Help us tell the story of how to reclaim digital independence

Together with a growing network of partners and our community, Your Data Network is preparing a feature documentary that shows how to reclaim digital independence. We spotlight the founders and builders behind fantastic, real-world, privacy-first alternatives that people and organizations can use today to take back control of their data and digital lives. A crowdfunding campaign will launch soon on Kickstarter. Join the launch list now to be notified the moment it goes live.

Why

Over the past years, a few Big Tech platforms have become the rails of daily life. They can see what you read, watch and listen to and link it to your identity. You don’t see what’s collected or how it’s shared. Access can be removed, accounts locked, payments blocked. Policy shifts can reshape your choices overnight, and central points of failure can take entire organizations offline.

At the same time, concern about digital sovereignty is rising amid geopolitical shifts. In a separate track, new legislation around digital identity and programmable money is advancing, raising valid questions about profiling, gated access, and the ability to freeze transactions. That’s why this film points to something practical: you can regain digital independence today. Over recent years, robust open-source, privacy-first alternatives have matured with familiar ease-of-use, they’re just not widely known yet.

What the film will cover

  • Founders and builders who created these technologies because the status quo no longer worked
  • Real-world use by people and organizations already running on this stack
  • Clear explanations of how it works without jargon
  • Why this can scale so it does not remain a niche

Who is involved

The documentary is initiated by YourData Network with Leadervids attached as production partner. We are in conversation with multiple organizations including Volla and ThreeFold to feature their stories in the film. Soon, more names of other organizations will be announced.

Timeline

  • Pre-launch: now through 30 November 2025 — collect interest and notify on launch
  • Crowdfunding: 1–20 December 2025 — back the project and choose rewards
    Updates will be published on Kickstarter and via email.

Accessibility

The film will launch with EN / NL / DE plus full captions. If we reach the funding goal we intend to add more languages.

Kickstarter: more than a donation

Kickstarter is a platform where you back a project with a pledge. If we reach our goal your card is charged at the end of the campaign and you receive the reward you chose. If we do not reach the goal you are not charged.

Example rewards you can pick

  • Early streaming access to The Digital Age and Reclaiming Digital Independence
  • Online premiere ticket with live Q&A plus replay
  • HD downloads of both films, DRM-free
  • Interviews Vault access with long-form conversation
  • Your name in the end credits
  • In-person premiere ticket in the Netherlands (date TBA)
  • Community screening license for non-profits (up to 200 attendees)
  • Company credit options: name in end titles, shared logo card, or solo logo card

Go to Kickstarter to stay updated

Visit our Kickstarter pre-launch page:

https://www.kickstarter.com/projects/yourdata/reclaiming-digital-independence

Click “Notify me on launch” on Kickstarter to boost day-one momentum

Subcribe for email updates

Or you can sign up here for email updates and receive campaign news, screening dates, and rewards

Press & partners: For sponsor packs or media inquiries contact YourData Network via hello@yourdata.network or the form on our site.

“People are rightly concerned about where things are heading — always-on tracking, AI-driven profiling, recurring data breaches, and lock-in to a few platforms — yet most haven’t seen the alternatives. With this documentary we simply show what already works today: open-source, privacy-first technology you can use in daily life, whether you’re an individual or a company. By supporting and sharing this project, you help more people discover these options and give the movement a powerful boost.”
Robert-Jan Lamers, founder, YourData Network

The three most important developments at ThreeFold in September 2025

Every month, ThreeFold shares key developments within their decentralized ecosystem. In this article, we summarize the September update for you. Why? Because these developments matter to anyone who values privacy, ownership, and a fairer digital infrastructure. We explain it clearly, without technical jargon, so you know exactly what’s happening and why it matters to you.

1. The technology behind the network keeps getting stronger

ThreeFold has been building a fairer internet for years. In September, important steps were taken to make the network’s backend even more reliable and scalable:

ThreeFold’s Kubernetes-based platform, “KubeCloud,” was further developed. This technology ensures that digital services continue running smoothly even during high traffic or if one or more nodes fail or go offline temporarily. It provides stability and continuity for applications running on the decentralized internet, all without users noticing a thing.

The “Mycelium Network,” which enables secure communication between nodes, received new features for enhanced security and key management. This means data can be exchanged more safely between participants.

The data protection system was also upgraded: “Quantum Safe Storage” was designed to withstand the computational power of future quantum computers. Your data remains protected—now and in the future.

What this means for you:
You don’t need to be a tech expert to benefit from these improvements. These updates make it possible to use or run services on a network that is stable, secure, and future-proof—without relying on Big Tech.

2. Serious market interest is emerging

There’s growing evidence that the market is ready for an alternative internet:
More than five major organizations have expressed interest in purchasing capacity from the ThreeFold network, companies looking to replace their current cloud infrastructure with this more transparent and sustainable alternative.

A successful funding round was completed in Dubai, allowing the network to scale further.
Meanwhile, the team is working on new partnerships and larger investments to roll out the network globally.

What this means for you:
ThreeFold is no longer a fringe project. There is real interest from businesses and investors. That means: more availability, more support, and more assurance that the network will remain relevant. If you get involved now, you’ll be part of a growing movement from the ground up.

3. New rewards: from automatic issuance to real value

Until now, ThreeFold’s digital token (TFT) was minted automatically, new tokens were regularly created and distributed to node owners (also called farmers) who contributed computing power. But starting November 2025, that changes:

The automatic issuance (minting) of tokens will stop. Instead, participants will be rewarded based on actual usage, meaning, if your node is actively delivering services, you’ll receive fair compensation for it.
A reservation system will also be introduced, allowing users to pre-book capacity. This gives node operators more income predictability.

What this means for you:
If you’re considering joining as a node owner, or already own a node (v3), you’ll still earn rewards for your contribution to the decentralized internet. The nature of the reward will change, shifting from capacity-based to usage-based. The goal is for rewards to remain at least as high as before, potentially even higher.
More details will be shared soon. Of course, we’ll keep you updated.

In summary

In September 2025, ThreeFold made more tangible progress toward building a fairer internet. The technical foundation has been strengthened with upgrades to KubeCloud, Mycelium Network, and quantum-safe storage. At the same time, market interest is rising, with multiple major players lined up to adopt the network, and a successful funding round in Dubai signaling growing confidence. The reward system for node owners is also evolving; participants will now be compensated based on real-world usage instead of automatic token issuance.

ThreeFold is moving from promise to practice, delivering concrete value for users and contributors alike.
👉 Read the full update in the ThreeFold newsroom

Next-generation nodes: more powerful, AI-ready, and a fresh new look

Demand for nodes continues to rise and that’s good news. More and more people are actively contributing to a free, decentralized internet. We can feel that momentum: the previous series of nodes is now almost completely sold out.

At the same time, we’ve continued to improve. The casing (in other words: the box that houses all the hardware) of the previous generation is no longer available. That gave us the opportunity to upgrade several key hardware components, especially to better handle the growing demand for AI.

The result? A brand-new generation of nodes that are more powerful than ever, wrapped in a refined new design. In this update, we’ll explain exactly what has changed  and what it means for you.

Which models have been upgraded?

Ikon Max, Nova Go and Nova Plus: more storage, faster processor

Until now, these three models all shared the same casing. That has now been replaced with a new version – just as compact, but with improved heat dissipation. The internal configuration has also been updated: including a redesigned storage setup aimed at higher performance and long-term reliability.

The new models now offer between 2 TB (Ikon Max15 2TB, Nova Go15 and Nova Plus15) and 4 TB (Ikon Max15 4TB) of storage. Previously, 2 TB was the maximum available.

