From the Rubble | Digital Sovereignty Series | Social Media


series: [“Digital Sovereignty”]

TLDR: Social media platforms are not communication tools with a business model attached. They are attention harvesting machines that happen to let you communicate. Everything you post is permanent. Everything you do on the platform - and increasingly off it - is collected, profiled, and sold. The dopamine loop is engineered, not accidental. The mental and physical damage is documented, not theoretical. The phone in your pocket is a sensor array running apps that use your microphone, camera, accelerometer, and GPS in ways you never agreed to. This article covers what they’re actually collecting, what it’s doing to your brain and body, who the players are and what empire each of them is building, where to go instead, and how to actually exit.


series: [“Digital Sovereignty”]

The Feed Is Not Free

The phrase “if you’re not paying for the product, you are the product” has been repeated so many times it’s lost its bite. Let’s be more specific.

You are not the product. Your attention is the product. Your behavioral data is the product. Your emotional state is the product - because an anxious, outraged, or envious user scrolls longer than a content one. Your social graph is the product. Your location history is the product. Your purchase intent is the product. Your political leanings are the product. Your relationship status, your health concerns, your financial situation, your religious beliefs - all products, inferred from your behavior whether you disclosed them or not.

The platforms don’t sell your data directly in most cases. They sell access to you - the ability to show you a specific message at a specific moment when their model predicts you’re most susceptible to it. That is a more sophisticated and more dangerous form of exploitation than selling a spreadsheet of your email address.

This is the attention economy. Your focus is a finite resource. Every hour you spend in a feed is an hour someone else monetized.


series: [“Digital Sovereignty”]

Everything Is Forever

The first thing to understand before you post anything anywhere: permanence is the default.

Deleting a post removes it from your visible profile. It does not remove it from the platform’s servers. It does not remove it from the archives of third-party data brokers who scraped it before deletion. It does not remove it from screenshots. It does not remove it from government databases that collected it under legal process. It does not remove it from the Wayback Machine or similar archival services.

The EU’s “right to be forgotten” laws have forced some platforms to delist content from search results. They have not forced deletion from corporate or government databases.

What this means in practice:

  • That post you made in 2016 expressing a political view you’ve since revised - archived
  • That photo from a party in 2019 - archived
  • That comment you fired off in anger at 1am - archived
  • That medical question you asked in a Facebook group - archived
  • That argument with a family member that played out in a comment thread - archived

Employers run social media audits. Insurance companies purchase behavioral data. Law enforcement issues legal process to platforms. Divorce attorneys subpoena records. Background check services aggregate everything they can find.

The timeline of what you can control ends the moment you hit post. What happens after that is not yours to manage.


series: [“Digital Sovereignty”]

What They’re Actually Collecting

The gap between what people think is being collected and what is actually being collected is enormous.

What you actively provide:

  • Name, email, phone number, date of birth
  • Photos, posts, comments, messages
  • Profile information, listed interests, relationship status

What you generate by using the platform:

  • Every post you read and how long you paused on it
  • Every post you scrolled past without engaging
  • Every video you watched, rewound, or skipped
  • Every link you hovered over without clicking
  • Every profile you visited - including people you’d never engage with publicly
  • Every search you ran on the platform
  • Every ad you saw, ignored, or clicked
  • Device, OS, browser, IP address
  • Approximate location from IP, exact location if permission was granted - and increasingly even without explicit permission via WiFi triangulation

What they infer from your behavior:

  • Political leanings (with documented accuracy)
  • Income bracket and financial stability
  • Relationship status and stability
  • Mental health state
  • Pregnancy status - Meta infamously inferred this before users announced it
  • Sexual orientation
  • Religious beliefs
  • Likelihood of purchasing specific products
  • Susceptibility to specific emotional content types
  • Sleep patterns from active hours

What they collect off-platform: Every website with a Facebook Like button, a Meta Pixel, or a Google Tag sends data back to those companies about your visit - whether you’re logged in or not, whether you have an account or not. Meta’s pixel alone is embedded in millions of websites. Google’s tracking infrastructure covers an estimated 85%+ of the web. You are being tracked across the internet by these companies continuously, regardless of whether you’re using their platforms.

