)); transition-timing-function: var(--tw-ease, var(--default-transition-timing-function));
@@ -2376,20 +2321,6 @@ body.zen-mode-enable {
display: none; display: none;
} }
} }
.hover\:rounded {
&:hover {
@media (hover: hover) {
border-radius: 0.25rem;
}
}
}
.hover\:rounded-full {
&:hover {
@media (hover: hover) {
border-radius: calc(infinity * 1px);
}
}
}
.hover\:rounded-lg { .hover\:rounded-lg {
&:hover { &:hover {
@media (hover: hover) { @media (hover: hover) {

View File

Before

Width:  |  Height:  |  Size: 1.6 MiB

After

Width:  |  Height:  |  Size: 1.6 MiB

View File

Before

Width:  |  Height:  |  Size: 143 KiB

After

Width:  |  Height:  |  Size: 143 KiB

View File

Before

Width:  |  Height:  |  Size: 1.7 MiB

After

Width:  |  Height:  |  Size: 1.7 MiB

View File

Before

Width:  |  Height:  |  Size: 102 KiB

After

Width:  |  Height:  |  Size: 102 KiB

View File

Before

Width:  |  Height:  |  Size: 35 KiB

After

Width:  |  Height:  |  Size: 35 KiB

View File

Before

Width:  |  Height:  |  Size: 1.6 MiB

After

Width:  |  Height:  |  Size: 1.6 MiB

View File

@@ -2,16 +2,27 @@
title: "Welcome to CSTF!" title: "Welcome to CSTF!"
--- ---
<!-- Light mode image --> <header>
<div class="dark:hidden"> <!-- Light mode image -->
<img src="/cstf-full-logo.svg" alt="CSTF" class="w-84 mx-auto" /> <div class="dark:hidden">
</div> {{<figure
src="/img/cstf-full-logo.svg"
<!-- Dark mode image --> alt="CSTF"
<div class="hidden dark:block"> nozoom="true"
<img src="/cstf-full-logo-light.svg" alt="CSTF" class="w-84 mx-auto" /> class="w-84 mx-auto"
</div> >}}
</div>
<!-- Dark mode image -->
<div class="hidden dark:block">
{{<figure
src="/img/cstf-full-logo-light.svg"
alt="CSTF"
nozoom="true"
class="w-84 mx-auto"
>}}
</div>
</header>
<div class="prose dark:prose-invert max-w-3xl mx-auto pt-8"> <div class="prose dark:prose-invert max-w-3xl mx-auto pt-8">
@@ -26,8 +37,8 @@ title: "Welcome to CSTF!"
</div> </div>
<div class="flex flex-col gap-4 pt-16" > <div class="flex flex-col gap-4 pt-16" >
{{< article link="/articles/independent-technology/" class="shadow-lg" >}} {{< article link="/articles/independent-technology/" >}}
{{< article link="/articles/why-digital-sovereignty-matters/" class="shadow-lg" >}} {{< article link="/articles/why-digital-sovereignty-matters/" >}}
{{< article link="/articles/arguments-against-centralization/" class="shadow-lg" >}} {{< article link="/articles/arguments-against-centralization/" >}}
</div> </div>

