Resilient Systems

Why I’m reducing my dependence on US tech

Published:

This site examines what happens when digital dependency meets power.

For years, my digital life sat comfortably inside one legal sphere. Different companies. Different products. One jurisdiction.

That concentration felt normal. Efficient. Invisible.

I no longer treat it as neutral.

Two wake-up calls

In 2025, the Chief Prosecutor of the International Criminal Court lost access to his Microsoft email account after U.S. sanctions were imposed. A European judicial institution found itself digitally constrained through a corporate platform governed by foreign law.

The message was quiet but unmistakable: infrastructure follows jurisdiction.

The second was political.

Recently, the United States again floated the idea of acquiring Greenland. Not as satire. As strategy. A U.S. president openly signalled willingness to pursue control over territory within the European sphere.

Not because of Greenland itself, but because of what it revealed about assumed permanence in alliances.

For many, this was geopolitical theatre.

For me, it was a trigger.

If territorial ambition can be expressed so casually between allies, assumptions about permanent alignment deserve scrutiny.

Digital infrastructure does not float above geopolitics. It sits downstream from it.

What changed in my thinking

My risk model shifted.

The probability of my personal services being disrupted by sanctions or foreign policy remains low. I am not planning for imminent shutdown.

What concerns me is correlation.

When email, storage, authentication, developer tools, publishing, devices and payment rails all operate under the same legal regime, exposure concentrates.

Disruption does not need to be frequent to be consequential. A single coordinated constraint can propagate across layers.

Resilience begins by reducing that propagation.

What I mean by resilience

Resilience is practical.

While convenience optimises for integration, resilience optimises for manoeuvre.

That requires uncomfortable questions:

These questions apply at national scale and at household scale. This site investigates both.

How locked-in I actually was

The issue was not individual tools. It was layer concentration.

When I mapped my setup honestly, five layers emerged:

Across those layers, dependency clustered within a single jurisdiction.

Changing one layer affects others in a cascade.

Lock-in was not emotional. It was architectural.

I documented this in a full dependency map of my personal tech stack, making structural exposure visible rather than abstract. –> Dependency map: understanding digital lock-in in a personal tech stack

Why I’m documenting this publicly

Writing imposes discipline.

If I claim reduced exposure, I must demonstrate it. If diversification introduces fragility, that must be visible too.

This is an experiment in lowering correlated dependency while keeping everyday systems functional.

Some adjustments will succeed. Some will prove unnecessary. Some risks will remain theoretical.

The challenge ahead

This blog documents a deliberate attempt to bring dependency and control back into closer alignment. In practice, that means reducing reliance on US platforms where credible alternatives exist, particularly within different legal jurisdictions.

Some changes will be straightforward. Others will reveal deeper structural ties. A few may prove unjustifiable.

Dependencies stack. Leverage travels through layers. Reducing exposure in one place often exposes attachment in another. Mapping those connections, and testing where they can realistically be loosened, is the work ahead.

What to expect

I intend to write roughly weekly about this journey:

Final note

This blog is an attempt to think clearly, in public, about technological dependency and what it takes to unwind it responsibly.

It’s about building resilience, preserving room to manoeuvre, and not assuming that yesterday’s stability will automatically exist tomorrow.

What comes next is practical: mapping dependencies, testing alternatives, documenting failures, and sharing what holds up under real use.

If nothing else, this is a way to regain agency by making choices visible.

The results will determine whether the hypothesis holds.