Compare commits
10 Commits
78f38034ce
...
c6efeeabd6
Author | SHA1 | Date | |
---|---|---|---|
![]() |
c6efeeabd6 | ||
![]() |
13bc51d443 | ||
![]() |
396dd976d9 | ||
![]() |
188380873b | ||
![]() |
d7bd9bae18 | ||
![]() |
4a5cfbeb49 | ||
![]() |
599e3a1649 | ||
![]() |
59db4fc091 | ||
![]() |
97256cf4a3 | ||
![]() |
0000fc7d22 |
10
.cspell/custom-dictionary-workspace.txt
Normal file
@@ -0,0 +1,10 @@
|
||||
# Custom Dictionary Words
|
||||
Balkanization
|
||||
commoditized
|
||||
CSTF
|
||||
Elon
|
||||
Forkability
|
||||
Laitupa
|
||||
Sahrul
|
||||
Snowden
|
||||
Zuckerberg
|
10
.vscode/settings.json
vendored
Normal file
@@ -0,0 +1,10 @@
|
||||
{
|
||||
"cSpell.customDictionaries": {
|
||||
"custom-dictionary-workspace": {
|
||||
"name": "custom-dictionary-workspace",
|
||||
"path": "${workspaceFolder:civilsociety.dev}/.cspell/custom-dictionary-workspace.txt",
|
||||
"addWords": true,
|
||||
"scope": "workspace"
|
||||
}
|
||||
}
|
||||
}
|
15
README.md
@@ -6,21 +6,12 @@
|
||||
- Install dart-sass.
|
||||
|
||||
```bash
|
||||
hugo server
|
||||
hugo server -D
|
||||
npm run dev # TailwindCSS JIT compilation
|
||||
```
|
||||
|
||||
## Deploy
|
||||
|
||||
```bash
|
||||
hugo build
|
||||
docker build -t payneio/civilsociety.dev . --file ./Dockerfile
|
||||
docker push payneio/civilsociety.dev
|
||||
|
||||
# From payne-cloud
|
||||
|
||||
# First time...
|
||||
bin/wild-app-deploy civilsociety
|
||||
|
||||
# Update...
|
||||
kubectl rollout restart deployment civilsociety -n civilsociety
|
||||
scripts/deploy.sh
|
||||
```
|
||||
|
4975
assets/css/compiled/main.css
Normal file
@@ -1,8 +1,22 @@
|
||||
@font-face {
|
||||
font-family: font;
|
||||
src: url('/fonts/font.ttf');
|
||||
src: url('/fonts/OpenSans-Regular.ttf');
|
||||
}
|
||||
|
||||
@font-face {
|
||||
font-family: cstf;
|
||||
src: url('/fonts/LinLibertine_R.ttf');
|
||||
}
|
||||
|
||||
html {
|
||||
font-family: font;
|
||||
}
|
||||
|
||||
h1, h2, h3, h4, h5, h6, .main-menu, .decoration-primary-500 {
|
||||
font-family: cstf;
|
||||
}
|
||||
|
||||
figure {
|
||||
margin: .5em;
|
||||
padding: 0;
|
||||
}
|
187
assets/img/cstf-four-line.svg
Normal file
After Width: | Height: | Size: 1.6 MiB |
1199
assets/img/cstf-full-logo-light.svg
Normal file
After Width: | Height: | Size: 143 KiB |
1244
assets/img/cstf-full-logo.svg
Normal file
After Width: | Height: | Size: 1.7 MiB |
1117
assets/img/cstf-logo.svg
Normal file
After Width: | Height: | Size: 102 KiB |
131
assets/img/cstf-one-line.svg
Normal file
@@ -0,0 +1,131 @@
|
||||
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
|
||||
<!-- Created with Inkscape (http://www.inkscape.org/) -->
|
||||
|
||||
<svg
|
||||
width="127.96875mm"
|
||||
height="10.333529mm"
|
||||
viewBox="0 0 127.96875 10.33353"
|
||||
version="1.1"
|
||||
id="svg1"
|
||||
xml:space="preserve"
|
||||
xmlns="http://www.w3.org/2000/svg"
|
||||
xmlns:svg="http://www.w3.org/2000/svg"><defs
|
||||
id="defs1" /><g
|
||||
id="layer11"
|
||||
transform="translate(160.22189,-6.4715022)"><g
|
||||
id="g392-7"
|
||||
transform="translate(-0.80798665,-27.113896)"><path
|
||||
style="font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -35.556555,38.228175 c -0.05927,0.0593 -0.1016,0.0847 -0.1016,0 -0.0085,-0.2286 -0.03387,-0.55034 -0.06773,-0.64347 -0.0254,-0.0339 -0.03387,-0.0677 -0.1016,-0.0677 -0.237067,0.0931 -0.4572,0.16933 -1.0414,0.24553 -0.01693,0.0508 0,0.18627 0.01693,0.23707 0.4572,0.0423 0.550334,0.0847 0.550334,0.57573 v 1.651 c 0,0.69427 -0.08467,0.72813 -0.592667,0.77047 -0.0508,0.0508 -0.0508,0.2286 0,0.2794 0.254,-0.008 0.592667,-0.0169 0.931333,-0.0169 0.338667,0 0.592667,0.008 0.846667,0.0169 0.0508,-0.0508 0.0508,-0.2286 0,-0.2794 -0.4318,-0.0423 -0.516467,-0.0762 -0.516467,-0.77047 v -1.38853 c 0,-0.1778 0.0762,-0.2794 0.143934,-0.3556 0.321733,-0.31327 0.702733,-0.49954 1.032933,-0.49954 0.169333,0 0.347133,0.11007 0.448733,0.3048 0.08467,0.16934 0.1016,0.39794 0.1016,0.65194 v 1.28693 c 0,0.69427 -0.08467,0.72813 -0.524933,0.77047 -0.04233,0.0508 -0.04233,0.2286 0,0.2794 0.254,-0.008 0.524933,-0.0169 0.8636,-0.0169 0.338667,0 0.643467,0.008 0.897467,0.0169 0.04233,-0.0508 0.04233,-0.2286 0,-0.2794 -0.474134,-0.0423 -0.567267,-0.0762 -0.567267,-0.77047 v -1.26153 c 0,-0.46567 -0.03387,-0.87207 -0.2286,-1.13454 -0.143933,-0.18626 -0.4064,-0.28786 -0.702733,-0.28786 -0.414867,0 -0.889,0.11006 -1.388534,0.6858 z"
|
||||
id="path385-77" /><path
|
||||
id="path384-5"
|
||||
style="font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -39.165667,37.51644 c -0.5588,0 -1.024319,0.22866 -1.329119,0.59272 -0.3048,0.36407 -0.466122,0.85515 -0.466122,1.38855 0,0.8636 0.575922,1.82004 1.778188,1.82004 0.541866,0 0.94823,-0.186 1.236097,-0.47387 0.381,-0.36407 0.558622,-0.89772 0.558622,-1.42265 0,-0.88053 -0.482269,-1.90479 -1.777666,-1.90479 z m -0.127125,0.2961 c 0.728132,0 1.176671,0.66027 1.176671,1.87947 0,1.0668 -0.550328,1.32964 -0.948261,1.32964 -0.880534,0 -1.168403,-1.06683 -1.168403,-1.71876 0,-0.7366 0.177993,-1.49035 0.939993,-1.49035 z" /><path
|
||||
style="font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -42.069808,40.226305 v -1.68487 c 0,-0.42333 0.03387,-0.9652 0.03387,-0.9652 0,-0.0339 -0.04233,-0.0593 -0.110067,-0.0593 -0.245533,0.0931 -0.575733,0.16933 -1.159933,0.24553 -0.01693,0.0508 0,0.18627 0.01693,0.23707 0.4572,0.0508 0.550333,0.0931 0.550333,0.57573 v 1.651 c 0,0.70273 -0.09313,0.72813 -0.6096,0.77047 -0.0508,0.0508 -0.0508,0.2286 0,0.2794 0.2794,-0.008 0.6096,-0.0169 0.948267,-0.0169 0.338667,0 0.6604,0.008 0.9398,0.0169 0.0508,-0.0508 0.0508,-0.2286 0,-0.2794 -0.516467,-0.0339 -0.6096,-0.0677 -0.6096,-0.77047 z"
|
||||
id="path382-5" /><path
|
||||
style="font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -42.950986,36.446005 c 0,0.22013 0.2032,0.44027 0.4064,0.44027 0.237067,0 0.440267,-0.22014 0.440267,-0.4064 0,-0.2032 -0.1778,-0.44027 -0.4064,-0.44027 -0.2032,0 -0.440267,0.2032 -0.440267,0.4064 z"
|
||||
id="path381-7" /><path
|
||||
style="font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -46.172,37.60094 c -0.118533,0 -0.1524,0.1016 -0.1524,0.16934 v 0.11006 c 0,0.0423 0.0085,0.0508 0.04233,0.0508 h 0.499533 v 2.54847 c 0,0.60113 0.262467,0.8382 0.651934,0.8382 0.389466,0 0.8128,-0.18627 1.143,-0.5588 -0.01693,-0.0847 -0.06773,-0.13547 -0.1524,-0.14393 -0.220134,0.16933 -0.474134,0.23706 -0.694267,0.23706 -0.2286,0 -0.2794,-0.254 -0.2794,-0.77893 v -2.14207 h 0.880533 c 0.08467,0 0.2032,-0.0339 0.2032,-0.11006 v -0.16934 c 0,-0.0339 -0.0254,-0.0508 -0.06773,-0.0508 h -1.016 v -0.3302 c 0,-0.55033 0.03387,-0.889 0.03387,-0.889 0,-0.0508 -0.0254,-0.0677 -0.06773,-0.0677 -0.04233,0 -0.110066,0.0339 -0.186266,0.0762 -0.1016,0.0508 -0.186267,0.0847 -0.287867,0.11853 -0.1016,0.0254 -0.186267,0.0593 -0.186267,0.11007 0,0.1016 0.0254,0.0423 0.0254,0.98213 z"
|
||||
id="path380-8" /><path
|
||||
id="path379-3"
|
||||
style="font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -48.542815,37.51644 c -0.694266,0 -1.396815,0.45687 -1.396815,0.93947 0,0.2032 0.101373,0.30489 0.296106,0.30489 0.245534,0 0.39791,-0.17777 0.39791,-0.28783 0,-0.0593 -0.0084,-0.11858 -0.02532,-0.15245 -0.0085,-0.0254 -0.01654,-0.0764 -0.01654,-0.1695 0,-0.26246 0.35523,-0.35553 0.676963,-0.35553 0.287867,0 0.685744,0.14397 0.685744,1.10071 0,0.0593 -0.02524,0.0933 -0.05064,0.1018 l -0.72812,0.17777 c -0.8128,0.2032 -1.396815,0.65209 -1.396815,1.22783 0,0.69426 0.473935,0.91415 1.066602,0.91415 0.287867,0 0.550408,-0.0677 0.922941,-0.35553 l 0.169497,-0.13539 h 0.01654 c 0.0508,0.26246 0.13561,0.49092 0.56741,0.49092 0.321733,0 0.6268,-0.14382 0.8046,-0.31316 -0.01693,-0.1016 -0.05104,-0.16914 -0.144176,-0.22841 -0.06773,0.0593 -0.211559,0.1354 -0.313159,0.1354 -0.245533,0 -0.254248,-0.33039 -0.254248,-0.71986 v -1.24436 c 0,-1.20227 -0.660408,-1.43092 -1.278475,-1.43092 z m 0.618049,1.74407 v 1.11725 c 0,0.11007 -0.0506,0.16934 -0.118338,0.22014 -0.220133,0.1778 -0.508108,0.37259 -0.745175,0.37259 -0.423333,0 -0.609264,-0.33853 -0.609264,-0.601 0,-0.381 0.177551,-0.77034 0.804085,-0.93121 z" /><path
|
||||
id="path377-4"
|
||||
style="font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -51.249538,35.32329 c -0.211667,0.0847 -0.846789,0.20352 -1.185455,0.22892 -0.01693,0.0677 -1.59e-4,0.20294 0.05064,0.25374 0.440266,0.0254 0.542086,-0.0167 0.542086,0.69453 v 1.08365 c 0,0.0593 -0.0167,0.076 -0.07596,0.076 -0.03387,0 -0.381024,-0.14366 -0.660424,-0.14366 -0.5588,0 -0.93154,0.18624 -1.270206,0.50797 -0.364067,0.36407 -0.583946,0.8633 -0.583946,1.48984 0,1.0414 0.52479,1.8035 1.43919,1.8035 0.3302,0 0.643467,-0.16931 1.058333,-0.50798 0.03387,-0.0339 0.118658,-0.051 0.127125,0.008 0.01693,0.21167 0.09302,0.49971 0.09302,0.49971 0.06773,0.0254 0.109913,0.0254 0.160713,0 0.186267,-0.1524 0.482439,-0.27921 0.998905,-0.33848 0.0508,-0.0508 0.0508,-0.17812 0,-0.22892 -0.541866,-0.0423 -0.61805,-0.20319 -0.61805,-0.61805 v -3.83543 c 0,-0.55033 0.03411,-0.88883 0.03411,-0.88883 0,-0.0593 -0.03387,-0.0847 -0.110072,-0.0847 z m -1.422652,2.48925 c 0.3048,0 0.516414,0.11016 0.685747,0.30489 0.118534,0.13547 0.144177,0.19487 0.144177,0.45734 v 1.60869 c 0,0.16086 -0.01686,0.22861 -0.135392,0.33021 -0.313267,0.27093 -0.58415,0.40618 -0.795817,0.40618 -0.4572,0 -0.931209,-0.49972 -0.931209,-1.55805 0,-0.6096 0.118462,-0.94823 0.245462,-1.12603 0.262467,-0.39793 0.617699,-0.42323 0.787032,-0.42323 z" /><path
|
||||
style="font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -57.720509,38.228175 c -0.05927,0.0593 -0.1016,0.0847 -0.1016,0 -0.0085,-0.2286 -0.03387,-0.55034 -0.06773,-0.64347 -0.0254,-0.0339 -0.03387,-0.0677 -0.1016,-0.0677 -0.237067,0.0931 -0.4572,0.16933 -1.041406,0.24553 -0.01693,0.0508 0,0.18627 0.01693,0.23707 0.457205,0.0423 0.550339,0.0847 0.550339,0.57573 v 1.651 c 0,0.69427 -0.08467,0.72813 -0.592672,0.77047 -0.0508,0.0508 -0.0508,0.2286 0,0.2794 0.254002,-0.008 0.592672,-0.0169 0.931339,-0.0169 0.338667,0 0.592667,0.008 0.846667,0.0169 0.0508,-0.0508 0.0508,-0.2286 0,-0.2794 -0.4318,-0.0423 -0.516467,-0.0762 -0.516467,-0.77047 v -1.38853 c 0,-0.1778 0.0762,-0.2794 0.143933,-0.3556 0.321734,-0.31327 0.702734,-0.49954 1.032934,-0.49954 0.169333,0 0.347133,0.11007 0.448733,0.3048 0.08467,0.16934 0.1016,0.39794 0.1016,0.65194 v 1.28693 c 0,0.69427 -0.08467,0.72813 -0.524933,0.77047 -0.04233,0.0508 -0.04233,0.2286 0,0.2794 0.254,-0.008 0.524933,-0.0169 0.8636,-0.0169 0.338666,0 0.643466,0.008 0.897466,0.0169 0.04233,-0.0508 0.04233,-0.2286 0,-0.2794 -0.474133,-0.0423 -0.567266,-0.0762 -0.567266,-0.77047 v -1.26153 c 0,-0.46567 -0.03387,-0.87207 -0.2286,-1.13454 -0.143934,-0.18626 -0.4064,-0.28786 -0.702734,-0.28786 -0.414866,0 -0.889,0.11006 -1.388533,0.6858 z"
|
||||
id="path375-0" /><path
|
||||
style="font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -61.936901,41.31781 c 0.3302,0 0.728133,-0.16933 1.143,-0.508 0.04233,-0.0339 0.118533,-0.0508 0.127,0.008 0.01693,0.22013 0.09313,0.49953 0.09313,0.49953 0.06773,0.0254 0.1016,0.0254 0.160867,0 0.186266,-0.1524 0.4826,-0.2794 0.999066,-0.33867 0.0508,-0.0508 0.0508,-0.1778 0,-0.2286 -0.541866,-0.0423 -0.618066,-0.2032 -0.618066,-0.61806 v -1.6256 c 0,-0.254 0.03387,-0.87207 0.03387,-0.87207 0,-0.0254 -0.0254,-0.0508 -0.06773,-0.0508 -0.04233,0.008 -0.169333,0.0169 -0.296333,0.0169 -0.270934,0 -0.575734,-0.008 -0.8636,-0.0169 -0.0508,0.0508 -0.0508,0.2286 0,0.2794 0.414866,0.0254 0.524933,0.127 0.524933,0.6858 v 1.63407 c 0,0.16086 -0.01693,0.2286 -0.135467,0.3302 -0.313266,0.27093 -0.635,0.4064 -0.846666,0.4064 -0.254,0 -0.677334,-0.11854 -0.677334,-0.87207 v -1.54093 c 0,-0.254 0.03387,-0.87207 0.03387,-0.87207 0,-0.0254 -0.0254,-0.0508 -0.06773,-0.0508 -0.04233,0.008 -0.169334,0.0169 -0.296334,0.0169 -0.270933,0 -0.575733,-0.008 -0.8636,-0.0169 -0.0508,0.0508 -0.0508,0.2286 0,0.2794 0.4064,0.0339 0.524934,0.127 0.524934,0.67733 v 1.6256 c 0,0.5842 0.254,1.15147 1.0922,1.15147 z"
|
||||
id="path374-2" /><path
|
||||
id="path373-8"
|
||||
style="font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -65.751767,37.51644 c -0.5588,0 -1.024319,0.22866 -1.329119,0.59272 -0.3048,0.36407 -0.465606,0.85515 -0.465606,1.38855 0,0.8636 0.575403,1.82004 1.77767,1.82004 0.541866,0 0.948235,-0.186 1.236101,-0.47387 0.381,-0.36407 0.559139,-0.89772 0.559139,-1.42265 0,-0.88053 -0.482785,-1.90479 -1.778185,-1.90479 z m -0.127125,0.2961 c 0.728134,0 1.17719,0.66027 1.17719,1.87947 0,1.0668 -0.550331,1.32964 -0.948264,1.32964 -0.880534,0 -1.168403,-1.06683 -1.168403,-1.71876 0,-0.7366 0.177477,-1.49035 0.939477,-1.49035 z" /><path
|
||||
style="font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -69.247819,38.34224 c 0.738891,0 0.764969,0.21316 0.791048,0.63024 0.05216,0.0556 0.234706,0.0556 0.286863,0 -0.0087,-0.2317 -0.01738,-0.49122 -0.01738,-0.81561 0,-0.30585 0.0087,-0.5561 0.01738,-0.79708 -0.05216,-0.0556 -0.234706,-0.0556 -0.286863,0 -0.02608,0.50976 -0.05216,0.63025 -0.791048,0.63025 h -0.808434 v -1.6683 c 0,-0.50049 0.104314,-0.59318 0.486798,-0.59318 h 0.391178 c 0.921442,0 1.138762,0.37074 1.330005,1.01026 0.104314,0 0.199935,-0.0185 0.269478,-0.0463 -0.05216,-0.38 -0.18255,-1.26976 -0.191243,-1.3439 -0.0087,-0.0185 -0.01738,-0.0278 -0.03477,-0.0278 -0.156471,0.0371 -0.191241,0.0371 -0.408563,0.0371 h -2.216674 c -0.27817,0 -0.773662,-0.009 -1.121376,-0.0185 -0.05216,0.0556 -0.05216,0.25025 0,0.30586 0.608499,0.0278 0.756277,0.0741 0.756277,0.84342 v 3.7166 c 0,0.76927 -0.147778,0.81562 -0.756277,0.84342 -0.05216,0.0556 -0.05216,0.25025 0,0.30586 0.304249,-0.009 0.738892,-0.0185 1.130069,-0.0185 0.391178,0 0.817127,0.009 1.121377,0.0185 0.05216,-0.0556 0.05216,-0.25025 0,-0.30586 -0.608499,-0.0278 -0.756277,-0.0741 -0.756277,-0.84342 v -1.86293 z"
|
||||
id="path371-5" /></g><g
|
||||
id="g391-3"
|
||||
transform="translate(-0.39047033,-27.113896)"><path
|
||||
id="path362-4"
|
||||
style="font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -91.300898,37.51644 c -0.5588,0 -1.02432,0.22866 -1.32912,0.59272 -0.3048,0.36407 -0.46612,0.85515 -0.46612,1.38855 0,0.8636 0.57592,1.82004 1.77818,1.82004 0.54187,0 0.94824,-0.186 1.2361,-0.47387 0.381,-0.36407 0.55863,-0.89772 0.55863,-1.42265 0,-0.88053 -0.48227,-1.90479 -1.77767,-1.90479 z m -0.12713,0.2961 c 0.72814,0 1.17668,0.66027 1.17668,1.87947 0,1.0668 -0.55033,1.32964 -0.94827,1.32964 -0.88053,0 -1.1684,-1.06683 -1.1684,-1.71876 0,-0.7366 0.17799,-1.49035 0.93999,-1.49035 z" /><path
|
||||
style="font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -76.971277,42.58781 c 0.127,-0.2286 0.237067,-0.47413 0.347134,-0.72813 0.677333,-1.63407 1.049866,-2.49767 1.4986,-3.4544 0.160866,-0.3556 0.287866,-0.49107 0.6858,-0.54187 0.0508,-0.0508 0.0508,-0.2286 0,-0.2794 -0.169334,0.008 -0.364067,0.0169 -0.601134,0.0169 -0.254,0 -0.516466,-0.008 -0.770466,-0.0169 -0.0508,0.0508 -0.0508,0.2286 0,0.2794 0.262466,0.0254 0.541866,0.0762 0.4064,0.381 l -0.846667,1.93887 c -0.05927,0.14393 -0.127,0.16086 -0.2032,-0.008 l -0.745067,-1.76107 c -0.1524,-0.3556 -0.194733,-0.508 0.2794,-0.55033 0.0508,-0.0508 0.0508,-0.2286 0,-0.2794 -0.313266,0.008 -0.651933,0.0169 -0.956733,0.0169 -0.287868,0 -0.516468,-0.008 -0.685798,-0.0169 -0.0508,0.0508 -0.0508,0.2286 0,0.2794 0.3302,0.0423 0.44027,0.11853 0.660398,0.635 l 0.9652,2.22673 c 0.06773,0.1778 0.2032,0.5588 0.118533,0.79587 -0.1016,0.28787 -0.2032,0.51647 -0.3302,0.77893 -0.09313,0.16934 -0.211666,0.24554 -0.423333,0.24554 -0.118533,0 -0.1524,-0.0254 -0.245533,-0.0254 -0.245535,0 -0.372535,0.254 -0.372535,0.36406 0,0.1778 0.16934,0.31327 0.397935,0.31327 0.1778,0 0.516466,-0.0677 0.821266,-0.6096 z"
|
||||
id="path370-5" /><path
|
||||
id="path369-19"
|
||||
