summaryrefslogtreecommitdiff
path: root/asymmetry.tex
blob: 254314da27fc3f02a9e0acc5f6e99c227e940606 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
% This file carries two licenses. 
%
% The text is license CC BY-SA see imprint.
% 
% LaTex template for a pamphlet 
% Copyright (C) 2025 Roman Philip
%
% This program is free software: you can redistribute it and/or modify
% it under the terms of the GNU General Public License as published by
% the Free Software Foundation, either version 3 of the License, or
% (at your option) any later version.
%
% This program is distributed in the hope that it will be useful,
% but WITHOUT ANY WARRANTY; without even the implied warranty of
% MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
% GNU General Public License for more details.
%
% You should have received a copy of the GNU General Public License
% along with this program.  If not, see <https://www.gnu.org/licenses/>.

\documentclass[10pt]{book}

\author{Roman Philip}
\title{Asymmetry, heteronomy, delegation: what happens when our self-reliance in fact relies on technological providers?}

% making the font TeX Gyre Termes the default font; GFL
\usepackage{tgtermes}
% loading the inter font so I can use throughout the document; OFL
\usepackage{inter}
\usepackage[T1]{fontenc}

\usepackage[english]{babel}

\usepackage[
	a6paper, % Set size of document
	%top=1.5cm, % margins
	top=2cm, % margins
	bottom=1.5cm,
	inner=1cm, % for twosided docs, left is called inner
	textwidth=7cm,
	%outer=1cm, % for twosided docs, right is called outer
	bindingoffset=0.1cm,
	twoside=true,
	%showframe, % show actual margin frame on the pdf
	%showcrop % show layout size if smaller than paper size
	]{geometry}

% Set color of the font for the whole document if different than black
%\usepackage{xcolor}
%\color{black}

% Hyphenation word list
\hyphenation{%
	AI
	Adobe
	Bench
	Bitcoin
	DIY
	Daniel
	Instagram
	European
	Union
	France
	Cyprus
	Central
	Bank
	heteronomy
	heteronomic
	Maps
	International
	Monetary
	Fund
	Facebook
	LinkedIn
	Microsoft
	Nassim
	Nassim
	Philip
	Roman
	Ross
	Taleb
	bitcoin
	lock-in
	}

% Fine tunes typographic effect (i.e. character protrusion?)
% I get a few less Overflow when protusion is on
\usepackage{microtype}
\sloppy

% hyphens URL
% so that URL line-break
\usepackage[hyphens]{url}

% To enable strikethrough text with \sout{}
%\usepackage[normalem]{ulem}

% Group footnotes altogether after the text
% Add \theendnotes to show notes, after the text
\usepackage{endnotes}
\let\footnote=\endnote

% Make the labels of description lists non-bold (default is bold)
%\renewcommand*\descriptionlabel[1]{\hspace\labelsep\normalfont #1}
% this works because the command \sourceinter is defined in the 
% preamble
\renewcommand*\descriptionlabel[1]{\hspace\labelsep\interlight #1}

% Print commit and branch (git)
% credit CL
% The branch name can be extracted from .git/HEAD 
% and given [branch name], the commit ID can be found in
% .git/refs/heads/[branch name]
\usepackage{xstring}
\usepackage{catchfile}

% The package catchfile provides the command \CatchFileDef,
% which allows us to read .git/HEAD into a macro
\CatchFileDef{\headfull}{.git/HEAD}{}
% Use \StrGobbleRight from the xstring package to trim it
\StrGobbleRight{\headfull}{1}[\head]
% Extract the branch name from the string with \StrBehind
% and save it to \branch
\StrBehind[2]{\head}{/}[\branch]
\IfFileExists{.git/refs/heads/\branch}{%
% Use \CatchFileDef to save the commit ID in \commit
    \CatchFileDef{\commit}{.git/refs/heads/\branch}{}}%

% to display .png file
\usepackage{graphicx}

\begin{document}

\newgeometry{
	layoutheight=13.65cm, % custom height for the actually print area
	layoutwidth=9.3cm, % custom width for the actually print area
	layoutvoffset=0.6cm, % bleed
	top=0.8cm,
	bottom=0.8cm,
	left=1.4cm,
	right=1.4cm
}