What they share:

  • Advertisers: aggregated and segmented behavioral targeting
  • Data brokers: sold in varying degrees by platform and jurisdiction
  • Law enforcement: Meta fulfilled 77% of government data requests in the second half of 2024
  • Internal research: including research they’ve suppressed when it showed harm

series: [“Digital Sovereignty”]

The Device in Your Pocket

Before we get to the platforms, let’s talk about the hardware they run on.

Your smartphone is the most comprehensive surveillance device ever built and voluntarily carried. It contains a microphone, front and rear cameras, GPS, accelerometer, gyroscope, barometer, Bluetooth radio, WiFi radio, and NFC. Every one of these sensors is potentially accessible to every app you’ve granted permissions - and some data collection happens through channels most people never consider.

The Microphone

Voice assistants - Siri, Google Assistant, Alexa - maintain always-on listening states to detect their wake words. That means the microphone is structurally active. Apps that have been granted microphone permission can access it in the background. Whether they do, and what they do with what they hear, is largely unverifiable by the user.

The more documented mechanism is ultrasonic cross-device tracking (uXDT). Apps embed inaudible high-frequency audio beacons (18–20 kHz, beyond human hearing) into TV commercials, in-store audio, and web ads. When a nearby smartphone microphone picks up this beacon, the app reports back to an advertising server - correlating what you’re watching on TV, where you’re standing in a retail store, and what device you’re carrying. All without recording a word of conversation.

Companies caught using this include Alphonso (embedded in over 250 gaming apps) and SilverPush. The FTC investigated. The technology is real, documented, and continues in evolved forms. It requires microphone permission - permission that most people grant without reading what it’s used for.

The Camera

Even when you’re not taking photos, apps with camera permission can request low-resolution frames to detect movement, presence, and faces. This happens silently in the background. Combined with AI processing, front-facing cameras can infer emotional state from micro-expressions during content consumption - data that’s extraordinarily valuable for advertising systems and behavioral profiling.

Motion Sensors

Accelerometers and gyroscopes were not considered privacy-sensitive and therefore didn’t require explicit user permission on most platforms for years. Research has shown these sensors can:

  • Identify your walking gait - a unique biometric identifier
  • Infer keystrokes from the vibration pattern of your taps
  • Determine whether you’re in a car, on a train, or walking
  • Create behavioral fingerprints that identify you across devices even without login

No permission prompt. No disclosure. Happening continuously.

Bluetooth and WiFi Scanning

Your phone constantly scans for nearby Bluetooth and WiFi signals even when you’re not actively connecting to anything. This creates a continuous log of:

  • Devices near you (identifying the people you spend time with)
  • Physical locations via WiFi network fingerprinting
  • Movement patterns through stores, buildings, and public spaces

Retail chains use Bluetooth beacons to track shoppers through stores. Advertisers correlate your physical presence in specific locations with your subsequent online behavior. Your phone is mapping your life and reporting it continuously.

Buried Settings and Silent Updates

Operating system updates routinely change default permission states. A setting you deliberately turned off may be re-enabled after an update without notification. This is documented behavior on both iOS and Android - new features ship with opt-out instead of opt-in, meaning the collection begins before most users are aware it exists.

Examples of settings that have been quietly re-enabled or added through updates:

  • Location sharing with app developers
  • Personalized advertising identifiers reset to “on”
  • Voice assistant activation sensitivity increased
  • Photo analysis for “memories” and facial recognition features
  • Cross-app tracking for “relevant” content

The practical response: after every major OS update, audit your privacy settings from scratch. Don’t assume they’re where you left them.

The Browser-Over-App Rule

This is one of the highest-leverage habits you can build: if something can be done in a browser, do it in a browser.

