<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Niels' Letter]]></title><description><![CDATA[CEO at mintBlue | make data flow with proof | cybersecurity, AI, compliance, operations, automation, growth, minimalism, guitar, surf, cats, and kimchi.]]></description><link>https://www.nielsvandenbergh.com</link><image><url>https://substackcdn.com/image/fetch/$s_!P1gu!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f2cc1c6-56e8-4b53-ad07-6e3b37e2cdc0_500x500.png</url><title>Niels&apos; Letter</title><link>https://www.nielsvandenbergh.com</link></image><generator>Substack</generator><lastBuildDate>Sat, 18 Apr 2026 09:46:36 GMT</lastBuildDate><atom:link href="https://www.nielsvandenbergh.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Niels van den Bergh]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[nillavanilla@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[nillavanilla@substack.com]]></itunes:email><itunes:name><![CDATA[Niels V. van den Bergh]]></itunes:name></itunes:owner><itunes:author><![CDATA[Niels V. van den Bergh]]></itunes:author><googleplay:owner><![CDATA[nillavanilla@substack.com]]></googleplay:owner><googleplay:email><![CDATA[nillavanilla@substack.com]]></googleplay:email><googleplay:author><![CDATA[Niels V. van den Bergh]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Doing Dishes with a Kingpin]]></title><description><![CDATA[What happens when you accidentally host a top criminal with your Airbnb startup.]]></description><link>https://www.nielsvandenbergh.com/p/doing-dishes-with-a-kingpin</link><guid isPermaLink="false">https://www.nielsvandenbergh.com/p/doing-dishes-with-a-kingpin</guid><dc:creator><![CDATA[Niels V. van den Bergh]]></dc:creator><pubDate>Wed, 11 Feb 2026 06:54:42 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ye_M!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72ca8b15-5c3b-45a4-b046-3904edf6d4a0_2586x1427.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ye_M!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72ca8b15-5c3b-45a4-b046-3904edf6d4a0_2586x1427.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ye_M!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72ca8b15-5c3b-45a4-b046-3904edf6d4a0_2586x1427.png 424w, https://substackcdn.com/image/fetch/$s_!ye_M!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72ca8b15-5c3b-45a4-b046-3904edf6d4a0_2586x1427.png 848w, https://substackcdn.com/image/fetch/$s_!ye_M!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72ca8b15-5c3b-45a4-b046-3904edf6d4a0_2586x1427.png 1272w, https://substackcdn.com/image/fetch/$s_!ye_M!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72ca8b15-5c3b-45a4-b046-3904edf6d4a0_2586x1427.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ye_M!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72ca8b15-5c3b-45a4-b046-3904edf6d4a0_2586x1427.png" width="1456" height="803" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/72ca8b15-5c3b-45a4-b046-3904edf6d4a0_2586x1427.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:803,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:6486194,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.nielsvandenbergh.com/i/186734992?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72ca8b15-5c3b-45a4-b046-3904edf6d4a0_2586x1427.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ye_M!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72ca8b15-5c3b-45a4-b046-3904edf6d4a0_2586x1427.png 424w, https://substackcdn.com/image/fetch/$s_!ye_M!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72ca8b15-5c3b-45a4-b046-3904edf6d4a0_2586x1427.png 848w, https://substackcdn.com/image/fetch/$s_!ye_M!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72ca8b15-5c3b-45a4-b046-3904edf6d4a0_2586x1427.png 1272w, https://substackcdn.com/image/fetch/$s_!ye_M!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72ca8b15-5c3b-45a4-b046-3904edf6d4a0_2586x1427.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I was 22 and running an Airbnb management company in Amsterdam. Huurfix, we called it. We handled everything: keys, cleaning, and guest communication. Property owners could collect rent without lifting a finger, and in those days, everyone wanted in. Airbnb was booming. Everyone wanted to list their place. Nobody wanted to deal with the guests. We managed dozens of apartments across the city.</p><p>One day, a guest cancelled last-minute. Two full weeks, suddenly available. The property was a cosy townhouse in Amsterdam-West, owned by a young couple who were travelling. I listed it that same evening. Last-minute availability, middle of the week. Not expecting much.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.nielsvandenbergh.