In addition, all three are now equipped with the Intel Core 5 210H processor, a fast, energy-efficient chip that delivers smoother processing, more stable performance, and better support for demanding applications like AI or distributed cloud environments.

node threefold internet

Nova Pro: faster, smarter, and built for AI

The Nova Pro15 has received a full upgrade, both inside and out. It now features the Intel Core Ultra 9 285H processor, a high-end chip built specifically for AI and high-performance computing. The result: more processing power, faster multitasking, and optimal energy efficiency all packed into a single advanced processor.

On the storage side, the Nova Pro uses NVMe storage via PCIe 5.0 (NVMe5). If you’re not familiar with the term: this technology allows data to move at extreme speeds, without bottlenecks. It supports data transfer rates of up to 14,800 MB per second. That makes this node perfect for AI applications, heavy workloads, and real-time data analysis.

We tested this ourselves by installing a custom AI assistant on the node and the results were impressive. The speed, stability, and responsiveness showed clearly: this node is already ready for the future.

Whether you’re working with AI, developing software, or simply want full control in a decentralized network: the Nova Pro delivers. Quiet, powerful, and always ready.

All four models are designed to meet the growing demand for reliable decentralized storage, computing power, and communication.

3node threefold

What does this mean for you?

If you’re ready to help build the decentralized internet, it’s important to choose the node that best fits your needs.

The new generation of nodes offers:

  • More ways to contribute and benefit from the network
  • Direct access to powerful, future-ready technology
  • A simple way to become an active part of the internet of the future

Depending on your goals, you can go in two directions:

Ikon Max – for contribution and personal use

These nodes allow you to contribute capacity to the decentralized network while also using it yourself – partly or fully. Ideal for hosting your own Nextcloud environment, storing data securely, or running your own applications. With the Ikon Max, you’re in full control from day one.

Nova series – for capacity contribution only, with higher guaranteed rewards

The Nova Go, Nova Plus and Nova Pro nodes are fully allocated to ThreeFold for the first 18 months. During that period, they cannot be used for personal applications. But that’s exactly what makes them so attractive: because the capacity is actively used right away, you receive a higher and fixed monthly reward – helping you earn back your investment faster and generate more passive income. After 18 months, the node becomes fully available for your own use.

The Nova Pro offers maximum performance and speed, especially suited for AI and demanding digital tasks.

Important: limited availability

At the moment, the new nodes are not available from stock. Why? The outer casing of this new generation – the part that houses all the advanced tech – is currently hard to source. We depend on our suppliers and can only place an order when they confirm availability.

Once we get the go-ahead, we’ll order immediately. But to be completely transparent: we don’t yet know how many units we’ll be able to get. That’s why priority will go to those who have already placed an order.

Don’t want to miss out or wait longer than necessary? Then order now.
That way, you increase your chances of getting your own node delivered soon and start contributing to the internet of the future: free, independent, and built by all of us.

👉 View the new nodes and place your order

New webinar series: Learn how to get control over your data with Nextcloud

Every time you upload a file to Google Drive, share a folder via Dropbox, or collaborate in Microsoft Teams you give something away. Not just convenience. But ownership. Autonomy. Privacy.

Big Tech companies don’t just store your data. They use it, scan it, monetize it, and lock you into systems you can’t see into or control.

And let’s be honest: we’ve let it happen.
Because the alternatives seemed too technical. Too complex. Too far away.

But that’s changing.

Introducing a new webinar by YourData Network

Nextcloud: How your own decentralized cloud environment works

For the first time, we’re hosting a dedicated webinar on one of the most practical and empowering tools to regain control over your digital life: Nextcloud, an open-source cloud platform you can run independently, whether on your own server or – even better- on ThreeFold’s decentralized internet.

Why? Because we keep hearing the same questions:

“How do I actually use the decentralized internet?”
“Where can I store my data safely?”
“What can I do with Nextcloud?”

“Is there a way to work and share without Big Tech watching?”

Yes. There is.
And this webinar is going to show you exactly how.

What you’ll discover

✅ What Nextcloud is and how it runs on the Decentralized Internet
✅ How you can host your own cloud or choose from thousands of trusted nodes
✅ How you stay in full control: no tracking, no scanning, no hidden monetization
✅ How Nextcloud lets you store, sync, share and collaborate just like Google or Microsoft, but without giving anything away
✅ Why this is about more than tech, it’s about digital self-determination

Who it’s for

People who are done with surveillance capitalism

Teams or small businesses looking for open-source, secure collaboration tools

Anyone searching for real alternatives — not just promises

When & how

Online, live, with demos and real-world examples

📅 Dutch session: Thursday 9 October – Sign up here
📅 English session: Thursday 20 November – Sign-up here

⏱ Duration: ~75 minutes

This is about freedom, not features

Nextcloud on the decentralized internet isn’t just a tool. It’s a gateway. To sovereignty. To responsibility. To building something outside of systems that were never built for your benefit.

Join us and see how decentralization can move from ideal to action.
Sign up now

Seminar: High Tech Campus Eindhoven

Digital autonomy through the decentralized internet

How your organization can regain control over data, AI, and infrastructure. Independent from hyperscalers.

Companies in Europe face a crucial choice: continue outsourcing data and AI capacity to American cloud providers, or reclaim true ownership of their data and digital infrastructure.

At this event, you’ll experience what that alternative looks like in practice: ThreeFold’s decentralized internet. A revolutionary technology that fundamentally reimagines how data is stored, accessed and owned, away from central control toward a more open, resilient and sovereign digital future.

And it’s already working today. With live demos and real-world use cases, you’ll see how this shift is not just possible but actionable, offering your organization a powerful opportunity to regain control, ensure data sovereignty and build on infrastructure that truly belongs to you.

Practical details

  • Location: AI Innovation Center, High Tech Campus Eindhoven
  • Date: Tuesday, November 4, 2025
  • Time: 16:00 – 17:30 (doors open at 15:30)
  • Followed by: Networking drinks until 19:00
  • Admission: Free (registration required)

What to expect

During this session, you will get:

  • A clear explanation of the decentralized internet and how it works
  • Practical insights into overcoming vendor lock-in and data security risks
  • Inspiring use cases such as Kubernetes, Nextcloud, and AI workloads
  • A live demo of a working solution (hardware & software)
  • Time for Q&A and networking with peers at the High Tech Campus

Why this matters for you and your organization

The challenges facing European companies that generate and rely heavily on data are urgent and increasingly complex, especially for those at the forefront of innovation, like the organizations based at the High Tech Campus.

For CTOs & Tech Leads
You know how dependent you’ve become on hyperscalers. Vendor lock-in limits your choices, and compliance with European regulations is a constant concern.

For Founders & Business Owners
You wonder if your IP and business-critical data are truly safe. The fear of sensitive data falling into the wrong hands is real. Meanwhile, cloud costs keep rising often without predictable control.

In this session, you’ll discover how the decentralized internet provides a working alternative today:

  • Secure, compliant, and fully under your ownership
  • Free from vendor lock-in and hidden costs
  • With the compute power and flexibility that AI and innovation demand

About YourData Network

YourData Network empowers organizations and individuals to take true ownership of their data. Our goal is to make it as easy as possible to use and help build the decentralized internet.

We offer tools and guidance to break free from big tech dependency and create a future where digital infrastructure is open, secure, and owned by the people it serves.

YourData Network was founded by entrepreneur Robert Jan Lamers, driven by a clear vision for digital autonomy and a strong belief in decentralization as a force for good. As an early advocate of the ThreeFold network, he is committed to making the decentralized internet accessible and actionable, starting here and now.

Register now

Register for free

Seats are limited, so make sure to secure your spot on time.

After registering, you’ll immediately receive a confirmation and all practical details by email.

We look forward to welcoming you.

Questions? Feel free to email us at hello@yourdata.network. We’ll be happy to help.

Which apps work on the OwnPhone? Find out here

“Sounds great, a privacy-friendly phone… but can I still use my trusted apps?”