Native apps demand a permission set that browsers don’t:

  • Camera: apps can request it; a browser can only access camera through explicit in-session prompts
  • Microphone: same
  • Location: apps can access background location; browsers only access location during active sessions with explicit prompts
  • Contacts: apps can request full contact list access; browsers have no contact access
  • Storage: apps can read and write to device storage; browsers operate in sandboxes
  • Background activity: apps run processes when you’re not using them; browser tabs go dormant
  • Push notifications: apps can send them anytime; browser notifications require explicit permission and can be disabled globally

The trade-off is convenience - apps are faster and more polished. The cost is that every app is a potential surveillance vector running continuously in the background. The browser version of the same service has dramatically fewer permissions and stops running the moment you close the tab.

Specific applications of this rule:

  • Facebook/Instagram: use facebook.com in Firefox with uBlock Origin rather than the app - the app has microphone, camera, location, and contacts access; the website has none of that unless you explicitly grant it in-session
  • TikTok: same logic - the app is deeply invasive; the website version is dramatically reduced
  • Reddit: browser beats app on every privacy dimension
  • Shopping: Amazon’s mobile app tracks your in-app behavior more granularly than the website
  • News/Media: browser with uBlock Origin blocks trackers the app would send freely

The apps are designed to be better than the mobile browser experience specifically to get you to use the app. That’s not a coincidence. The app is the collection mechanism. The browser is the path around it.


series: [“Digital Sovereignty”]

What It’s Doing to Your Brain and Body

The Dopamine Architecture Is Intentional

Social media platforms use variable reward schedules - the same psychological mechanism used in slot machines. You don’t know if the next scroll will show something rewarding or boring. That unpredictability is more addictive than consistent rewards. It was designed this way, by people who understood exactly what they were building.

Every like, comment, notification, and new post triggers a small dopamine release in the brain’s reward center. Over time, this creates tolerance: you need more stimulation to get the same reward signal. The brain starts pruning neural pathways to make the reward loop faster and more efficient. The result is measurable structural brain changes - a shorter, faster reward pathway that drives impulsivity, and reduced volume in areas responsible for emotional regulation and decision-making.

A 2025 EEG study found that people who spent more than two hours daily scrolling showed a 35% reduction in prefrontal impulse control over six months. The prefrontal cortex is where you make deliberate decisions, regulate emotions, and resist impulse. Social media is measurably degrading the part of your brain responsible for self-control.

TikTok’s algorithm specifically has been shown to spike dopamine by juxtaposing content types - funny video followed by serious political content - creating neurological whiplash that keeps the reward system continuously engaged. Gamma wave activity increased 62% during these transitions in research subjects. The algorithm isn’t just showing you content you like. It’s managing your neurochemical state to maximize time on platform.

Serotonin and the Comparison Engine

Social media is a perfectly designed comparison machine. You see everyone’s highlight reel against your unfiltered experience of your own life. This comparison effect consistently reduces serotonin activity - the neurotransmitter most associated with baseline contentment and social belonging.

The platforms know this. The research showing Instagram made teenage girls feel worse about their bodies was conducted internally by Meta and suppressed. Frances Haugen’s whistleblower documents confirmed Meta knew their platforms were causing measurable psychological harm and chose engagement over user welfare.

Sleep, Cortisol, and the Downstream Health Cascade

Evening social media use disrupts sleep through two mechanisms. Blue light from screens suppresses melatonin production, delaying sleep onset. And stimulating, emotionally activating content keeps the sympathetic nervous system elevated when it should be downregulating for sleep.

From a functional health perspective, this matters beyond feeling tired. Chronically disrupted sleep elevates cortisol. Elevated cortisol is the upstream driver of dysregulated blood sugar, immune suppression, hormonal imbalance, gut permeability, and accumulated inflammatory damage. The downstream health consequences of chronic sleep disruption from evening screen use are the same as chronic stress - because they are chronic stress.

The phone next to your bed running a social media app that sends you notifications is a cortisol delivery device.

