The Curtain Lifts on a Familiar Drama
Every few years, society rediscovers that data has value. A leak happens, a scandal breaks, or a regulator finally drags a corporation into the light, and suddenly dinner-table conversations revolve around privacy settings, hacked accounts, or “how do I delete this app?”
Then the panic fades. The news cycle moves on. We go back to scrolling, swiping, and “accepting all cookies” without much thought. The details are never the sizzle for consumers—what they want is simple. And simplicity, in practice, usually means letting someone else handle the hard parts, even if it costs them sovereignty over their personal data.
The question is whether this cycle can keep repeating in an era when the costs of losing control are rising and the technology landscape is shifting beneath our feet.
That’s why I think the next decade will be defined by a new phase: the bridging era.
Sovereignty Becomes Visible
For years, “data sovereignty” was a phrase mostly uttered by lawyers, activists, and IT consultants trying to sell compliance workshops. Ordinary users shrugged. They were too busy checking their feeds, downloading the latest app, or marveling at the convenience of cloud services that “just worked.”
But cracks kept forming:
• Cambridge Analytica (2018): Millions realized their personal likes and shares had been weaponized for political manipulation.
• Equifax breach (2017): Over 140 million people had their financial records exposed in one fell swoop.
• Ransomware waves (2020–2023): Hospitals and city governments found themselves locked out of their own systems, with ordinary people paying the price.
These incidents lit sparks of fear. For a while, people paid attention. They demanded answers, they toggled settings, they asked their friends which app was “safe.” And then, slowly, the urgency ebbed.
That’s the pattern: pain spikes awareness, fear drives temporary action, but simplicity always wins.
The Consumer’s Paradox
Here’s the uncomfortable truth: most people don’t want to manage their own data. They don’t want to worry about JSON formats, privacy policies, or which server their account lives on. They want three things, and three things only:
1. A big shiny button that just works.
2. An easy escape hatch when it doesn’t.
3. Someone to blame if it all goes wrong.
This paradox—wanting control without the complexity of control—defines the challenge of the next decade. If platforms and protocols can’t deliver both simplicity and sovereignty, consumers will always default to convenience, even if it means losing freedom.
The Bridges That Matter
That’s where bridges come in.
Right now, we live in a fractured ecosystem. Some platforms, like Mastodon, run on the open ActivityPub protocol, which connects thousands of independent servers into the so-called Fediverse. Others, like Bluesky, run on the new AT Protocol, with a focus on portability and algorithmic choice. Meta’s Threads is dabbling with ActivityPub integration but hasn’t gone all in.
For the average user, none of this matters—until they try to switch platforms, or until their chosen platform locks them in. That’s when the pain spikes, fear takes over, and suddenly sovereignty feels urgent.
Bridges promise to solve this by letting users carry their identity, social graph, and content across platforms without friction. The ideal is universality: log in anywhere, post anywhere, move anywhere, without starting over.
Why This Time Is Different
We’ve been here before. In the 1990s, closed systems like AOL and CompuServe tried to wall off users, but open protocols like email (SMTP) and the web (HTTP/HTML) blew them away. Interoperability was too powerful.
But the 2010s flipped the script. Centralized giants like Facebook, Twitter, and Instagram thrived despite being closed, because venture capital, advertising dollars, and addictive design made them irresistible. Openness wasn’t enough to win.
So why might sovereignty and universality finally take root in the 2020s and 2030s? A few reasons:
• Regulatory pressure: Governments are now forcing interoperability and portability (GDPR in Europe, privacy laws in California and Canada). What was optional is becoming mandatory.
• Capital fatigue: Investors know users are sick of lock-in. A “we let you own your data” pitch now attracts funding instead of skepticism.
• Developer gravity: Building apps across fractured ecosystems is a nightmare. Tools that promise “build once, interoperate everywhere” will become default.
• AI acceleration: With machine learning feeding on vast datasets, control of personal data is no longer just about privacy—it’s about protecting identity from being cloned, manipulated, or monetized without consent.
Ten Years in Three Acts
Act 1: Friction and Familiarity (Years 1–3)
Bluesky and Threads grow faster than Mastodon because they feel familiar. Their onboarding is smoother, their feeds more algorithmic. Bridges exist but are clumsy, mostly nerd-driven projects with rough edges.
Mastodon grows steadily, but mostly through migration waves triggered by scandals at centralized platforms. It remains the conscience of the decentralized web, even if it isn’t the most popular.