That’s a question we hear a lot and rightfully so. Because if you’re switching to a privacy-first smartphone, you want to be sure it still lets you do the things that matter to you. Like using the apps you rely on every day.

So: which apps work? Which don’t? Where can you download them? And why is the OwnPhone much more than just another phone?

OwnPhone: Built from a radically different starting point

The OwnPhone isn’t a variation of existing smartphones. It’s built from a radically different starting point. While most phones are designed to grab your attention and collect your data in the background, the OwnPhone has only one goal: to give you control over your personal data, your usage, and your attention.

You use the phone for your needs. Without tracking. Without hidden data collection. And without unnecessary distractions.

The operating system is open-source, free from Google or Apple, and developed according to privacy-compliant European standards. You decide whether your files and photos stay on your phone or are stored securely on the decentralized internet of ThreeFold. In that case, your data is available in your personal cloud: a private Nextcloud environment only you can access.

Most apps work just fine

If you’re switching to the OwnPhone, you’ll want to know whether your current apps will still work. The short answer: yes, in most cases they do. Messaging, banking, navigation, government services, they all run smoothly.

Common apps that work on the OwnPhone:

  • Messaging: WhatsApp, Telegram, Signal, Outlook
  • Navigation: Google Maps, Waze, Organic Maps
  • Banking: Rabobank, ING, ASN, Bunq
  • Government: DigiD, NS
  • Media: Spotify, Netflix
  • Authentication: Microsoft Authenticator, Google Authenticator, Aegis, 2FAS
  • Tools: Firefox, Brave, ProtonMail, Nextcloud

Some apps may not work right away, especially those heavily dependent on Google services or specific security layers. But even then, there’s often a solution. You’ll find tips, workarounds, and support in our user community.

There are also a few apps that unfortunately don’t work at all, apps that are fully locked into Google Play Services, like ChatGPT, Android Auto, or YouTube. Luckily, there are privacy-friendly alternatives for most of them.

⚠️ Note: Apps like WhatsApp, Google Maps, or Gmail collect massive amounts of personal data. Whether you continue using them is your decision, but we warmly invite you to explore more privacy-conscious alternatives.

Discover alternatives in the F-Droid App Store

The OwnPhone comes pre-installed with two app stores: Aurora Store and F-Droid.

  • F-Droid only contains open-source, privacy-friendly apps. Think of Signal, Organic Maps, Simple Calendar, Tasks, and more.
  • Aurora Store gives you access to (almost) all apps from the Google Play Store — but without Google knowing who you are.

You don’t need to create any accounts. Just open the store, search for your app, tap “install” — done.

Micro-G: Essential for many apps

Many apps – like banking, government services or navigation – are built on top of Google Play Services. That’s a bundle of background services most Android phones rely on, including location tracking, push notifications, sync tools, and account connections. You usually don’t notice it, but a lot of apps won’t work without it.

On the OwnPhone, these Google services have been intentionally removed to protect your privacy. Instead, Micro‑G is installed by default.

Micro‑G is an open-source alternative to Google Play Services. It mimics the core functionality that many apps depend on, allowing them to function normally, but without sending any data to Google. Thanks to Micro‑G, apps like Rabobank, DigiD, NS, and WhatsApp work perfectly fine on the OwnPhone.

You set the pace, without giving up convenience

The beauty of the OwnPhone is that you don’t have to change all your habits overnight. You can use your phone just like you always have. Most apps work. Everything your current phone can do, this one can too.

As long as the apps that matter to you still work (and chances are high they do), there’s really no reason not to switch. From there, you decide how far you want to go. Still using WhatsApp because of your kids’ class group? That’s fine, it works. At the same time, you can already start exploring privacy-friendly alternatives.

Of course, switching phones takes a bit of effort. But we’re here to help. From transferring your contacts to importing your calendar, our community offers step-by-step guides and helpful tools.

We’ve got your back, so you can take ownership of your data, without sacrificing ease of use.

Try it for yourself

Want to learn more about the OwnPhone or order one right away?
Visit www.yourdata.network/ownphone

Or sign up for a free live webinar where we explain everything about the OwnPhone and the decentralized internet. Check the schedule at www.yourdata.network or our webinar page

Discover the internet built for people, not corporations. Free English webinar

A new kind of internet is gaining ground. One that puts users, not tech giants, back in control.

On Thursday, September 18, YourData Network invites you to a free, live webinar:
“Introduction to the Decentralized Internet.”

This session will be hosted in English by Robert Jan Lamers, founder of YourData Network and outspoken advocate for a privacy-first, user-owned internet. With clarity and vision, Robert Jan will guide you through one of the most important shifts in digital history.

🗓️ Thursday, September 18, 2025 – 20:00 CET
🎤 In English | Hosted by Robert Jan Lamers, Founder of Your Data Network


What you’ll learn

  • What the decentralized internet really is and why it changes everything
  • How it empowers your autonomy, privacy, and digital rights
  • Why it’s also better for the environment and energy use
  • How it works, without the tech jargon
  • How to start using it today
  • How to contribute to this growing movement

You’ll hear real-world examples, get actionable insights, and have the chance to ask your own questions live.


Why this matters

The internet wasn’t meant to be owned by a handful of corporations. But that’s exactly where we’ve ended up. From invasive ads to mass surveillance, our digital lives are increasingly shaped by centralized systems that serve profit over people.

It’s time for something better.
A web where you own your data.
Where you choose who sees what.
Where trust is built into the network, not outsourced to Big Tech.

This webinar is your first step.


Who it’s for

  • Anyone concerned about privacy, censorship or online control
  • Professionals looking for future-proof digital alternatives
  • Curious minds who want to understand what’s next for the internet

Sign up now, it’s free
Want to learn how to take control of your data and use new internet technology on your terms? Join our 75-minute online webinar where we explain everything in a clear, practical way.

Why the centralized internet is broken, why the decentralized web is the solution, and why that matters to you

The current internet is highly centralized. Large parts of our digital infrastructure depend on a handful of central data centers, platforms, and service providers, often operated by foreign tech giants. This model brings several structural problems. Below, we highlight eleven major issues, with a focus on examples from Europe and the Netherlands (from mid-2022 onward). We conclude by briefly outlining a possible alternative in the form of a decentralized internet (ThreeFold), which aims to address several of these problems.

1. Vulnerability of the centralized model

Single points of failure

In a centralized internet, single points of failure pose a major risk. A single malfunction or attack can affect millions of users. For example, a rare summer storm in July 2023 in the Netherlands severed a single fiber optic cable between two Microsoft data centers. As a result, Azure services across the Western Europe region were disrupted for hours. Microsoft confirmed that the remaining connections were overwhelmed, causing a chain reaction of packet loss and outages. Everything was restored only after ~13 hours. This incident showed that even with redundant connections, a single bottleneck can have major consequences.

Large-Scale Cloud Outages

Such incidents happen more often. In January 2023, Microsoft faced a global Azure outage, which took down services like Teams and Outlook. More than 500 million users rely on Azure Cloud; an outage thus creates a domino effect on numerous services. Reuters calculated that virtually all major global companies use Azure, meaning a single error or update could affect millions. Other Big Tech platforms have faced similar outages, underlining how vulnerable our digital society is when too many critical systems rely on the same centralized infrastructure.

Centralization Creates Fragility

In short, centralization creates single points of failure that can cause massive disruption, both physically (fiber cables, data centers) and digitally. Experts emphasize that concentrated hubs in networks are concentrated points of vulnerability. Therefore, redundancy and decentralization are essential to mitigate such risks.