Attention Fragmentation

The average attention span has measurably declined as short-form video consumption has increased. Generation Z, raised on Instagram and TikTok, shows an average attention span of approximately eight seconds. The mechanism is direct: when you train your brain to expect a new stimulus every 3–15 seconds, it loses the capacity to sustain focus on anything that doesn’t deliver at that rate.

This degrades the ability to read long-form content, follow complex arguments, sit with ambiguity, and do deep work. The cognitive infrastructure that social media degrades is the same infrastructure required for critical thinking, pattern recognition, and the kind of sustained analysis that actually changes your understanding of the world.


series: [“Digital Sovereignty”]

The Players and What They Actually Own

Meta

Core platforms:

  • Facebook
  • Instagram
  • WhatsApp
  • Threads

Additional infrastructure:

  • Oculus/Meta VR
  • Facebook Marketplace
  • Meta Pay
  • Meta AI
  • Meta Pixel (embedded on millions of third-party websites)

What they know: The most comprehensive behavioral profile in consumer technology. Meta’s cross-platform data - combining Facebook activity, Instagram behavior, WhatsApp metadata, and off-platform tracking via the Meta Pixel - produces profiles that are both broader and deeper than any competitor. They know your social graph, your interests, your anxieties, your purchase history, your relationship dynamics, and your political susceptibility.

Regulatory history: $1.3 billion GDPR fine in 2023, the largest in EU history. Multiple FTC settlements. Internal research suppression documented by whistleblowers. Congressional testimony that produced no meaningful regulation.


series: [“Digital Sovereignty”]

Google / Alphabet

Core platforms:

  • YouTube
  • Google Search
  • Gmail
  • Google Maps
  • Google Photos
  • Google News

Additional infrastructure:

  • Android OS (on ~72% of smartphones globally - OS-level data access)
  • Chrome browser (dominant browser globally)
  • Google Ads network (tracking infrastructure on ~85% of the web)
  • Fitbit
  • Nest/Google Home
  • Waymo
  • DeepMind

What they know: Your search history is your inner life. Every question you’ve asked, every concern you’ve researched, every purchase you’ve considered - indexed and retained. Combined with location history from Maps, email content from Gmail, viewing history from YouTube, behavioral data from Chrome, and Android’s OS-level access, Google’s profile extends from your health concerns to your daily movements to your political views to your relationships.


series: [“Digital Sovereignty”]

TikTok / ByteDance → Now: TikTok US / Oracle-led consortium

This one requires current context because it changed significantly.

What happened: Congress passed a law in 2024 requiring TikTok to be sold or banned due to its Chinese ownership. The Supreme Court upheld the law. Trump issued executive orders delaying enforcement while a deal was negotiated. In December 2025, TikTok signed agreements to form a new U.S. joint venture. The deal closed January 22, 2026.

Current ownership of U.S. TikTok:

  • Oracle: 15% - content moderation oversight, algorithm security, data auditing
  • Silver Lake (private equity): 15%
  • MGX (Abu Dhabi state investment fund): 15%
  • ByteDance: 19.9% retained
  • Existing ByteDance investors: 30.1%

The algorithm: ByteDance still owns the underlying algorithm. Oracle is “retraining” it on U.S. user data only and auditing it for national security compliance. The content recommendation engine that made TikTok the most psychologically effective engagement machine ever deployed remains ByteDance’s intellectual property - now with American investors controlling moderation policy.

Larry Ellison - the figure you need to understand:

Oracle’s co-founder and chairman is the central player here, and his profile raises questions that go well beyond a typical tech acquisition.

