# Technologoical Sovereignty, vol. 2. * [Dedication](content/00dedication.md) * [Preface: Technological Sovereignty – What are we talking about?](content/01preface.md) * [Introduction: Technological Sovereignty – Learning to love machines again](content/02intro.md) ## Part 1: Characterising technological sovereignty initiatives * [Code is political, algorithms are weapons of math destruction](content/03algos.md) * [Digital Governance: Once upon a time...](content/04gamification.md) * [Keeping technological sovereignty: The case of Internet Relay Chat](content/05irc.md) * [Hacklabs to technological cooperatives](content/06cooperatives.md) * [From appropriate technologies to re-appropriated technologies](content/07rats.md) ## Part 2: Characterising technological sovereignty * [A seed sprouts when it is sown in fertile soil](content/08rizomatica.md) * [COATI: Simultaneous interpreting using radio frequencies](content/09coati.md) * [Whistleblowing: A double edged sword](content/10leaks.md) * [Encrypting mails with usable tools: The mass adoption of encryption technologies](content/11leap.md) * [Let's develop peasant computing, let's breed “kittens”](content/12chatons.md) ## Credits * [Credits](content/13credits.md) * * * * [Back cover](content/14back.md)