2. Environmental Burden of Centralized Data Centers

Cooling Water Consumption and Water Scarcity

Centralized hyperscale data centers are not only an IT risk, they also pose a burden to the environment and the surrounding living environment. In Europe, concerns mainly focus on water usage and land consumption. Large data centers consume enormous amounts of (cooling) water – often clean drinking water – to keep their servers cool. A relatively small 1 MW data center can consume up to 26 million liters of water annually, equivalent to the annual usage of around 62 households. Many large centers use evaporative cooling systems, where water disappears permanently into the atmosphere. This locally contributes to water scarcity, especially in dry periods.

The Meta Data Center Controversy in the Netherlands

These concerns were explicitly raised around the (now cancelled) Meta data center in Zeewolde. This hyperscale data center was projected to consume large amounts of groundwater, alarming local residents. In 2022, massive local resistance emerged due to fears of exhausting the local water supply. The Dutch government ultimately intervened and revoked the zoning approval for Meta’s data center. This unprecedented decision – driven by concerns over groundwater and the landscape – illustrates the environmental impact such centralized data centers can have.

Growing Political and Social Tension in Europe and Beyond

Elsewhere in Europe, tensions are also rising. Researchers have noted that data centers in water-scarce regions increase political and social risks. In 2023, citizens in Uruguay protested against new Google data centers during the worst drought in 74 years. In the Netherlands, drinking water is scarce during hot summers, and data centers then compete with civilians and farmers for this essential resource.

Electricity Grid Congestion and Land Use

Aside from water, there are concerns around energy use and land consumption. Hyperscale centers consume so much electricity that local grids become overloaded. In the Amsterdam region, electricity capacity became so scarce that in 2022 the municipality issued a construction freeze on new data centers. Only those considered “essential for Amsterdam” were still allowed. The density of data centers pushed the energy grid to its limits, endangering network reliability.

In addition, valuable agricultural land is lost to massive server halls, another major point of criticism in Zeewolde and beyond.

A Growing Environmental Burden

In summary, data centralization leads to concentrated environmental burdens. Large data centers act like “water vultures” and infrastructure gluttons. On a small and densely populated continent like Europe, this leads to protests and forces policymakers to intervene. Governments are now imposing stricter requirements on cooling and water usage, and some EU regulations require more transparency around environmental impact. But the fundamental question remains: is such centralization compatible with sustainable and just development, especially in vulnerable regions?

3. War and Geopolitics: Data Centers as Strategic Targets

Data Infrastructure as a Military Target

In times of crisis or war, central digital hubs become strategic targets. Data infrastructure is now so deeply integrated into economic and governmental systems that hostile actors prioritize disabling or exploiting it. Europe has become increasingly aware of this vulnerability, especially since the war in Ukraine.

Missile Strikes on Ukrainian Data Centers

During the early days of the Russian invasion in February 2022, Russian forces launched targeted missile strikes on Ukrainian government data centers. A major data facility in Kyiv was hit, severely disrupting government digital communication. Because much sensitive data was stored locally, the physical destruction of servers led to direct information loss. Ukraine eventually had to migrate its data to cloud servers abroad, with support from Microsoft, to maintain continuity.

This case is now viewed as a wake-up call for other nations: centralized data centers are no longer neutral infrastructure, they are considered legitimate military targets, just like power plants or bridges in earlier eras.

European intelligence services now work from the assumption that, in the event of a conflict (e.g., with Russia), critical IT hubs could be attacked both physically and digitally.

Dutch Policy Shift: “Too Big to Fail”

The Dutch government has formally recognized this risk. Since September 2023, large multi-tenant data centers have been officially designated as vital infrastructure. The official reasoning is that failure of such data centers could realistically cause societal disruption and cascading failures. They are described as “too big to fail.” A prolonged outage would severely compromise national digital continuity.

This new classification comes with legal obligations: operators must now implement advanced security protocols and comply with mandatory incident reporting requirements under the EU’s NIS2 directive.

DDoS Attacks and Information Warfare

In addition to physical risks, cyber threats are escalating. During geopolitical tensions, DDoS campaigns and digital sabotage can paralyze key digital services. European institutions and companies are increasingly targeted by pro-Russian hacker groups. These assaults are not random, they are part of broader strategies to destabilize public trust and interrupt communication channels.

Data Centers as a Matter of National Security

In short: centralized internet infrastructure and data centers are no longer neutral, they are strategic targets in modern warfare. Both physical attacks (as in Ukraine) and digital disruptions (as seen across Europe) illustrate the risks of centralization. National governments are responding with new designations and security frameworks, recognizing that digital infrastructure is now a core component of national defense.

4. Lack of Control Over Your Own Data

Centralization Means Loss of Data Sovereignty

A direct consequence of internet centralization is that users – citizens, companies, and governments – lose effective control over their data. In today’s model, our information often ends up in distant cloud servers or with a few dominant platforms, usually owned by foreign corporations. This raises major questions about data sovereignty, especially in Europe, where privacy regulations are stricter.

The Meta Case: Billions in Fines and Data Repatriation

A striking example is the legal battle over EU–US data transfers. In May 2023, Meta (Facebook) was fined €1.2 billion by the Irish Data Protection Authority for transferring European user data to U.S. servers. The reason: such transfers expose data to U.S. surveillance laws like FISA 702, violating core EU privacy rights. In addition to the fine, Meta was ordered to repatriate all previous EU Facebook data to data centers within Europe.

This unprecedented sanction highlights how little control Europeans—users or regulators—have once their data is placed with a U.S.-based cloud provider. American law can override European privacy wishes.

Systemic Exposure to Foreign Surveillance

And it’s not just Facebook. All major cloud providers – Amazon AWS, Google, Microsoft Azure – are based in the U.S. and subject to similar surveillance laws. European concerns include the risk that sensitive personal data or business secrets are accessible to foreign intelligence services through legal backdoors. The Snowden revelations in 2013 already showed that the NSA had direct access to data at Big Tech companies via programs like PRISM. That led to the annulment of the old Safe Harbor agreement and later of the Privacy Shield by the European Court. Nonetheless, in practice, EU data continued to flow en masse to American clouds, hence the recent sanctions and the creation of a new EU–US Data Privacy Framework.

But critics such as privacy activist Max Schrems question whether this new agreement will hold up in court as long as U.S. surveillance law remains unchanged.

Vendor Lock-In and Platform Dependency in Europe

Loss of control is also an issue closer to home. European companies and governments often experience vendor lock-in with major cloud providers, making it difficult to migrate or self-manage their data (see also point 7). Additionally, many essential online services are privately owned. Think of Gmail/Outlook for email, Office365 or Google Docs for documents, and social media for communication. If a service unilaterally changes its terms or deletes data, individual users are powerless.

In 2022, for example, there were reports of companies being restricted or removed from cloud platforms due to geopolitical sanctions, leaving them temporarily unable to access their own data.

The European Response: Digital Sovereignty Initiatives

European policymakers are responding with initiatives aimed at digital sovereignty. There is a growing call to regain “control over one’s own data.” Projects like Gaia-X (a European cloud federation initiative) and legislation such as the Data Act (2024) aim to improve data portability and reduce dependency. The core goal is for Europe to no longer be merely a data colony of the United States.

A 2024 Clingendael report showed that 9 out of the 10 largest GDPR fines were issued to U.S. tech firms. This underscores how often Big Tech violates EU rules, usually due to a lack of transparency or user control.

Reclaiming Control Requires Structural Change

Nevertheless, in practice, most European data today is still not “under our own control.” We still rely on the promises of third parties. Whether they are European, National or local, they remain a ‘third party’. Regaining control requires either a fundamentally different internet architecture or strict oversight of dominant players. Awareness is growing that “whoever owns the servers, holds the power”, and Europe increasingly wants that power to reside within its own region.

