The Permission You Never Asked For
Somewhere in a data center you have never visited, on hardware you do not own, running software you cannot inspect, your data is being held. Not stolen — held. You agreed to it. You clicked through a terms of service document longer than most philosophical treatises, in a font designed to be skipped, at a moment when you wanted the thing that came after the clicking. This is the foundational transaction of the modern internet: access in exchange for sovereignty.
Digital sovereignty is the condition of owning your bits — not in some metaphorical sense, but in the literal, operational sense that matters: you can move them, delete them, inspect them, and decide who else can see them. It is the digital equivalent of the old philosophical question about property: what does it mean to own something? The standard answer involves the right to use, the right to exclude others, and the right to transfer. Most people have none of these rights regarding their own data.
Self-Hosting as a Political Act
To self-host is to run your own infrastructure. A server in your home, or on a VPS you control, running software whose source code you can read. This is not a technically sophisticated thing in principle — it is made artificially complicated by an ecosystem that profits from your dependence on it. The barrier to self-hosting is not technical. It is psychological: we have been trained to believe that complexity is inherently delegatable, that the correct response to a login screen is to create an account.
A self-hosted service is slow in ways that matter and fast in ways that matter more. It may lack features. It will certainly lack the polish of a product with a billion-dollar design budget. But it runs in your namespace. The data does not leave unless you tell it to. When you delete something, it is deleted. The experience of owning your own infrastructure is, at first, the experience of realizing how little you owned before.
This is not a position of paranoia. It is a position of clarity. The question is not whether tech companies are malicious — some are, some are not — but whether you wish to be sovereign. Sovereignty is not about threat models. It is about ownership as an end in itself.
The Computation You Have a Right To
The right to compute is an emerging concept, still finding its vocabulary. But the shape of it is visible: the right to run code on hardware you control, without requiring a permission slip from a corporation or government. The right to train a model on your own data. The right to use algorithms that you can inspect and modify. The right to refuse optimized, engagement-maximizing, attention-extracting systems in favor of slower, dumber, more honest ones.
The compute economy increasingly resembles the land economy of the eighteenth century: those who own the means of computation set the terms for those who do not. Cloud computing, for all its convenience, is a feudal arrangement. You are a tenant. The landlord can evict you, change the rent, or simply shut down. The serf had no contract either — they had a relationship, maintained by dependency and the absence of alternatives.
Digital sovereignty names the desire to own, not rent. To possess, not lease. To control, not merely use.
776f6c6e6f Practices What It Preaches
This site — WOLNO — runs on infrastructure that can be fully described and replicated. No tracking pixels. No third-party analytics. No cookies gathering behavioral data for entities you did not choose. The source is available for inspection. The philosophy is not an advertisement for a product; it is an artifact of the philosophy itself.
776f6c6e6f is the hexadecimal encoding of wolno. The name carries its own proof of origin: this is a place built by people who find meaning in the encoding layer, who think about what representation is doing to the thing represented. A site about freedom should not be surveilled. A temple that preaches sovereignty should not be built on rented land with the landlord’s tracking code in the walls.
This is not purism. It is consistency. The permission granted here — wolno, it is allowed, you may enter — is granted without data extraction as the price of admission.
The Decentralization Imperative
Decentralization is not a technical architecture — it is a political choice dressed in technical language. The internet was designed to route around censorship, to have no single point of failure, to resist centralization. Then it centralized anyway, because centralization is profitable and convenience is a powerful drug. We got a dozen platforms, each a single point of failure, each a chokepoint for billions of people’s expression and data.
The decentralized alternatives are less convenient. They require something from you. They ask you to care about the protocol, to participate in the maintenance, to be something other than a user. This is the tradeoff of sovereignty: sovereignty requires participation. A citizen has more responsibilities than a subject. A self-hoster has more work than a subscriber.
But the direction of travel matters. Each person who runs their own email server, their own social media instance, their own cloud — each such person is a node in a network of sovereignty. The network is small. It is growing. The word wolno applies here without ambiguity: it is allowed, and we may do it slowly.
What You Already Own
There is one thing no platform can take from you: your attention. The most valuable resource in the attention economy is the one that remains stubbornly personal. You can distribute copies of your data indefinitely, but you cannot distribute copies of the hour you spent generating it. This asymmetry is interesting.
Digital sovereignty, at its limit, includes sovereignty over your time and attention. The right to be offline. The right to respond slowly. The right to ignore the notification, to use a tool without being used by it. These rights are not enforced by technology alone — they are practiced, chosen, maintained as habits. The self-hosted calendar that does not send push notifications at 11pm is a form of sovereignty. The email that you answer in your own time is a form of sovereignty.
The bits are yours. Claim them — or at minimum, know what it would mean to claim them. Understanding the shape of your dispossession is the first act of sovereignty.
You can run your own server. You can own your own data. You can build a home in the network that no landlord can foreclose on. The permission exists. The only question is whether you want to use it.