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Niels' Letter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>That same night, a booking request came in. A Chinese name. No profile photo. Brand new account. Zero reviews. He wanted the full two weeks, paid upfront.</p><p>Red flags? Sure. But here&#8217;s the thing about running a startup at 22: you need money. And a two-week booking is easy money. No turnover. No back-to-back cleanings. Just one guest, one check-in, one check-out. Let&#8217;s do it. I accepted. He confirmed instantly. Deal done.</p><p>The day before check-in, I did what I should have done before accepting. I googled him.</p><p>The first results made my stomach drop. The same name. Amsterdam-based. Connected to organised crime. Convicted of human trafficking. Recently released. On probation. Linked to the Holleeder network, the kidnapping and extortion ring that dominated Dutch crime headlines for decades. I stared at my screen.</p><p>Then I did what any rational person would do: I convinced myself it couldn&#8217;t be him. &#8220;It&#8217;s probably a common name,&#8221; I told myself. &#8220;There are thousands of them. What are the odds?&#8221; I also noticed something I filed away for later: he owned a chain of hotels. One of them was around the corner from the apartment.</p><p>I called my lawyer.</p><p>&#8220;I think I&#8217;m about to check a human trafficker into a family home in Amsterdam-West,&#8221; I said. &#8220;What do I do?&#8221;</p><p>He didn&#8217;t skip a beat. &#8220;The police already know where he is and what he&#8217;s doing. He&#8217;s on probation. You don&#8217;t have to do anything. Just act normal. It&#8217;ll be fine.&#8221;</p><p>I decided to trust that.</p><p>Check-in day. I arrived early to prepare the place, tucking away the couple&#8217;s personal items, making the beds, the usual routine. A normal Dutch townhouse. IKEA furniture. Family photos on the walls. Cosy.</p><p>The doorbell rang. One hour early.</p><p>I walked to the window and looked down at the street. A black stretched Hummer was parked in front of the house. Tinted windows. A large Chinese man leaning against the hood, arms crossed. My stomach turned. I buzzed them in.</p><p>Footsteps on the stairs. My heart was pounding. The door opened.</p><p>It wasn&#8217;t the man from the car. A slight figure stepped in. Maybe 1.60 metres tall. Soft handshake. Polite. Almost deferential. &#8220;Hello,&#8221; he said, and introduced himself. The same name from the booking.</p><p>I gave him the tour. Kitchen, bathroom, bedroom. He nodded along. &#8220;Perfect, perfect.&#8221; I handed over the keys. &#8220;Thank you.&#8221; He walked back down the stairs, got into the Hummer, and drove off.</p><p>I stood there, alone in the townhouse. Was that really him?</p><p>Two weeks passed. I went back to the daily grind. Other apartments. Other guests. Other problems. I tried not to think about it.</p><p>Check-out day. I decided to handle this one myself. I wasn&#8217;t going to send a colleague into whatever was waiting in that apartment.</p><p>I rang the doorbell. Knocked. No answer. I took out my master key and turned the lock. The door swung open.</p><p>The floor was covered in packaging material. I bent down and picked something up. Dolce &amp; Gabbana. Chanel. Louis Vuitton. Easily 10,000 euros worth of luxury brand packaging scattered across the living room. The dining table was buried under Chinese takeout containers. Grease everywhere.</p><p>I looked at the wall. Oil. Splashed vertically. Like someone had thrown an open bottle across the room.</p><p>I walked to the bedroom. Red liquid on the floor. My first thought: Is that blood? I stepped closer. Red wine. An overturned bottle. The white plaster wall was stained crimson. The floor was sticky with it.</p><p>The kitchen was worse. Every piece of dinnerware had been used. Pots, pans, plates. All coated in grease and grime. I stood in the middle of it all. What happened here? I didn&#8217;t want to think too hard about it.</p><p>I pulled out my phone and opened the Airbnb app. &#8220;Hey, I just arrived for check-out. Where are you?&#8221;</p><p>The reply came instantly. &#8220;Check-out? That&#8217;s today? Shit, I had no idea.&#8221;</p><p>I stared at the message. Then I started cleaning. The owners were coming back. I had no choice. This was going to take hours.</p><p>I was scrubbing the kitchen counter when the doorbell rang. I walked to the window. The Hummer was back.</p><p>My heart was in my throat. Someone ran up the stairs. He burst through the door.</p><p>Sorry, sorry, sorry.</p><p>&#8220;You need to pay for extra cleaning,&#8221; I said.</p><p>No. I&#8217;m not going to do that</p><p>He paused, looking around the apartment. At the oil on the walls. The wine stains. The mountain of dishes. His expression softened.</p><p>I&#8217;m very sorry. I will help you.