  • Founded Oracle in the 1970s on a CIA database contract - the company is literally named after a CIA project
  • Largest individual donor to Friends of the Israel Defense Forces - $16.6 million in 2017 (the largest single donation in FIDF history), $10 million in 2014, totaling over $26 million documented
  • Personal friend of Benjamin Netanyahu for decades; hosted Netanyahu on his private Hawaiian island; offered Netanyahu a $500,000 Oracle board position
  • Oracle opened a $319 million government cloud data center in Jerusalem; has contracts with the Israeli Air Force for classified surveillance projects
  • Oracle’s former CEO Safra Catz (Israeli-American): “Our commitment to Israel is second to none”
  • Publicly declared in 2024: “Citizens will be on their best behavior because we are constantly recording and reporting everything that’s going on” - this is the man who now oversees data security and algorithm auditing for 170 million American TikTok users

The media empire Ellison is building:

  • Oracle: cloud infrastructure, AI data centers, TikTok US algorithm oversight
  • Paramount/Skydance (son David Ellison as CEO): CBS News, Paramount Pictures, Paramount+, MTV, Comedy Central, Showtime, Nickelodeon
  • Attempted acquisition of Warner Bros. Discovery (CNN, HBO, Discovery)
  • Rupert Murdoch (Fox) reportedly seeking to join the consortium

When you scroll TikTok, Larry Ellison’s company is now auditing what you see. The man who built a database for the CIA, donated more money to the IDF than any other private individual in history, and declared that constant surveillance will make citizens “behave” now oversees the content moderation rules and data security of the platform that reaches more Americans under 30 than any other.

The concern isn’t hypothetical. Before the deal closed, TikTok content critical of Israel - including documentation of Gaza - was already being suppressed and shadowbanned at rates that content researchers noticed and documented. The platform moved to align with its prospective owners before the ink was dry.

Trading Chinese state influence for this particular set of American interests is not obviously an improvement. Draw your own conclusions.

Core platforms:

  • TikTok (US - new entity)
  • CapCut (video editing app, still ByteDance-owned globally)
  • Lemon8

What they collect: Viewing behavior at granular level - not just what you watch but which moments you rewatch, when you skip, how long you pause. Biometric identifiers including faceprints and voiceprints in some jurisdictions. The ByteDance-built algorithm profiles users from cold based purely on behavior and serves increasingly extreme or emotionally activating content to maximize session length.


series: [“Digital Sovereignty”]

Amazon

Core platforms:

  • Twitch (livestreaming)
  • IMDb
  • Goodreads
  • Audible

Additional infrastructure:

  • Amazon.com (dominant e-commerce, purchase behavior data)
  • Ring (home surveillance camera network)
  • Alexa (always-on ambient audio collection)
  • Amazon Pharmacy
  • Amazon Fresh / Whole Foods
  • Amazon Ads network
  • AWS (hosts a significant portion of the internet - including competitors)

What they know: Your purchase history is one of the most revealing behavioral datasets that exists - health conditions (pharmacy, supplements), financial situation (spending patterns), household composition, hobbies, reading interests. Ring cameras create a de facto neighborhood surveillance network; Amazon has provided Ring footage to law enforcement thousands of times, sometimes without a warrant. Alexa devices are always-on audio collection points in your home. AWS hosting means Amazon’s infrastructure underlies much of its competitors’ data.


series: [“Digital Sovereignty”]

Microsoft

Core platforms:

  • LinkedIn
  • Xbox / Xbox Game Pass
  • Bing
  • MSN

Additional infrastructure:

  • Windows OS (telemetry - detailed in Episode 1)
  • Windows Recall (AI screenshot surveillance - detailed in Surveillance OS)
  • Azure cloud (second largest after AWS)
  • OpenAI partnership / Copilot AI
  • Activision Blizzard / Call of Duty
  • Teams / Office 365 (enterprise communications and document activity)
  • GitHub (developer code and activity)
  • Outlook email

What they know: LinkedIn is the professional surveillance network - career history, professional network, job search activity, industry, salary range. Combined with Windows telemetry, Office 365 document activity, Azure enterprise data, and Copilot AI processing your work content, Microsoft’s profile of the professional population is unmatched. The OpenAI investment and Copilot integration represents an attempt to extend this into AI-mediated work and personal activity.


series: [“Digital Sovereignty”]

X (Formerly Twitter)

Core platforms:

  • X
  • xAI / Grok

What they know: Public discourse patterns, political views, real-time reactions. Grok AI is trained on the full corpus of X posts. The API monetization shift means the public conversation data that previously flowed relatively freely now flows primarily to X’s AI systems and paying enterprise customers.

