Digital Emigration

Dependency map: understanding digital lock‑in in a personal tech stack

Published:

This page documents the structural dependencies in my personal tech stack. Not just the tools I use, but the underlying layers they quietly rely on to function.

The goal is to make digital lock‑in visible. I use this map to understand and reduce how structural dependencies in my tech stack translate into vulnerability to external jurisdiction and policy overreach.

Lock‑in rarely lives in a single app. It emerges from connected dependencies: identity, storage, devices, formats and ecosystems reinforcing each other.

Understanding those layers is a prerequisite for any realistic migration towards digital sovereignty.

Reading the dependency map

Think in layers from bottom to top:

  1. Devices & operating systems - what you physically own
  2. Identity & trust - accounts, authentication, recovery paths
  3. Storage & sync - where data lives and how it is backed up
  4. Apps & workflows - email, notes, browser, chat, ebooks
  5. Sharing & distribution - who else you must interoperate with

If a higher layer depends on a lower one, replacing it without friction is usually impossible.

My dependency map

Devices & OS

Identity & trust

Storage & sync

Apps & workflows

What this implies (practical constraints)

Migration order that usually hurts least

  1. Replace single-purpose apps with open formats (notes, browser, mail client)
  2. Move storage to a neutral home (files/photos)
  3. Reduce identity coupling (separate logins, recovery methods)
  4. Only then swap devices or OS, if that’s still the goal

Dependency resolution checklist

I use this checklist to track which dependencies I have already resolved or reduced, and which ones still actively constrain my choices.

Identity & accounts

Devices & operating systems

Storage & backups

Communication

Documents & productivity

Notes & personal knowledge

Media & content

Security & authentication

AI


How to read this list:
A checked box means I have actually made the dependency irrelevant in practice, not merely replaced it on paper.