style="font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -79.322678,37.32162 c -0.22013,0 -0.62633,0.14363 -0.84646,0.43149 -0.1016,-0.0677 -0.38103,-0.23667 -0.88057,-0.23667 -0.75353,0 -1.44797,0.50781 -1.44797,1.28674 0,0.4572 0.20322,0.71966 0.44028,0.94826 -0.23706,0.2032 -0.37258,0.56738 -0.37258,0.85525 0,0.3048 0.1695,0.54157 0.38964,0.65164 -0.4572,0.27093 -0.69453,0.66067 -0.69453,1.02474 0,0.7366 0.69423,0.96532 1.34617,0.96532 1.143,0 2.37918,-0.55063 2.37918,-1.46503 0,-0.27094 -0.12705,-0.48255 -0.37259,-0.68575 -0.3302,-0.27093 -0.92283,-0.27957 -1.2361,-0.27957 -0.1524,0 -0.36369,0.017 -0.56689,0.0424 -0.127,0.008 -0.21191,0.0171 -0.25425,0.0171 -0.24553,0 -0.54156,-0.11859 -0.54156,-0.48266 0,-0.16933 0.0503,-0.34699 0.15192,-0.49092 0.2032,0.11853 0.4403,0.17776 0.7705,0.17776 0.74507,0 1.43092,-0.46579 1.43092,-1.29552 0,-0.39794 -0.11827,-0.62657 -0.3638,-0.88057 0.0593,-0.0847 0.22841,-0.20309 0.33848,-0.20309 0.0593,0 0.1187,0.0256 0.1695,0.1018 0.0339,0.0677 0.14406,0.15245 0.23719,0.15245 0.16087,0 0.31316,-0.15261 0.31316,-0.32195 0,-0.1778 -0.16104,-0.31315 -0.38964,-0.31315 z m -1.80351,0.45733 c 0.5334,0 0.82166,0.38919 0.82166,1.09192 0,0.7874 -0.39832,0.94827 -0.71159,0.94827 -0.7112,0 -0.78703,-0.60122 -0.78703,-1.14309 0,-0.59266 0.2113,-0.8971 0.67696,-0.8971 z m -0.76171,3.5388 c 0.0931,0.0254 0.22842,0.0424 0.33848,0.0424 0.26247,0 0.49952,-0.0253 0.61805,-0.0253 0.42334,0 0.77921,0.008 1.02475,0.14366 0.3302,0.18626 0.43149,0.3049 0.43149,0.52503 0,0.6096 -0.89732,0.93121 -1.65932,0.93121 -0.3048,0 -1.01596,-0.24541 -1.01596,-0.82114 0,-0.28787 0.017,-0.49948 0.26251,-0.79582 z" /><path
|
||||
id="path366-8"
|
||||
style="font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -84.982978,37.51644 c -0.5588,0 -1.02483,0.22866 -1.32963,0.59272 -0.3048,0.36407 -0.46561,0.85515 -0.46561,1.38855 0,0.8636 0.57592,1.82004 1.77819,1.82004 0.54187,0 0.94823,-0.186 1.2361,-0.47387 0.381,-0.36407 0.55862,-0.89772 0.55862,-1.42265 0,-0.88053 -0.48227,-1.90479 -1.77767,-1.90479 z m -0.12712,0.2961 c 0.72813,0 1.17667,0.66027 1.17667,1.87947 0,1.0668 -0.55033,1.32964 -0.94826,1.32964 -0.88053,0 -1.16841,-1.06683 -1.16841,-1.71876 0,-0.7366 0.178,-1.49035 0.94,-1.49035 z" /><path
|
||||
style="font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -88.519138,40.226305 c 0,0.70273 -0.0931,0.74507 -0.6096,0.77047 -0.0508,0.0508 -0.0508,0.2286 0,0.2794 0.29633,-0.008 0.6096,-0.0169 0.94826,-0.0169 0.33867,0 0.6604,0.008 0.9398,0.0169 0.0508,-0.0508 0.0508,-0.2286 0,-0.2794 -0.51647,-0.0254 -0.6096,-0.0677 -0.6096,-0.77047 v -3.90313 c 0,-0.55034 0.0339,-0.889 0.0339,-0.889 0,-0.0593 -0.0339,-0.0847 -0.11007,-0.0847 -0.21166,0.0847 -0.84666,0.2032 -1.18533,0.2286 -0.0169,0.0677 0,0.2032 0.0508,0.254 0.49107,0.0339 0.54187,0.0593 0.54187,0.69427 z"
|
||||
id="path364-3" /><path
|
||||
style="font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -96.400318,38.228175 c -0.0593,0.0593 -0.1016,0.0847 -0.1016,0 -0.008,-0.2286 -0.0339,-0.55034 -0.0677,-0.64347 -0.0254,-0.0339 -0.0339,-0.0677 -0.1016,-0.0677 -0.23706,0.0931 -0.4572,0.16933 -1.0414,0.24553 -0.0169,0.0508 0,0.18627 0.0169,0.23707 0.4572,0.0423 0.55033,0.0847 0.55033,0.57573 v 1.651 c 0,0.69427 -0.0847,0.72813 -0.59266,0.77047 -0.0508,0.0508 -0.0508,0.2286 0,0.2794 0.254,-0.008 0.59266,-0.0169 0.93133,-0.0169 0.33867,0 0.59267,0.008 0.84667,0.0169 0.0508,-0.0508 0.0508,-0.2286 0,-0.2794 -0.4318,-0.0423 -0.51647,-0.0762 -0.51647,-0.77047 v -1.38853 c 0,-0.1778 0.0762,-0.2794 0.14393,-0.3556 0.32174,-0.31327 0.70274,-0.49954 1.03294,-0.49954 0.16933,0 0.34713,0.11007 0.44873,0.3048 0.0847,0.16934 0.1016,0.39794 0.1016,0.65194 v 1.28693 c 0,0.69427 -0.0847,0.72813 -0.52493,0.77047 -0.0423,0.0508 -0.0423,0.2286 0,0.2794 0.254,-0.008 0.52493,-0.0169 0.8636,-0.0169 0.33866,0 0.64346,0.008 0.89746,0.0169 0.0423,-0.0508 0.0423,-0.2286 0,-0.2794 -0.47413,-0.0423 -0.56726,-0.0762 -0.56726,-0.77047 v -1.26153 c 0,-0.46567 -0.0339,-0.87207 -0.2286,-1.13454 -0.14394,-0.18626 -0.4064,-0.28786 -0.70274,-0.28786 -0.41486,0 -0.889,0.11006 -1.38853,0.6858 z"
|
||||
id="path361-8" /><path
|
||||
style="font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -101.1731,38.846235 c 0,-0.18626 0.0762,-0.28786 0.14393,-0.36406 0.32174,-0.31327 0.74506,-0.49954 1.083734,-0.49954 0.169328,0 0.347128,0.11854 0.448728,0.3048 0.0847,0.16934 0.1016,0.39794 0.1016,0.65194 v 1.28693 c 0,0.69427 -0.0847,0.72813 -0.524928,0.77047 -0.0423,0.0508 -0.0423,0.2286 0,0.2794 0.237058,-0.008 0.524928,-0.0169 0.863598,-0.0169 0.33866,0 0.61806,0.008 0.89746,0.0169 0.0423,-0.0508 0.0423,-0.2286 0,-0.2794 -0.47413,-0.0423 -0.56726,-0.0762 -0.56726,-0.77047 v -1.26153 c 0,-0.46567 -0.0339,-0.87207 -0.2286,-1.13454 -0.14394,-0.18626 -0.4064,-0.28786 -0.70274,-0.28786 -0.423332,0 -0.922852,0.11006 -1.439322,0.6858 -0.0339,0.0339 -0.0847,0.11853 -0.0847,0 l 0.008,-1.905 c 0,-0.55034 0.0339,-0.889 0.0339,-0.889 0,-0.0593 -0.0339,-0.0847 -0.11007,-0.0847 -0.21166,0.0847 -0.84666,0.2032 -1.18533,0.2286 -0.0169,0.0677 0,0.2032 0.0508,0.254 0.44027,0.0254 0.54187,-0.0169 0.54187,0.69427 v 3.69993 c 0,0.70273 -0.1016,0.7366 -0.59267,0.77047 -0.0508,0.0508 -0.0508,0.2286 0,0.2794 0.2794,-0.008 0.59267,-0.0169 0.93133,-0.0169 0.32174,0 0.59267,0.008 0.82974,0.0169 0.0508,-0.0508 0.0508,-0.2286 0,-0.2794 -0.42334,-0.0339 -0.49954,-0.0677 -0.49954,-0.77047 z"
|
||||
id="path360-81" /><path
|
||||
style="font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -102.80413,40.46268 c -0.0339,-0.0762 -0.1016,-0.11007 -0.1778,-0.11854 -0.28786,0.37254 -0.65193,0.5588 -1.016,0.5588 -0.61806,0 -1.13453,-0.62653 -1.13453,-1.61713 0,-0.93133 0.4064,-1.49013 0.9652,-1.49013 0.49953,0 0.56727,0.29633 0.60113,0.59266 0.0254,0.2286 0.14394,0.3048 0.32174,0.3048 0.1778,0 0.41486,-0.11006 0.41486,-0.37253 0,-0.46567 -0.4826,-0.80433 -1.2954,-0.80433 -0.8382,0 -1.73566,0.75353 -1.73566,1.9558 0,1.0922 0.6096,1.84573 1.6764,1.84573 0.508,0 0.95673,-0.16087 1.38006,-0.85513 z"
|
||||
id="path359-7" /><path
|
||||
id="path358-1"
|
||||
style="font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -107.86367,37.53297 c -0.7366,0 -1.69292,0.70313 -1.69292,1.99006 0,0.47413 0.11851,0.93142 0.39791,1.25315 0.28786,0.33867 0.68541,0.54157 1.29501,0.54157 0.64346,0 1.10104,-0.29612 1.4397,-0.73639 -0.0254,-0.0847 -0.0762,-0.12692 -0.17776,-0.13539 -0.31327,0.32174 -0.559,0.45682 -1.05007,0.45682 -0.3048,0 -0.66047,-0.17746 -0.92294,-0.60926 -0.16933,-0.2794 -0.27078,-0.66907 -0.27078,-1.16014 l 2.25206,0.0171 c 0.1016,0 0.16071,-0.051 0.16071,-0.14417 0,-0.7112 -0.25406,-1.4733 -1.43092,-1.4733 z m 0,0.27957 c 0.32173,0 0.7028,0.17764 0.7028,0.88884 0,0.0762 -0.034,0.11885 -0.12712,0.11885 l -1.53221,0.0253 c 0.16086,-0.95673 0.75333,-1.03301 0.95653,-1.03301 z" /><path
|
||||
style="font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -110.90558,40.20579 v -3.53864 c 0,-0.59286 0.0864,-0.94487 0.39763,-0.94487 h 0.19017 c 0.64832,0 1.05459,0.24085 1.20155,0.95413 0.0951,0 0.2161,-0.009 0.2939,-0.0463 -0.0605,-0.42612 -0.10373,-0.89856 -0.11238,-1.31542 0,-0.009 -0.0173,-0.0278 -0.0259,-0.0278 -0.2939,0.0278 -1.2534,0.0741 -1.93629,0.0741 h -0.7434 c -0.66561,0 -1.68562,-0.0463 -2.0141,-0.0741 -0.0173,0 -0.0346,0.0185 -0.0346,0.0278 -0.0346,0.41686 -0.12102,0.89856 -0.2161,1.34321 0.0864,0.037 0.19017,0.0463 0.2939,0.0463 0.17288,-0.74107 0.57052,-0.98192 1.14103,-0.98192 h 0.42357 c 0.31983,0 0.40627,0.35201 0.40627,0.91708 v 3.56643 c 0,0.76886 -0.14695,0.81518 -0.83848,0.84297 -0.0519,0.0556 -0.0519,0.25012 0,0.3057 0.42356,-0.009 0.85577,-0.0185 1.21018,-0.0185 0.32848,0 0.76934,0.009 1.20154,0.0185 0.0519,-0.0556 0.0519,-0.25012 0,-0.3057 -0.69153,-0.0278 -0.83848,-0.0741 -0.83848,-0.84297 z"
|
||||
id="text340-3" /></g><g
|
||||
id="g390-5"
|
||||
transform="translate(-45.265222,-17.844912)"><path
|
||||
style="font-style:italic;font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -72.980939,31.94026 c 0.169334,-0.27094 1.202267,-1.84574 1.439334,-2.413 0.127,-0.28787 0.2286,-0.60114 0.2286,-0.89747 0,-0.24553 -0.118534,-0.4064 -0.440267,-0.4064 -0.254,0 -0.397933,0.11007 -0.397933,0.31327 0,0.0593 0.01693,0.13546 0.0508,0.1778 0.127,0.19473 0.1778,0.37253 0.1778,0.508 0,0.37253 -0.347134,1.00753 -0.643467,1.46473 0,0 -0.4318,0.70273 -0.651933,1.02447 l -0.0508,-0.0254 c -0.0508,-0.9906 -0.110067,-1.78647 -0.364067,-2.83634 -0.118533,-0.44873 -0.2286,-0.62653 -0.440267,-0.62653 -0.2032,0 -0.821266,0.3556 -1.1176,0.57573 0.0085,0.0931 0.04233,0.19474 0.110067,0.26247 0.1016,-0.0508 0.381,-0.18627 0.550333,-0.18627 0.110067,0 0.194734,0.0254 0.237067,0.0931 0.04233,0.0677 0.08467,0.2032 0.135467,0.3556 0.254,0.8636 0.508,2.92946 0.414866,3.14113 -0.347133,0.56727 -0.702733,0.9398 -0.821266,0.9398 -0.08467,0 -0.245534,-0.11007 -0.296334,-0.1524 -0.05927,-0.0508 -0.2286,-0.11853 -0.296333,-0.11853 -0.1778,0 -0.389467,0.16933 -0.389467,0.4318 0,0.2794 0.372534,0.3556 0.516467,0.3556 0.448733,0 1.1176,-0.54187 1.667933,-1.38854 z"
|
||||
id="path356-3" /><path
|
||||
style="font-style:italic;font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -76.801144,28.30806 -0.448733,0.0254 c -0.160867,0.008 -0.220134,0.0762 -0.237067,0.14393 -0.0085,0.0254 -0.03387,0.127 -0.03387,0.14393 0,0.0169 0.0254,0.0169 0.0508,0.0169 h 0.592667 l -0.516467,2.30293 c -0.06773,0.2794 -0.118533,0.5334 -0.118533,0.69427 0,0.3048 0.1524,0.38946 0.414867,0.38946 0.372533,0 0.931333,-0.34713 1.227666,-0.87206 -0.0254,-0.11007 -0.08467,-0.16087 -0.186266,-0.16087 -0.389467,0.44027 -0.541867,0.52493 -0.677334,0.52493 -0.0254,0 -0.110066,-0.0169 -0.110066,-0.11853 0,-0.0762 0.0254,-0.24553 0.09313,-0.5334 l 0.499533,-2.22673 h 0.829734 c 0.1016,-0.0423 0.1778,-0.26247 0.08467,-0.3302 h -0.8382 l 0.08467,-0.381 c 0.03387,-0.1524 0.110067,-0.4064 0.110067,-0.508 0,-0.14394 -0.06773,-0.2286 -0.338667,-0.2286 -0.3048,0 -0.296333,0.381 -0.372533,0.69426 z"
|
||||
id="path355-22" /><path
|
||||
id="path354-2"
|
||||
style="font-style:italic;font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -79.022378,28.22346 c -1.4732,0 -2.08307,1.43931 -2.08307,2.51458 0,0.71966 0.33906,1.28674 1.04179,1.28674 0.56727,0 1.08332,-0.29601 1.58285,-0.93948 -0.0423,-0.0931 -0.0927,-0.13539 -0.1943,-0.13539 -0.4826,0.49107 -0.67777,0.56689 -1.08417,0.56689 -0.381,0 -0.64337,-0.20312 -0.64337,-0.97358 0,-0.0423 3.1e-4,-0.22011 0.009,-0.28784 2.2098,-0.4318 2.17558,-1.08387 2.17558,-1.4056 0,-0.21167 -0.19449,-0.62632 -0.80409,-0.62632 z m -0.19482,0.26252 c 0.3048,0 0.41497,0.0759 0.41497,0.32143 0,0.762 -0.89753,1.04136 -1.541,1.12603 0.3048,-1.1938 0.77043,-1.44746 1.12603,-1.44746 z" /><path
|
||||
style="font-style:italic;font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -82.664388,27.29876 c 0,0.22013 0.18627,0.4064 0.4064,0.4064 0.22013,0 0.4064,-0.18627 0.4064,-0.4064 0,-0.22014 -0.18627,-0.4064 -0.4064,-0.4064 -0.22014,0 -0.4064,0.18626 -0.4064,0.4064 z"
|
||||
id="path351-9" /><path
|
||||
style="font-style:italic;font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -85.816378,32.02492 c 0.6096,0 1.15993,-0.4318 1.56633,-0.99906 -0.0254,-0.0847 -0.11007,-0.14394 -0.18627,-0.14394 -0.3302,0.37254 -0.66886,0.64347 -1.1176,0.64347 -0.14393,0 -0.3048,-0.0339 -0.42333,-0.19473 -0.127,-0.16087 -0.21167,-0.32174 -0.21167,-0.8382 0,-1.26154 0.59267,-2.0066 1.2446,-2.0066 0.11854,0 0.3556,0.0423 0.3556,0.32173 0,0.0508 -0.0169,0.11853 -0.0423,0.16087 -0.0254,0.0423 -0.0423,0.127 -0.0423,0.1778 0,0.13546 0.0847,0.27093 0.2286,0.27093 0.2286,0 0.44027,-0.16933 0.44027,-0.381 0,-0.3302 -0.0339,-0.8128 -0.94827,-0.8128 -0.33866,0 -0.889,0.2286 -1.23613,0.60113 -0.41487,0.44027 -0.69427,1.10067 -0.69427,1.8542 0,0.28787 0.0508,0.66887 0.254,0.9398 0.16934,0.24554 0.46567,0.4064 0.8128,0.4064 z"
|
||||
id="path350-1" /><path
|
||||
id="path349-1"
|
||||
style="font-style:italic;font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -88.612918,28.22346 c -1.41393,0 -2.08256,1.32908 -2.08256,2.34508 0,0.44873 0.11019,1.45624 1.18546,1.45624 0.27093,0 0.52476,-0.0337 0.77876,-0.16071 0.7366,-0.36407 1.31207,-1.26158 1.31207,-2.26911 0,-0.6096 -0.15233,-1.3715 -1.19373,-1.3715 z m -0.15244,0.27957 c 0.254,0 0.38944,0.13501 0.50798,0.37207 0.11006,0.22014 0.13591,0.52528 0.13591,0.77928 0,0.33867 -0.0595,1.06686 -0.36432,1.54099 -0.23707,0.36407 -0.58436,0.51625 -0.89762,0.51625 -0.24554,0 -0.60927,-0.32178 -0.60927,-1.21078 0,-0.762 0.32985,-1.99781 1.22732,-1.99781 z" /><path
|
||||
style="font-style:italic;font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -91.025748,26.46797 c -0.4318,-0.0708 -0.381,-0.28331 -1.13453,-0.28331 -0.7112,0 -1.63407,0.50465 -1.81187,1.44311 -0.0254,0.10624 -0.0339,0.20362 -0.0339,0.30101 0,0.7791 0.6604,1.1952 1.25307,1.50508 0.38946,0.20362 0.69426,0.48693 0.69426,1.01813 0,0.0973 -0.008,0.21248 -0.0254,0.32758 -0.13546,0.71712 -0.55033,1.00043 -1.1684,1.00043 -0.71966,0 -1.143,-0.37184 -1.15146,-1.25717 l -0.254,0.0266 c -0.0254,0.67285 -0.0423,0.96501 -0.11007,1.41653 0.49107,0 0.70273,0.1328 1.38853,0.1328 0.9398,0 1.83727,-0.72597 2.0066,-1.62902 0.0169,-0.11509 0.0254,-0.23019 0.0254,-0.32757 0,-0.78795 -0.57573,-1.18635 -1.143,-1.46081 -0.28786,-0.1328 -0.89746,-0.49579 -0.89746,-1.10667 0,-0.062 0,-0.1151 0.0169,-0.18592 0.1016,-0.54006 0.54186,-0.90305 1.07526,-0.90305 0.77894,0 0.889,0.52235 0.9398,1.10667 l 0.26247,0.0177 c 0,-0.42496 0.0423,-0.664 0.0677,-1.14208 z"
|
||||
id="path347-6" /><path
|
||||
style="font-style:italic;font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -82.116398,29.25363 c 0.0762,-0.3302 0.16933,-0.65193 0.16933,-0.79586 0,-0.11854 -0.0593,-0.18627 -0.16933,-0.18627 -0.27093,0 -0.65193,0.0593 -1.04987,0.11007 -0.0593,0.0677 -0.0423,0.16086 0.008,0.23706 l 0.33867,0.0254 c 0.1016,0.008 0.1524,0.0847 0.1524,0.16934 0,0.0847 -0.0254,0.19473 -0.0762,0.4318 l -0.39793,1.74413 c -0.0593,0.27093 -0.14394,0.61807 -0.14394,0.77893 0,0.16087 0.0931,0.2794 0.34714,0.2794 0.4064,0 0.7874,-0.28786 1.17686,-0.7874 -0.0254,-0.0762 -0.0762,-0.14393 -0.19473,-0.14393 -0.22013,0.254 -0.46567,0.42333 -0.55033,0.42333 -0.0677,0 -0.0847,-0.0423 -0.0847,-0.14393 0,-0.0762 0.0423,-0.26247 0.0931,-0.4826 z"
|
||||
id="path345-7-7" /></g><g
|
||||
id="g389-8"
|
||||
transform="translate(-45.265222,-17.844912)"><path
|
||||
style="font-style:italic;font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -97.663778,27.00419 c 0.11853,-0.54187 0.21167,-0.889 0.21167,-0.889 0,-0.0593 -0.0254,-0.0847 -0.1016,-0.0847 -0.2286,0.0847 -0.8382,0.19474 -1.18534,0.22014 l -0.0254,0.2032 c 0,0.0254 0.008,0.0423 0.0423,0.0423 l 0.26247,0.0169 c 0.11007,0 0.1778,0.0508 0.1778,0.23707 0,0.0931 -0.0254,0.24553 -0.0593,0.42333 l -0.8382,3.7592 c -0.0677,0.27094 -0.11853,0.5588 -0.11853,0.71967 0,0.16087 0.0339,0.37253 0.3556,0.37253 0.381,0 0.8382,-0.21166 1.22766,-0.85513 -0.0339,-0.0847 -0.0762,-0.14393 -0.18626,-0.14393 -0.254,0.3048 -0.52494,0.49106 -0.62654,0.49106 -0.0677,0 -0.1016,-0.0508 -0.1016,-0.11853 0,-0.0677 0.0254,-0.19473 0.1016,-0.5334 z"
|
||||
id="path346-6" /><path
|
||||
style="font-style:italic;font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -100.56912,29.23092 c 0.0762,-0.3302 0.16933,-0.65193 0.16933,-0.79586 0,-0.11854 -0.0593,-0.18627 -0.16933,-0.18627 -0.27093,0 -0.65193,0.0593 -1.04987,0.11007 -0.0593,0.0677 -0.0423,0.16086 0.008,0.23706 l 0.33867,0.0254 c 0.1016,0.008 0.1524,0.0847 0.1524,0.16934 0,0.0847 -0.0254,0.19473 -0.0762,0.4318 l -0.39793,1.74413 c -0.0593,0.27093 -0.14394,0.61807 -0.14394,0.77893 0,0.16087 0.0931,0.2794 0.34714,0.2794 0.4064,0 0.7874,-0.28786 1.17685,-0.7874 -0.0254,-0.0762 -0.0762,-0.14393 -0.19472,-0.14393 -0.22013,0.254 -0.46567,0.42333 -0.55033,0.42333 -0.0677,0 -0.0847,-0.0423 -0.0847,-0.14393 0,-0.0762 0.0423,-0.26247 0.0931,-0.4826 z"
|
||||
id="path345-2" /><path
|
||||
style="font-style:italic;font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -101.08927,27.29876 c 0,0.22013 0.18627,0.4064 0.4064,0.4064 0.22013,0 0.40639,-0.18627 0.40639,-0.4064 0,-0.22014 -0.18626,-0.4064 -0.40639,-0.4064 -0.22013,0 -0.4064,0.18626 -0.4064,0.4064 z"
|
||||
id="path344-4" /><path
|
||||
style="font-style:italic;font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -104.29977,31.29679 -0.2794,-1.97273 c -0.11853,-0.7874 -0.22013,-1.10067 -0.5334,-1.10067 -0.28787,0 -0.77894,0.49953 -1.07527,0.95673 0.0254,0.0847 0.0847,0.13547 0.18627,0.1524 0.23707,-0.2286 0.4318,-0.41486 0.59267,-0.41486 0.0762,0 0.12699,0.14393 0.19473,0.51646 l 0.3556,2.06587 c 0.0593,0.381 0.1524,0.54187 0.27093,0.54187 0.0847,0 0.2032,-0.127 0.36407,-0.3048 0.26247,-0.28787 0.5842,-0.70274 0.70273,-0.87207 0.18627,-0.26247 0.57574,-0.77047 0.8128,-1.33773 0.127,-0.28787 0.2286,-0.60114 0.2286,-0.89747 0,-0.24553 -0.11853,-0.4064 -0.44026,-0.4064 -0.254,0 -0.39794,0.11007 -0.39794,0.31327 0,0.0593 0.0169,0.13546 0.0508,0.1778 0.127,0.19473 0.1778,0.37253 0.1778,0.508 0,0.37253 -0.31326,1.02446 -0.64346,1.46473 -0.1016,0.14393 -0.41487,0.54187 -0.52494,0.635 z"