View File

@@ -7,69 +7,69 @@ featureImageCaption: "Photo by <a href=\"https://unsplash.com/@sahrulfikrilaitup
## Introduction ## Introduction
Independent technologysoftware and hardware developed outside corporate and government control, owned and operated by the people who use itis essential to the flourishing of civil society in the digital age. As our social, political, and economic lives increasingly move online, the question of who controls these digital spaces has profound implications for democracy, individual autonomy, and collective well-being. Independent technology is software and hardware developed outside corporate and government control, owned and operated by the people who use it. We are so accustomed to being dependent on commercial platforms and services that we fail to recognize the alternatives; however, independent technology is essential to the flourishing of civil society in the digital age. As our social, political, and economic lives increasingly move online, the question of who controls these digital spaces has profound implications for democracy, individual autonomy, and collective well-being.
The Civil Society Technology Foundation (CSTF) contends that truly independent technology is not just preferable but necessary for addressing the growing crises of digital rights, privacy, autonomy, and democratic participation. When technology serves its users rather than distant shareholders or state interests, it becomes a foundation for a more equitable, free, and resilient society. The Civil Society Technology Foundation (CSTF) contends that truly independent technology is not just preferable but necessary for addressing the growing crises of digital rights, privacy, autonomy, and democratic participation. When technology serves its users rather than distant shareholders or state interests, it becomes a foundation for a more equitable, free, and resilient society.
The concentration of digital power in the hands of a few corporations and governments has reached a critical threshold where it now threatens the very foundations of civil society. This essay examines why independent technology matters, what's at stake, and how we can build toward digital self-determination. The concentration of digital power in the hands of a few corporations and governments has reached a critical threshold where it now threatens the very foundations of civil society. This essay examines why independent technology matters, what's at stake, and how we can build toward digital self-determination.
## The Problem: Centralization of Digital Power ## The problem: centralization of digital power
Our digital infrastructurefrom communication platforms to cloud computing services, from operating systems to artificial intelligence modelshas become increasingly centralized under the control of a handful of global corporations and powerful states. This concentration creates systemic vulnerabilities and power imbalances that undermine individual autonomy and collective agency. Our digital infrastructure--from communication platforms to cloud computing services, from operating systems to artificial intelligence models--has become increasingly centralized under the control of a handful of global corporations and powerful states. This concentration creates systemic vulnerabilities and power imbalances that undermine individual autonomy and collective agency.
### Corporate Capture ### Corporate capture
The corporate capture of our digital commons has proceeded rapidly, with alarming consequences: The corporate capture of our digital commons has proceeded rapidly, with alarming consequences.
- **Infrastructure Consolidation**: Major technology companies have consolidated control over fundamental digital infrastructure, from cloud services to communication platforms. Just five companiesAlphabet, Amazon, Apple, Meta, and Microsoftnow control much of the infrastructure that powers our digital lives, creating unprecedented concentrations of power. Major technology companies have consolidated control over fundamental digital infrastructure, from cloud services to communication platforms. Just five companies--Alphabet, Amazon, Apple, Meta, and Microsoft--now control much of the infrastructure that powers our digital lives, creating unprecedented concentrations of power.
- **Misaligned Incentives**: Commercial imperatives prioritize engagement, data collection, and profit over user well-being. When a service is "free," users become the product, with their attention and personal data monetized through surveillance-based advertising. As one tech executive famously noted, "If you're not paying for the product, you are the product." Commercial imperatives prioritize engagement, data collection, and profit over user well-being. When a service is "free," users become the product, with their attention and personal data monetized through surveillance-based advertising. As one tech executive famously noted, "If you're not paying for the product, you are the product."
- **Extractive Relationships**: Platform monopolies create harmful dependencies and extract value from communities. Local businesses, independent creators, and civil society organizations increasingly rely on centralized platforms that extract fees, impose arbitrary rules, and can unilaterally change terms of service. Platform monopolies create harmful dependencies and extract value from communities. Local businesses, independent creators, and civil society organizations increasingly rely on centralized platforms that extract fees, impose arbitrary rules, and can unilaterally change terms of service.
- **Artificial Scarcity**: Corporate technology creates artificial scarcity in what should be abundant digital resources. Digital goods can be replicated at near-zero marginal cost, yet subscription models, paywalls, and intellectual property regimes create artificial barriers to access and use. Corporate technology creates artificial scarcity in what should be abundant digital resources. Digital goods can be replicated at near-zero marginal cost, yet subscription models, paywalls, and intellectual property regimes create artificial barriers to access and use.
- **Personalization as Control**: Algorithmic "personalization" becomes a mechanism for behavioral manipulation and preference shaping, optimizing for commercial outcomes rather than user agency or collective well-being. These systems are designed to maximize time spent, interaction, and consumptionnot to enhance human flourishing. Algorithmic "personalization" becomes a mechanism for behavioral manipulation and preference shaping, optimizing for commercial outcomes rather than user agency or collective well-being. These systems are designed to maximize time spent, interaction, and consumption, not to enhance human flourishing.
Our public messaging infrastructure should not be in the hands of any individual, such as Elon Musk or Mark Zuckerberg, where a single person's whims can reshape the digital public sphere that billions of people rely on. Our public messaging infrastructure should not be in the hands of any individual, such as Elon Musk or Mark Zuckerberg, where a single person's whims can reshape the digital public sphere that billions of people rely on.
### Government Overreach ### Government overreach
As digital systems become central to civic life, governments have expanded their control in problematic ways: As digital systems become central to civic life, governments have expanded their control in problematic ways.
- **Mass Surveillance**: State surveillance undermines civil liberties and democratic processes. The capabilities revealed by Edward Snowden and subsequent whistleblowers demonstrate how digital infrastructure has enabled unprecedented monitoring of citizens, activists, and journalists without appropriate democratic oversight. _Government regulatory capture_ of technology often reinforces corporate power rather than constraining it. Complex regulatory frameworks crafted with industry input frequently protect incumbents while raising barriers to entry for smaller, independent alternatives.
- **Regulatory Capture**: Government regulation of technology often reinforces corporate power rather than constraining it. Complex regulatory frameworks crafted with industry input frequently protect incumbents while raising barriers to entry for smaller, independent alternatives. Public services increasingly rely on proprietary technologies, creating long-term vulnerabilities within _overdependent relationships_. When governments outsource core functions to proprietary platforms, they sacrifice sovereignty and create risky dependencies that undermine democratic accountability.
- **Dependency Relationships**: Public services increasingly rely on proprietary technologies, creating long-term vulnerabilities. When governments outsource core functions to proprietary platforms, they sacrifice sovereignty and create risky dependencies that undermine democratic accountability. _Mass state surveillance_ undermines civil liberties and democratic processes. The capabilities revealed by Edward Snowden and subsequent whistleblowers demonstrate how digital infrastructure has enabled unprecedented monitoring of citizens, activists, and journalists without appropriate democratic oversight.