\thispagestyle{empty}
\begin{flushleft}
	% Add \par so the line spacing is even
	{\Huge\interextrabold Asymmetry, heteronomy, delegation:\\ what happens\\ when our\\ self-reliance\\ in fact relies on technological providers?\par}
	\bigskip
	{\large\intermedium roman philip}
\end{flushleft}

%\vspace*{\fill}%
\begin{flushright}
\includegraphics*[width=0.2\textwidth]{rabbit.png}
\end{flushright}
\restoregeometry

\newpage
\thispagestyle{empty}
% start page counter
\mainmatter
%hide page counter
\thispagestyle{empty}
% Setting for the group/page
\begingroup

\newpage
\date{} % hide date \maketitle prints \today
\maketitle

\newpage
\thispagestyle{empty}
\vspace*{\fill}%

\begin{scriptsize}

\begingroup
\interlight
\parindent 0pt
\parskip 1ex

Imprint

\begin{description}
 \setlength{\itemsep}{-1.1ex} % horizontal space between list items
 \setlength{\labelsep}{0.2em} % horizontal space between label and description
   \item[LAYOUT] yctct
   \item[ARTWORK] \emph{white rabbit} by le marteau rêveur
   \item[EDITORS] Daniel Ross; T.K.
   \item[COPY EDITING] Daniel Ross
   \item[PRINTING] Lilou (Drucken3000)
   \item[PRINTER] RISO MZ1070E
   \item[PAPER] Metapaper 90 gsm
   \item[INK] Riso ink, blue
   \item[PRINT RUN] 150
   \item[BINDING] yctct
   \item[FONTS] inter OFL-1.1; termes GFL
   \item[SPELLCHECK] aspell licensed under LGPL-2.1+
   \item[TYPESETTING] \LaTeX\ licensed under LPPL-1.3c
   \item[VERSION CONTROL] Git licensed under GPL-2.0+
   \item[TEXT EDITOR] Vim licensed under Vim license
   \item[OPERATING SYSTEM] GNU/Linux Trisquel %which complies with the GNU Free System Distribution Guidelines
   \item[COMPUTER] Thinkpad X220 with Libreboot
\end{description}

\url{https://pub.yctct.com}\newline
\texttt{yctct@yctct.com}\newline
\texttt{2E0F FB60 7FEF 11D0 FB45 4DDC E979 E52A 7036 7A88}\newline
PGP public key: \url{https://yctct.com/_pubkey.txt}

Compiled on \today.

Commit hash \texttt{\commit}%on branch \texttt{\branch}.

© 2025 \emph{Asymmetry, heteronomy, delegation: what happens when our
	self-reliance in fact relies on technological providers?} by Roman
	Philip is licensed under \mbox{CC BY-SA 4.0}.

TL;DR of the license: you can copy, translate and redistribute this essay
with attribution, even commercially. If you redistribute this essay
electronically, you cannot apply technological restrictions e.g. DRM.
To see the full license, check
\url{https://creativecommons.org/licenses/by-sa/4.0/}.

Like the layout of this pamphlet? Download the source file.

Source file: \url{https://git.yctct.com/asymmetry}

To order copies please email \texttt{yctct@yctct.com}.

\end{scriptsize}
\endgroup

\newpage
\thispagestyle{empty}
\vspace*{20ex}
Many of us benefit from what technological providers have to offer. 

We
use technologies knowing that the applications or the software we rely
upon will increase the power, speed and scale at which we can operate.

As we adopt a technology, we entrust the provider of that technology with some
of our autonomy; in return, we expect that the power of that technology will
further empower us.  However, sometimes things don't work out as expected. The
heteronomy of providers --- that is, the influence providers have over users
--- can give rise to adverse consequences.  Users can discover that they have
been locked out, or they may be dragged along through unwanted changes, or lose
access to their assets.

A key factor behind such problems is that, very often, asymmetries of power
exist between users and providers. These asymmetries are not always obvious,
and sometimes users hand their autonomy over to these heteronomous powers with
little or no awareness of them.