|
||||
id="path343-7" /><path
|
||||
style="font-style:italic;font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -106.90216,29.23092 c 0.0762,-0.3302 0.16933,-0.65193 0.16933,-0.79586 0,-0.11854 -0.0593,-0.18627 -0.16933,-0.18627 -0.27094,0 -0.65194,0.0593 -1.04987,0.11007 -0.0593,0.0677 -0.0423,0.16086 0.009,0.23706 l 0.33867,0.0254 c 0.1016,0.008 0.1524,0.0847 0.1524,0.16934 0,0.0847 -0.0254,0.19473 -0.0762,0.4318 l -0.39794,1.74413 c -0.0593,0.27093 -0.14393,0.61807 -0.14393,0.77893 0,0.16087 0.0931,0.2794 0.34713,0.2794 0.4064,0 0.7874,-0.28786 1.17687,-0.7874 -0.0254,-0.0762 -0.0762,-0.14393 -0.19473,-0.14393 -0.22014,0.254 -0.46567,0.42333 -0.55034,0.42333 -0.0677,0 -0.0847,-0.0423 -0.0847,-0.14393 0,-0.0762 0.0423,-0.26247 0.0931,-0.4826 z"
|
||||
id="path342-6" /><path
|
||||
style="font-style:italic;font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -107.42231,27.29876 c 0,0.22013 0.18627,0.4064 0.4064,0.4064 0.22013,0 0.4064,-0.18627 0.4064,-0.4064 0,-0.22014 -0.18627,-0.4064 -0.4064,-0.4064 -0.22013,0 -0.4064,0.18626 -0.4064,0.4064 z"
|
||||
id="path341-2" /><path
|
||||
style="font-style:italic;font-size:32px;font-family:'Linux Libertine O';-inkscape-font-specification:'Linux Libertine O';white-space:pre;display:inline;stroke-width:0"
|
||||
d="m -111.27114,32.28326 c 0.7933,0 1.60366,-0.4225 2.30312,-1.23996 -0.0256,-0.0827 -0.0682,-0.13777 -0.16207,-0.13777 -0.70799,0.71642 -1.32216,1.00115 -2.08133,1.00115 -1.03214,0 -1.45865,-0.93686 -1.45865,-2.0023 0,-0.25717 0.0256,-0.51435 0.0768,-0.78071 0.34121,-1.86452 1.63778,-2.63605 2.28606,-2.63605 1.1345,0 1.47571,0.74397 1.54395,1.53387 l 0.24737,-0.0367 c 0.008,-0.47761 0.0256,-0.92767 0.0768,-1.42365 -0.46063,-0.0276 -0.708,-0.41332 -1.71455,-0.41332 -1.35628,0 -2.85757,1.34099 -3.18171,3.1504 -0.0427,0.22962 -0.0682,0.45924 -0.0682,0.67968 0,1.23077 0.63975,2.3054 2.13251,2.3054 z"
|
||||
id="text340-2-4" /></g></g></svg>
|
After Width: | Height: | Size: 35 KiB |
185
assets/img/cstf-two-line.svg
Normal file
After Width: | Height: | Size: 1.6 MiB |
BIN
assets/people/paul-payne.jpg
Normal file
After Width: | Height: | Size: 127 KiB |
@@ -9,7 +9,7 @@ defaultContentLanguage = "en"
|
||||
# pluralizeListTitles = "true" # hugo function useful for non-english languages, find out more in https://gohugo.io/getting-started/configuration/#pluralizelisttitles
|
||||
|
||||
enableRobotsTXT = true
|
||||
summaryLength = 0
|
||||
summaryLength = 20
|
||||
|
||||
buildDrafts = false
|
||||
buildFuture = false
|
||||
@@ -29,6 +29,7 @@ googleAnalytics = "G-606W7SWX5E"
|
||||
category = "categories"
|
||||
author = "authors"
|
||||
series = "series"
|
||||
person = "people"
|
||||
|
||||
[sitemap]
|
||||
changefreq = 'daily'
|
||||
@@ -67,3 +68,10 @@ googleAnalytics = "G-606W7SWX5E"
|
||||
name = 'fragmentrefs'
|
||||
type = 'fragments'
|
||||
weight = 10
|
||||
|
||||
[markup]
|
||||
[markup.goldmark]
|
||||
[markup.goldmark.parser]
|
||||
[markup.goldmark.parser.attribute]
|
||||
block = true
|
||||
title = true
|
@@ -12,7 +12,7 @@
|
||||
|
||||
[[main]]
|
||||
name = "About"
|
||||
pageRef = "foundation"
|
||||
pageRef = "about"
|
||||
weight = 30
|
||||
|
||||
[[main]]
|
||||
|
@@ -42,7 +42,7 @@ disableTextInHeader = false
|
||||
showScrollToTop = true
|
||||
|
||||
[homepage]
|
||||
layout = "profile" # valid options: page, profile, hero, card, background, custom
|
||||
layout = "custom" # valid options: page, profile, hero, card, background, custom
|
||||
#homepageImage = "IMAGE.jpg" # used in: hero, and card
|
||||
showRecent = ["articles"]
|
||||
showRecentItems = 3
|
||||
@@ -61,7 +61,7 @@ disableTextInHeader = false
|
||||
showAuthor = false
|
||||
# showAuthorBottom = false
|
||||
showHero = true
|
||||
# heroStyle = "basic" # valid options: basic, big, background, thumbAndBackground
|
||||
heroStyle = "big" # valid options: basic, big, background, thumbAndBackground
|
||||
layoutBackgroundBlur = true # only used when heroStyle equals background or thumbAndBackground
|
||||
layoutBackgroundHeaderSpace = true # only used when heroStyle equals background
|
||||
showBreadcrumbs = true
|
||||
@@ -75,27 +75,27 @@ disableTextInHeader = false
|
||||
invertPagination = false
|
||||
showReadingTime = true
|
||||
showTableOfContents = true
|
||||
showRelatedContent = true
|
||||
showRelatedContent = false
|
||||
relatedContentLimit = 3
|
||||
showTaxonomies = false
|
||||
showTaxonomies = true
|
||||
showAuthorsBadges = false
|
||||
showWordCount = true
|
||||
sharingLinks = [ "linkedin", "twitter", "bluesky", "mastodon", "reddit", "pinterest", "facebook", "email", "whatsapp", "telegram"]
|
||||
sharingLinks = [ "linkedin", "twitter", "bluesky", "mastodon", "reddit", "facebook", "email", "whatsapp", "telegram"]
|
||||
showZenMode = true
|
||||
|
||||
[list]
|
||||
showHero = false
|
||||
# heroStyle = "background" # valid options: basic, big, background, thumbAndBackground
|
||||
showHero = true
|
||||
heroStyle = "background" # valid options: basic, big, background, thumbAndBackground
|
||||
layoutBackgroundBlur = true # only used when heroStyle equals background or thumbAndBackground
|
||||
layoutBackgroundHeaderSpace = true # only used when heroStyle equals background
|
||||
showBreadcrumbs = false
|
||||
showSummary = false
|
||||
showBreadcrumbs = true
|
||||
showSummary = true
|
||||
showViews = false
|
||||
showLikes = false
|
||||
showTableOfContents = false
|
||||
showCards = false
|
||||
showCards = true
|
||||
orderByWeight = false
|
||||
groupByYear = true
|
||||
groupByYear = false
|
||||
cardView = false
|
||||
cardViewScreenWidth = false
|
||||
constrainItemsWidth = false
|
||||
@@ -164,4 +164,4 @@ disableTextInHeader = false
|
||||
|
||||
[rssnext]
|
||||
# feedId = ""
|
||||
# userId = ""
|
||||
# userId = ""
|
||||
|
@@ -1,21 +1,44 @@
|
||||
---
|
||||
title: 'Welcome to CivilSociety.dev'
|
||||
title: "Welcome to CSTF!"
|
||||
---
|
||||
|
||||
As civil society organizations become increasingly dependent on digital tools, the question of who controls that technology becomes a matter of democratic importance.
|
||||
<header>
|
||||
<!-- Light mode image -->
|
||||
<div class="dark:hidden">
|
||||
{{<figure
|
||||
src="/img/cstf-full-logo.svg"
|
||||
alt="CSTF"
|
||||
nozoom="true"
|
||||
class="w-84 mx-auto"
|
||||
>}}
|
||||
</div>
|
||||
|
||||
The Civil Society Technology Foundation develops and disseminates open-source, self-hosted technologies that enable genuine digital sovereignty. We provide the tools, knowledge, and community support necessary for civil society to operate independently of surveillance-based platforms and extractive business models.
|
||||
<!-- Dark mode image -->
|
||||
<div class="hidden dark:block">
|
||||
{{<figure
|
||||
src="/img/cstf-full-logo-light.svg"
|
||||
alt="CSTF"
|
||||
nozoom="true"
|
||||
class="w-84 mx-auto"
|
||||
>}}
|
||||
</div>
|
||||
</header>
|
||||
|
||||
Our work spans software development, educational resources, and community engagement—creating pathways to technological self-determination for organizations that can't afford to compromise their values.
|
||||
<div class="prose dark:prose-invert max-w-3xl mx-auto pt-8">
|
||||
|
||||
{{< button href="/foundation/" target="_self" >}}
|
||||
Learn More
|
||||
{{< /button >}}
|
||||
The CSTF empowers individuals and communities to reclaim digital self-determination through the development and dissemination of open-source, self-hosted technologies.
|
||||
|
||||
<div class="flex justify-end">
|
||||
{{< button href="/foundation/">}}
|
||||
Learn More about CSTF
|
||||
{{< /button >}}
|
||||
</div>
|
||||
|
||||
<div class="flex flex-col gap-8">
|
||||
{{< article link="/articles/independent-technology/" >}}
|
||||
{{< article link="/articles/why-digital-sovereignty-matters/" >}}
|
||||
{{< article link="/articles/arguments-against-centralization/" >}}
|
||||
</div>
|
||||
|
||||
<div class="flex flex-col gap-4 pt-16" >
|
||||
{{< article link="/articles/independent-technology/" >}}
|
||||
{{< article link="/articles/digital-self-determination/" >}}
|
||||
{{< article link="/articles/arguments-against-centralization/" >}}
|
||||
</div>
|
||||
|
||||
|
BIN
content/about/featured.png
Normal file
After Width: | Height: | Size: 636 KiB |
177
content/about/index.md
Normal file
@@ -0,0 +1,177 @@
|
||||
---
|
||||
title: The Civil Society Technology Foundation
|
||||
heroStyle: background
|
||||
showDate: false
|
||||
showWordCount: false
|
||||
showReadingTime: false
|
||||
cardView: false
|
||||
aliases:
|
||||
- /foundation/
|
||||
- /foundation/core-principles/
|
||||
- /foundation/mission-statement/
|
||||
---
|
||||
|
||||
The Civil Society Technology Foundation is a global, volunteer-led, US 501(c)3 non-profit charity incorporated in Washington State.
|
||||
|
||||
## Purpose
|
||||
|
||||
The foundational technologies of our digital lives are open and free. The architecture of the Internet was intentionally designed with standardization, open protocols, and distributed governance to ensure it remained robust, interoperable, and accessible to all. The Internet and the technologies that run upon it hold the promise to empower individuals and communities locally and globally with the tools to communicate, organize, and innovate without barriers.
|
||||
|
||||
However, instead of embracing this potential directly, individuals and organizations have increasingly turned to commercial platforms and service providers to mediate access to technology. While convenient, our usage of technology is now largely centralized, gated, and governed by the increasingly few at the expense of access, privacy, and self-determination of the many. Over-reliance on centralized platforms has resulted in degraded health and weakened civil liberties as they too often prioritize engagement and control over user welfare.
|
||||
|
||||
This is a crisis of _digital self-determination_.
|
||||
|
||||
Digital technology is in its essence a common good. It is software and software, like knowledge or speech, is free to all. Free to be created. Free to be shared.
|
||||
|
||||
_The Civil Society Technology Foundation collaborates to remove barriers to creating, sharing, and using software. Our work spans open software development, educational resources, and community engagement, creating pathways to technological self-determination for individuals and communities in alignment with their values._
|
||||
|
||||
|
||||
## Mission
|
||||
|
||||
The Civil Society Technology Foundation (CSTF) empowers individuals and communities to reclaim digital self-determination through the development and dissemination of open-source, self-hosted technologies.
|
||||
|
||||
We exist to create a world where technology serves people by reducing dependency on centralized platforms and enabling direct control of digital infrastructure and applications.
|
||||
|
||||
Through accessible tools, educational resources, and community engagement, we advance practical autonomy: the capacity of users to understand, create, modify, and maintain the technologies they rely on.
|
||||
|
||||
We believe digital self-determination, including control over data, identity, and computation, is essential to democratic participation and institutional resilience in the digital era.
|
||||
|
||||
This work is motivated by a conviction that open systems, federated infrastructure, and transparent governance are not only technically feasible, but socially necessary. By building and sharing common resources, we contribute to a broader ecosystem of public digital goods—critical to any robust civil society.
|
||||
|
||||
|
||||
## Principles
|
||||
|
||||
The Civil Society Technology Foundation operates according to the following core principles that guide all our work, partnerships, and initiatives.
|
||||
|
||||
### Self-determination by Design
|
||||
|
||||
**Users must own their data and control their computing environment.**
|
||||
|
||||
Digital systems should be designed with autonomy as a foundational requirement, not an afterthought. This means:
|
||||
|
||||
- Data remains under user control by default.
|
||||
- Consent must be explicit, informed, and revocable.
|
||||
- Infrastructure should be designed for individual or community ownership.
|
||||
- Privacy is a fundamental right, not a premium feature.
|
||||
|
||||
### Tools Over Policy
|
||||
|
||||
**We build alternatives rather than asking for permission.**
|
||||
|
||||
While policy reform has its place, we prioritize creating technical solutions that enable autonomy regardless of regulatory environments:
|
||||
|
||||
- Direct action through tool-building creates immediate paths to autonomy.
|
||||
- Self-determination cannot wait for legislative or corporate reform.
|
||||
- Working alternatives demonstrate what's possible and accelerate change.
|
||||
- Technical empowerment reduces reliance on regulatory protection.
|
||||
|
||||
### Open Source, Always
|
||||
|
||||
**Software must be libre—free to use, study, modify, and share.**
|
||||
|
||||
Open source is not simply a development methodology but a foundation for digital self-determination:
|
||||
|
||||
- Source code transparency enables trust verification and community oversight.
|
||||
- Freedom to modify ensures tools can adapt to evolving needs.
|
||||
- Rights to redistribute create resilience against capture or abandonment.
|
||||
- Collective improvement leads to higher quality and security.
|
||||
|
||||
### Self-Hosted Infrastructure
|
||||
|
||||
**Individuals and communities should control their own infrastructure.**
|
||||
|
||||
Centralized hosting creates fundamental risks of capture, surveillance, and dependency:
|
||||
|
||||
- Local infrastructure ownership provides true digital autonomy.
|
||||
- Self-hosting creates resilience against external disruption.
|
||||
- Community-scale infrastructure balances efficiency with self-determination.
|
||||
- Infrastructure design should prioritize simplicity, reliability, and maintainability.
|
||||
|
||||
### Democratized AI
|
||||
|
||||
**Artificial intelligence must be open, efficient, and serve civil society.**
|
||||
|
||||
As AI becomes increasingly central to digital systems, its governance and accessibility are critical:
|
||||
|
||||
- AI systems should run on commodity hardware where possible.
|
||||
- Models and training data should be publicly available and auditable.
|
||||
- Development should be guided by public needs over commercial imperatives.
|
||||
- Benefits should accrue to communities, not just model owners.
|
||||
|
||||
### Transparent Governance
|
||||
|
||||
**All governance must be visible, accountable, and auditable.**
|
||||
|
||||
How we govern ourselves models the world we seek to create:
|
||||
|
||||
- Decision-making processes should be documented and accessible.
|
||||
- Influence should be earned through contribution, not financial control.
|
||||
- Community participation in governance should be substantive, not symbolic.
|
||||
- Accountability requires both transparency and mechanisms for change.
|
||||
|
||||
### Healthy Ecosystems Win
|
||||
|
||||
**Projects succeed through their value to communities, not popularity or funding.**
|
||||
|
||||
We evaluate success by contribution to civil society, not market metrics:
|
||||
|
||||
- Genuine utility to real communities outweighs vanity metrics.
|
||||
- Sustainability matters more than rapid growth.
|
||||
- Complementary projects create more value than competitors.
|
||||
- Diversity of approaches strengthens the ecosystem as a whole.
|
||||
|
||||
### Interoperability via Consent
|
||||
|
||||
**Standards emerge from alignment, not imposition.**
|
||||
|
||||
True interoperability respects autonomy while enabling cooperation:
|
||||
|
||||
- Protocols should be open, documented, and implementable by anyone.
|
||||
- Standards adoption should be voluntary and beneficial.