</p><p>He wasn&#8217;t offering to pay because that would have been impersonal. Disrespectful, even. He wanted to fix what he&#8217;d broken himself. The honourable thing to do.</p><p>Fifteen minutes later, I was standing at the kitchen sink. He was next to me. Shoulder to shoulder. He did the soap. I did the towel. He mumbled apologies in broken English as we worked through the stack. &#8220;Sorry I left it like this.&#8221; &#8220;Very sorry.&#8221;</p><p>About an hour later, the apartment was presentable again.</p><div><hr></div><p>A 22-year-old startup founder. Doing dishes with a kingpin. In a cosy townhouse in Amsterdam. Owned by a young couple who had no idea.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.nielsvandenbergh.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Niels' Letter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Why anonymity is our biggest enemy online]]></title><description><![CDATA[The ability to trace our actions online back to us as individuals will shape our behaviour.]]></description><link>https://www.nielsvandenbergh.com/p/accountability-without-surveillance</link><guid isPermaLink="false">https://www.nielsvandenbergh.com/p/accountability-without-surveillance</guid><dc:creator><![CDATA[Niels V. van den Bergh]]></dc:creator><pubDate>Wed, 04 Feb 2026 08:39:18 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ETZw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68a80845-e8e8-4a5b-9bdd-bbdaa5410065_1024x491.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ETZw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68a80845-e8e8-4a5b-9bdd-bbdaa5410065_1024x491.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ETZw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68a80845-e8e8-4a5b-9bdd-bbdaa5410065_1024x491.png 424w, https://substackcdn.com/image/fetch/$s_!ETZw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68a80845-e8e8-4a5b-9bdd-bbdaa5410065_1024x491.png 848w, https://substackcdn.com/image/fetch/$s_!ETZw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68a80845-e8e8-4a5b-9bdd-bbdaa5410065_1024x491.png 1272w, https://substackcdn.com/image/fetch/$s_!ETZw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68a80845-e8e8-4a5b-9bdd-bbdaa5410065_1024x491.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ETZw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68a80845-e8e8-4a5b-9bdd-bbdaa5410065_1024x491.png" width="1024" height="491" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/68a80845-e8e8-4a5b-9bdd-bbdaa5410065_1024x491.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:491,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:372751,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.nielsvandenbergh.com/i/185576560?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7a7c948-c972-4631-bc08-10d0437da7cb_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ETZw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68a80845-e8e8-4a5b-9bdd-bbdaa5410065_1024x491.png 424w, https://substackcdn.com/image/fetch/$s_!ETZw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68a80845-e8e8-4a5b-9bdd-bbdaa5410065_1024x491.png 848w, https://substackcdn.com/image/fetch/$s_!ETZw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68a80845-e8e8-4a5b-9bdd-bbdaa5410065_1024x491.png 1272w, https://substackcdn.com/image/fetch/$s_!ETZw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68a80845-e8e8-4a5b-9bdd-bbdaa5410065_1024x491.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Why is it that most of us fill out our tax returns properly? Or scan every item at the self-checkout, even when no one is watching?</p><p>You could say we follow our moral compass as humans, but that is only half the truth. The other half is that we do these things because there are rules with consequences if we fail to comply. These rules exist because we collectively chose them through democratic processes. They, the elected representatives, create laws, and authorities enforce them.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.nielsvandenbergh.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Niels' Letter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>When you walk through a supermarket, cameras record your movements. They create an audit trail. The footage follows you from aisle to aisle. But crucially, that footage alone cannot identify you. You remain pseudonymous. Your face is captured, but your identity is not known.</p><p>If you steal something, that footage becomes evidence. But to link you to your identity, you would need to identify yourself (show an ID), or authorities would need to obtain your identity through official channels. The audit trail exists. The ability to identify you exists. But the link between the two requires a deliberate step.</p><p>This is how accountability works offline. You are tracked, but not identified. Private, but accountable.