- **Security State Expansion**: National security justifications often mask anti-democratic control mechanisms. The post-9/11 expansion of digital surveillance and the ongoing use of security arguments to justify technological control demonstrate how nominal protection can lead to substantial harm. National security justifications often mask anti-democratic control mechanisms. The post-9/11 expansion of digital surveillance, the current expansion of surveillance technologies in response to civil protests of immigration enforcement, and the ongoing use of security arguments to justify technological control demonstrate how nominal protection can lead to substantial harm.
- **Corporate-State Alliances**: The line between corporate and state power blurs as they develop symbiotic relationships. Tech companies gain market access and regulatory advantages, while states gain access to data and infrastructure for surveillance and control. The line between corporate and state power blurs as _corporate-state alliances_ develop. Tech companies gain market access and regulatory advantages, while states gain access to data and infrastructure for surveillance and control.
Government is too often compromised by corporate special interests, creating a cycle where those with the most resources shape both market and regulatory outcomes. Government is too often compromised by corporate special interests, creating a cycle where those with the most resources shape both market and regulatory outcomes.
### Systemic Failures ### Systemic failures
These problems aren't just individual failures but represent systemic issues with how digital technology is currently structured: These problems aren't just individual failures but represent systemic issues with how digital technology is currently structured.
- **Inequality Amplification**: Concentration of technological power amplifies existing social inequalities. Those with fewer resources have less privacy, less control, and are more vulnerable to exploitation in digital systems designed primarily for profit maximization. Concentration of technological power _amplifies existing social inequalities_. Those with fewer resources have less privacy, less control, and are more vulnerable to exploitation in digital systems designed primarily for profit maximization.
- **Manipulation Incentives**: Ad-based business models incentivize psychological manipulation rather than service. The imperative to maximize "engagement" leads to the amplification of divisive, emotional content and the creation of addictive design patterns. Ad-based business models incentivize _psychological manipulation_ rather than service. The imperative to maximize "engagement" leads to the amplification of divisive, emotional content and the creation of addictive design patterns.
- **Innovation Barriers**: Proprietary systems create artificial barriers to innovation and adaptation. When core technologies are locked behind patents, trade secrets, and closed interfaces, communities cannot adapt them to their specific needs or improve upon them. Proprietary systems create _artificial barriers to innovation_ and adaptation. When core technologies are locked behind patents, trade secrets, and closed interfaces, communities cannot adapt them to their specific needs or improve upon them.
- **Infrastructure Vulnerabilities**: Critical infrastructure becomes vulnerable to both market and geopolitical forces. When essential digital services are controlled by profit-seeking entities or potentially hostile governments, they become points of leverage that can be exploited during conflicts or crises. Critical _infrastructure becomes vulnerable_ to both market and geopolitical forces. When essential digital services are controlled by profit-seeking entities or potentially hostile governments, they become points of leverage that can be exploited during conflicts or crises.
- **Externalized Harms**: The costs of digital systems are often externalized onto users and society, from privacy violations to psychological harms to environmental impacts. These are treated as "external" to the core transaction, though they represent real and significant costs. The _harms_ of digital systems are often _externalized_ onto users and society, from privacy violations to psychological harms to environmental impacts. These are treated as "external" to the core transaction, though they represent real and significant costs.
The structure of our digital infrastructure has evolved rapidly, without sufficient consideration of its impacts on civil society, democracy, and human flourishing. The consequence is a digital ecosystem that systematically extracts value from communities while undermining the conditions for collective agency. The structure of our digital infrastructure has evolved rapidly, without sufficient consideration of its impacts on civil society, democracy, and human flourishing. The consequence is a digital ecosystem that systematically extracts value from communities while undermining the conditions for collective agency.
## The Solution: Digital Self-Determination ## The solution: digital self-determination
In response to these challenges, we need a vision of digital self-determination—where individuals and communities can meaningfully control their technological destinies. This isn't merely a technical project but a social and political one, grounded in core principles that put human flourishing at the center of technological development. In response to these challenges, we need a vision of digital self-determination—where individuals and communities can meaningfully control their technological destinies. This isn't merely a technical project but a social and political one, grounded in core principles that put human flourishing at the center of technological development.
### Core Principles of Independent Technology ### Core principles of independent technology
Independent technology is guided by principles that prioritize human agency and community well-being: Independent technology is guided by principles that prioritize human agency and community well-being:
@@ -83,7 +83,7 @@ Independent technology is guided by principles that prioritize human agency and
- **Democratic Governance**: The rules, policies, and development priorities of digital systems should be determined through democratic processes. Those affected by technological systems should have a voice in how they function and evolve. - **Democratic Governance**: The rules, policies, and development priorities of digital systems should be determined through democratic processes. Those affected by technological systems should have a voice in how they function and evolve.
### Benefits to Civil Society ### Benefits to civil society
Independent technology creates substantial benefits for civil society organizations and the communities they serve: Independent technology creates substantial benefits for civil society organizations and the communities they serve:
@@ -101,11 +101,11 @@ Independent technology creates substantial benefits for civil society organizati
Most importantly, independent technology simply works better for the specific needs of civil society. The quality can be higher because it's designed for use rather than for market dominance or data extraction. Most importantly, independent technology simply works better for the specific needs of civil society. The quality can be higher because it's designed for use rather than for market dominance or data extraction.
## The Path Forward: Building Digital Commons ## The path forward: building digital commons
Building viable alternatives to corporate-controlled technology requires both technical and social infrastructure. We need robust, accessible tools and the organizational structures to sustain them. Building viable alternatives to corporate-controlled technology requires both technical and social infrastructure. We need robust, accessible tools and the organizational structures to sustain them.
### Technical Foundations ### Technical foundations
The technical foundations of digital commons include: The technical foundations of digital commons include:
@@ -121,7 +121,7 @@ The technical foundations of digital commons include:
These technical elements aren't merely features but fundamental design principles that shape what technology can and cannot do, who it serves, and how power flows within digital systems. These technical elements aren't merely features but fundamental design principles that shape what technology can and cannot do, who it serves, and how power flows within digital systems.
### Social Foundations ### Social foundations
Technical infrastructure alone is insufficient; we also need social structures to support and sustain independent technology: Technical infrastructure alone is insufficient; we also need social structures to support and sustain independent technology:
@@ -137,11 +137,11 @@ Technical infrastructure alone is insufficient; we also need social structures t
The social dimension of independent technology is not secondary but fundamental to its success. Technical solutions divorced from community governance and capacity building will inevitably drift toward centralization and exploitation. The social dimension of independent technology is not secondary but fundamental to its success. Technical solutions divorced from community governance and capacity building will inevitably drift toward centralization and exploitation.