5. Mass Surveillance via Centralized Infrastructure

Centralization Enables Efficient Surveillance

Centralization makes mass surveillance easier, both by governments and by corporations. When data flows pass through a handful of datacenters and are stored by only a few entities, it creates the perfect setup for widespread monitoring. Europe has painful experience with both indiscriminate state surveillance and private misuse of user data.

Government Surveillance: Legal Overreach in Europe

The EU has strong privacy laws, but member states have at times pushed (and crossed) the legal boundaries. A classic example is the retention of communications metadata (telephony/internet). The European Court of Justice has repeatedly ruled (since 2014) that generalized mass surveillance – such as mandatory storage of all phone and internet data of citizens – violates fundamental rights. Yet several countries largely ignored this. Ireland, Belgium, France, the UK, and others maintained broad retention obligations in the name of national security.

For example, in 2021 France’s highest administrative court approved a law allowing continuous bulk data retention due to a “permanent terrorism threat.” This is effectively a legal bypass of the EU ban—but in practice, it means many European citizens are still being preventively monitored via centralized telecom and internet provider databases.

Dutch Case: The “Sleepwet” and Internet Tapping

The Netherlands, for example, had the “Sleepwet” (Intelligence and Security Services Act of 2017), which permits broad cable tapping. After public protest, the law was slightly amended, but intelligence services still have wide access to internet hubs.

Corporate Surveillance: Ad Tech and Platform Exploitation

The situation is no better on the corporate side. The centralized advertisement model of Big Tech relies on mass data collection. Platforms like Facebook, Google, and TikTok gather behavioral data from hundreds of millions of Europeans to build detailed user profiles. This is enabled through centralized infrastructure like tracking pixels and cookies that monitor our internet behavior at scale.

Scandals like Cambridge Analytica showed how such centralized datasets (e.g. Facebook’s social graph) can be abused for political manipulation. Major platforms have also experienced repeated data breaches, exposing personal information of millions of users.

The GDPR’s Limits and the Persistence of Central Logging

The EU is trying to push back through the GDPR with some success (see the fines in points 4 and 6). Still, if you watch a video on YouTube, it’s centrally logged by YouTube. If you post something on Facebook, it’s centrally analyzed by AI systems. Smartphone data typically flows through just a few cloud servers that can, if needed, be monitored. This asymmetry – users decentralized, data centralized – makes mass surveillance both economically attractive and technically feasible.

Cross-Border Espionage Enabled by Centralized Networks

Centralized internet infrastructure even facilitates cross-border espionage. The Snowden revelations showed that U.S. and U.K. intelligence agencies could directly tap transatlantic fiber cables and intercept data at major internet exchange points. This allowed them to extract vast amounts of European communication in one go. In a decentralized network, this would be far more difficult because there’s no single hub where everything converges.

Surveillance Built into the Architecture

Where data clusters, curious eyes gather. Europe struggles to protect citizens from both Big Brother and Big Tech. The centralized model puts them at a disadvantage. Only by breaking that model – or by implementing strong decentral encryption and federation – can access for mass surveillance truly be limited. Until then, the infrastructure remains an open invitation for anyone who wants to watch on a large scale.

6. Infrastructure Risk: The Single Point of Failure Problem

Centralized Internet = Central Weak Spots

A core problem of centralization is that many people or systems become dependent on a few critical points, whether that’s a DNS server, data center, cloud provider, or telecom node. If something goes wrong at such a central hub, the consequences can be massive and far-reaching. This is known as the single point of failure.

When DNS Fails: No One Gets Online

A well-known example occurred in July 2022, when Cloudflare’s DNS services went offline, taking down websites like Discord, Shopify, and Peloton for hours. Cloudflare is one of the largest DNS providers in the world. When its routing system malfunctioned, millions of users worldwide were unable to access the web, even though their own internet connections and devices were working fine. All because of one point in the infrastructure.

Data Center Fires and the Chain Reaction Effect

Another example is the 2021 fire at the OVH data center in Strasbourg. OVH is Europe’s largest cloud hosting provider. The fire destroyed entire server halls, causing thousands of websites – from news platforms to government portals – to go offline permanently. Some companies lost years’ worth of data and couldn’t recover because they had stored everything in one centralized location.

Although OVH had a backup plan, the backup servers were in the same building. This failure sparked debate about how “resilient” centralized cloud actually is.

Congestion on the Grid: Too Much in One Place

Centralization also causes pressure on other infrastructure. In Amsterdam and other tech hubs, data centers and server parks consume so much energy that the electricity grid becomes congested. In 2023, a moratorium was imposed in parts of the Netherlands on the construction of new server facilities due to capacity shortages. Here, too, the concentration of usage in a few spots creates a fragility that affects the entire network.

A Single Provider Can Paralyze Governments

Governments themselves are not immune. In 2023, the Danish government experienced a major outage after a central IT supplier, KMD, had technical problems. Multiple digital public services were offline for hours, including tax systems and citizen portals. Critics warned that the Danish government had become too dependent on a single commercial provider for basic digital services.

Cloud Providers: Convenience at the Cost of Resilience

The same applies to cloud storage. If everyone’s files are in the same cloud (e.g., Google Drive or Microsoft OneDrive), an incident – technical or political – can affect millions at once. In 2021, a misconfiguration at Facebook’s servers took down Facebook, WhatsApp, and Instagram for nearly 6 hours. The company lost billions in market value, and millions of users worldwide were suddenly without communication.

This case demonstrates how much reach a single central actor can have and what happens when that actor fails.

Centralization Makes the Internet Fragile

In summary: the more we centralize, the more brittle the system becomes. Every layer of the internet – from nameservers and hosting to apps and telecom – is now partly dependent on a handful of providers or locations. One problem there can cascade across entire countries or continents. Decentralization is not just a political or ethical goal, it is essential for a resilient and robust internet.

7. Vendor Lock-In and the Loss of Technological Freedom

What Is Vendor Lock-In?

Vendor lock-in occurs when a user (person, company, or government) becomes so dependent on a provider’s technology, platform, or infrastructure that switching becomes difficult, costly, or practically impossible. Centralized services often make this dependency intentional. Once you’ve committed your data, applications, or workflows to one provider, leaving comes at a price.

Proprietary Standards and Closed Ecosystems

Large cloud platforms such as Microsoft Azure, Amazon AWS, and Google Cloud use proprietary tools and formats that are not always compatible with other systems. This makes migrating to another provider a technical challenge. For example, if your organization uses Microsoft’s entire stack – email via Outlook, documents via OneDrive, collaboration via Teams – moving to a different setup would require retraining staff, transferring data, and potentially losing functionality.

In some cases, key functions are only available within the ecosystem, so competitors can’t offer a true alternative.

Lock-In in Government and Education

Governments and schools are particularly affected. A 2023 report from The Register described how German state agencies were deeply locked into Microsoft 365, even after the software was found to violate the GDPR in some configurations. Due to vendor lock-in, they couldn’t easily switch to privacy-friendly or open-source alternatives.

The same applies to Dutch municipalities, which often depend on a small number of software suppliers. Contracts are lengthy, customization is high, and exiting the partnership can take years.

Cloud Lock-In: “Pay to Leave”

In the cloud sector, there’s a phenomenon known as egress fees; providers charge extra money when customers try to move their data to a competitor. This means: uploading data is cheap or free, but downloading it again costs money. Critics see this as a deliberate barrier to exit.

An article from EU Techloop explained how these lock-ins hinder innovation and limit user freedom. Companies become “trapped” in a tech stack that no longer serves their needs, but exiting is too costly or risky.

End-User Examples: App Stores and Streaming

Vendor lock-in also affects ordinary users. Apple users, for instance, are tied to the App Store, iCloud, and Safari. Android users are largely dependent on Google Play, Gmail, and Google Docs. Streaming services like Spotify, Netflix, and YouTube make it difficult to export playlists or history.