|
||||
- Federation should respect boundary decisions of participants.
|
||||
- Gateways between systems should preserve user autonomy.
|
||||
|
||||
### Contribution Defines Membership
|
||||
|
||||
**Participation is earned through action. Identity is contextual and optional.**
|
||||
|
||||
Communities grow stronger through active contribution:
|
||||
|
||||
- Value is created through doing, not just affiliating.
|
||||
- Multiple forms of contribution should be recognized and valued.
|
||||
- Identity verification should be proportional to the context.
|
||||
- Privacy and pseudonymity are valid choices in appropriate contexts.
|
||||
|
||||
### Critical Adoption over Blind Use
|
||||
|
||||
**Pragmatism means understanding trade-offs.**
|
||||
|
||||
We advocate informed choice rather than ideological purity:
|
||||
|
||||
- Users should understand what rights they give up and why.
|
||||
- Perfect autonomy may be balanced against practical needs.
|
||||
- Transition paths from closed to open systems are valuable.
|
||||
- Transparency about compromises builds trust and education.
|
||||
|
||||
## Directors
|
||||
|
||||
<div class="not-prose">
|
||||
|
||||
{{<figure
|
||||
src="/people/paul-payne.jpg"
|
||||
href="/people/paul-payne/"
|
||||
target="_self"
|
||||
alt="Paul Payne, CSTF Director"
|
||||
nozoom="true"
|
||||
caption="Paul Payne, CSTF Director"
|
||||
class="max-h-80"
|
||||
>}}
|
||||
|
||||
</div>
|
||||
|
||||
## Contact
|
||||
|
||||
7405 168th St NE #621<br/>
|
||||
Redmond, WA 98052
|
||||
|
||||
+1 (206) 790-6707
|
@@ -1,9 +1,10 @@
|
||||
---
|
||||
title: "Articles"
|
||||
cardView: true
|
||||
cascade:
|
||||
showReadingTime: true
|
||||
showWordCount: true
|
||||
params:
|
||||
heroStyle: background
|
||||
heroStyle: big
|
||||
---
|
||||
|
||||
|
BIN
content/articles/arguments-against-centralization/featured.jpg
Normal file
After Width: | Height: | Size: 6.6 MiB |
@@ -1,6 +1,8 @@
|
||||
---
|
||||
title: Arguments Against Centralization
|
||||
date: 2025-07-06
|
||||
featureImageCaption: "Photo by Chad Davis, licensed under Creative Commons Attribution 2.0 (CC BY 2.0): https://www.flickr.com/photos/146321178@N05/49062863796. License link: https://creativecommons.org/licenses/by/2.0/"
|
||||
summary: While centralization can offer certain efficiencies and conveniences, we believes that the current level of concentration poses fundamental threats to individual autonomy, community resilience, and democratic governance. This resource provides evidence-based arguments that can be used in advocacy, education, and technology development contexts.
|
||||
---
|
||||
|
||||
## Executive Summary
|
||||
|
BIN
content/articles/digital-self-determination/featured.jpg
Normal file
After Width: | Height: | Size: 1.5 MiB |
131
content/articles/digital-self-determination/index.md
Normal file
@@ -0,0 +1,131 @@
|
||||
---
|
||||
title: Digital Self-Determination
|
||||
date: 2025-07-06
|
||||
summary: Digital self-determination is essential for individuals, communities, and civil society organizations to maintain control over their digital lives. This article explores the importance of digital self-determination, the threats it faces, and practical steps toward achieving it.
|
||||
featureImageCaption: "Photo by <a href=\"https://unsplash.com/@lemonvlad?utm_content=creditCopyText&utm_medium=referral&utm_source=unsplash\">Vladislav Klapin</a> on <a href=\"https://unsplash.com/photos/assorted-flag-YeO44yVTl20?utm_content=creditCopyText&utm_medium=referral&utm_source=unsplash\">Unsplash</a>"
|
||||
aliases:
|
||||
- /articles/why-digital-sovereignty-matters/
|
||||
updated: 2025-07-06
|
||||
---
|
||||
|
||||
## What is digital self-determination?
|
||||
|
||||
Digital self-determination is the ability of individuals, communities, and organizations to exercise meaningful control over their digital lives. It means having genuine authority over your data, the software you use, and the infrastructure that powers your online activities.
|
||||
|
||||
True digital self-determination includes:
|
||||
|
||||
- **Data control**: Determining what information you share, with whom, and under what conditions.
|
||||
- **Software freedom**: Using, examining, modifying, and sharing the code that runs your digital tools.
|
||||
- **Infrastructure ownership**: Having the ability to operate your own servers and services.
|
||||
- **Knowledge access**: Understanding how your technology works and being able to make informed choices.
|
||||
- **Governance participation**: Having a voice in how digital systems are designed and regulated.
|
||||
|
||||
Digital self-determination exists on a spectrum from complete dependency to full autonomy. The Civil Society Technology Foundation works toward shifting the balance away from centralized control and toward individual and community empowerment.
|
||||
|
||||
## The threat to digital self-determination
|
||||
|
||||
Most people today have very little digital self-determination. Consider your typical online experience:
|
||||
|
||||
- Your personal information is collected, analyzed, and monetized by corporations without meaningful consent.
|
||||
- The software you use is controlled by distant companies that can change terms, features, or access at any time.
|
||||
- Your content and connections depend on platforms that can censor, amplify, or de-rank what you share.
|
||||
- Critical services like email, calendars, and file storage are hosted on corporate infrastructure that you cannot inspect or control.
|
||||
- Algorithms shape what you see and how you communicate in ways designed to maximize corporate profit.
|
||||
|
||||
This lack of self-determination is not accidental--it's the result of business models and regulatory environments that incentivize centralization and data extraction. The trend toward concentration has accelerated as digital technology has become essential to nearly every aspect of modern life.
|
||||
|
||||
## Individuals need digital self-determination
|
||||
|
||||
For individuals, digital self-determination affects fundamental aspects of daily life:
|
||||
|
||||
### Privacy and security
|
||||
|
||||
Without digital self-determination, your personal information becomes vulnerable to exploitation. Your browsing history, location data, and private communications transform into corporate assets, traded and monetized without meaningful consent. Intimate details of your life face constant exposure through data breaches and surveillance, creating a permanent digital record that can be weaponized against you at any time.
|
||||
|
||||
Digital self-determination changes this dynamic fundamentally. When you control your digital infrastructure, you determine what information you share and with whom. Encryption and privacy-preserving tools become standard practice rather than specialized knowledge. You can maintain clear boundaries between different aspects of your digital life, protecting both your current privacy and your future autonomy.
|
||||
|
||||
### Personal autonomy
|
||||
|
||||
Without digital self-determination, your choices become systematically constrained by forces beyond your control. Algorithms shape not just what information you see, but what options appear available to you. Design patterns constantly nudge you toward behaviors that benefit platforms rather than yourself, while essential tasks increasingly require surrendering privacy as the price of participation.
|
||||
|
||||
Digital self-determination restores meaningful choice to your daily life. You can make decisions based on diverse information sources that you've actively chosen rather than algorithmic curation. Your tools serve your needs rather than exploiting your attention for profit. Most importantly, you can participate fully in digital society without surrendering your fundamental rights or personal dignity.
|
||||
|
||||
### Economic security
|
||||
|
||||
Without digital self-determination, you face growing economic vulnerabilities in an increasingly digital economy. Your skills and livelihood become dependent on proprietary platforms that can change terms or revoke access arbitrarily. Economic opportunities remain subject to the whims of platform policies, while the value you create online flows primarily to distant corporate owners rather than building your own wealth or community resources.
|
||||
|
||||
Digital self-determination builds genuine economic resilience. You develop portable skills that transcend any specific corporate platform, ensuring your capabilities remain valuable regardless of technological shifts. You can create and connect through systems you help govern, participating in cooperative economic models that distribute value more equitably among those who generate it.
|
||||
|
||||
## Communities need digital self-determination
|
||||
|
||||
Communities, from local neighborhoods to identity groups to civil society organizations, face particular challenges in the digital age.
|
||||
|
||||
### Community autonomy
|
||||
|
||||
Without digital self-determination, communities lose fundamental autonomy as their governance structures become subordinated to platform rules and algorithms. Local knowledge and cultural context get systematically flattened by global platforms designed for mass consumption rather than community specificity. Meanwhile, community resources flow steadily toward distant corporations instead of circulating locally to strengthen community bonds and capacity.
|
||||
|
||||
Digital self-determination enables communities to truly thrive on their own terms. They can design digital spaces that authentically reflect local values and meet specific community needs. Community standards and practices remain intact without corporate override or algorithmic interference. Most importantly, digital infrastructure becomes a genuine community asset that builds collective wealth and capacity rather than extracting value.
|
||||
|
||||
### Resilience against censorship
|
||||
|
||||
Without digital self-determination, communities face systematic silencing through mechanisms that appear neutral but consistently harm marginalized voices. Platform policies regularly restrict legitimate speech, with enforcement patterns that disproportionately affect those with the least institutional power. Commercial content moderation systems cannot possibly reflect the nuance and context of diverse community standards, leading to decisions that undermine rather than protect community discourse.
|
||||
|
||||
Digital self-determination preserves community voice through infrastructure independence. Communities can operate their own communication systems that resist external censorship while developing content moderation approaches appropriate to their specific context and values. They maintain fallback channels that cannot be easily blocked, ensuring continuity of communication even under pressure.
|
||||
|
||||
### Collective memory
|
||||
|
||||
Without digital self-determination, community history becomes dangerously precarious as it depends entirely on corporate platforms with their own priorities and lifespans. When platforms shut down or change direction, they take irreplaceable community archives with them. Algorithmic sorting continuously buries historically important content, while corporate priorities rather than community values determine what gets preserved for future generations.
|
||||
|
||||
Digital self-determination strengthens cultural continuity by giving communities control over their own historical record. They can maintain archives and documentation according to their own standards and priorities. Knowledge transfer between generations happens on community terms rather than through corporate intermediaries. Digital artifacts remain accessible and meaningful even as underlying technologies evolve, ensuring that community memory persists across technological transitions.
|
||||
|
||||
## Civil society needs digital self-determination
|
||||
|
||||
For the non-profit and non-governmental bodies that form the backbone of democratic society, digital self-determination is particularly crucial.
|
||||
|
||||
### Independence from corporate control
|
||||
|
||||
Without digital self-determination, civil society becomes fundamentally compromised in its mission and effectiveness. NGOs find themselves forced to accept surveillance and data extraction as the price of accessing essential digital tools, undermining their ability to protect the communities they serve. Advocacy organizations become dependent on platforms that may actively oppose their values, while corporate philanthropy increasingly shapes which digital infrastructure gets built, prioritizing donor interests over community needs.
|
||||
|
||||
Digital self-determination allows civil society to maintain its integrity and independence. Organizations can choose and use tools that genuinely align with their mission and values rather than contradicting them. Advocacy work can proceed without platform-imposed limitations that undermine effectiveness, while infrastructure development responds to actual community needs rather than market incentives or corporate priorities.
|
||||
|
||||
### Operational security
|
||||
|
||||
Without digital self-determination, civil society organizations face escalating security risks that threaten their core work. Sensitive communications and confidential data must reside on vulnerable commercial platforms designed for profit rather than protection. Critical organizational workflows become dependent on services that can be withdrawn or modified without notice, while organizational data gets integrated into commercial AI training sets without consent or oversight.
|
||||
|
||||
Digital self-determination dramatically improves operational security by returning control to the organizations themselves. They can maintain direct oversight of sensitive information rather than trusting corporate intermediaries. Communication channels become resistant to surveillance and interference, while infrastructure resilience protects against both technical disruption and political pressure.
|
||||
|
||||
### Ethical alignment
|
||||
|
||||
Without digital self-determination, civil society faces deep contradictions that undermine moral authority and organizational effectiveness. Organizations advocating for human rights often find themselves using tools that systematically violate those same rights. Digital workflows frequently contradict stated organizational values, while resource dependencies on extractive platforms compromise advocacy positions and limit strategic options.
|
||||
|
||||
Digital self-determination enables authentic alignment between values and practice. Technology choices can reflect and actively reinforce organizational principles rather than undermining them. Digital infrastructure embodies the world organizations are working to create, demonstrating alternative possibilities rather than perpetuating existing problems. Most importantly, consistency between means and ends strengthens moral authority and makes advocacy more credible and effective.
|
||||
|
||||
## The path to digital self-determination
|
||||
|
||||
Achieving greater digital self-determination isn't an all-or-nothing proposition. It's a journey with practical steps that individuals and organizations can take.
|
||||
|
||||
### For individuals
|
||||
|
||||
1. **Start with awareness**: Learn how your current tools work and what alternatives exist.
|
||||
2. **Make incremental changes**: Replace proprietary services with open alternatives one by one.
|
||||
3. **Join communities of practice**: Connect with others on similar journeys.
|
||||
4. **Develop technical literacy**: Build skills to maintain more of your own technology.
|
||||
5. **Support and advocate**: Contribute to projects and policies that promote digital self-determination.
|
||||
|
||||
### For organizations
|
||||
|
||||
1. **Audit current dependencies**: Understand where you lack digital self-determination.
|
||||
2. **Prioritize critical systems**: Focus first on communications and sensitive data.
|
||||
3. **Invest in capacity**: Build technical skills within your organization.
|
||||
4. **Build community infrastructure**: Partner with similar organizations to share resources.
|
||||
5. **Center self-determination in planning**: Make digital autonomy a strategic priority.
|
||||
|
||||
The Civil Society Technology Foundation's [Wild Cloud project](/projects/wild-cloud) provides a reference implementation for individuals, communities, and organizations seeking to regain digital self-determination. It demonstrates that practical steps toward greater independence are possible today, even with limited resources.
|
||||
|
||||
## Conclusion
|
||||
|
||||
Digital self-determination isn't a luxury, it's increasingly essential for meaningful participation in society, for the health of communities, and for the independence of civil society. As digital technology becomes more deeply embedded in every aspect of our lives, the question of who controls that technology becomes more urgent.
|
||||
|
||||
The challenges are significant, but practical alternatives exist. By taking incremental steps toward greater self-determination, we can build a digital future that enhances rather than undermines human agency, community resilience, and democratic values.
|
||||
|
||||
Digital self-determination matters because it determines whether technology will serve as a tool of liberation or a mechanism of control. The choice between these futures is still ours to make--if we act with purpose and clarity about what's at stake.
|
BIN
content/articles/independent-technology/featured.jpg
Normal file
After Width: | Height: | Size: 1.8 MiB |
Before Width: | Height: | Size: 936 KiB |
@@ -1,77 +1,79 @@
|
||||
---
|
||||
title: The Importance of Independent Technology in Civil Society
|
||||
date: 2025-07-06
|
||||
summary: Independent technology is essential for civil society to thrive in the digital age. This essay explores the problems of centralization, the benefits of digital self-determination, and how we can build a more equitable and resilient digital future.
|
||||
featureImageCaption: "Photo by <a href=\"https://unsplash.com/@sahrulfikrilaitupa?utm_content=creditCopyText&utm_medium=referral&utm_source=unsplash\">Sahrul Laitupa</a> on <a href=\"https://unsplash.com/photos/a-young-man-sitting-at-a-desk-with-headphones-on-64ONLGrc0HQ?utm_content=creditCopyText&utm_medium=referral&utm_source=unsplash\">Unsplash</a>"
|
||||
---
|
||||
|
||||
## Introduction
|
||||
|
||||
Independent technology—software and hardware developed outside corporate and government control, owned and operated by the people who use it—is essential to the flourishing of civil society in the digital age. As our social, political, and economic lives increasingly move online, the question of who controls these digital spaces has profound implications for democracy, individual autonomy, and collective well-being.
|
||||
Independent technology is software and hardware developed outside corporate and government control, owned and operated by the people who use it. We are so accustomed to being dependent on commercial platforms and services that we fail to recognize the alternatives; however, independent technology is essential to the flourishing of civil society in the digital age. As our social, political, and economic lives increasingly move online, the question of who controls these digital spaces has profound implications for democracy, individual autonomy, and collective well-being.
|
||||
|
||||
The Civil Society Technology Foundation (CSTF) contends that truly independent technology is not just preferable but necessary for addressing the growing crises of digital rights, privacy, autonomy, and democratic participation. When technology serves its users rather than distant shareholders or state interests, it becomes a foundation for a more equitable, free, and resilient society.
|
||||
|
||||
The concentration of digital power in the hands of a few corporations and governments has reached a critical threshold where it now threatens the very foundations of civil society. This essay examines why independent technology matters, what's at stake, and how we can build toward digital self-determination.
|
||||
|
||||
## The Problem: Centralization of Digital Power
|
||||
## The problem: centralization of digital power
|
||||
|
||||
Our digital infrastructure—from communication platforms to cloud computing services, from operating systems to artificial intelligence models—has become increasingly centralized under the control of a handful of global corporations and powerful states. This concentration creates systemic vulnerabilities and power imbalances that undermine individual autonomy and collective agency.
|
||||
Our digital infrastructure--from communication platforms to cloud computing services, from operating systems to artificial intelligence models--has become increasingly centralized under the control of a handful of global corporations and powerful states. This concentration creates systemic vulnerabilities and power imbalances that undermine individual autonomy and collective agency.
|
||||
|
||||
### Corporate Capture
|
||||
### Corporate capture
|
||||
|
||||
The corporate capture of our digital commons has proceeded rapidly, with alarming consequences:
|
||||
The corporate capture of our digital commons has proceeded rapidly, with alarming consequences.
|
||||
|
||||
- **Infrastructure Consolidation**: Major technology companies have consolidated control over fundamental digital infrastructure, from cloud services to communication platforms. Just five companies—Alphabet, Amazon, Apple, Meta, and Microsoft—now control much of the infrastructure that powers our digital lives, creating unprecedented concentrations of power.
|
||||
Major technology companies have consolidated control over fundamental digital infrastructure, from cloud services to communication platforms. Just five companies--Alphabet, Amazon, Apple, Meta, and Microsoft--now control much of the infrastructure that powers our digital lives, creating unprecedented concentrations of power.
|
||||
|
||||
- **Misaligned Incentives**: Commercial imperatives prioritize engagement, data collection, and profit over user well-being. When a service is "free," users become the product, with their attention and personal data monetized through surveillance-based advertising. As one tech executive famously noted, "If you're not paying for the product, you are the product."
|
||||
Commercial imperatives prioritize engagement, data collection, and profit over user well-being. When a service is "free," users become the product, with their attention and personal data monetized through surveillance-based advertising. As one tech executive famously noted, "If you're not paying for the product, you are the product."
|
||||
|
||||
- **Extractive Relationships**: Platform monopolies create harmful dependencies and extract value from communities. Local businesses, independent creators, and civil society organizations increasingly rely on centralized platforms that extract fees, impose arbitrary rules, and can unilaterally change terms of service.
|
||||
Platform monopolies create harmful dependencies and extract value from communities. Local businesses, independent creators, and civil society organizations increasingly rely on centralized platforms that extract fees, impose arbitrary rules, and can unilaterally change terms of service.
|
||||
|
||||
- **Artificial Scarcity**: Corporate technology creates artificial scarcity in what should be abundant digital resources. Digital goods can be replicated at near-zero marginal cost, yet subscription models, paywalls, and intellectual property regimes create artificial barriers to access and use.
|
||||
Corporate technology creates artificial scarcity in what should be abundant digital resources. Digital goods can be replicated at near-zero marginal cost, yet subscription models, paywalls, and intellectual property regimes create artificial barriers to access and use.
|
||||
|
||||
- **Personalization as Control**: Algorithmic "personalization" becomes a mechanism for behavioral manipulation and preference shaping, optimizing for commercial outcomes rather than user agency or collective well-being. These systems are designed to maximize time spent, interaction, and consumption—not to enhance human flourishing.
|
||||
Algorithmic "personalization" becomes a mechanism for behavioral manipulation and preference shaping, optimizing for commercial outcomes rather than user agency or collective well-being. These systems are designed to maximize time spent, interaction, and consumption, not to enhance human flourishing.
|
||||
|
||||
Our public messaging infrastructure should not be in the hands of any individual, such as Elon Musk or Mark Zuckerberg, where a single person's whims can reshape the digital public sphere that billions of people rely on.
|
||||
|
||||
### Government Overreach
|
||||
### Government overreach
|
||||
|
||||
As digital systems become central to civic life, governments have expanded their control in problematic ways:
|
||||
As digital systems become central to civic life, governments have expanded their control in problematic ways.
|
||||
|
||||
- **Mass Surveillance**: State surveillance undermines civil liberties and democratic processes. The capabilities revealed by Edward Snowden and subsequent whistleblowers demonstrate how digital infrastructure has enabled unprecedented monitoring of citizens, activists, and journalists without appropriate democratic oversight.
|
||||
_Government regulatory capture_ of technology often reinforces corporate power rather than constraining it. Complex regulatory frameworks crafted with industry input frequently protect incumbents while raising barriers to entry for smaller, independent alternatives.
|
||||
|
||||
- **Regulatory Capture**: Government regulation of technology often reinforces corporate power rather than constraining it. Complex regulatory frameworks crafted with industry input frequently protect incumbents while raising barriers to entry for smaller, independent alternatives.
|
||||
Public services increasingly rely on proprietary technologies, creating long-term vulnerabilities within _overdependent relationships_. When governments outsource core functions to proprietary platforms, they sacrifice self-determination and create risky dependencies that undermine democratic accountability.
|
||||
|
||||
- **Dependency Relationships**: Public services increasingly rely on proprietary technologies, creating long-term vulnerabilities. When governments outsource core functions to proprietary platforms, they sacrifice sovereignty and create risky dependencies that undermine democratic accountability.
|
||||
_Mass state surveillance_ undermines civil liberties and democratic processes. The capabilities revealed by Edward Snowden and subsequent whistle-blowers demonstrate how digital infrastructure has enabled unprecedented monitoring of citizens, activists, and journalists without appropriate democratic oversight.