## Artificial Intelligence: A Critical Inflection Point ## Artificial intelligence: a critical inflection point
The rapid development of artificial intelligence represents both a profound challenge and a potential opportunity for digital self-determination. How AI evolves in the coming years will shape the balance of power in digital spaces for decades to come. The rapid development of artificial intelligence represents both a profound challenge and a potential opportunity for digital self-determination. How AI evolves in the coming years will shape the balance of power in digital spaces for decades to come.
### The Challenge ### The challenge of AI
AI development currently reinforces centralization and inequality: AI development currently reinforces centralization and inequality:
@@ -157,7 +157,7 @@ AI development currently reinforces centralization and inequality:
These trends threaten to create a new era of technological dependency more profound than any we've seen before, where a few entities control the fundamental tools of knowledge work, cultural production, and computational reasoning. These trends threaten to create a new era of technological dependency more profound than any we've seen before, where a few entities control the fundamental tools of knowledge work, cultural production, and computational reasoning.
### The Opportunity ### The opportunity of AI
Despite these challenges, AI also presents significant opportunities for digital self-determination: Despite these challenges, AI also presents significant opportunities for digital self-determination:
@@ -173,40 +173,32 @@ Despite these challenges, AI also presents significant opportunities for digital
The path we choose with AI—toward further centralization or toward democratization—will significantly shape the future of digital self-determination. By supporting open, efficient, and community-governed approaches to AI, we can ensure that these powerful tools enhance rather than undermine human agency and collective well-being. The path we choose with AI—toward further centralization or toward democratization—will significantly shape the future of digital self-determination. By supporting open, efficient, and community-governed approaches to AI, we can ensure that these powerful tools enhance rather than undermine human agency and collective well-being.
## Case Study: Wild Cloud ## Case study: Wild Cloud
The Civil Society Technology Foundation's [Wild Cloud project](/projects/wild-cloud/) exemplifies the principles of independent technology in practice. This reference implementation demonstrates how civil society organizations can regain digital sovereignty through practical, accessible tools. The Civil Society Technology Foundation's [Wild Cloud project](/projects/wild-cloud/) exemplifies the principles of independent technology in practice. This reference implementation demonstrates how civil society can regain digital sovereignty through practical, accessible tools.
Wild Cloud provides: Wild Cloud enables individuals, communities, and organizations to run their own email, calendar, file storage, website, and collaboration tools on infrastructure they control, reducing dependency on corporate platforms. Services under user control ensure sensitive information remains protected from surveillance and exploitation.
- **Self-Hosted Services**: Organizations can run their own email, calendar, file storage, website, and collaboration tools on infrastructure they control, reducing dependency on corporate platforms. Despite the complexity of the underlying systems, simplified deployment tools make it feasible for organizations with limited technical capacity to set up and maintain their own infrastructure. A network of practitioners provides documentation, troubleshooting assistance, and ongoing development, ensuring that organizations aren't alone in their journey toward digital self-determination.
- **Privacy by Design**: All services prioritize data minimization, encryption, and user control, ensuring that sensitive information remains protected from surveillance and exploitation. Wild Cloud services support open standards and federation protocols, allowing organizations to communicate with others while maintaining their autonomy and control. This practical approach to digital sovereignty demonstrates that independence from corporate platforms is not merely theoretical but achievable with current technology and modest resources. By making these tools more accessible and providing support for their adoption, we create pathways to broader digital self-determination.
- **Simplified Deployment**: Despite the complexity of the underlying systems, simplified deployment tools make it feasible for organizations with limited technical capacity to set up and maintain their own infrastructure. ## A call to action
- **Community Support**: A network of practitioners provides documentation, troubleshooting assistance, and ongoing development, ensuring that organizations aren't alone in their journey toward digital self-determination.
- **Federation**: All services support open standards and federation protocols, allowing organizations to communicate with others while maintaining their autonomy and control.
This practical approach to digital sovereignty demonstrates that independence from corporate platforms is not merely theoretical but achievable with current technology and modest resources. By making these tools more accessible and providing support for their adoption, we create pathways to broader digital self-determination.
## Conclusion: A Call to Action
The choice is not between technology and its absence, but between technology that serves its users and technology that serves other masters. Civil society requires digital tools that enhance rather than undermine its core values of autonomy, cooperation, and democratic governance. The choice is not between technology and its absence, but between technology that serves its users and technology that serves other masters. Civil society requires digital tools that enhance rather than undermine its core values of autonomy, cooperation, and democratic governance.
Independent technology is not a luxury or a theoretical preferenceit is a practical necessity for maintaining the conditions that make civil society possible. When our digital infrastructure is captured by commercial or state interests, the spaces for independent association, expression, and collective action narrow dangerously. Independent technology is not a luxury or a theoretical preference, it is a practical necessity for maintaining the conditions that make civil society possible. When our digital infrastructure is captured by commercial or state interests, the spaces for independent association, expression, and collective action narrow dangerously.
By investing in independent technology, we create the possibility of digital spaces that reflect and reinforce the values of civil society rather than market or state power. This is not merely a technical challenge but a social and political imperative that requires both visionary thinking and practical action. By investing in independent technology, we create the possibility of digital spaces that reflect and reinforce the values of civil society rather than market or state power. This is not merely a technical challenge but a social and political imperative that requires both visionary thinking and practical action.
The path forward requires: The path forward requires:
1. **Individual Action**: Moving personal and organizational data to self-hosted or community-governed platforms 1. **Individual Action**: Moving personal and organizational data to self-hosted or community-governed platforms.
2. **Collective Investment**: Supporting the development and maintenance of digital commons through funding, contribution, and advocacy 2. **Collective Investment**: Supporting the development and maintenance of digital commons through funding, contribution, and advocacy.
3. **Policy Reform**: Advancing regulatory frameworks that limit surveillance, protect privacy, and ensure interoperability 3. **Policy Reform**: Advancing regulatory frameworks that limit surveillance, protect privacy, and ensure interoperability.
4. **Educational Initiatives**: Building technical literacy and capacity for digital self-determination 4. **Educational Initiatives**: Building technical literacy and capacity for digital self-determination.
5. **Alternative Models**: Developing and demonstrating viable alternatives to the current dominant paradigms 5. **Alternative Models**: Developing and demonstrating viable alternatives to the current dominant paradigms.
An open Internet is a human right. Our digital commons—the shared spaces, tools, and resources that enable connection, creation, and collective action—must be protected from capture and enclosure, whether by corporate monopolies or authoritarian states. An open Internet is a human right. Our digital commons must be protected from capture and enclosure, whether by corporate monopolies or authoritarian states.
The Civil Society Technology Foundation invites individuals, organizations, and communities to join in building and maintaining the digital commons our shared future requires. By reclaiming control over our technological infrastructure, we take a crucial step toward a more just, democratic, and flourishing society. The Civil Society Technology Foundation invites individuals, organizations, and communities to join in building and maintaining the digital commons our shared future requires. By reclaiming control over our technological infrastructure, we take a crucial step toward a more just, democratic, and flourishing society.

