# Technologoical Sovereignty, vol. 2. * [Dedication](content/00dedication.md) * [Technological Sovereignty: What are we talking about?](content/01preface.md) * [Technological Sovereignty: Learning to love machines again](content/02intro.md) ## Part 1: Technological sovereignty initiatives * [Code is political, algorithms are weapons of math destruction](content/03algos.md) * [A seed sprouts when it is sown in fertile soil](content/04rizomatica.md) * [COATI: Simultaneous interpreting using radio frequencies](content/05coati.md) * [Whistleblowing: A double edged sword](content/06leaks.md) * [Let's develop peasant computing, let's breed “kittens”](content/07chatons.md) ## Part 2: Characterising technological sovereignty * [Encrypting mails with usable tools: The mass adoption of encryption technologies](content/08leap.md) * [Keeping technological sovereignty: The case of Internet Relay Chat](content/09irc.md) * [Digital Governance: Once upon a time...](content/10gamification.md) * [From appropriate technologies to re-appropriated technologies](content/11rats.md) * [Hacklabs to technological cooperatives](content/12cooperatives.md) ## Credits * [Credits](content/13contributions.md) * * * * [Back cover](content/14back.md)