Note on Elon Musk: X is privately owned by Musk, who also runs SpaceX (Starlink satellite internet), Tesla, Neuralink, and has close ties to the Trump administration. The concentration of infrastructure - internet access, social media, AI, neural interfaces, automotive - in one owner is worth noting when considering what X knows and what it’s connected to.


series: [“Digital Sovereignty”]

Snapchat

Core platforms:

  • Snapchat
  • Spotlight
  • Snap Map

What they know: Real-time location through Snap Map (live location sharing with contacts), friend networks, visual content including face data through AR lens processing. The “disappearing” content model created a false sense of privacy - Snap retains content on servers longer than the user-facing disappearance suggests, and the mechanism was always defeatable by screenshots.


series: [“Digital Sovereignty”]

Apple

Core platforms:

  • App Store
  • iMessage / FaceTime
  • Apple News
  • Apple Pay
  • Apple Intelligence AI

Additional infrastructure:

  • iOS (operating system)
  • iCloud (backup and sync)
  • Safari browser

What they know: Apple’s privacy positioning is more substantive than competitors - App Tracking Transparency, on-device AI processing, and end-to-end encryption for iMessage are real implementations, not marketing. The critical caveat: iCloud backups of iMessages are encrypted in a way Apple holds keys to, meaning law enforcement requests to Apple succeed. iCloud stores your photos, documents, and messages. The App Store position gives Apple revenue from and visibility into every app on their platform.


series: [“Digital Sovereignty”]

The Layer Underneath All of Them

The players above are the visible layer. Underneath is the data broker ecosystem - companies like Acxiom, Experian, Oracle Data Cloud, LiveRamp, and hundreds of smaller operators who buy, aggregate, and resell behavioral data from every source they can access. You have never heard of most of them. They have files on you.

Data brokers aggregate platform data, purchase records, public records, location data from apps, health app data, and social media data into comprehensive profiles sold to insurance companies, employers, financial institutions, law enforcement, and anyone willing to pay. You can request data deletion from many of them under state privacy laws, but the process is deliberately difficult and incomplete.

The platforms are the collection layer. Data brokers are the distribution layer. Both operate largely outside meaningful regulatory oversight in the United States.


series: [“Digital Sovereignty”]

Where to Actually Go

Leaving the surveillance platforms doesn’t mean leaving the internet. It means choosing different infrastructure.

Video

  • Rumble (rumble.com) - algorithm-neutral, creator-friendly monetization, political and alternative media. The most mature alternative for this audience.
  • Odysee (odysee.com) - blockchain-based, decentralized. Your content structurally cannot be deplatformed by a corporate policy change.

Livestreaming

  • Kick (kick.com) - more permissive policies than Twitch, better creator terms. Most viable Twitch alternative with meaningful audience.

Microblogging / Short-form

  • Nostr (Primal) (primal.net) - decentralized protocol. Your identity is a cryptographic key you control. You cannot be banned from the protocol itself. The most sovereign option.
  • Bluesky (bsky.app) - federated social using AT Protocol. You can move your account and followers between servers. Better sovereignty story than X, not as complete as Nostr.
  • UpScrolled (upscrolled.com) - alternative short-form feed designed without the manipulation architecture of TikTok or Reels.

Federated / Community

  • Mastodon / Fediverse (joinmastodon.org) - federated, self-hostable. No single company controls your account. The Fediverse includes Pixelfed (Instagram alternative) and PeerTube (YouTube alternative).
  • Element / Matrix (element.io) - for community spaces. Covered in depth in the Sovereign Communications article.

