Digital Opt-Out: Reclaiming Your Attention and Data
The most accessible form of opting out is digital. It requires no relocation, no entity formation, no career change. It requires only the recognition that your attention is being sold, your data is being harvested, and the platforms you use daily are designed — with considerable engineering talent —
The most accessible form of opting out is digital. It requires no relocation, no entity formation, no career change. It requires only the recognition that your attention is being sold, your data is being harvested, and the platforms you use daily are designed — with considerable engineering talent — to ensure you keep using them whether or not they serve your interests. The digital opt-out is where most people can start today, and the lessons it teaches apply to every other domain of sovereignty.
Shoshana Zuboff documented the architecture in The Age of Surveillance Capitalism: the major technology platforms generate revenue not by providing services to users but by extracting what she calls “behavioral surplus” — the patterns of your activity that predict your future behavior and are sold to advertisers as certainty about what you will do next. You are not the customer. You are the raw material. The service you receive is the bait; the data you generate is the product. Understanding this does not require paranoia. It requires the same clear-eyed assessment you would apply to any business relationship: what am I giving, what am I getting, and is the exchange fair?
The Attention Economy
Before addressing data, we need to address attention, because attention is the more immediate extraction. The average American spends over four hours per day on their smartphone, and the apps consuming that time are engineered — through variable reward schedules, infinite scroll, notification triggers, and social comparison loops — to maximize time-on-platform. This is not speculation about intent; it is documented practice. Former platform employees have described the design methodology in detail. The goal is engagement, and engagement is measured in minutes of your life.
The sovereign question is simple: is this exchange serving you? Four hours per day is twenty-eight hours per week. That is a part-time job, donated to platforms that monetize your presence without compensating you for it. The sovereign does not need to eliminate digital technology — that is neither practical nor desirable. The sovereign needs to become intentional about what receives their attention, for how long, and on whose terms.
The practical starting point is measurement. Track your screen time for one week without trying to change it. Look at the numbers. Most people are genuinely surprised. The awareness itself shifts behavior, because the gap between how much time you think you spend and how much time you actually spend is where the extraction hides.
The Data Economy
The data extraction is subtler than the attention extraction, and for most individuals, less immediately harmful — but more structurally concerning. What platforms know about you: your location history, your search queries, your purchase patterns, your communication metadata, your browsing history, your social graph, your political leanings, your health concerns, your financial behavior, and your psychological vulnerabilities. This is not speculation. It is documented by the platforms’ own advertising tools, which allow advertisers to target users based on these exact categories.
Snowden’s Permanent Record describes the government side of the surveillance architecture. The commercial side is, in many ways, more comprehensive, because people voluntarily hand their data to platforms in exchange for convenience, and that voluntary handover generates far more behavioral data than any government surveillance program could collect through coercion.
The proportional response is not to disappear from the internet. It is to become deliberate about which services receive your data and what they do with it.
The Practical Digital Opt-Out Spectrum
Digital sovereignty is a spectrum, not a binary. The steps below are ordered from simplest to most involved. Start where you are. Move at whatever pace serves you.
Level 1: Low Effort, High Impact
Ad blocker. Install uBlock Origin on every browser you use. It is free, open-source, and blocks the tracking scripts that follow you across the internet. This single step eliminates the majority of web-based tracking for most users.
Privacy settings. Go through the privacy settings on your phone (iOS: Settings > Privacy & Security; Android: Settings > Privacy). Disable ad tracking. Review which apps have access to your location, contacts, microphone, and camera. Revoke access for any app that does not need it. This takes fifteen minutes and should be done once per quarter.
Password manager.If you reuse passwords — and most people do — a single data breach exposes every account that shares that password. Bitwarden (free, open-source) or 1Password ($36/year) solves this entirely. This is not optional. It is the digital equivalent of locking your front door.
Level 2: Moderate Effort, Significant Sovereignty
Email.Move from Gmail to a privacy-respecting provider. Proton Mail (free tier available, paid plans from $4/month) or Fastmail ($5/month) are the standard recommendations. Gmail scans your email to build advertising profiles. Proton Mail encrypts it. The migration takes an afternoon; the benefit is permanent.
Search.Switch your default search engine from Google to DuckDuckGo (privacy-focused, ad-supported but does not build profiles) or Kagi ($10/month, no ads, no tracking). Google Search is the primary mechanism through which Google builds your behavioral profile. Switching search engines is the single highest-impact change per unit of effort.
Browser. Firefox with privacy settings configured (Enhanced Tracking Protection set to Strict) or Brave (Chromium-based, privacy-focused by default). Both are free. Chrome is built by an advertising company; it behaves accordingly.
Two-factor authentication. Enable it on every important account. Use an authenticator app (Authy, Google Authenticator, or Aegis for Android) rather than SMS, which is vulnerable to SIM-swapping attacks.
Level 3: Higher Effort, Deep Sovereignty
VPN.A VPN encrypts your internet traffic and masks your IP address from your internet service provider and the websites you visit. What it does not do: make you anonymous, protect you from all tracking, or replace other privacy practices. Mullvad ($5/month, no account required — you get a number) or ProtonVPN (included with Proton Mail plans) are the trustworthy options. Avoid free VPNs; if the service is free, you are the product.
Self-hosted file storage.A Synology NAS ($300-$600 for hardware) gives you local, encrypted file storage that you control. Cloud alternative: Proton Drive or Tresorit for encrypted cloud storage that the provider cannot read.
Own your domain. Buy a personal domain through Cloudflare Registrar (at-cost pricing, no markup). Point it at a website or newsletter you control. When you own the domain, you own the address — no platform can take it from you.
Communication. Signal for messaging (encrypted, open-source, free). Jitsi Meet for video calls (encrypted, open-source, free, no account required). These replace the platforms that monetize your communication metadata.
Social Media: Use or Be Used
Social media deserves its own assessment because it is where the attention economy and the data economy converge most intensely. The sovereign position on social media is not abstinence — it is intentionality.
The question to ask about each platform you use: am I using this strategically (to build an audience, maintain specific relationships, or access specific information), or am I being used by it (scrolling without purpose, checking compulsively, feeling worse after use than before)? The honest answer determines the honest response.
For platforms you use strategically: set time limits, disable notifications, use the browser version instead of the app (apps have more tracking capability), and audit quarterly whether the platform is still serving your purpose. For platforms you use compulsively: delete the app from your phone. You can always reinstall it. The friction of reinstallation is often enough to break the compulsive cycle.
The Sovereign Digital Principle
The principle that governs all of this is simple: if the service is free, you are the product. If you are paying, demand that you are the customer. This is not an absolute rule — some free services (Signal, Firefox, Wikipedia) are genuinely free because they are funded by donations or grants. But as a default heuristic for evaluating digital services, it is remarkably reliable.
The digital opt-out is the gateway to every other form of sovereignty. It costs the least. It teaches the most. And it demonstrates, in the most concrete terms available, that every institutional dependency is a choice you can re-examine — and that the alternatives, when you look for them, are often better than what you left behind.
This article is part of The Case for Opting Out series at SovereignCML.
Related reading: The Digital Sovereignty Toolkit, Why “Work Within the System” Has a Ceiling, The Opt-Out Economy