This does not imply that we should reject the usage of digital technologies, or to
say that we should decrease our usage of them, or avoid large technology
companies. But it is to raise the question:\\

\noindent what would it take for users
to leverage the power that technologies have to offer without finding
themselves subject to the adverse consequences which result from such
asymmetrical relationships to providers?\\

\noindent RP.

\newpage
\thispagestyle{empty}
\vspace*{20ex}
Late in December 2024, Bench, a startup whose promise was to automate
accounting for businesses, shut down.

On December 27th, users of Bench found that the login interface used to
access their accounting data and tax documents had disappeared.
Instead, a visit to the site revealed only a single webpage bearing the
following message printed on a plain white background:

\begin{quote}
"We regret to inform you that as of December 27, 2024, the Bench
platform will no longer be accessible. We know this news is abrupt and
may cause disruption, so we're committed to helping Bench customers
navigate through the transition.

``From the entire team at Bench, it has been an absolute privilege to
serve small businesses for the last 13 years. Thank you for being part
of our journey.''\footnote{You can still see that page on archive.org:
	\url{https://web.archive.org/web/20241227223423if_/https://bench.co/}}
\end{quote}

A few days later, an announcement was made that Bench had been acquired
by a company with no experience in running accounting books for
businesses.\footnote{\url{https://techcrunch.com/2025/01/03/inside-the-wild-fall-and-last-minute-revival-of-bench-the-vc-backed-accounting-startup-that-imploded-over-the-holidays/}}
Some users tried to obtain their data or close their accounts, but
couldn't. They were forced to transfer their accounting data to the new
owner.\footnote{\url{https://techcrunch.com/2025/01/10/bench-customers-are-now-being-forced-to-hand-over-their-data-or-risk-losing-it-they-say/}}\textsuperscript{,}\footnote{Thank you to Fabien K. for letting me know about the shutdown of Bench.}

Earlier in 2024, another scandal had broken out: ``tens of thousands of
U.S. businesses and individuals''\footnote{\url{https://apnews.com/article/synapse-evolve-bank-fintech-accounts-frozen-07ecb45f807a8114cac7438e7a66b512}}
found themselves locked out, unable to access their savings.\footnote{\url{https://www.nbcnews.com/buisness/consumer/collapse-fintech-firm-10-million-users-without-access-money-rcna153599}}
This happened because a financial technology company, which was the
backbone of other financial digital applications, shut down. In the
turmoil, the authorities found that the bank balance of these technology
companies did not match the balance of users. \$96 million in funds were
missing.\footnote{\url{https://www.cnbc.com/2024/11/22/synapse-bankruptcy-thousands-of-americans-see-their-savings-vanish.html}}
Some users said they were refunded less than 1\% of their
balance;\footnote{We would like to think that users would be refunded in
  this kind of situation, like when a bank goes bust; however, that did
  not happen here, because the deposits at these financial technology
  companies weren't insured by the Federal Deposit Insurance
  Corporation.} a woman was told that she would only get \$500 back from
the \$280,000 she initially deposited, another user said he was offered
81 cents against his \$22,000.\footnote{\emph{Ibid.}}

Some other disruptions are less devastating, yet still show that users
can, without realising it, find themselves in a position where they are
effectively powerless. For example, over the last decade or so, a trend
has emerged for software companies to herd users onto the cloud. That
means that, if users want to utilise an application, they must now
remain tethered to the servers of providers. It also means, most of the
time, that users must store their work on servers belonging to providers,
rather than on their own computers. The problem, though, is that once a
company has locked users in, they can drag them along as they implement
unwanted changes, or decide to use the work of users as input to train
their own technology. For example, Adobe's AI technology scans the work
of all users by default.\footnote{\url{https://infosec.exchange/@briankrebs/111965550971762920}
  and \url{https://helpx.adobe.com/acrobat/using/generative-ai.html}} Along
the same lines, back in 2023 Microsoft allegedly trained their AI
technology on the data of companies storing their work on the servers of
Microsoft.\footnote{\url{https://www.saverilawfirm.com/our-cases/github-copilot-intellectual-property-litigation}}

These are examples showing that the \emph{heteronomy} of providers ---
that is the influence providers can have on users --- can cause adverse
consequences. Once users have come to trust providers with their
autonomy, the heteronomous power of providers can lead to situations
such as the ones described above. Users can get locked out from their
accounts, lose their savings, or be dragged along powerlessly as
providers make unwanted changes.