Binary file not shown.

After

Width:  |  Height:  |  Size: 3.9 MiB

View File

@@ -2,6 +2,8 @@
title: Position Statements title: Position Statements
date: 2025-07-06 date: 2025-07-06
weight: 60 weight: 60
featureImageCaption: "Photo by <a href=\"https://unsplash.com/@nasa?utm_content=creditCopyText&utm_medium=referral&utm_source=unsplash\">NASA</a> on <a href=\"https://unsplash.com/photos/satellite-view-of-earths-surface-_SFJhRPzJHs?utm_content=creditCopyText&utm_medium=referral&utm_source=unsplash\">Unsplash</a>"
--- ---
The Civil Society Technology Foundation (CSTF) holds the following positions regarding technology, digital rights, and civil society. These statements represent our core beliefs and guide our work. The Civil Society Technology Foundation (CSTF) holds the following positions regarding technology, digital rights, and civil society. These statements represent our core beliefs and guide our work.

View File

@@ -5,196 +5,124 @@ summary: Digital sovereignty is essential for individuals, communities, and civi
featureImageCaption: "Photo by <a href=\"https://unsplash.com/@lemonvlad?utm_content=creditCopyText&utm_medium=referral&utm_source=unsplash\">Vladislav Klapin</a> on <a href=\"https://unsplash.com/photos/assorted-flag-YeO44yVTl20?utm_content=creditCopyText&utm_medium=referral&utm_source=unsplash\">Unsplash</a>" featureImageCaption: "Photo by <a href=\"https://unsplash.com/@lemonvlad?utm_content=creditCopyText&utm_medium=referral&utm_source=unsplash\">Vladislav Klapin</a> on <a href=\"https://unsplash.com/photos/assorted-flag-YeO44yVTl20?utm_content=creditCopyText&utm_medium=referral&utm_source=unsplash\">Unsplash</a>"
--- ---
## What Is Digital Sovereignty? ## What is digital sovereignty?
Digital sovereignty is the ability of individuals, communities, and organizations to exercise meaningful control over their digital lives. It means having genuine authority over your data, the software you use, and the infrastructure that powers your online activities. Digital sovereignty is the ability of individuals, communities, and organizations to exercise meaningful control over their digital lives. It means having genuine authority over your data, the software you use, and the infrastructure that powers your online activities.
True digital sovereignty includes: True digital sovereignty includes:
- **Data control**: Determining what information you share, with whom, and under what conditions - **Data control**: Determining what information you share, with whom, and under what conditions.
- **Software freedom**: Using, examining, modifying, and sharing the code that runs your digital tools - **Software freedom**: Using, examining, modifying, and sharing the code that runs your digital tools.
- **Infrastructure ownership**: Having the ability to operate your own servers and services - **Infrastructure ownership**: Having the ability to operate your own servers and services.
- **Knowledge access**: Understanding how your technology works and being able to make informed choices - **Knowledge access**: Understanding how your technology works and being able to make informed choices.
- **Governance participation**: Having a voice in how digital systems are designed and regulated - **Governance participation**: Having a voice in how digital systems are designed and regulated.
Digital sovereignty exists on a spectrum from complete dependency to full autonomy. The Civil Society Technology Foundation works toward shifting the balance away from centralized control and toward individual and community empowerment. Digital sovereignty exists on a spectrum from complete dependency to full autonomy. The Civil Society Technology Foundation works toward shifting the balance away from centralized control and toward individual and community empowerment.
## Why Sovereignty Is Under Threat ## The threat to digital sovereignty
Most people today have very little digital sovereignty. Consider your typical online experience: Most people today have very little digital sovereignty. Consider your typical online experience:
- Your personal information is collected, analyzed, and monetized by corporations without meaningful consent - Your personal information is collected, analyzed, and monetized by corporations without meaningful consent.
- The software you use is controlled by distant companies that can change terms, features, or access at any time - The software you use is controlled by distant companies that can change terms, features, or access at any time.
- Your content and connections depend on platforms that can censor, amplify, or derank what you share - Your content and connections depend on platforms that can censor, amplify, or de-rank what you share.
- Critical services like email, calendars, and file storage are hosted on corporate infrastructure that you cannot inspect or control - Critical services like email, calendars, and file storage are hosted on corporate infrastructure that you cannot inspect or control.
- Algorithms shape what you see and how you communicate in ways designed to maximize corporate profit - Algorithms shape what you see and how you communicate in ways designed to maximize corporate profit.
This lack of sovereignty is not accidentalit's the result of business models and regulatory environments that incentivize centralization and data extraction. The trend toward concentration has accelerated as digital technology has become essential to nearly every aspect of modern life. This lack of sovereignty is not accidental--it's the result of business models and regulatory environments that incentivize centralization and data extraction. The trend toward concentration has accelerated as digital technology has become essential to nearly every aspect of modern life.
## Why Digital Sovereignty Matters for Individuals ## Individuals need digital sovereignty
For individuals, digital sovereignty affects fundamental aspects of daily life: For individuals, digital sovereignty affects fundamental aspects of daily life:
### Privacy and Security ### Privacy and security
Without digital sovereignty, your personal information is vulnerable: Without digital sovereignty, your personal information becomes vulnerable to exploitation. Your browsing history, location data, and private communications transform into corporate assets, traded and monetized without meaningful consent. Intimate details of your life face constant exposure through data breaches and surveillance, creating a permanent digital record that can be weaponized against you at any time.
- Your browsing history, location data, and private communications become corporate assets Digital sovereignty changes this dynamic fundamentally. When you control your digital infrastructure, you determine what information you share and with whom. Encryption and privacy-preserving tools become standard practice rather than specialized knowledge. You can maintain clear boundaries between different aspects of your digital life, protecting both your current privacy and your future autonomy.
- Intimate details of your life can be exposed through data breaches or surveillance
- Your digital footprint creates a permanent record that can be used against you
With digital sovereignty, you can: ### Personal autonomy
- Determine what information you share and with whom Without digital sovereignty, your choices become systematically constrained by forces beyond your control. Algorithms shape not just what information you see, but what options appear available to you. Design patterns constantly nudge you toward behaviors that benefit platforms rather than yourself, while essential tasks increasingly require surrendering privacy as the price of participation.
- Use encryption and privacy-preserving tools as a matter of course
- Maintain boundaries between different aspects of your digital life
### Personal Autonomy Digital sovereignty restores meaningful choice to your daily life. You can make decisions based on diverse information sources that you've actively chosen rather than algorithmic curation. Your tools serve your needs rather than exploiting your attention for profit. Most importantly, you can participate fully in digital society without surrendering your fundamental rights or personal dignity.
Without digital sovereignty, your choices are constrained: ### Economic security