Act 2: The Sovereignty Shocks (Years 3–7)
Another Cambridge Analytica-style scandal hits, but this time with AI. Perhaps a billion fake accounts amplify disinformation during an election, or someone’s entire social graph is cloned into a botnet. The fear spike is global.
Governments respond by mandating portability and interoperability. Bridges mature. Suddenly, “move your account with one click” isn’t a dream—it’s required by law.
Act 3: Universality as Default (Years 7–10)
Consumers stop asking “which platform are you on?” because it doesn’t matter. Just as email addresses and phone numbers became universal identifiers, so too does a personal data key or sovereign ID.
Front-end apps still compete—some polished, some niche, some community-run—but they all run on interoperable back-ends. Simplicity wins for the user, sovereignty becomes the invisible default.
Who Owns the Toll Booths?
Here’s the twist. Bridges may give us sovereignty, but bridges can also have tolls. The risk isn’t that interoperability fails ~ it’s that it succeeds, but in a way controlled by a handful of gatekeepers.
Think about how web browsers are “open,” yet Google Chrome dominates. Or how Android is “open source,” yet Google controls its fate through services and APIs.
The sovereignty decade might end not with a thousand flowers blooming, but with a few big companies running the bridges, charging fees, and steering traffic their way. The danger isn’t lock-in ~ it’s the illusion of freedom while tolls pile up.
What This Means for You
For individuals, the best strategy is awareness. You don’t need to become a protocol engineer, but you do need to understand the basics of where your data lives, who controls the bridges, and what escape hatches exist.
For businesses and creators, the opportunity is enormous. Offering products and services that align with data sovereignty ~ tools that make portability simple, or platforms that interoperate by design—will resonate more as scandals and regulations pile up.
For policymakers, the challenge is subtle: write laws that encourage real universality without accidentally handing the toll booths to the biggest players. That means not just mandating “portability” in theory, but ensuring it in practice.
The Strange Loop Ahead
The next decade won’t be remembered as the time people learned to manage their data directly. That ship has sailed—complexity is too high, and the appetite for DIY is too low.
Instead, it will be remembered as the time sovereignty shifted from theory to default. Not because consumers demanded it in detail, but because fear forced attention, regulators forced compliance, and bridges made universality feel effortless.
It’s 9 o’clock. Do you know where your data is?
“It’s 9 o’clock. Do you know where your data is?” won’t be a call to panic. It’ll be a gentle reminder that your digital identity now moves with you—that sovereignty is a background guarantee, like running water or electricity.
But don’t mistake background guarantees for inevitabilities. Every bridge has a builder, every bridge has a toll risk. The fight won’t be over whether universality arrives—it will be over who controls the routes once it does.
Closing Thought
History suggests openness wins in the long run, but polish wins faster. The bridging decade will test whether we can combine both ~ simplicity for the consumer, sovereignty in the infrastructure, and universality as the quiet thread holding it together.
When people finally stop asking “where’s my data?” ~ that’s when we’ll know sovereignty has arrived.
Q&A Summary:
Q: What is data sovereignty?
A: Data sovereignty is the concept that information is subject to the laws and governance structures within the nation it is collected. In the context of this blog post, it refers to the control and ownership individuals have over their personal data.
Q: What is the role of bridges in data sovereignty?
A: Bridges promise to solve the issues of data sovereignty by letting users carry their identity, social graph, and content across platforms without friction. This allows users to log in anywhere, post anywhere, move anywhere, without starting from scratch.
Q: What changes are expected in the next decade regarding data sovereignty?
A: The next decade is expected to see a shift from data sovereignty being a theory to becoming the default. This shift is expected to come about through regulatory pressure, capital fatigue, developer gravity and AI acceleration. The decade is expected to play out in three acts: Friction and Familiarity, The Sovereignty Shocks, and Universality as Default.
Q: What is the potential risk associated with bridges in data sovereignty?
A: While bridges can help achieve data sovereignty by promoting interoperability, they can also come with tolls. The risk is that a handful of gatekeepers might control the bridges, charging fees and steering traffic their way, creating an illusion of freedom while tolls pile up.
Q: What is the best strategy for individuals regarding data sovereignty?
A: For individuals, the best strategy is awareness. They need to understand the basics of where their data lives, who controls the bridges, and what escape hatches exist.