</p><h2>Privacy, Anonymity, and Pseudonymity</h2><p>Before we move on to how this works online, there is an important distinction: privacy, anonymity, and pseudonymity are not the same.</p><p><strong>Privacy</strong> means certain information about you is not publicly accessible. Your medical records, your bank statements, your conversations at home.</p><p><strong>Anonymity</strong> means you cannot be recognised or identified at all. No trail exists. No link to any identity is possible.</p><p><strong>Pseudonymity</strong> sits in the middle. You can be recognised. You have a reputation. Your actions are tracked and audited. But your identity remains private until you choose to reveal it, or until a legitimate process (like a court order) links your pseudonym to your real identity.</p><p>In our day-to-day offline life, we are pseudonymous. Your face acts as a pseudonym. People recognise you, but they do not know your name, address, or official identity unless you share it. A shop clerk sees your face every week but does not know who you are. You become identified when you choose to identify yourself, perhaps by showing ID or using a bank card.</p><p>The key point: a pseudonym is always tied to a fixed identity. You cannot create unlimited pseudonyms without accountability. Each pseudonym corresponds to a single real entity. This creates reputation, consequence, and responsibility.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WOJy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6851e1ae-1547-4585-8971-0c1f8d17f356_1024x389.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WOJy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6851e1ae-1547-4585-8971-0c1f8d17f356_1024x389.png 424w, https://substackcdn.com/image/fetch/$s_!WOJy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6851e1ae-1547-4585-8971-0c1f8d17f356_1024x389.png 848w, https://substackcdn.com/image/fetch/$s_!WOJy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6851e1ae-1547-4585-8971-0c1f8d17f356_1024x389.png 1272w, https://substackcdn.com/image/fetch/$s_!WOJy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6851e1ae-1547-4585-8971-0c1f8d17f356_1024x389.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WOJy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6851e1ae-1547-4585-8971-0c1f8d17f356_1024x389.png" width="1024" height="389" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6851e1ae-1547-4585-8971-0c1f8d17f356_1024x389.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:389,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:266188,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.nielsvandenbergh.com/i/185576560?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7643ded-83c1-42a8-8010-4173f43c0b8c_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!WOJy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6851e1ae-1547-4585-8971-0c1f8d17f356_1024x389.png 424w, https://substackcdn.com/image/fetch/$s_!WOJy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6851e1ae-1547-4585-8971-0c1f8d17f356_1024x389.png 848w, https://substackcdn.com/image/fetch/$s_!WOJy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6851e1ae-1547-4585-8971-0c1f8d17f356_1024x389.png 1272w, https://substackcdn.com/image/fetch/$s_!WOJy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6851e1ae-1547-4585-8971-0c1f8d17f356_1024x389.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Online: No Audit Trail, No Accountability</h2><p>Creating fake content online was always easy. All anyone had to do was create an email address and social media accounts under a fake name, register a domain name that sounds official, and design a website that looks like a news outlet. Without any ability to trace who created the content, the creation and spread of misinformation was trivial.</p><p>But today&#8217;s synthetic content is far more sophisticated. AI can generate photorealistic deepfake videos in seconds. Large language models write convincing fake articles at scale, complete with citations, quotes from &#8220;experts,&#8221; and official-sounding language. Voice cloning technology can impersonate anyone with just a few seconds of audio. Synthetic media is now indistinguishable from reality.</p><p>We are not just dealing with fake articles anymore. We are dealing with fake people, fake videos, fake audio. Entire synthetic realities created by anonymous actors with zero accountability.</p><p>The problem is not just &#8220;fake news.&#8221; It is inauthentic content at scale: AI-generated, synthetic, fabricated. Content designed to mislead, manipulate, or deceive. And the creators face no consequences because they cannot be traced.