Chapter 6: Digital Sovereignty
Your digital life — email, files, communication, income platforms, identity, audience — sits on infrastructure you do not own and cannot control. Every platform you use is a landlord, and the terms of your tenancy can change without notice, without negotiation, and without appeal. Digital sovereignt
Your digital life — email, files, communication, income platforms, identity, audience — sits on infrastructure you do not own and cannot control. Every platform you use is a landlord, and the terms of your tenancy can change without notice, without negotiation, and without appeal. Digital sovereignty means owning the infrastructure your digital life depends on, or at minimum maintaining the ability to migrate when any single platform fails, changes terms, or decides you are no longer welcome. Of all seven sovereignty domains, this one is the most immediately actionable. You can begin today, with free tools, and within a week have dramatically reduced your platform dependency.
The Digital Dependency Audit
The exercise is simple and the results are usually uncomfortable. List every platform your life and income depend on. Your email provider. Your cloud storage. Your social media accounts. Your income platforms — Stripe, PayPal, Amazon, Etsy, YouTube, Substack, whatever you use. Your communication tools. Your banking apps. Your password manager. Now, for each one, imagine that the company locks your account tomorrow. No warning, no explanation, no recourse for thirty days. What breaks?
For most people, the answer is: nearly everything. A locked Google account means lost email, lost documents, lost photos, lost contacts, lost calendar, and lost two-factor authentication for dozens of other services. A frozen PayPal account means income in limbo for weeks. A suspended social media account means lost audience access. A deactivated Amazon seller account means inventory stranded in warehouses. These are not hypothetical scenarios. They happen daily, to ordinary people, for reasons ranging from algorithmic error to policy changes to security false positives.
The audit reveals dependency. The response is architecture — building redundancy, maintaining alternatives, and owning what you can own.
Email Sovereignty
Email is the most critical piece of digital infrastructure you use, because nearly every other account — banking, social media, income platforms, government services — authenticates through it. If you lose access to your email, you lose access to everything downstream. Email sovereignty starts with a single decision: own your domain name and run your email through it.
A custom domain email address — you@yourdomain.com — is portable. If your email hosting provider changes terms, raises prices, or shuts down, you move your domain to a new provider and your email address stays the same. Every contact, every account, every registration continues to work. An email address tied to a provider — yourname@gmail.com, yourname@outlook.com — is not portable. If you lose that account, every downstream service that authenticates through it must be individually recovered, if recovery is even possible.
Domain registration costs roughly $10 to $20 per year. Email hosting through providers like Fastmail, Proton Mail, or Zoho costs $30 to $60 per year. For less than the cost of a monthly streaming subscription, you can own the most important piece of digital infrastructure in your life. This is the single highest-leverage digital sovereignty action available.
File Sovereignty
Cloud storage is convenient. It is also someone else’s computer, governed by someone else’s terms of service, subject to someone else’s business decisions. The sovereign does not refuse cloud storage — the convenience and accessibility are genuine. The sovereign ensures that anything important also exists somewhere they control.
The 3-2-1 backup rule provides the framework: three copies of important data, on two different types of media, with one copy offsite. In practice, this might mean your files live on your computer’s hard drive (copy one), are backed up to an external drive or NAS in your home (copy two, different media), and are synced to a cloud service or stored at a different physical location (copy three, offsite). The cloud service can be one of the three copies. It should not be the only copy.
Self-hosted cloud solutions — Nextcloud, Synology NAS, and similar systems — provide the accessibility of cloud storage with the control of local ownership. These require more technical setup than consumer cloud services, but the technical barrier has dropped substantially; a capable person can configure a Nextcloud instance on a Raspberry Pi in an afternoon. The result is cloud-like functionality on hardware you own, with data that remains under your control regardless of any company’s decisions.
Communication Sovereignty
The channels through which you communicate — with family, friends, colleagues, clients — should include at least one that is encrypted and at least one that you could migrate from without losing your contact network. Signal provides end-to-end encrypted messaging that is free, open-source, and not dependent on advertising revenue or data harvesting for its business model. It is not the only option, but it is currently the strongest combination of security, usability, and independence from platform incentives.