|
||||
|
||||
- **Security State Expansion**: National security justifications often mask anti-democratic control mechanisms. The post-9/11 expansion of digital surveillance and the ongoing use of security arguments to justify technological control demonstrate how nominal protection can lead to substantial harm.
|
||||
National security justifications often mask anti-democratic control mechanisms. The post-9/11 expansion of digital surveillance, the current expansion of surveillance technologies in response to civil protests of immigration enforcement, and the ongoing use of security arguments to justify technological control demonstrate how nominal protection can lead to substantial harm.
|
||||
|
||||
- **Corporate-State Alliances**: The line between corporate and state power blurs as they develop symbiotic relationships. Tech companies gain market access and regulatory advantages, while states gain access to data and infrastructure for surveillance and control.
|
||||
The line between corporate and state power blurs as _corporate-state alliances_ develop. Tech companies gain market access and regulatory advantages, while states gain access to data and infrastructure for surveillance and control.
|
||||
|
||||
Government is too often compromised by corporate special interests, creating a cycle where those with the most resources shape both market and regulatory outcomes.
|
||||
|
||||
### Systemic Failures
|
||||
### Systemic failures
|
||||
|
||||
These problems aren't just individual failures but represent systemic issues with how digital technology is currently structured:
|
||||
These problems aren't just individual failures but represent systemic issues with how digital technology is currently structured.
|
||||
|
||||
- **Inequality Amplification**: Concentration of technological power amplifies existing social inequalities. Those with fewer resources have less privacy, less control, and are more vulnerable to exploitation in digital systems designed primarily for profit maximization.
|
||||
Concentration of technological power _amplifies existing social inequalities_. Those with fewer resources have less privacy, less control, and are more vulnerable to exploitation in digital systems designed primarily for profit maximization.
|
||||
|
||||
- **Manipulation Incentives**: Ad-based business models incentivize psychological manipulation rather than service. The imperative to maximize "engagement" leads to the amplification of divisive, emotional content and the creation of addictive design patterns.
|
||||
Ad-based business models incentivize _psychological manipulation_ rather than service. The imperative to maximize "engagement" leads to the amplification of divisive, emotional content and the creation of addictive design patterns.
|
||||
|
||||
- **Innovation Barriers**: Proprietary systems create artificial barriers to innovation and adaptation. When core technologies are locked behind patents, trade secrets, and closed interfaces, communities cannot adapt them to their specific needs or improve upon them.
|
||||
Proprietary systems create _artificial barriers to innovation_ and adaptation. When core technologies are locked behind patents, trade secrets, and closed interfaces, communities cannot adapt them to their specific needs or improve upon them.
|
||||
|
||||
- **Infrastructure Vulnerabilities**: Critical infrastructure becomes vulnerable to both market and geopolitical forces. When essential digital services are controlled by profit-seeking entities or potentially hostile governments, they become points of leverage that can be exploited during conflicts or crises.
|
||||
Critical _infrastructure becomes vulnerable_ to both market and geopolitical forces. When essential digital services are controlled by profit-seeking entities or potentially hostile governments, they become points of leverage that can be exploited during conflicts or crises.
|
||||
|
||||
- **Externalized Harms**: The costs of digital systems are often externalized onto users and society, from privacy violations to psychological harms to environmental impacts. These are treated as "external" to the core transaction, though they represent real and significant costs.
|
||||
The _harms_ of digital systems are often _externalized_ onto users and society, from privacy violations to psychological harms to environmental impacts. These are treated as "external" to the core transaction, though they represent real and significant costs.
|
||||
|
||||
The structure of our digital infrastructure has evolved rapidly, without sufficient consideration of its impacts on civil society, democracy, and human flourishing. The consequence is a digital ecosystem that systematically extracts value from communities while undermining the conditions for collective agency.
|
||||
|
||||
## The Solution: Digital Self-Determination
|
||||
## The solution: digital self-determination
|
||||
|
||||
In response to these challenges, we need a vision of digital self-determination—where individuals and communities can meaningfully control their technological destinies. This isn't merely a technical project but a social and political one, grounded in core principles that put human flourishing at the center of technological development.
|
||||
|
||||
### Core Principles of Independent Technology
|
||||
### Core principles of independent technology
|
||||
|
||||
Independent technology is guided by principles that prioritize human agency and community well-being:
|
||||
|
||||
- **User Sovereignty**: Control over personal data and computing environments must rest with users. People should own their data, determine how it's used, and maintain authority over the devices and services they rely on. Consent should be meaningful, informed, and revocable.
|
||||
- **User Self-determination**: Control over personal data and computing environments must rest with users. People should own their data, determine how it's used, and maintain authority over the devices and services they rely on. Consent should be meaningful, informed, and revocable.
|
||||
|
||||
- **Open Systems**: Technology should be transparent, modifiable, and freely available. Open-source software, open standards, and open hardware create the conditions for inspection, improvement, and adaptation by communities rather than just original creators.
|
||||
|
||||
@@ -81,7 +83,7 @@ Independent technology is guided by principles that prioritize human agency and
|
||||
|
||||
- **Democratic Governance**: The rules, policies, and development priorities of digital systems should be determined through democratic processes. Those affected by technological systems should have a voice in how they function and evolve.
|
||||
|
||||
### Benefits to Civil Society
|
||||
### Benefits to civil society
|
||||
|
||||
Independent technology creates substantial benefits for civil society organizations and the communities they serve:
|
||||
|
||||
@@ -99,11 +101,11 @@ Independent technology creates substantial benefits for civil society organizati
|
||||
|
||||
Most importantly, independent technology simply works better for the specific needs of civil society. The quality can be higher because it's designed for use rather than for market dominance or data extraction.
|
||||
|
||||
## The Path Forward: Building Digital Commons
|
||||
## The path forward: building digital commons
|
||||
|
||||
Building viable alternatives to corporate-controlled technology requires both technical and social infrastructure. We need robust, accessible tools and the organizational structures to sustain them.
|
||||
|
||||
### Technical Foundations
|
||||
### Technical foundations
|
||||
|
||||
The technical foundations of digital commons include:
|
||||
|
||||
@@ -119,7 +121,7 @@ The technical foundations of digital commons include:
|
||||
|
||||
These technical elements aren't merely features but fundamental design principles that shape what technology can and cannot do, who it serves, and how power flows within digital systems.
|
||||
|
||||
### Social Foundations
|
||||
### Social foundations
|
||||
|
||||
Technical infrastructure alone is insufficient; we also need social structures to support and sustain independent technology:
|
||||
|
||||
@@ -135,11 +137,11 @@ Technical infrastructure alone is insufficient; we also need social structures t
|
||||
|
||||
The social dimension of independent technology is not secondary but fundamental to its success. Technical solutions divorced from community governance and capacity building will inevitably drift toward centralization and exploitation.
|
||||
|
||||
## Artificial Intelligence: A Critical Inflection Point
|
||||
## Artificial intelligence: a critical inflection point
|
||||
|
||||
The rapid development of artificial intelligence represents both a profound challenge and a potential opportunity for digital self-determination. How AI evolves in the coming years will shape the balance of power in digital spaces for decades to come.
|
||||
|
||||
### The Challenge
|
||||
### The challenge of AI
|
||||
|
||||
AI development currently reinforces centralization and inequality:
|
||||
|
||||
@@ -155,7 +157,7 @@ AI development currently reinforces centralization and inequality:
|
||||
|
||||
These trends threaten to create a new era of technological dependency more profound than any we've seen before, where a few entities control the fundamental tools of knowledge work, cultural production, and computational reasoning.
|
||||
|
||||
### The Opportunity
|
||||
### The opportunity of AI
|
||||
|
||||
Despite these challenges, AI also presents significant opportunities for digital self-determination:
|
||||
|
||||
@@ -171,40 +173,32 @@ Despite these challenges, AI also presents significant opportunities for digital
|
||||
|
||||
The path we choose with AI—toward further centralization or toward democratization—will significantly shape the future of digital self-determination. By supporting open, efficient, and community-governed approaches to AI, we can ensure that these powerful tools enhance rather than undermine human agency and collective well-being.
|
||||
|
||||
## Case Study: Wild Cloud
|
||||
## Case study: Wild Cloud
|
||||
|
||||
The Civil Society Technology Foundation's Wild Cloud project exemplifies the principles of independent technology in practice. This reference implementation demonstrates how civil society organizations can regain digital sovereignty through practical, accessible tools.
|
||||
The Civil Society Technology Foundation's [Wild Cloud project](/projects/wild-cloud/) exemplifies the principles of independent technology in practice. This reference implementation demonstrates how civil society can regain digital self-determination through practical, accessible tools.
|
||||
|
||||
Wild Cloud provides:
|
||||
Wild Cloud enables individuals, communities, and organizations to run their own email, calendar, file storage, website, and collaboration tools on infrastructure they control, reducing dependency on corporate platforms. Services under user control ensure sensitive information remains protected from surveillance and exploitation.
|
||||
|
||||
- **Self-Hosted Services**: Organizations can run their own email, calendar, file storage, website, and collaboration tools on infrastructure they control, reducing dependency on corporate platforms.
|
||||
Despite the complexity of the underlying systems, simplified deployment tools make it feasible for organizations with limited technical capacity to set up and maintain their own infrastructure. A network of practitioners provides documentation, troubleshooting assistance, and ongoing development, ensuring that organizations aren't alone in their journey toward digital self-determination.
|
||||
|
||||
- **Privacy by Design**: All services prioritize data minimization, encryption, and user control, ensuring that sensitive information remains protected from surveillance and exploitation.
|
||||
Wild Cloud services support open standards and federation protocols, allowing organizations to communicate with others while maintaining their autonomy and control. This practical approach to digital self-determination demonstrates that independence from corporate platforms is not merely theoretical but achievable with current technology and modest resources. By making these tools more accessible and providing support for their adoption, we create pathways to broader digital self-determination.
|
||||
|
||||
- **Simplified Deployment**: Despite the complexity of the underlying systems, simplified deployment tools make it feasible for organizations with limited technical capacity to set up and maintain their own infrastructure.
|
||||
|
||||
- **Community Support**: A network of practitioners provides documentation, troubleshooting assistance, and ongoing development, ensuring that organizations aren't alone in their journey toward digital self-determination.
|
||||
|
||||
- **Federation**: All services support open standards and federation protocols, allowing organizations to communicate with others while maintaining their autonomy and control.
|
||||
|
||||
This practical approach to digital sovereignty demonstrates that independence from corporate platforms is not merely theoretical but achievable with current technology and modest resources. By making these tools more accessible and providing support for their adoption, we create pathways to broader digital self-determination.
|
||||
|
||||
## Conclusion: A Call to Action
|
||||
## A call to action
|
||||
|
||||
The choice is not between technology and its absence, but between technology that serves its users and technology that serves other masters. Civil society requires digital tools that enhance rather than undermine its core values of autonomy, cooperation, and democratic governance.
|
||||
|
||||
Independent technology is not a luxury or a theoretical preference—it is a practical necessity for maintaining the conditions that make civil society possible. When our digital infrastructure is captured by commercial or state interests, the spaces for independent association, expression, and collective action narrow dangerously.
|
||||
Independent technology is not a luxury or a theoretical preference, it is a practical necessity for maintaining the conditions that make civil society possible. When our digital infrastructure is captured by commercial or state interests, the spaces for independent association, expression, and collective action narrow dangerously.
|
||||
|
||||
By investing in independent technology, we create the possibility of digital spaces that reflect and reinforce the values of civil society rather than market or state power. This is not merely a technical challenge but a social and political imperative that requires both visionary thinking and practical action.
|
||||
|
||||
The path forward requires:
|
||||
|
||||
1. **Individual Action**: Moving personal and organizational data to self-hosted or community-governed platforms
|
||||
2. **Collective Investment**: Supporting the development and maintenance of digital commons through funding, contribution, and advocacy
|
||||
3. **Policy Reform**: Advancing regulatory frameworks that limit surveillance, protect privacy, and ensure interoperability
|
||||
4. **Educational Initiatives**: Building technical literacy and capacity for digital self-determination
|
||||
5. **Alternative Models**: Developing and demonstrating viable alternatives to the current dominant paradigms
|
||||
1. **Individual Action**: Moving personal and organizational data to self-hosted or community-governed platforms.
|
||||
2. **Collective Investment**: Supporting the development and maintenance of digital commons through funding, contribution, and advocacy.
|
||||
3. **Policy Reform**: Advancing regulatory frameworks that limit surveillance, protect privacy, and ensure interoperability.
|
||||
4. **Educational Initiatives**: Building technical literacy and capacity for digital self-determination.
|
||||
5. **Alternative Models**: Developing and demonstrating viable alternatives to the current dominant paradigms.
|
||||
|
||||
An open Internet is a human right. Our digital commons—the shared spaces, tools, and resources that enable connection, creation, and collective action—must be protected from capture and enclosure, whether by corporate monopolies or authoritarian states.
|
||||
An open Internet is a human right. Our digital commons must be protected from capture and enclosure, whether by corporate monopolies or authoritarian states.
|
||||
|
||||
The Civil Society Technology Foundation invites individuals, organizations, and communities to join in building and maintaining the digital commons our shared future requires. By reclaiming control over our technological infrastructure, we take a crucial step toward a more just, democratic, and flourishing society.
|
||||
|
BIN
content/articles/position-statements/featured.jpg
Normal file
After Width: | Height: | Size: 3.9 MiB |
@@ -1,6 +1,9 @@
|
||||
---
|
||||
title: Position Statements
|
||||
date: 2025-07-06
|
||||
weight: 60
|
||||
featureImageCaption: "Photo by <a href=\"https://unsplash.com/@nasa?utm_content=creditCopyText&utm_medium=referral&utm_source=unsplash\">NASA</a> on <a href=\"https://unsplash.com/photos/satellite-view-of-earths-surface-_SFJhRPzJHs?utm_content=creditCopyText&utm_medium=referral&utm_source=unsplash\">Unsplash</a>"
|
||||
|
||||
---
|
||||
|
||||
The Civil Society Technology Foundation (CSTF) holds the following positions regarding technology, digital rights, and civil society. These statements represent our core beliefs and guide our work.
|
Before Width: | Height: | Size: 1.3 MiB |
@@ -1,198 +0,0 @@
|
||||
---
|
||||
title: Why Digital Sovereignty Matters
|
||||
date: 2025-07-06
|
||||
---
|
||||
|
||||
## What Is Digital Sovereignty?
|
||||
|
||||
Digital sovereignty is the ability of individuals, communities, and organizations to exercise meaningful control over their digital lives. It means having genuine authority over your data, the software you use, and the infrastructure that powers your online activities.
|
||||
|
||||
True digital sovereignty includes:
|
||||
|
||||
- **Data control**: Determining what information you share, with whom, and under what conditions
|
||||
- **Software freedom**: Using, examining, modifying, and sharing the code that runs your digital tools
|
||||
- **Infrastructure ownership**: Having the ability to operate your own servers and services
|
||||
- **Knowledge access**: Understanding how your technology works and being able to make informed choices
|
||||
- **Governance participation**: Having a voice in how digital systems are designed and regulated
|
||||
|
||||
Digital sovereignty exists on a spectrum from complete dependency to full autonomy. The Civil Society Technology Foundation works toward shifting the balance away from centralized control and toward individual and community empowerment.
|
||||
|
||||
## Why Sovereignty Is Under Threat
|
||||
|
||||
Most people today have very little digital sovereignty. Consider your typical online experience:
|
||||
|
||||
- Your personal information is collected, analyzed, and monetized by corporations without meaningful consent
|
||||
- The software you use is controlled by distant companies that can change terms, features, or access at any time
|
||||
- Your content and connections depend on platforms that can censor, amplify, or derank what you share
|
||||
- Critical services like email, calendars, and file storage are hosted on corporate infrastructure that you cannot inspect or control
|
||||
- Algorithms shape what you see and how you communicate in ways designed to maximize corporate profit
|
||||
|
||||
This lack of sovereignty is not accidental—it's the result of business models and regulatory environments that incentivize centralization and data extraction. The trend toward concentration has accelerated as digital technology has become essential to nearly every aspect of modern life.
|
||||
|
||||
## Why Digital Sovereignty Matters for Individuals
|
||||
|
||||
For individuals, digital sovereignty affects fundamental aspects of daily life:
|
||||
|
||||
### Privacy and Security
|
||||
|
||||
Without digital sovereignty, your personal information is vulnerable:
|
||||
|
||||
- Your browsing history, location data, and private communications become corporate assets
|
||||
- Intimate details of your life can be exposed through data breaches or surveillance
|
||||
- Your digital footprint creates a permanent record that can be used against you
|
||||
|
||||
With digital sovereignty, you can:
|
||||
|
||||
- Determine what information you share and with whom
|
||||
- Use encryption and privacy-preserving tools as a matter of course
|
||||
- Maintain boundaries between different aspects of your digital life
|
||||
|
||||
### Personal Autonomy
|
||||
|
||||
Without digital sovereignty, your choices are constrained:
|
||||
|
||||
- Algorithms shape what information you see and what options seem available
|
||||
- Design patterns nudge you toward behaviors that benefit platforms, not yourself
|
||||
- Essential tasks increasingly require using services that compromise your privacy
|
||||
|
||||
With digital sovereignty, you gain freedom:
|
||||
|
||||
- Make decisions based on diverse information sources you've chosen
|
||||
- Use tools designed to serve your needs rather than exploit your attention
|
||||
- Participate online without surrendering your rights or dignity
|
||||
|
||||
### Economic Security
|
||||
|
||||
Without digital sovereignty, you face growing vulnerabilities:
|
||||
|
||||
- Skills and livelihoods become dependent on proprietary platforms
|
||||
- Your access to economic opportunities can be arbitrarily restricted
|
||||
- The value you create online is captured primarily by platform owners
|
||||
|
||||
With digital sovereignty, you build resilience:
|
||||
|
||||
- Develop portable skills that aren't tied to specific corporate platforms
|
||||
- Create and connect through systems you help govern
|
||||
- Participate in cooperative economic models that distribute value more equitably
|
||||
|
||||
## Why Digital Sovereignty Matters for Communities
|
||||
|
||||
Communities—from local neighborhoods to identity groups to civil society organizations—face particular challenges in the digital age:
|
||||
|
||||
### Community Autonomy
|
||||
|
||||
Without digital sovereignty, communities lose self-determination:
|
||||
|
||||
- Community governance gets usurped by platform rules and algorithms
|
||||
- Local knowledge and context get flattened by global platforms
|
||||
- Community resources flow to distant corporations rather than circulating locally
|
||||
|
||||
With digital sovereignty, communities thrive:
|
||||
|
||||
- Design digital spaces that reflect local values and needs
|
||||
- Maintain community standards and practices without corporate override
|
||||
- Build digital infrastructure as a community asset
|
||||
|
||||
### Resilience Against Censorship
|
||||
|
||||
Without digital sovereignty, communities face silencing:
|
||||
|
||||
- Platform policies can restrict legitimate speech, especially from marginalized groups
|
||||
- Arbitrary enforcement affects those with the least power most severely
|
||||
- Commercial content moderation cannot reflect the nuance of community standards
|
||||
|
||||
With digital sovereignty, communities maintain their voice:
|
||||
|
||||
- Run their own communication infrastructure resistant to external censorship
|
||||
- Develop community-appropriate content moderation
|
||||
- Create fallback channels that cannot be easily blocked
|
||||
|
||||
### Collective Memory
|
||||
|
||||
Without digital sovereignty, community history becomes precarious:
|
||||
|
||||
- When platforms shut down, they take community archives with them
|
||||
- Algorithmic sorting buries historically important content
|
||||
- Corporate priorities determine what gets preserved
|
||||
|
||||
With digital sovereignty, cultural continuity strengthens:
|
||||
|
||||
- Communities maintain their own archives and historical records
|
||||
- Knowledge transfer between generations happens on community terms
|
||||
- Digital artifacts remain accessible even as technologies change
|
||||
|
||||
## Why Digital Sovereignty Matters for Civil Society
|
||||
|
||||
For civil society organizations—the non-profit and non-governmental bodies that form the backbone of democratic society—digital sovereignty is particularly crucial:
|
||||
|
||||
### Independence from Corporate Control
|
||||
|
||||
Without digital sovereignty, civil society becomes compromised:
|
||||
|
||||
- NGOs must accept surveillance and data extraction to use essential tools
|
||||
- Advocacy organizations depend on platforms that may not share their values
|
||||
- Corporate philanthropy shapes which digital infrastructure gets built
|
||||
|
||||
With digital sovereignty, civil society maintains integrity:
|
||||
|
||||
- Organizations use tools aligned with their mission and values
|
||||
- Advocacy can proceed without platform-imposed limitations
|
||||
- Infrastructure development responds to community needs, not market incentives
|
||||
|
||||
### Operational Security
|
||||
|
||||
Without digital sovereignty, organizations face serious risks:
|
||||
|
||||
- Sensitive communications and data reside on vulnerable commercial platforms
|
||||
- Critical workflows depend on services that can be withdrawn without notice
|
||||
- Organization data becomes integrated into commercial AI training sets
|
||||
|
||||
With digital sovereignty, operations become more secure:
|
||||
|
||||
- Organizations maintain control over sensitive information
|
||||
- Communication channels resist surveillance
|
||||
- Infrastructure resilience protects against disruption
|
||||
|
||||
### Ethical Alignment
|
||||
|
||||
Without digital sovereignty, civil society faces contradictions:
|
||||
|
||||
- Organizations advocating for rights often use tools that undermine those rights
|
||||
- Digital workflows can contradict organizational values
|
||||
- Resource dependencies compromise advocacy positions
|
||||
|
||||
With digital sovereignty, values and practices align:
|
||||
|
||||
- Technology choices reflect and reinforce organizational principles
|
||||
- Digital infrastructure embodies the world organizations are working to create
|
||||
- Consistency between means and ends strengthens moral authority
|
||||
|
||||
## The Path to Digital Sovereignty
|
||||
|
||||
Achieving greater digital sovereignty isn't an all-or-nothing proposition. It's a journey with practical steps that individuals and organizations can take:
|
||||
|
||||
### For Individuals
|
||||
|
||||
1. **Start with awareness**: Learn how your current tools work and what alternatives exist
|
||||
2. **Make incremental changes**: Replace proprietary services with open alternatives one by one
|
||||
3. **Join communities of practice**: Connect with others on similar journeys
|
||||
4. **Develop technical literacy**: Build skills to maintain more of your own technology
|
||||
5. **Support and advocate**: Contribute to projects and policies that promote digital sovereignty
|
||||
|
||||
### For Organizations
|
||||
|
||||
1. **Audit current dependencies**: Understand where you lack digital sovereignty
|
||||
2. **Prioritize critical systems**: Focus first on communications and sensitive data
|
||||
3. **Invest in capacity**: Build technical skills within your organization
|
||||
4. **Build community infrastructure**: Partner with similar organizations to share resources
|
||||
5. **Center sovereignty in planning**: Make digital autonomy a strategic priority
|
||||
|
||||
The Civil Society Technology Foundation's Wild Cloud project provides a reference implementation for organizations seeking to regain digital sovereignty. It demonstrates that practical steps toward greater independence are possible today, even with limited resources.