Publishing - The Most Important One

  • Ghost (self-hosted) - the newsletter and the blog are older than social media and more sovereign than any of the above. Your subscribers are yours. Your content is yours. No algorithm decides who sees it. The platforms are discovery pipes. Ghost is home.

series: [“Digital Sovereignty”]

How to Actually Exit

The Pyramid of Power framework is right on this: exit and build. Not petitions to companies that have captured the regulatory apparatus. Exit, and build parallel systems.

Phase 1 - Audit (Week 1)

  • Install a screen time tracker for one week without changing behavior. See the real number before you decide what to do with it.
  • Request your data from every platform. Facebook: Settings → Your Facebook Information → Download. Google: takeout.google.com. TikTok: Settings → Privacy → Personalization and Data. Read it.
  • List every platform you have an account on, including dormant ones.

Phase 2 - Download and archive (Week 2)

  • Export your content from every platform before deleting anything - posts, photos, videos, messages.
  • Store locally in encrypted Filen storage.
  • Export or record contacts and email addresses for people you want to maintain connection with, independent of the platform.
  • Announce where you’re going if you have an audience.

Phase 3 - Audit phone permissions now

  • Settings → Privacy → Camera: revoke from anything that doesn’t need it. A game doesn’t need your camera.
  • Settings → Privacy → Microphone: revoke from social media apps entirely. They don’t need it. If they do something that requires mic, it will ask in-session.
  • Settings → Privacy → Location: set everything to “while using” or “never.” Background location is almost never legitimately needed by a social app.
  • Settings → Privacy → Contacts: revoke from social apps. Giving Instagram your contacts is giving Meta every phone number in your life.
  • Delete the apps from your phone. Not disable - delete. Desktop access to the same platforms gives you dramatically reduced surveillance exposure.
  • After your next OS update: re-audit all of the above. Assume settings got reset.

Phase 4 - Reduce or exit (Month 2+)

Three valid approaches depending on your situation:

Full exit: Delete accounts. Use justdeleteme.com for instructions - some platforms make it deliberately difficult.

Strategic presence (pipes, not home): Stay on platforms only as distribution. Post links to your sovereign content. Don’t consume. Schedule posts from a desktop browser without opening the feed. Use Ghost’s social integration or a tool like Buffer. In, out, done.

The middle path: Delete the apps from your phone. Desktop-only access with Firefox + uBlock Origin. Turn off all notifications. Unfollow or mute everything that activates the comparison or outrage response. Set a time limit. Honor it.

The browser-over-app rule applies to everything: Facebook in Firefox beats the Facebook app on every privacy dimension. TikTok in a browser beats the TikTok app. Reddit, Instagram, Amazon - browser every time when you have the choice. Apps are better experiences specifically to get you inside the collection mechanism. The browser is the path around it.


series: [“Digital Sovereignty”]

The Larger Point

Social media as currently designed is incompatible with sovereignty.

A sovereign person makes deliberate choices about what information enters their mind. Social media platforms are explicitly designed to override deliberate choice with compulsive behavior. A sovereign person controls their own data. Social media platforms are explicitly designed to extract data without meaningful consent. A sovereign person’s attention belongs to them. Social media platforms’ entire business model is built on selling your attention to whoever will pay for it.

The device in your pocket is the front door. The app is the mechanism. The feed is the cage.

You cannot be sovereign over your digital life while spending three hours a day in someone else’s attention machine, running an app that has permission to use your microphone, camera, and location in the background.

This doesn’t require perfection. It requires consciousness. Understand what the system is doing. Make deliberate choices about your relationship to it. Build the alternatives rather than waiting for a regulatory apparatus that is itself captured by the people you’re trying to exit.

Exit and build. The feed will still be there if you want to go back. The question is whether you want to.


series: [“Digital Sovereignty”]

Resources

Where to go:

Data tools:

Further reading:


series: [“Digital Sovereignty”]

From the Rubble is written by Kala - veteran, 30-year conspiracy realist. Digital sovereignty, health sovereignty, and the overlap between them. No corporate funding. No ads. No permission required.