The implication of all these stories and unwanted
consequences is not that we should abandon the use of technological
applications, cloud infrastructures or artificial intelligence.

Asking someone, be it a company or a technology, to run our accounting books,
keep our money or our data, or run computing tasks, is nothing new. We've been
delegating tasks for a long time: to accountants, to bankers, to lawyers, as
well as to technologies and machines.

However, we usually don't delegate unquestioningly. We know things can go
wrong; we know there is always a chance the other party may mislead us. So when
we delegate, as far as possible we make sure that there are safeguards in
place. For example, we review contracts before signing; we get advice from
lawyers; we make sure the law will protect us; we figure out which pieces of
information, or bits of knowledge, we can risk transferring --- and which we
cannot. We would not sign a contract that allows someone else to lock us in,
or take advantage of our situation, while we remain powerless.

In other words, as the philosopher Daniel Ross tells me:

\begin{quote}
``We take care of the conditions of delegations. What is delegation? It
is the fact that, ever since the dawn of agriculture, when it became
possible to generate large surpluses of food, structures have arisen
relieving some people of certain tasks and designating other people with
other tasks. It is what we call the division of labour, and it usually
also involves the introduction of one or another kind of hierarchy. This
hierarchical division is a delegation. And with the Industrial
Revolution this delegation is extended to machines, to factories, and
then to all kinds of other technological systems, and today to apps,
platforms and so on. All of these delegations involve an interplay of
power and powerlessness. The time we save by delegating grants us
autonomy, the freedom to do other things. But it does so by taking those
tasks out of our hands, and therefore, potentially, out of our control:
autonomy depends on heteronomy, but it comes at a cost. This is why the division of labour, from
the very beginning, brings about new potentials for tension, conflict,
disagreement and war. It is to mitigate those risks that we must always
pay attention to our delegations, to the conditions in which they
operate, and to the rules we establish to ensure that the risks of
delegation are kept to a minimum.''
\end{quote}

But somehow, with digital technologies, we miss something; we do not
seem to have figured out what the \emph{conditions of delegations} are,
or what those conditions ought to be. Most of us have been caught in the
trap.

It's true that the kinds of technologies we are considering here can
initially give users a sense of empowerment: for example, by using
Google Maps, we suddenly realise that we have increased our freedom,
because we can find our way literally anywhere. But then, somehow, over
time, users can become trapped: in the case of Google Maps, we
increasingly realise that, without this navigational delegation, we no
longer know how to find our way around, sometimes even along routes with
which we were formerly familiar. And this is a problem that is not just
individual, but generational: to grow up without ever having learned to
navigate without delegating to Google Maps is another thing again.

It is as if individuals and even generations of individuals can no longer
imagine that alternatives exist. Today, some businesses can no longer exist
without an Instagram account; some people can no longer exist professionally
without a LinkedIn account. And so it becomes a paradox:

\begin{quote}
\emph{Technologies that were first
affording users new possibilities have become the only possibility there is.}
\end{quote}

In short: the systemic asymmetry of these delegations means that their
heteronomous character can fail to foster autonomy in a way users might have
first imagined, but instead, lock them in, or nudge them into situations
sometimes with no way out.

An oft-cited example is how the world wide web first granted, to just about
anyone, the ability to publish information to the world, creating a new global
public, but then, before too many years had passed, this new capacity fell
captive to a consortium of walled gardens\footnote{``A walled garden is a
software system wherein the carrier or service provider has control over
applications, content, and/or media, and restricts convenient access to
non-approved applicants or content.'' Wikipedia} dominated by a few
planetary-scale companies. Within the walls of these gardens, users have no
other choice but to accept the conditions offered to them by the gatekeepers.
And this offer is made on a take it or leave it basis: accept or decline the
heteronomous conditions of access provided by Facebook if you want to keep in
touch with others, by Instagram if you want to conduct marketing, by LinkedIn
if you want to exist on the job market, \emph{et cetera}. Yet, even though most
of us have identified these patterns, most of us still don't know how to avoid
those traps. We come to accept that `there is no alternative'', and we limit
ourselves to adapting to this mantra.