|
||||
|
||||
## Conclusion
|
||||
|
||||
Digital sovereignty isn't a luxury—it's increasingly essential for meaningful participation in society, for the health of communities, and for the independence of civil society. As digital technology becomes more deeply embedded in every aspect of our lives, the question of who controls that technology becomes more urgent.
|
||||
|
||||
The challenges are significant, but practical alternatives exist. By taking incremental steps toward greater sovereignty, we can build a digital future that enhances rather than undermines human agency, community resilience, and democratic values.
|
||||
|
||||
Digital sovereignty matters because it determines whether technology will serve as a tool of liberation or a mechanism of control. The choice between these futures is still ours to make—if we act with purpose and clarity about what's at stake.
|
@@ -1,12 +1,17 @@
|
||||
---
|
||||
title: Contribute
|
||||
summary: "Join us in building a strong technical foundation for civil society. Learn how you can contribute through donations, volunteering, and community engagement."
|
||||
date: 2025-01-15
|
||||
showDate: false
|
||||
showWordCount: false
|
||||
showReadingTime: false
|
||||
---
|
||||
|
||||
{{< lead >}}
|
||||
Help us create a strong and lasting technical foundation for Civil Society.
|
||||
{{< /lead >}}
|
||||
|
||||
The Civil Society Technology Foundation is a community-driven organization that relies on the support of individuals and organizations who share our vision of digital sovereignty and independent technology. There are many ways you can contribute to our mission:
|
||||
The Civil Society Technology Foundation is a community-driven organization that relies on the support of individuals and organizations who share our vision of digital self-determination and independent technology. There are many ways you can contribute to our mission:
|
||||
|
||||
### 1. Financial Contributions
|
||||
|
||||
@@ -20,11 +25,11 @@ We welcome volunteers who can contribute their skills and expertise to our proje
|
||||
|
||||
### 3. Spread the Word
|
||||
|
||||
Share our mission and resources with your network. Help raise awareness about the importance of digital sovereignty and independent technology for civil society. Follow us on social media, share our content, and engage in discussions about these critical issues.
|
||||
Share our mission and resources with your network. Help raise awareness about the importance of digital self-determination and independent technology for civil society. Follow us on social media, share our content, and engage in discussions about these critical issues.
|
||||
|
||||
### 4. Collaborate with Us
|
||||
|
||||
We are always looking for partnerships with like-minded organizations and individuals. If you have a project or initiative that aligns with our mission, let's explore how we can work together to advance digital sovereignty and empower civil society.
|
||||
We are always looking for partnerships with like-minded organizations and individuals. If you have a project or initiative that aligns with our mission, let's explore how we can work together to advance digital self-determination and empower civil society.
|
||||
|
||||
### 5. Join Our Community
|
||||
|
||||
@@ -32,11 +37,11 @@ Engage with us through our community forums, mailing lists, and events. Share yo
|
||||
|
||||
### 6. Stay Informed
|
||||
|
||||
Subscribe to our newsletter and follow our blog to stay updated on our latest projects, resources, and events. Being informed is the first step toward active participation in the movement for digital sovereignty.
|
||||
Subscribe to our newsletter and follow our blog to stay updated on our latest projects, resources, and events. Being informed is the first step toward active participation in the movement for digital self-determination.
|
||||
|
||||
### 7. Advocate for Policy Change
|
||||
|
||||
Engage in advocacy efforts to promote policies that support digital sovereignty and independent technology. Your voice can help influence decision-makers and raise awareness about the importance of these issues.
|
||||
Engage in advocacy efforts to promote policies that support digital self-determination and independent technology. Your voice can help influence decision-makers and raise awareness about the importance of these issues.
|
||||
|
||||
### 8. Donate Your Expertise
|
||||
|
||||
@@ -44,5 +49,5 @@ If you have specialized knowledge or skills that could benefit our projects, con
|
||||
|
||||
### 9. Become a Member
|
||||
|
||||
Join the Civil Society Technology Foundation as a member to support our mission and gain access to exclusive resources, events, and networking opportunities. Your membership helps us strengthen the community and advance our work in digital sovereignty.
|
||||
Join the Civil Society Technology Foundation as a member to support our mission and gain access to exclusive resources, events, and networking opportunities. Your membership helps us strengthen the community and advance our work in digital self-determination.
|
||||
|
||||
|
@@ -1,22 +0,0 @@
|
||||
---
|
||||
title: About the Civil Society Technology Foundation
|
||||
cascade:
|
||||
params:
|
||||
heroStyle: background
|
||||
---
|
||||
|
||||
The **Civil Society Technology Foundation (CSTF)** is a community-driven organization dedicated to empowering individuals and civil society organizations to reclaim digital sovereignty through open-source tools and self-hosted infrastructure.
|
||||
|
||||
## Who We Are
|
||||
|
||||
{{< article link="/foundation/charter/" >}}
|
||||
{{< article link="/foundation/mission-statement/" >}}
|
||||
{{< article link="/foundation/core-principles/" >}}
|
||||
{{< article link="/foundation/position-statements/" >}}
|
||||
{{< article link="/projects/governance/" >}}
|
||||
|
||||
## What We Believe
|
||||
|
||||
{{< article link="/articles/independent-technology/" >}}
|
||||
{{< article link="/articles/why-digital-sovereignty-matters/" >}}
|
||||
{{< article link="/articles/arguments-against-centralization/" >}}
|
@@ -1,131 +0,0 @@
|
||||
---
|
||||
title: Charter of the Civil Society Technology Foundation
|
||||
date: 2025-07-06
|
||||
---
|
||||
|
||||
## Purpose
|
||||
|
||||
The Civil Society Technology Foundation (CSTF) empowers individuals and communities to reclaim digital sovereignty through open-source tools, self-hosted infrastructure, and transparent governance. We exist to create a world where technology serves people — not corporations or governments.
|
||||
|
||||
## Vision
|
||||
|
||||
A sustainable, decentralized ecosystem of people-centered technology. A world governed by user agency, not technocracy, where digital sovereignty enables rather than undermines democratic participation, personal autonomy, and collective action.
|
||||
|
||||
## Mission
|
||||
|
||||
To advance digital self-determination through the development and dissemination of open-source, self-hosted technologies. We aim to reduce structural dependency on centralized corporate or governmental platforms by enabling individuals and institutions to operate their own digital infrastructure.
|
||||
|
||||
Through accessible tools, educational resources, and community engagement, we cultivate practical autonomy: the capacity of users to understand, modify, and maintain the technologies they rely on.
|
||||
|
||||
## Core Principles
|
||||
|
||||
1. **Sovereignty by Design**
|
||||
Users own their data and control their computing environment. Consent is explicit, revocable, and informed.
|
||||
|
||||
2. **Tools Before Policy**
|
||||
We build alternatives rather than asking for permission. Reform is irrelevant where autonomy is possible.
|
||||
|
||||
3. **Open Source, Always**
|
||||
Software must be libre — free to use, study, modify, and share. This is the foundation of digital freedom.
|
||||
|
||||
4. **Self-Hosting Infrastructure**
|
||||
Individuals and aligned collectives should run their own infrastructure. Central hosting creates capture risks.
|
||||
|
||||
5. **AI for the People**
|
||||
AI must be open, efficient, and serve civil society. Closed models and centralized control are unacceptable.
|
||||
|
||||
6. **Transparent Governance**
|
||||
All governance must be visible, accountable, and auditable. Influence is earned through contribution.
|
||||
|
||||
7. **Healthy Ecosystems Win**
|
||||
Projects are judged by their value to communities and civil society, not popularity or funding.
|
||||
|
||||
8. **Forkability is Freedom**
|
||||
Divergence is a right. Balkanization is not failure — it is resilience.
|
||||
|
||||
9. **Interoperability via Consent**
|
||||
Standards emerge from alignment, not imposition. We will propose, not enforce.
|
||||
|
||||
10. **Contribution Defines Membership**
|
||||
Participation is earned through action. Identity is contextual and optional.
|
||||
|
||||
11. **Critical Adoption over Blind Use**
|
||||
Pragmatism means understanding trade-offs. Users should know what rights they give up — and why.
|
||||
|
||||
_Expanded explanations of these principles can be found in our [Core Principles](/foundation/core_principles) document._
|
||||
|
||||
## Strategic Focus
|
||||
|
||||
The Civil Society Technology Foundation pursues its mission through five interconnected areas of work:
|
||||
|
||||
### 1. Infrastructure Development
|
||||
|
||||
- Building and distributing personal cloud infrastructure
|
||||
- Creating efficient, user-friendly self-hosting solutions
|
||||
- Developing reference implementations of sovereign technologies
|
||||
- Ensuring solutions work on commodity hardware
|
||||
|
||||
### 2. Education and Capacity Building
|
||||
|
||||
- Creating accessible learning resources on digital sovereignty
|
||||
- Educating individuals and organizations on self-hosted alternatives
|
||||
- Building technical literacy and maintenance capabilities
|
||||
- Documenting best practices for independent technology
|
||||
|
||||
### 3. Community Support
|
||||
|
||||
- Facilitating knowledge sharing among practitioners
|
||||
- Creating spaces for collaborative development
|
||||
- Supporting civil society in adopting sovereign technologies
|
||||
- Connecting technologists with community needs
|
||||
|
||||
### 4. Standards and Interoperability
|
||||
|
||||
- Developing open standards that respect user sovereignty
|
||||
- Promoting interoperability between independent systems
|
||||
- Documenting protocols for federation and cooperation
|
||||
- Encouraging critical adoption of standards
|
||||
|
||||
### 5. Research and Advocacy
|
||||
|
||||
- Documenting the impacts of centralized vs. sovereign technology
|
||||
- Researching sustainable models for independent infrastructure
|
||||
- Identifying barriers to digital sovereignty
|
||||
- Advocating for enabling conditions for technological independence
|
||||
|
||||
## Organizational Structure
|
||||
|
||||
The Civil Society Technology Foundation is structured to reflect our principles in practice:
|
||||
|
||||
### Governance
|
||||
|
||||
- Permanently non-profit structure
|
||||
- Contributors have meaningful voice in decision-making
|
||||
- Transparent processes for strategic and operational decisions
|
||||
- Regular public reporting on activities and finances
|
||||
|
||||
### Funding and Resource Allocation
|
||||
|
||||
- Funding accepted from diverse sources with full transparency
|
||||
- No single funding source should create dependency or control
|
||||
- Resources prioritized for maximum impact on digital sovereignty
|
||||
- Sustainability takes precedence over growth
|
||||
|
||||
### Membership and Participation
|
||||
|
||||
- Contribution-based participation model
|
||||
- Multiple pathways for meaningful involvement
|
||||
- Recognition of diverse forms of contribution
|
||||
- Commitment to inclusive participation
|
||||
|
||||
## Amendment Process
|
||||
|
||||
This charter establishes the foundation of the Civil Society Technology Foundation. It may be amended through a transparent process that includes:
|
||||
|
||||
1. Public proposal of amendments
|
||||
2. Community discussion period of at least 30 days
|
||||
3. Consideration of all substantive feedback
|
||||
4. Formal adoption through established governance processes
|
||||
5. Public documentation of changes and rationale
|
||||
|
||||
The core purpose and principles may only be modified when necessary to better fulfill our fundamental mission of advancing digital self-determination and sovereignty.
|
@@ -1,126 +0,0 @@
|
||||
---
|
||||
title: Core Principles
|
||||
date: 2025-07-06
|
||||
---
|
||||
The Civil Society Technology Foundation operates according to the following core principles that guide all our work, partnerships, and initiatives.
|
||||
|
||||
## 1. Sovereignty by Design
|
||||
|
||||
**Users must own their data and control their computing environment.**
|
||||
|
||||
Digital systems should be designed with sovereignty as a foundational requirement, not an afterthought. This means:
|
||||
|
||||
- Data remains under user control by default
|
||||
- Consent must be explicit, informed, and revocable
|
||||
- Infrastructure should be designed for individual or community ownership
|
||||
- Privacy is a fundamental right, not a premium feature
|
||||
|
||||
## 2. Tools Before Policy
|
||||
|
||||
**We build alternatives rather than asking for permission.**
|
||||
|
||||
While policy reform has its place, we prioritize creating technical solutions that enable autonomy regardless of regulatory environments:
|
||||
|
||||
- Direct action through tool-building creates immediate paths to freedom
|
||||
- Self-determination cannot wait for legislative or corporate reform
|
||||
- Working alternatives demonstrate what's possible and accelerate change
|
||||
- Technical empowerment reduces reliance on regulatory protection
|
||||
|
||||
## 3. Open Source, Always
|
||||
|
||||
**Software must be libre—free to use, study, modify, and share.**
|
||||
|
||||
Open source is not simply a development methodology but a foundation for digital freedom:
|
||||
|
||||
- Source code transparency enables trust verification and community oversight
|
||||
- Freedom to modify ensures tools can adapt to evolving needs
|
||||
- Rights to redistribute create resilience against capture or abandonment
|
||||
- Collective improvement leads to higher quality and security
|
||||
|
||||
## 4. Self-Hosting Infrastructure
|
||||
|
||||
**Individuals and communities should control their own infrastructure.**
|
||||
|
||||
Centralized hosting creates fundamental risks of capture, surveillance, and dependency:
|
||||
|
||||
- Local infrastructure ownership provides true digital autonomy
|
||||
- Self-hosting creates resilience against external disruption
|
||||
- Community-scale infrastructure balances efficiency with sovereignty
|
||||
- Infrastructure design should prioritize simplicity, reliability, and maintainability
|
||||
|
||||
## 5. AI for the People
|
||||
|
||||
**Artificial intelligence must be open, efficient, and serve civil society.**
|
||||
|
||||
As AI becomes increasingly central to digital systems, its governance and accessibility are critical:
|
||||
|
||||
- AI systems should run on commodity hardware where possible
|
||||
- Models and training data should be publicly available and auditable
|
||||
- Development should be guided by public needs, not commercial imperatives
|
||||
- Benefits should accrue to communities, not just model owners
|
||||
|
||||
## 6. Transparent Governance
|
||||
|
||||
**All governance must be visible, accountable, and auditable.**
|
||||
|
||||
How we govern ourselves models the world we seek to create:
|
||||
|
||||
- Decision-making processes should be documented and accessible
|
||||
- Influence should be earned through contribution, not financial control
|
||||
- Community participation in governance should be substantive, not symbolic
|
||||
- Accountability requires both transparency and mechanisms for change
|
||||
|
||||
## 7. Healthy Ecosystems Win
|
||||
|
||||
**Projects succeed through their value to communities, not popularity or funding.**
|
||||
|
||||
We evaluate success by contribution to civil society, not market metrics:
|
||||
|
||||
- Genuine utility to real communities outweighs vanity metrics
|
||||
- Sustainability matters more than rapid growth
|
||||
- Complementary projects create more value than competitors
|
||||
- Diversity of approaches strengthens the ecosystem as a whole
|
||||
|
||||
## 8. Forkability is Freedom
|
||||
|
||||
**Divergence is a right. Balkanization is not failure—it is resilience.**
|
||||
|
||||
The ability to take a different path ensures true independence:
|
||||
|
||||
- Projects should be designed for potential forking from inception
|
||||
- Architectural choices should facilitate independent operation
|
||||
- Community disagreement should be respected through supported divergence
|
||||
- Diversity of implementations creates antifragility in the ecosystem
|
||||
|
||||
## 9. Interoperability via Consent
|
||||
|
||||
**Standards emerge from alignment, not imposition.**
|
||||
|
||||
True interoperability respects sovereignty while enabling cooperation:
|
||||
|
||||
- Protocols should be open, documented, and implementable by anyone
|
||||
- Standards adoption should be voluntary and beneficial
|
||||
- Federation should respect boundary decisions of participants
|
||||
- Gateways between systems should preserve user sovereignty
|
||||
|
||||
## 10. Contribution Defines Membership
|
||||
|
||||
**Participation is earned through action. Identity is contextual and optional.**
|
||||
|
||||
Communities grow stronger through active contribution:
|
||||
|
||||
- Value is created through doing, not just affiliating
|
||||
- Multiple forms of contribution should be recognized and valued
|
||||
- Identity verification should be proportional to the context
|
||||
- Privacy and pseudonymity are valid choices in appropriate contexts
|
||||
|
||||
## 11. Critical Adoption over Blind Use
|
||||
|
||||
**Pragmatism means understanding trade-offs.**
|
||||
|
||||
We advocate informed choice rather than ideological purity:
|
||||
|
||||
- Users should understand what rights they give up and why
|
||||
- Perfect sovereignty may be balanced against practical needs
|
||||
- Transition paths from closed to open systems are valuable
|
||||
- Transparency about compromises builds trust and education
|
@@ -1,23 +0,0 @@
|
||||
---
|
||||
title: Mission Statement
|
||||
date: 2025-07-06
|
||||
---
|
||||
|
||||
The Civil Society Technology Foundation (CSTF) empowers individuals and communities to reclaim digital sovereignty through the development and dissemination of open-source, self-hosted technologies.
|
||||
|
||||
We exist to create a world where technology serves people—not corporations or governments—by reducing structural dependency on centralized platforms and enabling direct control of digital infrastructure.
|
||||
|
||||
Through accessible tools, educational resources, and community engagement, we advance practical autonomy: the capacity of users to understand, modify, and maintain the technologies they rely on.
|
||||
|
||||
We believe digital sovereignty—including control over data, identity, and computation—is essential to democratic participation and institutional resilience in the digital era.
|
||||
|
||||
## Our Approach
|
||||
|
||||
To fulfill this mission, we pursue two primary strategies:
|
||||
|
||||
1. The creation and support of accessible, libre digital tools
|
||||
2. The cultivation of technical literacy through educational resources and community engagement
|
||||
|
||||
We approach artificial intelligence as a public utility to be shaped and governed by civil society. Our efforts seek to align technological capabilities with ethical, sustainable, and equitable use, outside the logic of commercial exploitation.
|
||||
|
||||
This work is motivated by a conviction that open systems, federated infrastructure, and transparent governance are not only technically feasible, but socially necessary. By building and sharing common resources, we contribute to a broader ecosystem of public digital goods—critical to any robust civil society.
|
@@ -1,164 +0,0 @@
|
||||
Perfect — let’s build a simple battle plan (Gramsci-style) for what CivilSociety.dev — or any similar project — could follow to challenge hegemony and build real digital autonomy.
|
||||
|
||||
Here’s the flow:
|
||||
|
||||
|
||||
---
|
||||
|
||||
Battle Plan: Winning the War of Position for Digital Civil Society
|
||||
|
||||
Phase 1: Build Independent Infrastructure
|
||||
|
||||
Launch sovereign services (email, cloud, chat, web hosting) that working-class organizations can use without Big Tech.
|
||||
|
||||
Focus on ease of use and collective ownership (community clouds, co-ops, unions).
|
||||
|
||||
|
||||
Key goal: Create real-world alternatives that people can rely on.
|
||||
|
||||
|
||||
---
|
||||
|
||||
Phase 2: Popular Education
|
||||
|
||||
Teach not just how to use tech, but why digital sovereignty matters.
|
||||
|
||||
Build guides, workshops, videos, and political storytelling that connect tech freedom to everyday life struggles (housing, labor, climate, democracy).
|
||||
|
||||
|
||||
Key goal: Grow thousands of organic intellectuals inside civil society.
|
||||
|
||||
|
||||
---
|
||||
|
||||
Phase 3: Culture Shift
|
||||
|
||||
Create a new "common sense" about tech:
|
||||
|
||||
"We can run our own systems."
|
||||
|
||||
"Freedom is practical, not utopian."
|
||||
|
||||
"Big Tech dependence is a political trap."
|
||||
|
||||
|
||||
Use memes, stories, community campaigns to popularize.
|
||||
|
||||
|
||||
Key goal: Make sovereignty feel normal, not fringe.
|
||||
|
||||
|
||||
---
|
||||
|
||||
Phase 4: Strategic Alliances
|
||||
|
||||
Partner with unions, mutual aid groups, cooperatives, indigenous communities to embed sovereign tech into broader struggles for dignity and justice.
|
||||
|
||||
Wild Cloud becomes the digital backbone of working-class and social movements.
|
||||
|
||||
|
||||
Key goal: Tie tech sovereignty directly to the survival and power of civil society.
|
||||
|
||||
|
||||
---
|
||||
|
||||
Final Objective:
|
||||
|
||||
> Civil society owns its own communication, storage, learning, and organizing tools — breaking the 1%'s hegemony over the digital world.
|
||||
|
||||
|
||||
|
||||
|
||||
---
|
||||
|
||||
Would you like me to also turn this into a quick visual diagram (like a simple flowchart or map) so it’s super easy to share or present?
|
||||
It could look really clean if you're planning to post, pitch, or organize around it!
|
||||
|
||||
---
|
||||
|
||||
Good — let’s rate how CivilSociety.dev is doing on the Gramscian battle plan we just built.