- Algorithms shape what information you see and what options seem available Without digital sovereignty, you face growing economic vulnerabilities in an increasingly digital economy. Your skills and livelihood become dependent on proprietary platforms that can change terms or revoke access arbitrarily. Economic opportunities remain subject to the whims of platform policies, while the value you create online flows primarily to distant corporate owners rather than building your own wealth or community resources.
- Design patterns nudge you toward behaviors that benefit platforms, not yourself
- Essential tasks increasingly require using services that compromise your privacy
With digital sovereignty, you gain freedom: Digital sovereignty builds genuine economic resilience. You develop portable skills that transcend any specific corporate platform, ensuring your capabilities remain valuable regardless of technological shifts. You can create and connect through systems you help govern, participating in cooperative economic models that distribute value more equitably among those who generate it.
- Make decisions based on diverse information sources you've chosen ## Communities need digital sovereignty
- Use tools designed to serve your needs rather than exploit your attention
- Participate online without surrendering your rights or dignity
### Economic Security Communities, from local neighborhoods to identity groups to civil society organizations, face particular challenges in the digital age.
Without digital sovereignty, you face growing vulnerabilities: ### Community autonomy
- Skills and livelihoods become dependent on proprietary platforms Without digital sovereignty, communities lose fundamental self-determination as their governance structures become subordinated to platform rules and algorithms. Local knowledge and cultural context get systematically flattened by global platforms designed for mass consumption rather than community specificity. Meanwhile, community resources flow steadily toward distant corporations instead of circulating locally to strengthen community bonds and capacity.
- Your access to economic opportunities can be arbitrarily restricted
- The value you create online is captured primarily by platform owners
With digital sovereignty, you build resilience: Digital sovereignty enables communities to truly thrive on their own terms. They can design digital spaces that authentically reflect local values and meet specific community needs. Community standards and practices remain intact without corporate override or algorithmic interference. Most importantly, digital infrastructure becomes a genuine community asset that builds collective wealth and capacity rather than extracting value.
- Develop portable skills that aren't tied to specific corporate platforms ### Resilience against censorship
- Create and connect through systems you help govern
- Participate in cooperative economic models that distribute value more equitably
## Why Digital Sovereignty Matters for Communities Without digital sovereignty, communities face systematic silencing through mechanisms that appear neutral but consistently harm marginalized voices. Platform policies regularly restrict legitimate speech, with enforcement patterns that disproportionately affect those with the least institutional power. Commercial content moderation systems cannot possibly reflect the nuance and context of diverse community standards, leading to decisions that undermine rather than protect community discourse.
Communities—from local neighborhoods to identity groups to civil society organizations—face particular challenges in the digital age: Digital sovereignty preserves community voice through infrastructure independence. Communities can operate their own communication systems that resist external censorship while developing content moderation approaches appropriate to their specific context and values. They maintain fallback channels that cannot be easily blocked, ensuring continuity of communication even under pressure.
### Community Autonomy ### Collective memory
Without digital sovereignty, communities lose self-determination: Without digital sovereignty, community history becomes dangerously precarious as it depends entirely on corporate platforms with their own priorities and lifespans. When platforms shut down or change direction, they take irreplaceable community archives with them. Algorithmic sorting continuously buries historically important content, while corporate priorities rather than community values determine what gets preserved for future generations.
- Community governance gets usurped by platform rules and algorithms Digital sovereignty strengthens cultural continuity by giving communities control over their own historical record. They can maintain archives and documentation according to their own standards and priorities. Knowledge transfer between generations happens on community terms rather than through corporate intermediaries. Digital artifacts remain accessible and meaningful even as underlying technologies evolve, ensuring that community memory persists across technological transitions.
- Local knowledge and context get flattened by global platforms
- Community resources flow to distant corporations rather than circulating locally
With digital sovereignty, communities thrive: ## Civil society needs digital sovereignty
- Design digital spaces that reflect local values and needs For the non-profit and non-governmental bodies that form the backbone of democratic society, digital sovereignty is particularly crucial.
- Maintain community standards and practices without corporate override
- Build digital infrastructure as a community asset
### Resilience Against Censorship ### Independence from corporate control
Without digital sovereignty, communities face silencing: Without digital sovereignty, civil society becomes fundamentally compromised in its mission and effectiveness. NGOs find themselves forced to accept surveillance and data extraction as the price of accessing essential digital tools, undermining their ability to protect the communities they serve. Advocacy organizations become dependent on platforms that may actively oppose their values, while corporate philanthropy increasingly shapes which digital infrastructure gets built, prioritizing donor interests over community needs.
- Platform policies can restrict legitimate speech, especially from marginalized groups Digital sovereignty allows civil society to maintain its integrity and independence. Organizations can choose and use tools that genuinely align with their mission and values rather than contradicting them. Advocacy work can proceed without platform-imposed limitations that undermine effectiveness, while infrastructure development responds to actual community needs rather than market incentives or corporate priorities.
- Arbitrary enforcement affects those with the least power most severely
- Commercial content moderation cannot reflect the nuance of community standards
With digital sovereignty, communities maintain their voice: ### Operational security
- Run their own communication infrastructure resistant to external censorship Without digital sovereignty, civil society organizations face escalating security risks that threaten their core work. Sensitive communications and confidential data must reside on vulnerable commercial platforms designed for profit rather than protection. Critical organizational workflows become dependent on services that can be withdrawn or modified without notice, while organizational data gets integrated into commercial AI training sets without consent or oversight.
- Develop community-appropriate content moderation
- Create fallback channels that cannot be easily blocked