In more recent years, we have observed a similar pattern unfolding in
the way some cryptocurrency companies deal with their users.

For a long time, banks have had custody over people's financial assets; meaning
that the ``owner'' of a bank account, the account ``holder'', does not in any
clear way hold the ultimate power in relation to the release of funds held in
that account. The bank does. For example, in France (and probably in other
countries), if someone wants to withdraw a large sum of money from \emph{their own}
bank account, they have to request permission. While the process is mundane, they still have to fill out a
form, or provide an explanation of their reasons for wishing
to withdraw \emph{their own} funds. They can't just use their funds freely. Sometimes the restrictions can be more drastic:
cases where customers find that they really have no control over \emph{their}
funds, for example when banks freeze accounts, as occurred in Canada in
2022, when 210 bank accounts were frozen by the government without a court
order.\footnote{\url{https://www.cbc.ca/news/politics/ottawa-protests-frozen-bank-accounts-1.6355396}}
Or worse: when authorities grab funds sitting in bank accounts, as
occurred in 2013 in Cyprus when deposits above €100,000 were used to resolve
the debt of one of the largest local banks, as part of a deal with the European
Union, the European Central Bank and the International Monetary
Fund.\footnote{\url{https://web.archive.org/web/20130325042059if\_/https://www.reuters.com/article/2013/03/25/us-cyprus-parliament-idUSBRE92G03I20130325}}

With some technologies, such as bitcoin, this situation is changing:
individuals can have custody of their financial assets. In saying this,
we do not mean to imply that bitcoin is a panacea for the risk of
account-holders finding themselves deprived of their funds. Other risks
of that kind remain for those who deal in bitcoin. Nevertheless, the
fact remains that no technology provider can lock a user out from
accessing his or her bitcoin funds, as long as users keep their seed
secret. Yet, as we just stated, risks remain, and users can still fall
into one kind of trap or another. Users of cryptocurrencies can
undoubtedly still find themselves the victim of the heteronomy of
providers of technologies related to cryptocurrency management. These
providers might first provide users with tools that facilitate managing or
exchanging cryptocurrencies, but they can also put users in situations where
adverse circumstances can deprive them of access to their funds, locking
them out of their accounts, or even losing the whole value of their
holdings. In short, there is no escape from the need to pay attention to
the conditions of our delegations.

What is it that we are missing, then?

Some readers will shrug their shoulders and think that for one to have
access to the immense power and scale afforded by these technologies,
they simply have to accept the requirement to submit to these
asymmetries of power. That is just the price of doing business: we have
no choice. Other readers might think that for one to be free from these
asymmetries of power, one has to acquire extraordinary skills.

But this is not the case.

Avoiding asymmetries of power is not a question of whether one can write
code, or is some kind of IT wizard. You don't have to be a lawyer to
read and sign a contract, and we are often quite capable of doing so on
our own. We might not know all the intricate details of the meanings of
the clauses and the laws that govern them, but as individuals we still
acquire a set of heuristics (rules) that allow us to detect red flags.
It is the same with the kinds of technologies we are discussing here:
avoiding pitfalls is about having a short checklist in mind of what the
conditions of delegations should be (and what they shouldn't be), so
that when we are faced with using a new technology we can run that
checklist on our own, and give ourselves a pretty good chance to figure
out whether we will fall into a trap leaving us at the mercy of
providers.

Most of us do not want to get ourselves into situations where we would
be forced to ask for permission, jump through a painful set of hoops, or
get into a seemingly endless argument with a digital provider, just in
order to use \emph{our} digital assets. We want to have control over our
digital assets regardless of the deeds and practices of digital
providers.

For example, and here we are looping back to the case of Bench with which we
began, one can choose to use an accounting software whose providers cannot lock
you in. This doesn't mean that you shouldn't delegate the job of running your
accounting software to a provider, or that you have to have your own server.
Not at all. You can still rely on the servers of a third-party provider to run
your accounting system, but you have to take care of the conditions of
delegations, so if you're unhappy with the software, or the provider, you can
quit and carry on using the software \emph{without} the provider. Or if that
proves difficult, you can hire another provider to run that software for you,
which is, of course, still a delegation, but of a different kind, and with
fewer risks.  How all of that is possible is something that will be explained
in more detail in subsequent articles.