|
||||
|
||||
I’ll go phase by phase, with a simple scale:
|
||||
Excellent / Good / Needs Growth / Missing
|
||||
|
||||
|
||||
---
|
||||
|
||||
Phase 1: Build Independent Infrastructure
|
||||
|
||||
> Rating: Excellent
|
||||
|
||||
|
||||
|
||||
Wild Cloud is real, working infrastructure.
|
||||
|
||||
They're offering services like email, cloud storage, chat, hosting, and more — away from Big Tech.
|
||||
|
||||
Clear focus on self-hosting and community control.
|
||||
|
||||
|
||||
Comment:
|
||||
They've nailed the first step — they’re not just talking, they’re building.
|
||||
|
||||
|
||||
---
|
||||
|
||||
Phase 2: Popular Education
|
||||
|
||||
> Rating: Good
|
||||
|
||||
|
||||
|
||||
The Learning section is strong: it explains not just the technical but also the political reasons for sovereignty.
|
||||
|
||||
It’s accessible but could be pushed further into mass popular education — for example, shorter videos, memes, hands-on toolkits, or alliances with schools/unions.
|
||||
|
||||
|
||||
Comment:
|
||||
Good foundation — needs scaling up to reach beyond tech-savvy audiences.
|
||||
|
||||
|
||||
---
|
||||
|
||||
Phase 3: Culture Shift
|
||||
|
||||
> Rating: Needs Growth
|
||||
|
||||
|
||||
|
||||
They challenge Big Tech’s common sense implicitly through projects and writing.
|
||||
|
||||
But they're not (yet) visibly changing broader public attitudes or launching mass storytelling campaigns.
|
||||
|
||||
No evidence yet of heavy cultural production (memes, viral media, mass campaigns, popular slogans).
|
||||
|
||||
|
||||
Comment:
|
||||
This is their big opportunity: to widen the cultural battle and make digital sovereignty part of everyday imagination.
|
||||
|
||||
|
||||
---
|
||||
|
||||
Phase 4: Strategic Alliances
|
||||
|
||||
> Rating: Needs Growth
|
||||
|
||||
|
||||
|
||||
So far, the focus seems internal: building tools, education, and philosophy.
|
||||
|
||||
No clear, public partnerships yet with unions, housing co-ops, indigenous groups, or grassroots movements that desperately need digital independence.
|
||||
|
||||
|
||||
Comment:
|
||||
Strategic alliances with civil society movements would supercharge their impact — this is a crucial next step.
|
||||
|
||||
|
||||
---
|
||||
|
||||
Overall Rating:
|
||||
|
||||
Overall:
|
||||
|
||||
> CivilSociety.dev is very strong at building and explaining alternatives — now it needs to scale up cultural influence and strategic partnerships to fully realize a Gramscian digital movement.
|
||||
|
@@ -1,5 +1,6 @@
|
||||
---
|
||||
title: "Learning"
|
||||
cardView: true
|
||||
---
|
||||
|
||||
Resources for building technical skills and understanding digital sovereignty.
|
||||
Resources for building technical skills and understanding digital self-determination.
|
BIN
content/learning/git/featured.jpg
Normal file
After Width: | Height: | Size: 126 KiB |
@@ -1,13 +1,15 @@
|
||||
---
|
||||
title: "Git: Distributed Version Control for Digital Independence"
|
||||
date: 2025-01-15
|
||||
featureImageCaption: Author unknown. (https://commons.wikimedia.org/wiki/File:Linus-Torvalds.jpeg), “Linus Torvalds”, https://creativecommons.org/licenses/by-sa/3.0/legalcode
|
||||
summary: "Git is more than just a version control system; it embodies principles of decentralization, resilience, and user self-determination. This article explores how Git's distributed architecture aligns with the values of civil society organizations, enabling them to maintain control over their digital infrastructure."
|
||||
---
|
||||
|
||||
## Introduction
|
||||
|
||||
Version control systems are the backbone of modern software development, enabling collaboration, preserving history, and managing complexity. Among these tools, Git stands apart—not just as the most widely used version control system, but as a technology that fundamentally aligns with principles of decentralization, resilience, and user sovereignty.
|
||||
Version control systems are the backbone of modern software development, enabling collaboration, preserving history, and managing complexity. Among these tools, Git stands apart—not just as the most widely used version control system, but as a technology that fundamentally aligns with principles of decentralization, resilience, and user self-determination.
|
||||
|
||||
For civil society organizations, Git represents much more than a development tool. It embodies a different way of thinking about collaboration—one based on distributed trust, transparent history, and resilience against centralized control. In this article, we explore what Git is, how it works, and why its approach to distributed collaboration matters for organizations committed to digital sovereignty.
|
||||
For civil society organizations, Git represents much more than a development tool. It embodies a different way of thinking about collaboration—one based on distributed trust, transparent history, and resilience against centralized control. In this article, we explore what Git is, how it works, and why its approach to distributed collaboration matters for organizations committed to digital self-determination.
|
||||
|
||||
## What Is Git?
|
||||
|
||||
@@ -83,7 +85,7 @@ Git's distributed nature means:
|
||||
|
||||
In contexts where infrastructure may be unreliable or subject to interference, this resilience is invaluable.
|
||||
|
||||
### 2. Sovereignty and Control
|
||||
### 2. Self-Determination and Control
|
||||
|
||||
Git provides complete control over:
|
||||
|
||||
@@ -92,7 +94,7 @@ Git provides complete control over:
|
||||
- How contributions are reviewed and incorporated
|
||||
- What external dependencies are included
|
||||
|
||||
This sovereignty means organizations aren't dependent on the policies or availability of any particular service provider.
|
||||
This self-determination means organizations aren't dependent on the policies or availability of any particular service provider.
|
||||
|
||||
### 3. Transparency and Accountability
|
||||
|
||||
@@ -252,7 +254,7 @@ By distributing repositories across multiple participants, these organizations e
|
||||
|
||||
## Conclusion
|
||||
|
||||
Git represents more than just a tool—it embodies an approach to collaboration built on principles that civil society defends: distributed authority, transparent history, resilient systems, and user sovereignty. By adopting Git and its associated practices, organizations don't just improve their technical workflows; they align their operational methods with their values.
|
||||
Git represents more than just a tool—it embodies an approach to collaboration built on principles that civil society defends: distributed authority, transparent history, resilient systems, and user self-determination. By adopting Git and its associated practices, organizations don't just improve their technical workflows; they align their operational methods with their values.
|
||||
|
||||
The Civil Society Technology Foundation recognizes Git as a foundational technology for independent civil society infrastructure, enabling transparent collaboration without creating new dependencies or vulnerabilities.
|
||||
|
||||
|
Before Width: | Height: | Size: 2.3 MiB After Width: | Height: | Size: 4.9 MiB |
@@ -1,6 +1,8 @@
|
||||
---
|
||||
title: "The Internet: Infrastructure for Civil Society"
|
||||
date: 2025-01-15
|
||||
featureImageCaption: ITU. https://bbmaps.itu.int/bbmaps/. Captured 2025-07-09.
|
||||
summary: The Internet stands as one of humanity's most transformative technological achievements, connecting billions of people and fundamentally reshaping how we communicate, learn, organize, and participate in public life.
|
||||
---
|
||||
|
||||
## Introduction
|
||||
|
BIN
content/learning/language-models/featured.png
Normal file
After Width: | Height: | Size: 55 KiB |
@@ -1,13 +1,15 @@
|
||||
---
|
||||
title: "Language Models: Understanding AI in the Context of Civil Society"
|
||||
date: 2025-01-15
|
||||
featureImageCaption: "dvgodoy (https://commons.wikimedia.org/wiki/file:Transformer,-full-architecture.png), 'Transformer, full architecture', https://creativecommons.org/licenses/by/4.0/legalcode"
|
||||
summary: "Language models are reshaping how we interact with technology, but they also raise critical questions about control, transparency, and the future of human agency. This article explores language models through the lens of civil society values, examining their implications for digital self-determination and how organizations can navigate this complex landscape."
|
||||
---
|
||||
|
||||
## Introduction
|
||||
|
||||
Large Language Models (LLMs) have rapidly transformed from research curiosities to everyday tools. These systems, trained on vast corpora of human-written text, have demonstrated remarkable capabilities in understanding and generating human language, powering applications from automated assistants to content creation tools. For civil society organizations, these technologies represent both opportunity and challenge—tools that can amplify effectiveness and reach, but also systems that raise profound questions about centralization, control, and the future of human agency.
|
||||
|
||||
In this article, we examine language models through the lens of civil society values, exploring how these technologies work, their implications for digital sovereignty, and pathways to harnessing their benefits while minimizing risks to autonomy and independence.
|
||||
In this article, we examine language models through the lens of civil society values, exploring how these technologies work, their implications for digital self-determination, and pathways to harnessing their benefits while minimizing risks to autonomy and independence.
|
||||
|
||||
## What Are Language Models?
|
||||
|
||||
@@ -63,7 +65,7 @@ These capabilities can be particularly valuable for organizations with limited r
|
||||
|
||||
### Critical Concerns
|
||||
|
||||
At the same time, language models raise serious concerns for organizations committed to digital sovereignty:
|
||||
At the same time, language models raise serious concerns for organizations committed to digital self-determination:
|
||||
|
||||
1. **Centralization of Power**: The most capable models require resources only available to large corporations or governments
|
||||
2. **Data Extraction Risks**: API-based access creates dependency and potential surveillance
|
||||
@@ -75,13 +77,13 @@ At the same time, language models raise serious concerns for organizations commi
|
||||
|
||||
These concerns connect directly to civil society's core focus on distributed power, accountability, and human agency.
|
||||
|
||||
## Sovereignty Considerations
|
||||
## Self-Determination Considerations
|
||||
|
||||
For organizations committed to digital sovereignty, language models present particular challenges:
|
||||
For organizations committed to digital self-determination, language models present particular challenges:
|
||||
|
||||
### The Sovereignty Paradox
|
||||
### The Self-Determination Paradox
|
||||
|
||||
The most capable language models currently exist in a paradigm that conflicts with sovereignty principles:
|
||||
The most capable language models currently exist in a paradigm that conflicts with self-determination principles:
|
||||
|
||||
- Trained on massive datasets that no individual organization can replicate
|
||||
- Requiring computational resources beyond most civil society organizations
|
||||
@@ -90,9 +92,9 @@ The most capable language models currently exist in a paradigm that conflicts wi
|
||||
|
||||
This creates a paradox: using these tools can advance an organization's mission while simultaneously reinforcing dependency on centralized technological infrastructure.
|
||||
|
||||
### Sovereignty-Respecting Approaches
|
||||
### Self-Determination-Respecting Approaches
|
||||
|
||||
Several approaches exist for using language models while maintaining alignment with sovereignty principles:
|
||||
Several approaches exist for using language models while maintaining alignment with self-determination principles:
|
||||
|
||||
1. **Self-hosted smaller models**: Running smaller but still capable models on local infrastructure
|
||||
2. **Federated improvement**: Pooling resources to improve open models without centralizing data
|
||||
@@ -116,7 +118,7 @@ Before implementing language model technologies, organizations should evaluate:
|
||||
4. **Alignment Check**: Does the model's training and operation align with the organization's values?
|
||||
5. **Resource Analysis**: What local capabilities exist to understand, deploy, and maintain the system?
|
||||
|
||||
This assessment helps determine the appropriate balance between capability and sovereignty for each use case.
|
||||
This assessment helps determine the appropriate balance between capability and self-determination for each use case.
|
||||
|
||||
### Recommended Approaches by Context
|
||||
|
||||
@@ -187,7 +189,7 @@ A human rights organization uses language models to help draft, organize, and tr
|
||||
- Cloud APIs for translation of already-public information
|
||||
- Clear data policies regarding what can be sent to external services
|
||||
|
||||
This hybrid approach balances practical needs with sovereignty concerns.
|
||||
This hybrid approach balances practical needs with self-determination concerns.
|
||||
|
||||
### Scenario 2: Community Legal Aid
|
||||
|
||||
@@ -198,7 +200,7 @@ A legal assistance organization develops a system to help explain legal concepts
|
||||
- Create specialized interfaces for common questions
|
||||
- Maintain human review of all substantive advice
|
||||
|
||||
This sovereignty-first approach prioritizes control and alignment with the organization's values.
|
||||
This self-determination-first approach prioritizes control and alignment with the organization's values.
|
||||
|
||||
### Scenario 3: Environmental Data Analysis
|
||||
|
||||
@@ -209,7 +211,7 @@ A climate advocacy group uses language models to analyze environmental impact re
|
||||
- Implement clear boundaries on sensitive strategic discussions
|
||||
- Contribute to open model development in their domain
|
||||
|
||||
This pragmatic approach uses available tools while working toward greater sovereignty.
|
||||
This pragmatic approach uses available tools while working toward greater self-determination.
|
||||
|
||||
## The Future Landscape
|
||||
|
||||
@@ -224,14 +226,14 @@ Models continue to decrease in size while maintaining capabilities:
|
||||
- Specialized models outperform general models in specific domains
|
||||
- Browser-based models enable client-side processing
|
||||
|
||||
These trends make sovereignty-respecting approaches increasingly viable.
|
||||
These trends make self-determination-respecting approaches increasingly viable.
|
||||
|
||||
### Decentralized Research and Development
|
||||
|
||||
Alternatives to centralized AI development are emerging:
|
||||
|
||||
- Research collaboratives pooling resources for model development
|
||||
- Federated learning approaches that preserve data sovereignty
|
||||
- Federated learning approaches that preserve data self-determination
|
||||
- Community-governed models with transparent decision making
|
||||
- Regional training efforts creating linguistically diverse models
|
||||
|
||||
@@ -261,12 +263,12 @@ For organizations navigating language model adoption, we recommend the following
|
||||
7. **Document and share learnings**: Help build collective knowledge about responsible use
|
||||
8. **Regularly reassess**: Technology and best practices are evolving rapidly
|
||||
|
||||
These guidelines help organizations balance practical benefit with long-term sovereignty.
|
||||
These guidelines help organizations balance practical benefit with long-term self-determination.
|
||||
|
||||
## Conclusion
|
||||
|
||||
Language models represent a profound technological shift with particularly complex implications for civil society. While these tools offer significant benefits for organizations with limited resources, they also present risks of creating new dependencies and reinforcing centralization of technological power.
|
||||
|
||||
The Civil Society Technology Foundation advocates for a sovereignty-respecting approach to language models—one that leverages their benefits while working toward a future where such capabilities are available through community-governed, transparent infrastructure. This means making thoughtful choices today about how and when to use these tools, while supporting the development of alternatives that better align with civil society values.
|
||||
The Civil Society Technology Foundation advocates for a self-determination-respecting approach to language models—one that leverages their benefits while working toward a future where such capabilities are available through community-governed, transparent infrastructure. This means making thoughtful choices today about how and when to use these tools, while supporting the development of alternatives that better align with civil society values.
|
||||
|
||||
The path forward is neither uncritical adoption nor blanket rejection, but rather principled engagement that shapes these technologies to serve human agency, community autonomy, and distributed power—the core values that define civil society itself.
|
||||
|
BIN
content/learning/language-models/transformer-architecture.png
Normal file
After Width: | Height: | Size: 55 KiB |
BIN
content/learning/linux/featured.jpg
Normal file
After Width: | Height: | Size: 4.4 MiB |
@@ -1,11 +1,13 @@
|
||||
---
|
||||
title: "Linux: The Operating System for Digital Sovereignty"
|
||||
title: "Linux: The Operating System for Digital Self-Determination"
|
||||
date: 2025-01-15
|
||||
featureImageCaption: "Photo by <a href=\"https://unsplash.com/@wwarby?utm_content=creditCopyText&utm_medium=referral&utm_source=unsplash\">William Warby</a> on <a href=\"https://unsplash.com/photos/a-penguin-is-standing-on-a-rocky-area-mlDxrRUuDxc?utm_content=creditCopyText&utm_medium=referral&utm_source=unsplash\">Unsplash</a>"
|
||||
summary: "Linux is more than just an operating system; it is a cornerstone of digital self-determination for civil society organizations. This article explores how Linux empowers communities to reclaim control over their technology, ensuring independence, security, and adaptability in an increasingly centralized digital landscape."
|
||||
---
|
||||
|
||||
## Introduction
|
||||
|
||||
Linux stands as one of the most remarkable achievements in the history of computing—an operating system built by a global community, freely available to all, and powering everything from the smallest embedded devices to the largest supercomputers. For civil society organizations seeking digital sovereignty, Linux represents both a practical tool and a powerful symbol of what's possible when technology development is driven by community needs rather than corporate interests.
|
||||
Linux stands as one of the most remarkable achievements in the history of computing—an operating system built by a global community, freely available to all, and powering everything from the smallest embedded devices to the largest supercomputers. For civil society organizations seeking digital self-determination, Linux represents both a practical tool and a powerful symbol of what's possible when technology development is driven by community needs rather than corporate interests.
|
||||
|
||||
In this article, we explore what Linux is, why it matters for civil society, and how it provides the foundation for technological independence in an increasingly controlled digital landscape.
|
||||
|
||||
@@ -41,7 +43,7 @@ These characteristics reflect Linux's organic development process, where improve
|
||||
|
||||
## Why Linux Matters for Civil Society
|
||||
|
||||
For civil society organizations seeking digital sovereignty, Linux provides several unique benefits:
|
||||
For civil society organizations seeking digital self-determination, Linux provides several unique benefits:
|
||||
|
||||
### 1. Freedom from Corporate Control
|
||||
|
||||
@@ -91,9 +93,9 @@ Linux's accessibility removes barriers to participation:
|
||||
|
||||
This accessibility aligns with civil society's commitment to inclusion and equitable access to technological tools.
|
||||
|
||||
### 5. Sovereignty and Control
|
||||
### 5. Self-Determination and Control
|
||||
|
||||
Perhaps most importantly, Linux enables genuine sovereignty over computing infrastructure:
|
||||
Perhaps most importantly, Linux enables genuine self-determination over computing infrastructure:
|
||||
|
||||
- Organizations can inspect and modify any aspect of their systems
|
||||
- Technical knowledge builds internal capacity rather than dependency
|
||||
@@ -101,7 +103,7 @@ Perhaps most importantly, Linux enables genuine sovereignty over computing infra
|
||||
- Systems can be fully understood rather than treated as black boxes
|
||||
- Community governance replaces corporate decision-making
|
||||
|
||||
This sovereignty is not just a technical preference but essential for organizations that need to control their own digital infrastructure.
|
||||
This self-determination is not just a technical preference but essential for organizations that need to control their own digital infrastructure.
|
||||
|
||||
## Linux Distributions for Civil Society
|
||||
|
||||
@@ -166,7 +168,7 @@ The Civil Society Technology Foundation can provide guidance on distribution sel
|
||||
|
||||
## Beyond the Operating System: The Linux Ecosystem
|
||||
|
||||
Linux has inspired a broader ecosystem of tools and practices that support digital sovereignty:
|
||||
Linux has inspired a broader ecosystem of tools and practices that support digital self-determination:
|
||||
|
||||
- **Container technologies** like Docker and Kubernetes (themselves Linux-based) enable flexible, portable deployments
|
||||
- **Configuration management** tools allow systematic administration of multiple systems
|
||||
@@ -194,7 +196,7 @@ By providing a free, adaptable foundation, Linux enables these initiatives to fo
|
||||
As digital technology becomes increasingly central to all aspects of civic life, the relationship between Linux and civil society grows more important. Several emerging trends highlight this connection:
|
||||
|
||||
- **Edge computing** brings computation closer to communities, often using Linux on small devices
|
||||
- **Software sovereignty** movements advocate for public control of critical code
|
||||
- **Software self-determination** movements advocate for public control of critical code
|
||||
- **Digital commons** initiatives build shared technological resources
|
||||
- **Community cloud** approaches offer alternatives to corporate infrastructure
|
||||
- **Digital public infrastructure** creates essential services outside market logic
|
||||
@@ -203,7 +205,7 @@ In each of these areas, Linux provides a foundation that enables community contr
|
||||
|
||||
## Conclusion
|
||||
|
||||
For civil society organizations committed to digital sovereignty, Linux represents both practical infrastructure and a compelling vision. By choosing Linux, organizations assert control over their fundamental computing environment, build internal capacity rather than dependency, and join a global community developing technology for human needs rather than market demands.
|
||||
For civil society organizations committed to digital self-determination, Linux represents both practical infrastructure and a compelling vision. By choosing Linux, organizations assert control over their fundamental computing environment, build internal capacity rather than dependency, and join a global community developing technology for human needs rather than market demands.
|
||||
|
||||
The Civil Society Technology Foundation recognizes Linux as essential infrastructure for robust civil society in the digital age. By building on this foundation, organizations can create resilient, independent systems that genuinely serve their missions and communities.
|
||||
|
||||
|
BIN
content/learning/open-source/featured.jpg
Normal file
After Width: | Height: | Size: 362 KiB |
Before Width: | Height: | Size: 3.0 MiB |
@@ -1,6 +1,8 @@
|
||||
---
|
||||
title: "Open Source: The Foundation of Digital Freedom"
|
||||
date: 2025-01-15
|
||||
featureImageCaption: "Credit: Frank Karlitschek. 2015-10-04. CC. \"A portrait of Richard Stallman that I made during the 30 years FSF party in Boston.\""
|
||||
summary: "Open source is more than just a software development model; it is a philosophy that empowers individuals and communities to reclaim control over their digital lives. This article explores the principles of open source, its significance for civil society, and how it enables digital autonomy in an increasingly centralized tech landscape."