The principle extends beyond messaging. Your contact list should exist in a format you control — a file you can export, back up, and import to a new service. Your communication history, to the extent it matters, should be exportable. The sovereign does not build their communication life inside a single walled garden from which there is no exit without significant loss.
Income Platform Sovereignty
If your income flows through a platform you do not control, your income exists at that platform’s discretion. This is the digital sovereignty principle with the highest financial stakes. Payment processors — Stripe, PayPal, Square — can freeze funds, close accounts, and impose holds with limited explanation and lengthy resolution processes. Marketplace platforms — Amazon, Etsy, eBay — can suspend sellers, change fee structures, and alter algorithms in ways that reduce visibility to near zero.
The sovereign standard is that no single platform should control more than fifty percent of your digital income, and you should maintain at least one direct payment method — typically your own website with a payment processor, or a direct invoicing system — that allows you to transact with clients without any platform intermediary. An email list of customers who have purchased from you is the most valuable digital asset you can build, because it allows you to reach buyers directly regardless of what any platform decides.
This does not mean abandoning platforms. Platforms provide audience, infrastructure, and transaction volume that are difficult to replicate independently. It means ensuring that if any single platform relationship ends, your business survives. The platform is a channel. Your business is the relationships and the capability to deliver value. Those must exist independent of any single channel.
Identity Sovereignty
Your digital identity — your name, your content, your audience, your reputation — should reside on infrastructure you own. A social media following of 100,000 is valuable until the platform changes its algorithm, suspends your account, or declines into irrelevance. An email list of 10,000 people who opted in to hear from you is an asset that no platform can take away.
Domain ownership is the foundation. Your domain name is the one piece of internet real estate that is genuinely yours — registered in your name, transferable between registrars, and independent of any hosting or platform provider. Your website, hosted on that domain, is your permanent home on the internet. Social media profiles, marketplace listings, and platform presences are outposts. The domain is home.
Content published on your own domain is yours. Content published on Medium, LinkedIn, Twitter, or any other platform exists at the platform’s discretion. The sovereign publishes first to their own domain and syndicates to platforms — not the reverse. This ensures that the canonical version of your work exists on infrastructure you control, and that platform changes or account suspensions do not erase your published body of work.
Privacy as Sovereignty
Privacy is not about having something to hide. Privacy is about maintaining the autonomy to share what you choose, with whom you choose, on terms you set. In an economy built on surveillance — Shoshana Zuboff’s “surveillance capitalism,” in which your behavioral data is the raw material for prediction products sold to advertisers — privacy is a form of sovereignty. The person who accepts the default privacy settings of every platform is donating their behavioral data to companies whose interests do not align with their own.
The practical privacy stack for ordinary people is neither expensive nor technically demanding. A reputable VPN encrypts your internet traffic and prevents your ISP from logging your browsing activity. A privacy-focused browser — Firefox with appropriate extensions, or Brave — reduces tracking across websites. Encrypted messaging (Signal) protects your conversations. A password manager (Bitwarden, 1Password) with unique, strong passwords for every account prevents the cascade failure that occurs when one breached password unlocks multiple accounts. Two-factor authentication, preferably through a hardware key or authenticator app rather than SMS, secures your most important accounts against unauthorized access.
None of this makes you invisible. It makes you a harder target than the person using default settings, which is — in the economics of mass surveillance — usually sufficient.
What This Means For Your Sovereignty
Digital sovereignty is the domain where the gap between current vulnerability and achievable resilience is largest. Most people have taken zero deliberate steps toward digital independence. The person who registers a domain, sets up custom email, implements the 3-2-1 backup rule, installs a VPN and encrypted messaging, and builds an email list has accomplished more digital sovereignty in a week than most people accomplish in a decade.
The $99 Sovereign Manifesto includes the complete digital sovereignty checklist, the platform migration playbook, and privacy tool recommendations organized by priority and technical difficulty. Start with email sovereignty — it costs less than a coffee habit and protects the most critical piece of your digital infrastructure.
Own your email. Own your domain. Own your audience. Own your data. Everything else in the digital domain follows from these four commitments.
This article is part of The Manifesto Series at SovereignCML. Related reading: Chapter 5: Healthcare Sovereignty, Chapter 7: Energy and Physical Sovereignty, Chapter 8: Educational Sovereignty