### Collective Memory Digital sovereignty dramatically improves operational security by returning control to the organizations themselves. They can maintain direct oversight of sensitive information rather than trusting corporate intermediaries. Communication channels become resistant to surveillance and interference, while infrastructure resilience protects against both technical disruption and political pressure.
Without digital sovereignty, community history becomes precarious: ### Ethical alignment
- When platforms shut down, they take community archives with them Without digital sovereignty, civil society faces deep contradictions that undermine moral authority and organizational effectiveness. Organizations advocating for human rights often find themselves using tools that systematically violate those same rights. Digital workflows frequently contradict stated organizational values, while resource dependencies on extractive platforms compromise advocacy positions and limit strategic options.
- Algorithmic sorting buries historically important content
- Corporate priorities determine what gets preserved
With digital sovereignty, cultural continuity strengthens: Digital sovereignty enables authentic alignment between values and practice. Technology choices can reflect and actively reinforce organizational principles rather than undermining them. Digital infrastructure embodies the world organizations are working to create, demonstrating alternative possibilities rather than perpetuating existing problems. Most importantly, consistency between means and ends strengthens moral authority and makes advocacy more credible and effective.
- Communities maintain their own archives and historical records ## The path to digital sovereignty
- Knowledge transfer between generations happens on community terms
- Digital artifacts remain accessible even as technologies change
## Why Digital Sovereignty Matters for Civil Society Achieving greater digital sovereignty isn't an all-or-nothing proposition. It's a journey with practical steps that individuals and organizations can take.
For civil society organizations—the non-profit and non-governmental bodies that form the backbone of democratic society—digital sovereignty is particularly crucial: ### For individuals
### Independence from Corporate Control 1. **Start with awareness**: Learn how your current tools work and what alternatives exist.
2. **Make incremental changes**: Replace proprietary services with open alternatives one by one.
3. **Join communities of practice**: Connect with others on similar journeys.
4. **Develop technical literacy**: Build skills to maintain more of your own technology.
5. **Support and advocate**: Contribute to projects and policies that promote digital sovereignty.
Without digital sovereignty, civil society becomes compromised: ### For organizations
- NGOs must accept surveillance and data extraction to use essential tools 1. **Audit current dependencies**: Understand where you lack digital sovereignty.
- Advocacy organizations depend on platforms that may not share their values 2. **Prioritize critical systems**: Focus first on communications and sensitive data.
- Corporate philanthropy shapes which digital infrastructure gets built 3. **Invest in capacity**: Build technical skills within your organization.
4. **Build community infrastructure**: Partner with similar organizations to share resources.
5. **Center sovereignty in planning**: Make digital autonomy a strategic priority.
With digital sovereignty, civil society maintains integrity: The Civil Society Technology Foundation's [Wild Cloud project](/projects/wild-cloud) provides a reference implementation for individuals, communities, and organizations seeking to regain digital sovereignty. It demonstrates that practical steps toward greater independence are possible today, even with limited resources.
- Organizations use tools aligned with their mission and values
- Advocacy can proceed without platform-imposed limitations
- Infrastructure development responds to community needs, not market incentives
### Operational Security
Without digital sovereignty, organizations face serious risks:
- Sensitive communications and data reside on vulnerable commercial platforms
- Critical workflows depend on services that can be withdrawn without notice
- Organization data becomes integrated into commercial AI training sets
With digital sovereignty, operations become more secure:
- Organizations maintain control over sensitive information
- Communication channels resist surveillance
- Infrastructure resilience protects against disruption
### Ethical Alignment
Without digital sovereignty, civil society faces contradictions:
- Organizations advocating for rights often use tools that undermine those rights
- Digital workflows can contradict organizational values
- Resource dependencies compromise advocacy positions
With digital sovereignty, values and practices align:
- Technology choices reflect and reinforce organizational principles
- Digital infrastructure embodies the world organizations are working to create
- Consistency between means and ends strengthens moral authority
## The Path to Digital Sovereignty
Achieving greater digital sovereignty isn't an all-or-nothing proposition. It's a journey with practical steps that individuals and organizations can take:
### For Individuals
1. **Start with awareness**: Learn how your current tools work and what alternatives exist
2. **Make incremental changes**: Replace proprietary services with open alternatives one by one
3. **Join communities of practice**: Connect with others on similar journeys
4. **Develop technical literacy**: Build skills to maintain more of your own technology
5. **Support and advocate**: Contribute to projects and policies that promote digital sovereignty
### For Organizations
1. **Audit current dependencies**: Understand where you lack digital sovereignty
2. **Prioritize critical systems**: Focus first on communications and sensitive data
3. **Invest in capacity**: Build technical skills within your organization
4. **Build community infrastructure**: Partner with similar organizations to share resources
5. **Center sovereignty in planning**: Make digital autonomy a strategic priority
The Civil Society Technology Foundation's Wild Cloud project provides a reference implementation for organizations seeking to regain digital sovereignty. It demonstrates that practical steps toward greater independence are possible today, even with limited resources.
## Conclusion ## Conclusion
Digital sovereignty isn't a luxuryit's increasingly essential for meaningful participation in society, for the health of communities, and for the independence of civil society. As digital technology becomes more deeply embedded in every aspect of our lives, the question of who controls that technology becomes more urgent. Digital sovereignty isn't a luxury, it's increasingly essential for meaningful participation in society, for the health of communities, and for the independence of civil society. As digital technology becomes more deeply embedded in every aspect of our lives, the question of who controls that technology becomes more urgent.
The challenges are significant, but practical alternatives exist. By taking incremental steps toward greater sovereignty, we can build a digital future that enhances rather than undermines human agency, community resilience, and democratic values. The challenges are significant, but practical alternatives exist. By taking incremental steps toward greater sovereignty, we can build a digital future that enhances rather than undermines human agency, community resilience, and democratic values.
Digital sovereignty matters because it determines whether technology will serve as a tool of liberation or a mechanism of control. The choice between these futures is still ours to makeif we act with purpose and clarity about what's at stake. Digital sovereignty matters because it determines whether technology will serve as a tool of liberation or a mechanism of control. The choice between these futures is still ours to make--if we act with purpose and clarity about what's at stake.

