You Don’t Own Your Tech: Digital Dependency in the Cloud Era
Part I of the Digital Survivalism Series
We were told we were buying tools.
We were not.
What we were sold instead were temporary permissions wrapped in polished design — governed by incentives that have nothing to do with our continuity, our autonomy, or our memory. The smiling interfaces, the seamless ecosystems, the language of innovation and experience — all of it conceals a core truth:
we do not own the digital tools we rely on.
The Illusion of Ownership
The modern technology user is caught in a behavioral lease. You may pay full price for a device or software, but you are rarely its true owner. The software licenses we “agree” to — without reading — often explicitly reserve the company’s right to revoke, alter, or disable features without our consent.
What’s sold as ownership is better understood as
managed dependency: the illusion of control within a tightly regulated system.
This isn’t accidental. As Ellul (1964) wrote in The Technological Society, “Technique evolves by itself, more rapidly than it can be directed.” Platforms don’t evolve with the user in mind — they evolve to serve scalability, investor return, and telemetry extraction.
As Noam Chomsky argued in Manufacturing Consent (Herman & Chomsky, 1988), power is maintained less through overt control than by limiting the boundaries of thought. In tech, this isn’t enforced by coercion — but by convenience.
The danger isn’t that companies lie.
The danger is that we believe them.
Case Study: Windows 11 and the Managed Update Trap
In 2021, Microsoft released Windows 11 with drastically raised system requirements, including mandatory TPM 2.0 chips. Millions of perfectly functional machines were suddenly labeled “unsupported,” pushing users toward new hardware or cloud-based alternatives like Windows 365.
This wasn’t about security. It was about control.
Windows 11 also introduced more aggressive update behavior, reduced user control over default apps, and deeper integration of Microsoft accounts. These weren’t neutral enhancements — they were redefinitions of what it means to use a computer.
When Microsoft decides what apps you can remove or what hardware is obsolete, it reveals the asymmetry:
you are not the customer; you are a variable in a revenue loop.
(Cimpanu, 2021)
Apple’s Garden, Locked and Paved
Apple presents itself as the privacy-first alternative — and in some ways, it is. Compared to the data-harvesting practices of other tech giants, Apple has taken visible steps to protect user privacy.
But privacy is not the same as autonomy.
You can be private and still be locked in.
Apple’s ecosystem isn’t built for sovereignty — it’s built for continuity within its own boundaries. Decline updates, reject the App Store, or push against defaults, and you’ll quickly find the edges.
iOS users, for example, cannot uninstall Apple Music. Default behaviors route links to Apple’s own services — not user preferences. iCloud photo storage, AirDrop, HEIC image formats, iMessage, and FaceTime all foster a subtle but powerful lock-in.
This isn’t a walled garden.
It’s a beautifully landscaped cul-de-sac — with no exits.
As The Verge noted, Apple’s design isn’t about empowerment — it’s about increasing switching costs (Patel, 2018). The goal is to make the ecosystem feel like home — until you try to leave.
The Cloud Is Not Your Friend
“Your files are safe in the cloud,” we’re told.
But outages, lockouts, and silent data losses are not rare. When you store your content in a proprietary system, access can be revoked.
When Adobe removed access to older Creative Cloud versions, legacy workflows broke.
When Google shut down Google Play Music, users scrambled to export their libraries.
When Dropbox updates break local sync, your content depends on policies you can’t control.
Nothing in the cloud is permanent.
The terms of service say so — even if the marketing doesn’t.
Managed Convenience Is a Control System
This isn’t a conspiracy. It’s infrastructure.
It’s the logical end of business models that treat users not as owners, but as engagement metrics.
Convenience is the bait. Lock-in is the trap.
Systems that update themselves without consent are not neutral.
Systems that can’t be paused are not benevolent.
Systems that remove exit paths are not serving you — they are managing you.
The lie isn’t immoral in itself.
The danger is in believing it.
Coming Next:
I Am Not a Product: Resisting the Revenue Funnel
Part II of the Digital Survivalism Series
References
Cimpanu, C. (2021, June 25). Windows 11’s hardware requirements could leave millions behind. ZDNet. https://www.zdnet.com/
Doctorow, C. (2023). The Internet Con: How to Seize the Means of Computation. Verso Books.
Ellul, J. (1964). The Technological Society. Vintage Books.
Herman, E. S., & Chomsky, N. (1988). Manufacturing Consent: The Political Economy of the Mass Media. Pantheon Books.
Patel, N. (2018, April 23). Apple’s walled garden is starting to look like a prison. The Verge. https://www.theverge.com/