This dependence has behavioral consequences: users become less likely to explore alternatives or demand better terms.

EU Data Act: A First Step?

The European Union is trying to tackle lock-in through the Data Act (2024), which requires cloud providers to make switching easier and data more portable. It also introduces a ban on excessive egress fees and encourages interoperability between services. The act is seen as a first step toward technological freedom for users.

However, critics argue that enforcement will be challenging, and Big Tech may find new ways to retain control through technical tricks or contractual clauses.

Centralized Systems Keep You Trapped

Vendor lock-in is not a side effect, it’s a core part of many centralized business models. It creates dependency, reduces freedom of choice, and raises the cost of change. As long as infrastructure and platforms are controlled by a few dominant players, real digital autonomy will remain out of reach.

8. Freedom of Information and Platform Censorship

Centralized Platforms as Global Gatekeepers

In a centralized internet, a small number of tech platforms act as global gatekeepers of information. They decide what content is visible, which voices are amplified or silenced, and who can participate in the public conversation. These are private corporations – not democratic institutions – yet they wield tremendous influence over freedom of expression and public discourse.

Censorship of Independent Experts and Professionals

Many Europeans experience content removals, account suspensions, and visibility restrictions without clear explanations. This affects independent professionals, scientists, journalists, and everyday users. Sometimes, this results from automated moderation; in other cases, vague or inconsistently applied community guidelines are cited.

A documented example: several Dutch general practitioners and scientists had their content removed on YouTube, Facebook, and LinkedIn for sharing critical insights on health issues. In one case, a Dutch medical expert was banned from LinkedIn after sharing a link to a peer-reviewed article in The Lancet. The platform reversed its decision only after national media attention. During the suspension, the professional lost access to their network and visibility, impacting their practice.

This and other cases were described on BLCKBX, an independent Dutch media platform.

Political Crises and Shifting Moderation Policies

During times of geopolitical tension, centralized platforms often change their policies under government pressure. After Russia’s invasion of Ukraine, for example, the EU instructed platforms to block the Russian news outlets RT and Sputnik. Major platforms complied immediately, not only by removing content but by restricting searches and recommendation algorithms.

This shows how quickly political decisions can ripple through centralized platforms, impacting access to alternative perspectives, regardless of content legality or local context.

Invisible Censorship Through Algorithms

Even without formal bans, algorithms shape what we do or do not see. Content can be technically still online, but practically invisible due to downranking, deboosting, or demonetization. This form of algorithmic censorship is opaque and hard to challenge. Users don’t always realize their content is being suppressed, which makes resistance difficult.

Lack of Transparency and Fair Appeal

When content is removed or accounts suspended, users often receive vague notifications like “violation of community standards.” No clear explanation. No due process. Appeals are slow or ineffective, especially for smaller accounts or non-English users.

This erodes trust in digital platforms and undermines legal certainty. Private companies are effectively enforcing public norms, but without proper procedures, oversight, or accountability.

European Regulation: A Start, Not a Solution

The EU has attempted to address this through the Digital Services Act (DSA), effective since 2023. The DSA requires platforms to publish more data on content moderation and provide better appeals processes. This is a step in the right direction, but enforcement is complex and platforms still retain wide discretion.

Furthermore, the DSA doesn’t fundamentally change the centralized nature of content control. The power to decide what may be said remains with the platforms.

Censorship Is Baked Into the System

The structure of the centralized internet makes censorship – whether political, commercial, or algorithmic – easier and more scalable. If a platform decides to remove you, there is often no recourse. A decentralized system, in which no single actor can control speech across the entire network, is essential for protecting freedom of information in the digital age.

9. Erosion of Digital Identity and Autonomy

From User to Product: Your Identity Is Monetized

In a centralized internet, users are often not the customer, but the product. Your behavior, preferences, interactions, and even emotions become data points in a vast commercial ecosystem. This undermines your autonomy: instead of acting freely online, your digital identity is shaped and exploited by others.

Your attention is captured, your decisions influenced, and your profile sold to advertisers, AI trainers, and data brokers. The more centralized the infrastructure, the easier it is to aggregate and commercialize identity.

Fragmented and Dependent Identities

A typical internet user has dozens of accounts across different platforms, each with their own login, profile, settings, and behavioral history. These identities are not truly yours: they exist on someone else’s server, and they can be deleted, suspended, or altered without your consent.

For example, if you lose access to your Google or Apple account, you may instantly be locked out of your email, documents, photos, calendar, and payment apps. Your digital self is fragmented and fundamentally dependent on external actors.

The Rise of Algorithmic Identity

Platforms increasingly build predictive models based on your behavior. These models determine what you see, how you’re categorized, and what’s recommended to you. Over time, this affects your self-perception and behavior. Your identity is no longer just what you say or choose, but what the system predicts or assumes about you.

This phenomenon, known as algorithmic identity, can entrench stereotypes, amplify biases, and limit personal development. It reinforces the status quo instead of encouraging exploration or growth.

Digital Death: What Happens When You’re Banned?

In extreme cases, users experience digital death: their accounts are permanently removed from essential platforms. This can happen to whistleblowers, controversial figures, or simply due to errors in moderation systems. Suddenly, someone loses access to years of work, connections, or memories.

This reveals how fragile our digital identity is when it’s hosted centrally. There is often no alternative, no warning, and no appeal.

No True Ownership Without Decentralization

Without control over the infrastructure, true digital autonomy is impossible. You don’t own your data, your identity, or your digital relationships. You’re merely allowed to use them, temporarily and conditionally.

Decentralized identity systems (like self-sovereign identity, SSI) are being developed to address this. These systems give users cryptographic control over their digital persona. But until such systems are mainstream and supported by decentralized infrastructure, most people remain digital tenants. Never owners.

Autonomy Requires Infrastructure Control

To be truly free and autonomous online, people need more than privacy settings and user agreements. They need control over the underlying systems that define their identity. Centralized platforms offer convenience, but at the cost of freedom. A decentralized architecture is the only sustainable way to ensure that your digital self remains truly yours.

10. Loss of Community Ownership and Participation

The Internet Was Once a Commons

In its early days, the internet was a decentralized network built on open standards, maintained by academic and grassroots communities. Local internet service providers, community-hosted servers, and public infrastructure played a key role. Participation and contribution were common. Users were co-creators, not just consumers.

This structure enabled a sense of ownership and belonging. Communities managed their own mailing lists, forums, and websites. Governance was collaborative, not corporate.

Centralization Replaces Communities with Corporations

Today, most internet services are owned and operated by a handful of global corporations. The infrastructure is proprietary, the rules are top-down, and community participation is limited to feedback forms or comment sections. Decisions are made by executives, not users.

This shift from community infrastructure to corporate platforms means that people no longer have a stake in the systems they depend on. There’s no co-determination, no transparency, and often no accountability. It leads to disempowerment and detachment.

Content Creation Without Control

Millions of people spend their time creating videos, posts, memes, reviews, and artworks online. But most of this happens on platforms like YouTube, TikTok, Instagram, or Medium, where the creators have no ownership over the infrastructure, limited access to monetization tools, and no say in policy changes.

Algorithms decide visibility, demonetization can happen without warning, and terms of service can change at any time. Creators build their digital homes on rented land.

Lack of Local Resilience and Digital Sovereignty

When digital infrastructure is centralized and globally operated, communities lose local resilience. A neighborhood, town, or region cannot maintain or modify its own digital services. If Facebook goes down, even local school groups or volunteer networks disappear. If Amazon Web Services crashes, thousands of local businesses go offline.

This is especially problematic during crises, when local digital autonomy could make the difference between functioning systems and widespread disruption.