|
||||
---
|
||||
|
||||
## Introduction
|
||||
|
BIN
content/learning/software-development/featured.jpg
Normal file
After Width: | Height: | Size: 717 KiB |
@@ -1,13 +1,15 @@
|
||||
---
|
||||
title: "Software Development: Building Digital Infrastructure for Civil Society"
|
||||
date: 202-01-15
|
||||
date: 2025-01-15
|
||||
featureImageCaption: Photo by <a href="https://unsplash.com/@kellysikkema?utm_content=creditCopyText&utm_medium=referral&utm_source=unsplash">Kelly Sikkema</a> on <a href="https://unsplash.com/photos/woman-wearing-black-t-shirt-holding-white-computer-keyboard-YK0HPwWDJ1I?utm_content=creditCopyText&utm_medium=referral&utm_source=unsplash">Unsplash</a>
|
||||
summary: "Software development is a critical aspect of civil society's digital self-determination. This article explores how development practices, tools, and approaches can either reinforce dependency or enable self-determination, emphasizing the importance of building independent, adaptable, and resilient software systems."
|
||||
---
|
||||
|
||||
## Introduction
|
||||
|
||||
Software development is not merely a technical activity but a form of infrastructure building with profound implications for human freedom and agency. As digital systems increasingly mediate civic life, the ability to create, modify, and control software becomes essential for civil society's independence and effectiveness.
|
||||
|
||||
In this article, we explore software development through the lens of civil society values—examining how development practices, tools, and approaches can either reinforce dependency or enable sovereignty. We'll address both practical aspects of creating software and the broader implications of development choices for organizational autonomy and mission.
|
||||
In this article, we explore software development through the lens of civil society values—examining how development practices, tools, and approaches can either reinforce dependency or enable self-determination. We'll address both practical aspects of creating software and the broader implications of development choices for organizational autonomy and mission.
|
||||
|
||||
## Why Software Development Matters for Civil Society
|
||||
|
||||
@@ -48,9 +50,9 @@ Software development builds crucial organizational capabilities:
|
||||
|
||||
These capacities extend beyond software itself to strengthen overall organizational resilience.
|
||||
|
||||
## Sovereignty-Respecting Development Practices
|
||||
## Self-Determination-Respecting Development Practices
|
||||
|
||||
Software development practices can either enhance or undermine digital sovereignty. We advocate for approaches that:
|
||||
Software development practices can either enhance or undermine digital self-determination. We advocate for approaches that:
|
||||
|
||||
### 1. Focus on Simplicity and Maintainability
|
||||
|
||||
@@ -121,7 +123,7 @@ This purpose-driven approach ensures technology serves human needs rather than t
|
||||
Tool selection should balance multiple considerations:
|
||||
|
||||
1. **Community health**: Is there an active, diverse community supporting the tool?
|
||||
2. **Sovereignty implications**: Does the tool create new dependencies?
|
||||
2. **Self-determination implications**: Does the tool create new dependencies?
|
||||
3. **Learning curve**: Can your team develop and maintain expertise?
|
||||
4. **Longevity**: Is the tool likely to remain viable over your project's lifetime?
|
||||
5. **Resource requirements**: Does the tool work within your constraints?
|
||||
@@ -259,7 +261,7 @@ Programming languages and frameworks establish fundamental constraints:
|
||||
|
||||
### Database and Storage Technologies
|
||||
|
||||
Data storage choices have significant sovereignty implications:
|
||||
Data storage choices have significant self-determination implications:
|
||||
|
||||
**Key considerations**:
|
||||
|
||||
@@ -303,7 +305,7 @@ Several examples illustrate effective approaches to civil society software devel
|
||||
|
||||
### Case Study 1: SecureDrop
|
||||
|
||||
SecureDrop, an anonymous whistleblowing platform, demonstrates several sovereignty-respecting practices:
|
||||
SecureDrop, an anonymous whistleblowing platform, demonstrates several self-determination-respecting practices:
|
||||
|
||||
- **Air-gapped architecture** protects sources even from sophisticated adversaries
|
||||
- **Clear documentation** enables independent verification and deployment
|
||||
@@ -430,17 +432,17 @@ The local-first approach prioritizes user control while enabling collaboration:
|
||||
- Data lives primarily on user devices, not in the cloud
|
||||
- Synchronization happens peer-to-peer when possible
|
||||
- Applications work offline by default
|
||||
- User sovereignty over data is a foundational principle
|
||||
- User self-determination over data is a foundational principle
|
||||
- Collaboration happens without centralized control
|
||||
|
||||
This paradigm aligns closely with civil society's sovereignty principles.
|
||||
This paradigm aligns closely with civil society's self-determination principles.
|
||||
|
||||
### 2. Small-Scale Machine Learning
|
||||
|
||||
Machine learning is becoming accessible to smaller organizations:
|
||||
|
||||
- Pre-trained models reduce resource requirements
|
||||
- Federated approaches preserve data sovereignty
|
||||
- Federated approaches preserve data self-determination
|
||||
- On-device inference enables privacy-preserving intelligence
|
||||
- Transfer learning makes specialized applications viable
|
||||
- Community datasets enable alternatives to corporate AI
|
||||
@@ -475,6 +477,6 @@ These approaches make software development accessible to more civil society orga
|
||||
|
||||
Software development for civil society is not merely about creating tools but about building infrastructure for human freedom and agency. The technical choices organizations make have profound implications for who controls the digital systems mediating civic participation.
|
||||
|
||||
The Civil Society Technology Foundation advocates for development approaches that prioritize sovereignty, resilience, and community control—recognizing that software created with these values will better serve civil society's mission than technologies that create new dependencies or vulnerabilities.
|
||||
The Civil Society Technology Foundation advocates for development approaches that prioritize self-determination, resilience, and community control—recognizing that software created with these values will better serve civil society's mission than technologies that create new dependencies or vulnerabilities.
|
||||
|
||||
By building software with these principles in mind, civil society organizations don't just solve immediate problems but contribute to a digital ecosystem that reinforces rather than undermines human agency and collective action—the foundation upon which civil society itself rests.
|
||||
|
9
content/people/_index.md
Normal file
@@ -0,0 +1,9 @@
|
||||
---
|
||||
title: "People"
|
||||
cascade:
|
||||
layout: "single"
|
||||
showReadingTime: false
|
||||
showWordCount: false
|
||||
showDate: false
|
||||
---
|
||||
|
48
content/people/paul-payne/index.md
Normal file
@@ -0,0 +1,48 @@
|
||||
---
|
||||
title: Paul Payne
|
||||
date: 2025-07-06
|
||||
---
|
||||
|
||||
<div class="float-left mb-4 mr-6 no-prose mt-0 pt-0">
|
||||
{{<figure
|
||||
src="/people/paul-payne.jpg"
|
||||
alt="Paul Payne, CSTF Director"
|
||||
caption="Paul Payne, CSTF Director"
|
||||
class="max-h-80 mt-0"
|
||||
>}}
|
||||
</div>
|
||||
|
||||
Paul Payne is the director of the Civil Society Technology Foundation. Paul brings a nearly 35-year long career in technology, innovation, and startups to focus on building systems that empower civil society and promote open technologies.
|
||||
|
||||
## Microsoft
|
||||
|
||||
Paul is a Principal Research Engineer at Microsoft in the Office of the CTO. His current work involves building AI systems by augmenting generative models with systems and cognitive architectures. His team explores what can be done with LLMs to unlock their utility for a larger range of applications and spends time building functional prototypes and sharing learnings across Microsoft, academia, and the wider industry.
|
||||
|
||||
His work makes its way into products like Semantic Kernel, Microsoft Teams, and Bing, and is used by research teams around the world.
|
||||
|
||||
## Artificial Intelligence
|
||||
|
||||
Paul has pursued interests in autonomous agents and multi-agent systems in undergraduate studies (BSME) at the University of Nebraska in Mechanical Engineering with emphasis on robotics and control, in graduate work (MSCS) at the University of Washington, through numerous startups, and in his work at Microsoft.
|
||||
|
||||
He strongly believes AI will effect nearly every aspect of society in the upcoming decades and it is important now to be engaged in ensuring that the benefits of AI are positive and broadly distributed.
|
||||
|
||||
Paul founded the [Seattle AI Society](https://seattleaisociety.org) in 2023 where, in addition to professional networking and creative project collaborations, we held weekly discussions on AI’s impact on society from various perspectives.
|
||||
|
||||
In late 2023, Paul published a series of articles investigating topics of machine thinking in a newsletter named "[Investigations in Mind](https://payne.io/posts/investigations-in-mind/)".
|
||||
|
||||
## Innovation
|
||||
|
||||
Paul has a long history of working in innovation labs, including Microsoft Research, Microsoft Area51, Xinova, Ivy Softworks, and the Nordstrom Innovation Lab.
|
||||
|
||||
Through these engagements, Paul developed expertise in numerous innovation methodologies including Microsoft’s Central Incubation Framework, Jobs to be Done/Outcome Driven Innovation, Design Thinking, Lean Software Development, the Toyota Production System, Agile, Customer Development, Disruptive Innovation.
|
||||
|
||||
## Startups
|
||||
|
||||
Paul has been an early or founding member of multiple startups including [Atlas Informatics](https://www.geekwire.com/2017/atlas-informatics-shut-pulling-plug-encrypted-personal-search-engine/) (Director of Platform and Infrastructure), Fiero (CTO), and [Navigating Cancer](https://www.navigatingcancer.com) (Lead UX).
|
||||
|
||||
In 2002, Paul founded MinistryHome, a website builder (like Wix or SquareSpace) integrated with donation, newsletter, and other tools for small non-profits. In 2006 Paul transformed MinistryHome into a social network leading to its acquisition in 2007.
|
||||
|
||||
## Personal
|
||||
|
||||
Paul is a deeply proud father of two incredible people and relies on their ongoing experiences of the world to motivate much of his ongoing desire to make it a better place for the next generation.
|
||||
|
BIN
content/people/paul-payne/paul.jpg
Normal file
After Width: | Height: | Size: 127 KiB |
@@ -1,10 +1,11 @@
|
||||
---
|
||||
title: "Projects"
|
||||
cardView: true
|
||||
headless: true
|
||||
cascade:
|
||||
showReadingTime: false
|
||||
showWordCount: false
|
||||
showDate: false
|
||||
params:
|
||||
heroStyle: background
|
||||
heroStyle: big
|
||||
---
|
||||
|
||||
|
@@ -1,8 +0,0 @@
|
||||
---
|
||||
title: 'Education'
|
||||
date: 2025-01-15
|
||||
---
|
||||
|
||||
Curating and developing education resources.
|
||||
|
||||
Check out our [Learning articles](../learning/).
|
@@ -1,10 +0,0 @@
|
||||
---
|
||||
title: 'Governance'
|
||||
date: 2025-01-15
|
||||
---
|
||||
|
||||
Transparency is paramount.
|
||||
|
||||
Governance is an evolving project.
|
||||
|
||||
|
130
content/projects/wild-cloud/featured.svg
Normal file
After Width: | Height: | Size: 54 KiB |
@@ -1,67 +1,47 @@
|
||||
---
|
||||
title: Wild Cloud
|
||||
date: 2025-07-06
|
||||
alias:
|
||||
- /projects/
|
||||
---
|
||||
|
||||
Wild Cloud is the Civil Society Technology Foundation's reference implementation for personal and organizational self-hosted infrastructure. This project empowers individuals and organizations to run their own digital services without dependency on centralized corporate platforms.
|
||||
Wild Cloud is the Civil Society Technology Foundation's reference implementation for self-hosted "cloud" infrastructure. This project empowers individuals, communities, and organizations to run their own digital services without dependency on centralized corporate platforms.
|
||||
|
||||
## Overview
|
||||
When released later this year, Wild Cloud will become a complete, accessible solution for operating essential digital services on infrastructure you control. It combines carefully selected open-source components into a cohesive system providing the functionality needed for self-hosted cloud services.
|
||||
|
||||
Wild Cloud provides a complete, accessible solution for operating essential digital services on infrastructure you control. It combines carefully selected open-source components into a cohesive system that balances security, usability, and maintainability.
|
||||
By deploying Wild Cloud, individuals, communities, and organizations can:
|
||||
|
||||
By deploying Wild Cloud, organizations can:
|
||||
- Host their own cloud services.
|
||||
- Maintain full control over their data and communications.
|
||||
- Reduce or eliminate dependencies on surveillance-based platforms.
|
||||
- Build technical capacity.
|
||||
- Participate in a community of practice around independent infrastructure.
|
||||
|
||||
- Host their own email, calendar, file storage, website, and collaboration tools
|
||||
- Maintain full control over their data and communications
|
||||
- Reduce or eliminate dependencies on surveillance-based platforms
|
||||
- Build technical capacity and digital sovereignty
|
||||
- Participate in a community of practice around independent infrastructure
|
||||
The Wild Cloud project aims to start you with a simple self-hosted cloud solution that gets you set up quickly and lets you easily manage your cloud. However, it is a full solution. None of the technical foundations are stripped away. You can go deeper and extend your cloud how you see fit.
|
||||
|
||||
The Soverign Cloud project aims to start you with a simple self-hosted cloud solution that gets you set up quickly and easily manage your cloud. However, it is a full solution. None of the technical foundations are stripped away. You can go deeper and extend your cloud how you see fit.
|
||||
## Philosophy
|
||||
|
||||
### Architecture
|
||||
Wild Cloud embodies the Civil Society Technology Foundation's [core principles](/about/#principles), which include:
|
||||
|
||||
Wild Cloud allows individuals and organizations (cloud admins) to install and manage a full Kubernetes cluster (using K3s) made of one or multiple computers on their own premises. Kubernetes manages much of the complexity of maintaining the health of your cloud and managing the applications deployed in it.
|
||||
- **Self-determination by Design**: Users control their data and computing environment.
|
||||
- **Open Source, Always**: All components are free to use, study, modify, and share.
|
||||
- **Self-Hosting Infrastructure**: Direct control reduces dependency and vulnerability.
|
||||
- **Transparent Governance**: All components have clear, accountable governance.
|
||||
- **Practical Autonomy**: Infrastructure that users can understand and maintain.
|
||||
|
||||
### Applications
|
||||
By providing this reference implementation, we demonstrate that digital self-determination is not merely theoretical but practically achievable with current technology and modest resources.
|
||||
|
||||
Admins can deploy various applications into their cloud, including:
|
||||
## Architecture
|
||||
|
||||
- Email servers with webmail interfaces
|
||||
- Calendar and contacts synchronization
|
||||
- File storage and sharing
|
||||
- Collaborative document editing
|
||||
- Website hosting
|
||||
- Chat and communication tools
|
||||
- Knowledge management systems
|
||||
- And more, based on organizational needs
|
||||
Wild Cloud allows individuals, communities, and organizations (cloud operators) to install and manage a full, standard, Kubernetes cluster made of a few or many computers on their own premises. Kubernetes manages much of the complexity of maintaining the health of your cloud and managing the applications deployed in it. The Wild Cloud project provides a set of reference "stacks" that can be deployed on this Kubernetes cluster. These stacks combine best-of-breed open source software applications to enable productivity, communication, collaboration, and intelligence applications and more.
|
||||
|
||||
## Getting Started
|
||||
|
||||
The Wild Cloud project is currently being built out on GitHub.
|
||||
The Wild Cloud project is currently being developed, in the open, on GitHub.
|
||||
|
||||
{{< github repo="civil-society-dev/wild-cloud" showThumbnail=true >}}
|
||||
|
||||
|
||||
## Community Support
|
||||
## Join the Community
|
||||
|
||||
Wild Cloud is supported by a community of practitioners who share knowledge, troubleshooting tips, and enhancements. The Civil Society Technology Foundation provides:
|
||||
|
||||
- Documentation and tutorials
|
||||
- Installation guides for different environments
|
||||
- Regular security advisories
|
||||
- Community forum for mutual assistance
|
||||
- Workshops and training opportunities
|
||||
|
||||
## Philosophy
|
||||
|
||||
Wild Cloud embodies the Civil Society Technology Foundation's core principles:
|
||||
|
||||
- **Sovereignty by Design**: Users control their data and computing environment
|
||||
- **Open Source, Always**: All components are free to use, study, modify, and share
|
||||
- **Self-Hosting Infrastructure**: Direct control reduces dependency and vulnerability
|
||||
- **Transparent Governance**: All components have clear, accountable governance
|
||||
- **Forkability is Freedom**: Any component can be replaced or modified as needed
|
||||
- **Practical Autonomy**: Infrastructure that users can understand and maintain
|
||||
|
||||
By providing this reference implementation, we demonstrate that digital sovereignty is not merely theoretical but practically achievable with current technology and modest resources.
|
||||
The Wild Cloud project is developed and supported by a community of practitioners. To join the community or learn more, visit the [Wild Cloud website](https://mywildcloud.org).
|
||||
|
@@ -1,52 +0,0 @@
|
||||
baseURL = 'https://civilsociety.dev/'
|
||||
languageCode = 'en-us'
|
||||
title = 'Civil Society .dev'
|
||||
# theme = 'ananke'
|
||||
theme = 'blowfish'
|
||||
copyright = 'CivilSociety.dev'
|
||||
|
||||
[menus]
|
||||
[[menus.main]]
|
||||
name = 'About'
|
||||
pageRef = '/about'
|
||||
weight = 20
|
||||
[[menus.main]]
|
||||
name = 'Contribute'
|
||||
pageRef = '/contribute'
|
||||
weight = 30
|
||||
[[menus.main]]
|
||||
name = 'Projects'
|
||||
pageRef = '/projects'
|
||||
weight = 40
|
||||
[[menus.main]]
|
||||
name = 'Learning'
|
||||
pageRef = '/learning'
|
||||
weight = 50
|
||||
|
||||
[[menus.footer]]
|
||||
name = 'About'
|
||||
pageRef = '/about'
|
||||
weight = 10
|
||||
[[menus.footer]]
|
||||
name = 'Terms'
|
||||
pageRef = '/terms'
|
||||
weight = 20
|
||||
[[menus.footer]]
|
||||
name = 'Privacy'
|
||||
pageRef = '/privacy'
|
||||
weight = 20
|
||||
|
||||
[params]
|
||||
# mainSections = ["post"]
|
||||
text_color = "black"
|
||||
author = "CivilSociety.dev"
|
||||
favicon = ""
|
||||
site_logo = ""
|
||||
description = "The last theme you'll ever need. Maybe."
|
||||
# choose a background color from any on this page: https://tachyons.io/docs/themes/skins/ and preface it with "bg-"
|
||||
background_color_class = "bg-black"
|
||||
# choose fitting and alignment styles for the featured image using Tachyons classes such as "cover|contain" for fitting and "bg-top|bg-center|bg-bottom" for alignment, or add any other class space-separated to customize further
|
||||
featured_image_class = "cover bg-top"
|
||||
# choose a color dimming class for the page or site header from any on this page: https://tachyons.io/docs/themes/skins/, preface it with "bg-" and add the value such as "-X0" where X is in [1,9]
|
||||
cover_dimming_class = "bg-black-60"
|
||||
recent_posts_number = 3
|
8
layouts/_shortcodes/button.html
Normal file
@@ -0,0 +1,8 @@
|
||||
<a
|
||||
class="!rounded-lg bg-primary-600 px-4 py-2 !text-neutral !no-underline hover:!bg-primary-500 dark:bg-primary-800 dark:hover:!bg-primary-700"
|
||||
{{ with .Get "href" }}href="{{ . }}"{{ end }}
|
||||
{{ with .Get "target" }}target="{{ . }}"{{ end }}
|
||||
{{ with .Get "rel" }}rel="{{ . }}"{{ end }}
|
||||
role="button">
|
||||
{{ .Inner }}
|
||||
</a>
|
3
layouts/_shortcodes/div.html
Normal file
@@ -0,0 +1,3 @@
|
||||
<div class="{{ .Get "class" }}">
|
||||
{{ .Inner }}
|
||||
</div>
|
8
layouts/_shortcodes/more.html
Normal file
@@ -0,0 +1,8 @@
|
||||
<div class="flex cursor-pointer justify-end -mt-4">
|
||||
<a
|
||||
href="{{ .Params.href }}"
|
||||
class="rounded-lg border border-primary-400 px-2 py-[1px] text-s text-primary-700 dark:border-primary-600 dark:text-primary-400 hover:bg-primary-100 dark:hover:bg-primary-800 transition-colors duration-200 hover:rounded-lg"
|
||||
>
|
||||
Read more
|
||||
</a>
|
||||
</div>
|
14
layouts/home.html
Normal file
@@ -0,0 +1,14 @@
|
||||
{{ define "main" }}
|
||||
<article class="h-full max-w-full flex flex-col items-center justify-center">
|
||||
<section class="mt-6">
|
||||
{{ .Content }}
|
||||
</section>
|
||||
<section>
|
||||
{{ partial "recent-articles/main.html" . }}
|
||||
</section>
|
||||
<footer class="pt-8">
|
||||
</footer>
|
||||
</article>
|
||||
{{ end }}
|
||||
|
||||
|
9
package.json
Normal file
@@ -0,0 +1,9 @@
|
||||
{
|
||||
"name": "cstf",
|
||||
"version": "2.87.0",
|
||||
"description": "CSTF website.",
|
||||
"scripts": {
|
||||
"dev": "NODE_ENV=development npx ./themes/blowfish/node_modules/@tailwindcss/cli -c ./themes/blowfish/tailwind.config.js -i ./themes/blowfish/assets/css/main.css -o ./assets/css/compiled/main.css --jit -w",
|
||||
"build": "NODE_ENV=production npx ./themes/blowfish/node_modules/@tailwindcss/cli -c ./themes/blowfish/tailwind.config.js -i ./themes/blowfish/assets/css/main.css -o ./assets/css/compiled/main.css --jit"
|
||||
}
|
||||
}
|
18
scripts/deploy.sh
Executable file
@@ -0,0 +1,18 @@
|
||||
#!/bin/bash
|
||||
|
||||
# Build the TailwindCSS assets
|
||||
npm run build
|
||||
|
||||
# Build the site
|
||||
hugo build
|
||||
|
||||
# Build and push the Docker image
|
||||
docker build -t payneio/civilsociety.dev . --file ./Dockerfile
|
||||
docker push payneio/civilsociety.dev
|
||||
|
||||
# Deploy to Kubernetes
|
||||
|
||||
# First time...
|
||||
# bin/wild-app-deploy civilsociety
|
||||
|
||||
kubectl rollout restart deployment civilsociety -n civilsociety
|