For now, my point is simple: one does not just have to accept these
asymmetries.  There are indeed alternatives.  It is possible for the user not
to abandon their autonomy.  Users can have as much power as providers. When the
conditions of delegation are such as to ensure that users keep their power and
autonomy, then, if a provider does something users don't like, users can walk
out with their digital assets, e.g.  accounting books, tax documents, data,
work documents, funds as well as software they have become dependent upon.

It is in no way necessary to put yourself
in a situation where you can get locked out, or where you are obliged to enter
into difficult and painful arguments and negotiations just to win back the
right to use assets that were yours from the outset. In the words of Nassim Taleb:

\begin{quote} ``You do not want to win an argument. You want to
win.''\footnote{\emph{Skin in the Game}, Nassim Nicholas Taleb, 2018, p.24}
\end{quote}

And so the question we must ask is simple: how does one ``win'' when
using digital technologies?

What is the checklist for these conditions of delegations that you must
keep in mind so that you can leverage the power such technologies have
to offer, yet insulate yourself from the hubris and heteronomic excess
that providers can exert over users?

In a series of articles to come, these questions will be addressed, and exactly
what counts as the conditions of delegation will be discussed and explored in
detail. In other words, our aim will be to provide readers with heuristics they
can use, so that they can avoid falling into asymmetries of power, without
denying that in today's world self-reliance does not mean cutting oneself off
from technology, but rather means knowing how best to rely on new technologies,
and how best to take care of the risks of that reliance.

These technologies
are indeed immensely powerful, and therefore contain inherent threats and
risks. Our reliance upon them must not, and need not, end up making us, the
users of these technologies, powerless and trapped. But for that, we need
knowledge.

\newpage
\thispagestyle{empty}
\begingroup
% Set indent
\parindent 0pt
% Set space between paragraphs
\parskip 1ex

\newpage
\thispagestyle{empty}

\vspace*{\fill}%
\begin{center}
Thank you to those who financed this work.
\end{center}
\vspace*{\fill}%

\newpage
\thispagestyle{empty}
\textbf{\large Next essays}

If you'd like to receive an email when the next essay is out, you can sign up to a newsletter there: \url{https://lists.yctct.com/wws/subscribe/updates}.

\includegraphics*[width=0.4\textwidth]{subscribe.png}

\newpage
\thispagestyle{empty}
\textbf{\large Fundraising}

If you or your organisation would like to finance this work, you can use one of the following methods: cash, bank transfer, bitcoin, monero.

\textbf{Cash}

All currencies welcome.

You can send cash to the following address:

\texttt{Roman Philip\\
C/O Cultivation Space\\
ExRotaprint\\
Ausgang 4\\
Gottschedstr. 4\\
13357 Berlin\\
Germany}

\textbf{Bank transfer}

Please email me at \texttt{yctct@yctct.com} and I'll provide you with banking details.

\newpage
\textbf{Bitcoin}

\includegraphics*[width=0.4\textwidth]{btc.png}

\texttt{bc1qvtkplyg43uw35czec8cr35kmganvh6y2tr\\fcev}

\thispagestyle{empty}
\textbf{Monero}

\includegraphics*[width=0.4\textwidth]{xmr_cropped.png}

\texttt{86XSBNFRWSWLehxTcQrRMuMyssdhBWNCpAYi3G\\sgJf8f8BhLJUBpvCwheVUrPeTpKBDjRfLK7uzc\\bdd6ubTQ2b6m3ZUkRTg}

\newpage
\thispagestyle{empty}
\textbf{\large About}

I do independent research in philosophy, \mbox{security} \& technology.

I distribute my work under a \mbox{CC BY-SA} license; in short, that means that anyone can copy, translate and redistribute this work with attribution (credit), even commercially.
To see the full license, check \url{https://creativecommons.org/licenses/by-sa/4.0/}.


\endgroup

\newpage
\theendnotes

\end{document}