Participation Becomes Performance

Central platforms reward performance over participation. Metrics like likes, followers, and views incentivize users to produce content that pleases algorithms, not necessarily content that builds relationships or solves problems. Community becomes commodified. Dialogue turns into broadcast. Civic engagement is replaced by viral entertainment.

In this environment, genuine participation and deliberation – hallmarks of healthy communities – are marginalized.

Reviving the Commons Through Decentralization

Decentralized networks offer a path back to community ownership. Projects like ThreeFold, Mastodon, and Nextcloud show that it is possible to build open, federated systems that users can host, manage, and govern themselves.

In these models, communities can choose their own rules, manage their own infrastructure, and collectively shape their digital space. Participation becomes meaningful again, because it happens in systems that users partly own.

From Consumers Back to Contributors

If the internet is to serve the public good, users must regain a role in its design, maintenance, and governance. Centralized systems treat us as consumers. Decentralized models invite us to become contributors again. Only then can we rebuild digital spaces that reflect the values, needs, and diversity of our communities.

11. Market Distortion and Monopolization

The Illusion of Competition in a Winner-Takes-All Market

On the surface, the digital market appears competitive. There are thousands of apps, tools, and startups. But beneath that surface lies a winner-takes-all dynamic: platforms with the most users attract even more users, gain more data, and become virtually impossible to compete with. This is known as the network effect and it fuels monopolization.

As a result, most core services online are controlled by a handful of giants: Google dominates search and maps, Meta dominates social media, Amazon dominates cloud and e-commerce, and Microsoft dominates business productivity tools.

Startups Become Acquisition Targets, Not Competitors

Innovative startups are often bought before they can grow into real competitors. Facebook acquired Instagram and WhatsApp. Google bought YouTube and Waze. Microsoft took over LinkedIn and GitHub. These acquisitions remove market pressure and consolidate control.

This undermines innovation: founders build with the goal of being acquired, not disrupting the system. It also limits consumer choice. In the end, even if you’re using multiple apps, you’re often still in the same ecosystem.

Barriers to Entry Are Structural

Large platforms benefit from economies of scale, brand recognition, user base lock-in, and vast legal and lobbying teams. New entrants can’t compete on these terms. Even if a better product exists, it often fails due to lack of visibility, compatibility, or trust.

These barriers are structural, not just financial. A new search engine, for instance, must crawl and index billions of pages, handle global traffic, respect data regulations, and build business models without access to the same ad infrastructure. The playing field is far from level.

Market Power Shapes Regulation

Big Tech companies also exert enormous influence over regulation. Through lobbying, they shape data laws, cloud contracts, and digital taxation rules in ways that protect their business models. In some cases, they co-author industry standards or fund the very watchdogs meant to oversee them.

This leads to regulatory capture, when those in power help write the rules they must follow. Smaller competitors and consumers are left without a fair voice.

Public Infrastructure Becomes Privatized

Essential digital services – search, navigation, communication, storage – are now operated by private firms with profit motives. Governments and public institutions rely heavily on Big Tech infrastructure. For example, many Dutch municipalities and schools run on Microsoft 365. Health systems use Amazon cloud. Even police departments use Facebook for communication.

This reliance effectively privatizes public functions, without democratic control or public alternatives. It also increases the risk of lock-in and loss of digital sovereignty.

Economic Power Becomes Political Power

As tech firms grow, their economic power translates into geopolitical leverage. Countries court data centers with tax breaks. Politicians consult tech CEOs on national strategy. Companies negotiate directly with states, like Meta threatening to pull services from Europe if regulations become “unworkable.”

This power imbalance between public institutions and private platforms distorts democratic processes and weakens public accountability.

Monopolies Undermine a Free and Open Internet

A decentralized internet is not just a technical alternative, it is an economic necessity. Monopolies distort markets, limit choice, slow innovation, and undermine the democratic function of the internet. By distributing infrastructure, ownership, and governance, we can restore competition and create a more resilient digital economy.

12. Privacy Erosion and the Surveillance Economy

Surveillance as a Business Model

In today’s centralized internet, surveillance is not a bug, it’s a feature. Most “free” digital services generate revenue by tracking user behavior, analyzing it with AI, and monetizing the results through advertising or profiling. This has created a surveillance economy in which human attention and behavior are the main commodities.

Companies collect vast amounts of data: what you search, what you watch, where you go, who you talk to, what you buy, even how long you pause while reading. This behavioral data is processed to predict, influence, and ultimately manipulate future choices.

Invisible Tracking, Even Outside the Platform

Tracking doesn’t stop at the platform itself. Third-party cookies, trackers, device fingerprints, and browser analytics follow users across the web. Visiting a news site, shopping online, or even reading a public document can trigger dozens of data transmissions to unknown entities.

An investigation by The Markup showed how widespread this tracking is, even on websites run by governments and NGOs. Users often have no idea who receives their data, for what purpose, or how long it’s stored.

Personal Data Becomes a Liability

The more data is collected, the more risk users face. Data leaks, hacks, phishing attacks, and identity theft are now common consequences of centralized data storage. In one breach alone, the health data of over 100 million EU citizens was exposed.

Sensitive information – health, finance, politics, religion – can be used to profile, discriminate, or control. Once collected, it is almost impossible to delete.

Behavioral Manipulation at Scale

The surveillance economy doesn’t just observe, it shapes behavior. Platforms use algorithmic nudging to increase engagement, steer attention, and maximize time spent on screen. Newsfeeds, notifications, recommendations, and personalized ads are designed not to inform, but to provoke and convert.

This creates digital environments optimized for addiction, outrage, and division. Not well-being or truth.

Chilling Effects on Free Expression

Knowing that you’re being watched changes how you behave. This is the so-called chilling effect: people censor themselves, avoid certain topics, or refrain from activism for fear of being flagged, punished, or profiled.

In countries with authoritarian tendencies, centralized surveillance infrastructure is often used to monitor dissidents and suppress protests. But even in democratic states, surveillance undermines freedom of thought and expression at the structural level.

Consent Is an Illusion

GDPR and similar laws require consent for data collection. But in practice, most users click “accept all” without understanding what they agree to. Consent is often coerced – without it, the service doesn’t work – or buried under legal jargon.

This leads to a system where legal compliance replaces ethical responsibility, and data exploitation continues unchecked.

Privacy Needs Infrastructure, Not Just Policy

Privacy cannot be restored with settings and policies alone. As long as data flows through centralized systems owned by surveillance-driven corporations, the erosion of privacy will continue. A decentralized internet, where data remains with the user and infrastructure is user-owned, is the only durable foundation for true digital privacy.

13. Infrastructural Vulnerability and Geopolitical Risk

Centralized Infrastructure as a Single Point of Failure

The internet’s physical infrastructure – servers, data centers, fiber cables, and cloud platforms – is increasingly centralized. This concentration creates single points of failure: if a major provider goes offline, large parts of the internet can become inaccessible. This is not a theoretical risk, it has happened multiple times in recent years.

One 2023 example involved an outage at Microsoft’s cloud platform (Azure), which took down services like Outlook, Teams, and OneDrive across Europe. In the same year, an incident at AWS disrupted digital services for banks, retailers, and government portals across several countries.

Risks During Conflict and Crisis

Centralized infrastructure becomes especially vulnerable during armed conflicts, trade wars, or political unrest. Data centers, cables, and digital infrastructure are now seen as strategic targets and have already been attacked.

In 2022, a mysterious sabotage incident damaged multiple undersea internet cables between France and the UK, affecting European internet traffic. A few months later, sabotage of Germany’s rail communication system caused disruptions across the country, linked to a targeted fiber-optic attack.

Such events demonstrate that digital infrastructure is not immune to geopolitical instability—and that centralization increases both the attractiveness and the impact of attacks.