</p><h2>The Erosion of Online Accountability</h2><p>When you publish content under your own name, there is more at stake. Your reputation. Your relationships. Your career. Both public accountability and legal accountability create consequences for behaviour. But neither works without the ability to identify the person responsible.</p><p>For a while, influencers seemed like a viable model. They are not anonymous. Their reputation is their business. Brand partnerships worth millions are at stake. Platforms can demonetise them. Audiences can turn them on instantly. If they break the law, authorities can pursue them.</p><p>But this model is eroding. Synthetic influencers are now emerging with realistic faces, voices, and video content. There is no real person behind them. No reputation at stake. No accountability. An army of AI-generated personas can push any agenda, and nobody can be held responsible. It is the next evolution of troll armies: faces that move, voices that speak, clips that look indistinguishable from real people.</p><p>The vast majority of content online is still created by anonymous accounts. A deepfake video can rack up 10 million views in two hours, spread across platforms, influence elections or stock markets. The creator? Unknown. The consequences? None.</p><p>Online, you can create chaos and walk away. Offline, you cannot steal a candy bar without an audit trail following you.</p><h2>Current Approaches Are Not Working</h2><p>Since misinformation became a mainstream concern, we have attempted to solve it in several ways.</p><p><strong>Algorithms</strong> for detecting and removing fake content have improved. X (formerly Twitter) introduced Community Notes, a crowd-sourced fact-checking system where users collectively add context to posts. Meta partners with third-party fact-checkers. These efforts show promise.</p><p>But AI-generated content now outpaces detection. For every improvement in moderation algorithms, AI generation improves by 10x. Content moderation teams at major platforms remove millions of posts daily and still cannot keep up.</p><p><strong>Regulations</strong> have advanced significantly. The EU Digital Services Act (DSA), enforced since 2024, requires platforms to moderate illegal content and be transparent about their algorithms. Platforms can be fined up to 6% of global revenue for non-compliance. The EU Digital Markets Act (DMA) designated platform gatekeepers. Multiple countries have passed content moderation laws.</p><p>This is real progress. But even with the DSA forcing platforms to moderate, they are playing whack-a-mole. The core issue remains: platforms moderate symptoms, not the source. Anonymous authors still face no accountability.</p><p><strong>Financial sanctions</strong> against platforms have increased. The EU has issued multi-billion euro fines against Meta, Google, and others for various violations. But fines do not change behaviour fast enough, and wealthy tech companies can absorb them.</p><p><strong>AI detection tools</strong> are the newest attempt. Services claim to detect AI-generated text, deepfakes, and synthetic media. But this is an arms race, and detection is losing. The same AI companies building detection tools are also building better generation tools.</p><p>A key reason these solutions are ineffective is that they do not address the underlying issue: <strong>creators of inauthentic content have no accountability because they can remain anonymous online.</strong></p><h2>A Protocol for Accountable Online Communication</h2><p>What if we could create a system that, like offline activities, leaves an audit trail for all online activities, without endangering privacy or creating surveillance infrastructure?</p><p>Not a platform. A protocol. One that can be embedded in any type of online communication: social media like Instagram and TikTok, messaging apps like WhatsApp and Telegram, email services, forums, any digital platform where content is created and shared. A universal layer for accountability and trustworthiness.</p><p>The technical foundations already exist. The W3C Verifiable Credentials standard, published in 2025, provides cryptographically secure, privacy-respecting credentials that can be verified by anyone without contacting the issuer. These credentials support selective disclosure: you can prove you are over 18 without revealing your birthdate, or prove you are a resident of a country without revealing your address. You share only what is necessary, nothing more.</p><p>Here is how it works:</p><p>Every action you take online (posting, commenting, sharing, messaging) is logged in a way that maintains your pseudonymity. You remain unidentifiable to the public and to platforms. The audit trail exists, but it is not connected to your identity by default.