View File

@@ -5,65 +5,44 @@ alias:
- /projects/ - /projects/
--- ---
Wild Cloud is the Civil Society Technology Foundation's reference implementation for personal and organizational self-hosted infrastructure. This project empowers individuals and organizations to run their own digital services without dependency on centralized corporate platforms. Wild Cloud is the Civil Society Technology Foundation's reference implementation for self-hosted "cloud" infrastructure. This project empowers individuals, communities, and organizations to run their own digital services without dependency on centralized corporate platforms.
## Overview When released later this year, Wild Cloud will become a complete, accessible solution for operating essential digital services on infrastructure you control. It combines carefully selected open-source components into a cohesive system providing the functionality needed for self-hosted cloud services.
Wild Cloud provides a complete, accessible solution for operating essential digital services on infrastructure you control. It combines carefully selected open-source components into a cohesive system that balances security, usability, and maintainability. By deploying Wild Cloud, individuals, communities, and organizations can:
By deploying Wild Cloud, organizations can: - Host their own cloud services.
- Maintain full control over their data and communications.
- Reduce or eliminate dependencies on surveillance-based platforms.
- Build technical capacity.
- Participate in a community of practice around independent infrastructure.
- Host their own email, calendar, file storage, website, and collaboration tools The Wild Cloud project aims to start you with a simple self-hosted cloud solution that gets you set up quickly and lets you easily manage your cloud. However, it is a full solution. None of the technical foundations are stripped away. You can go deeper and extend your cloud how you see fit.
- Maintain full control over their data and communications
- Reduce or eliminate dependencies on surveillance-based platforms
- Build technical capacity and digital sovereignty
- Participate in a community of practice around independent infrastructure
The Soverign Cloud project aims to start you with a simple self-hosted cloud solution that gets you set up quickly and easily manage your cloud. However, it is a full solution. None of the technical foundations are stripped away. You can go deeper and extend your cloud how you see fit. ## Philosophy
### Architecture Wild Cloud embodies the Civil Society Technology Foundation's [core principles](/about/#principles), which include:
Wild Cloud allows individuals and organizations (cloud admins) to install and manage a full Kubernetes cluster (using K3s) made of one or multiple computers on their own premises. Kubernetes manages much of the complexity of maintaining the health of your cloud and managing the applications deployed in it. - **Sovereignty by Design**: Users control their data and computing environment.
- **Open Source, Always**: All components are free to use, study, modify, and share.
- **Self-Hosting Infrastructure**: Direct control reduces dependency and vulnerability.
- **Transparent Governance**: All components have clear, accountable governance.
- **Forkability is Freedom**: Any component can be replaced or modified as needed.
- **Practical Autonomy**: Infrastructure that users can understand and maintain.
### Applications By providing this reference implementation, we demonstrate that digital sovereignty is not merely theoretical but practically achievable with current technology and modest resources.
Admins can deploy various applications into their cloud, including: ## Architecture
- Email servers with webmail interfaces Wild Cloud allows individuals, communities, and organizations (cloud operators) to install and manage a full, standard, Kubernetes cluster made of a few or many computers on their own premises. Kubernetes manages much of the complexity of maintaining the health of your cloud and managing the applications deployed in it. The Wild Cloud project provides a set of reference "stacks" that can be deployed on this Kubernetes cluster. These stacks combine best-of-breed open source software applications to enable productivity, communication, collaboration, and intelligence applications and more.
- Calendar and contacts synchronization
- File storage and sharing
- Collaborative document editing
- Website hosting
- Chat and communication tools
- Knowledge management systems
- And more, based on organizational needs
## Getting Started ## Getting Started
The Wild Cloud project is currently being built out on GitHub. The Wild Cloud project is currently being developed, in the open, on GitHub.
{{< github repo="civil-society-dev/wild-cloud" showThumbnail=true >}} {{< github repo="civil-society-dev/wild-cloud" showThumbnail=true >}}
## Community Support ## Join the Community
Wild Cloud is supported by a community of practitioners who share knowledge, troubleshooting tips, and enhancements. The Civil Society Technology Foundation provides: The Wild Cloud project is developed and supported by a community of practitioners. To join the community or learn more, visit the [Wild Cloud website](https://mywildcloud.org).
- Documentation and tutorials
- Installation guides for different environments
- Regular security advisories
- Community forum for mutual assistance
- Workshops and training opportunities
## Philosophy
Wild Cloud embodies the Civil Society Technology Foundation's core principles:
- **Sovereignty by Design**: Users control their data and computing environment
- **Open Source, Always**: All components are free to use, study, modify, and share
- **Self-Hosting Infrastructure**: Direct control reduces dependency and vulnerability
- **Transparent Governance**: All components have clear, accountable governance
- **Forkability is Freedom**: Any component can be replaced or modified as needed
- **Practical Autonomy**: Infrastructure that users can understand and maintain
By providing this reference implementation, we demonstrate that digital sovereignty is not merely theoretical but practically achievable with current technology and modest resources.

View File

@@ -1,10 +1,5 @@
{{ define "main" }} {{ define "main" }}
<article class="h-full max-w-full flex flex-col items-center justify-center"> <article class="h-full max-w-full flex flex-col items-center justify-center">
<header>
{{ if .Params.showBreadcrumbs | default (.Site.Params.article.showBreadcrumbs | default false) }}
{{ partial "breadcrumbs.html" . }}
{{ end }}
</header>
<section class="mt-6"> <section class="mt-6">
{{ .Content }} {{ .Content }}
</section> </section>