Global Dependencies Create Leverage

Europe relies heavily on infrastructure owned by American or Chinese companies. Whether it’s cloud services (Microsoft, Amazon, Google), mobile hardware (Apple, Huawei), or backbone equipment (Cisco, ZTE), control lies largely outside of Europe’s jurisdiction. This creates geopolitical dependencies.

If tensions rise, these dependencies can be exploited. The 2019 Huawei ban showed how quickly access to key technologies can be weaponized. Sanctions, export restrictions, or forced service suspensions can severely impact the digital sovereignty of entire regions.

The Problem of Legal Fragmentation

Different countries have different laws regarding privacy, data access, and encryption. When infrastructure is centralized and global, these conflicting legal systems create compliance confusion and legal grey zones.

For example, European companies using U.S.-based cloud services may fall under U.S. surveillance laws, even if their data is hosted in the EU. The Schrems II ruling by the European Court of Justice invalidated the Privacy Shield agreement, highlighting the incompatibility between EU privacy rights and U.S. law.

A Matter of National and Regional Security

The reliability and independence of digital infrastructure is now a national security concern. Governments are beginning to recognize that centralization creates strategic vulnerabilities, not only for data protection, but for the continuity of basic services such as energy, health, transport, and communication.

The EU’s Cybersecurity Strategy emphasizes the need for more resilient and decentralized infrastructure, but implementation is slow, and political will is uneven.

Resilience Requires Distribution

In a centralized system, the failure of a few nodes can disrupt entire societies. In a decentralized system, no single point of failure exists. That makes it inherently more resilient, especially in times of crisis or conflict.

To protect digital sovereignty, ensure service continuity, and withstand geopolitical pressure, the internet’s infrastructure must be distributed, diverse, and community-owned. Only then can it serve as a stable foundation for our digital future.

Conclusion: A Systemic Problem Demands a Systemic Solution

The problems caused by the centralized internet are not isolated or incidental. They are structural, systemic, and deeply interconnected. From ecological strain and algorithmic manipulation to geopolitical risk and loss of autonomy, each issue reinforces the others, forming a tightly woven web of digital dependence.

Attempts to regulate or patch the current system are necessary, but not sufficient. As long as control, infrastructure, and data remain concentrated in the hands of a few global tech corporations, fundamental change will remain out of reach. True digital freedom, resilience, and sovereignty require a different foundation.

That foundation is decentralization.

A decentralized internet redistributes power, ownership, and control. It allows people and communities to reclaim their role. Not just as users or consumers, but as co-creators and stewards of the digital world. It replaces opacity with transparency, dependence with autonomy, fragility with resilience.

This is not a utopian dream, but an urgent necessity. The technological building blocks exist. The vision is clear. Now is the time to build and adopt a new internet, one that serves people, not platforms.

The decentralized internet already exists. And it works

The decentralized internet is no longer just an idea. It’s already here, fully operational and running. Since 2016, the non-profit foundation ThreeFold has been building a truly decentralized internet infrastructure from the ground up.

Today, the ThreeFold Grid spans over 50 countries worldwide and powers a growing number of real-world applications: from cloud storage and communication platforms to web hosting, AI workloads, and blockchain nodes. Unlike many other projects that depend on centralized layers or cloud dependencies, the ThreeFold Grid is fully peer-to-peer, energy-efficient, and self-owned by the people who run its physical infrastructure: the nodes.

It’s not a prototype. It’s live. And it’s growing.

How Your Data Network helps people use it

At Your Data Network, our mission is to help people, businesses and public organizations actually use this new internet, easily, securely and with full ownership.

Here’s how we do that:

  • We provide ready-to-use devices like privacy-first smartphones, Linux laptops and 3Nodes that connect directly to the decentralized internet.
  • We offer pre-installed services such as Nextcloud for secure file storage, private communication tools, and decentralized VPNs, all running on the ThreeFold Grid.
  • We make onboarding simple through step-by-step guides, demos and expert support, even for people with zero technical experience.
  • And we build a growing community of early adopters, builders and advocates who are no longer just users of the internet, but owners of it.

The internet is broken. The decentralized web is the solution. And that solution is ready. Now.

A new kind of internet starts here – free Dutch webinar on the decentralized web

A new kind of internet is gaining ground. One that puts users – not tech giants – back in control.

On Thursday, July 24, Your Data Network invites you to a free, live webinar:
“Introduction to the decentralized internet.”

This session will be hosted in Dutch by Robert‑Jan Lamers, founder of Your Data Network and outspoken advocate for a privacy-first, user-owned internet. With clarity and vision, he will guide you through one of the most important shifts in digital history.


🗓️ Thursday, July 24, 2025 – 20:00 CET
🎤 In Dutch | Hosted by Robert‑Jan Lamers, Founder of Your Data Network


What you’ll learn

  • What the decentralized internet really is—and why it changes everything
  • How it empowers your autonomy, privacy, and digital rights
  • Why it’s also better for the environment and energy use
  • How it works, without the tech jargon
  • How to start using it today
  • How to contribute to this growing movement

You’ll hear real-world examples, get actionable insights, and have the chance to ask your own questions live.

Why this matters

The internet wasn’t meant to be owned by a handful of corporations. But that’s exactly where we’ve ended up. From invasive ads to mass surveillance, our digital lives are increasingly shaped by centralized systems that serve profit over people.

It’s time for something better.
A web where you own your data.
Where you choose who sees what.
Where trust is built into the network, not outsourced to Big Tech.

This webinar is your first step.

Who it’s for

  • Anyone concerned about privacy, censorship or online control
  • Professionals looking for future-proof digital alternatives
  • Curious minds who want to understand what’s next for the internet

Sign up now – it’s free

Want to learn how to take control of your data and use new internet technology on your terms? Join our 75-minute online webinar where we explain everything in a clear, practical way.


Don’t miss this chance to get informed and inspired. Join us live on July 24 and be part of the shift toward a more human internet.

Three in four people believe tech companies have too much control over their data

Three out of four people no longer trust Big Tech with their personal data. That’s not just a number. It’s a signal. A growing shift in public awareness: from dependence to digital autonomy.

Where does this number come from?

This statistic comes from research by YouGov and the Norton Cyber Safety Insights (2022). In countries like the UK and Spain, 75% of adults feel that tech companies have too much control over their data. Source

Why do people feel this way?

The reasons are clear: Tracking without consent. Apps and websites track your behavior behind the scenes. Data sales. Personal information is treated as a product. Profiling and algorithms. Your online experience is curated by systems that may know more about you than you’d like. Lack of transparency. It’s often unclear what actually happens with your data.

One example: you browse a clothing site, and suddenly that same jacket follows you in ads for days. Or your location is shared automatically without explicit permission. People feel watched, manipulated.

75% of people feel uncomfortable with the power tech companies have over their personal data.

What are the consequences?

Growing distrust. People are becoming more skeptical and cautious. Changing behavior. Some seek privacy-friendly alternatives; others feel stuck in systems they can’t escape. A deeper debate. Who really controls our data? Us, or the platforms?

What can you do?

Fortunately, there are real alternatives. More and more people are choosing tools that respect privacy:

  • Use browsers like Brave or search engines like Startpage instead of Google.
  • Store your files with open-source systems like Nextcloud.
  • Choose privacy-friendly hardware, like the OwnPhone or laptops with an open source operating system such as Linux Mint.
  • Explore alternatives. There’s a whole ecosystem of privacy-first tools, many of which you’ll find through YourData Network

What makes YourData Network different? We go beyond protecting your privacy. We make sure you actually own your data and the network it lives on. That means your privacy isn’t just promised. It’s structurally protected. You don’t hand over your data to another third party, you stay in control.

Take back control

Three in four people feel uneasy about the power tech giants hold over their data. You don’t have to be one of them.

Want to take back control of your digital life? Start here at YourData Network.