</p><p>When content becomes the subject of a criminal investigation, a structured process begins. Authorities obtain a court order for that specific piece of content. The audit trail is then queried across an index of KYC (Know Your Customer) providers, whether in a single country or globally. One of these providers can respond: &#8220;I have that audit trail on file, which means I have the identity documents connected to this content.&#8221; With the court order in hand, that specific provider discloses the identity.</p><p>No single entity holds all the data. No platform knows who you are. The identity information is distributed across independent KYC providers, and only the provider that onboarded you can make the connection. And they can only do so with judicial authorisation for a specific piece of content.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ApQA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0594f0c4-b59f-4f53-9274-1c5ee1646736_1024x481.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ApQA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0594f0c4-b59f-4f53-9274-1c5ee1646736_1024x481.png 424w, https://substackcdn.com/image/fetch/$s_!ApQA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0594f0c4-b59f-4f53-9274-1c5ee1646736_1024x481.png 848w, https://substackcdn.com/image/fetch/$s_!ApQA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0594f0c4-b59f-4f53-9274-1c5ee1646736_1024x481.png 1272w, https://substackcdn.com/image/fetch/$s_!ApQA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0594f0c4-b59f-4f53-9274-1c5ee1646736_1024x481.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ApQA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0594f0c4-b59f-4f53-9274-1c5ee1646736_1024x481.png" width="1024" height="481" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0594f0c4-b59f-4f53-9274-1c5ee1646736_1024x481.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:481,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:397004,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.nielsvandenbergh.com/i/185576560?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4856bb6f-6f94-412f-9af2-8210f6c36655_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ApQA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0594f0c4-b59f-4f53-9274-1c5ee1646736_1024x481.png 424w, https://substackcdn.com/image/fetch/$s_!ApQA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0594f0c4-b59f-4f53-9274-1c5ee1646736_1024x481.png 848w, https://substackcdn.com/image/fetch/$s_!ApQA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0594f0c4-b59f-4f53-9274-1c5ee1646736_1024x481.png 1272w, https://substackcdn.com/image/fetch/$s_!ApQA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0594f0c4-b59f-4f53-9274-1c5ee1646736_1024x481.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Critically, this requires separate authorisation for each piece of content. Authorities cannot ask, &#8220;Who is this person and what have they posted in the last five years?&#8221; They must specify: &#8220;This particular post is under investigation. We need the identity of the author.&#8221;</p><p>This process can be automated with appropriate safeguards. When certain thresholds are met (verified harm, scale of distribution, legal complaint), the system can trigger a data release order through judicial oversight. Human judges, accountable to democratic institutions, make these decisions. Not Big Tech content moderators with commercial incentives.</p><p>This is not proactive surveillance. It is a retroactive investigation with democratic oversight. Decentralised identity storage. Division of powers. Checks and balances.</p><p>Compare this to a thief being caught in a supermarket: the police can obtain the thief's identity for that specific incident, but they cannot ask which supermarkets the thief has been in over the last five years, what items they bought, or who they spoke to. Each investigation requires a separate, specific authorisation.</p><p>This is <strong>Trias Politica in the digital age</strong>. Separation of powers. Checks and balances. Judicial oversight. The same principles that protect us offline apply online. Accountability flows from democratically elected institutions, not from private company policies.</p><p>In an age of AI-generated everything, the question is not &#8220;is this content real?&#8221; but &#8220;who created it?&#8221; Accountability does not stop synthetic content from being created. But it makes creators think twice before hitting publish.</p><h2>Who manages this system?</h2><p>Now the key question: who manages this system?</p><p>Currently, Big Tech companies like Google, Meta, and X manage our digital identities and activities. They have commercial motives: advertising, engagement, growth. This is problematic because information can be manipulated, deleted, or used for purposes we never agreed to. Their content moderation decisions are not accountable to any democratic process.</p><p>The answer is a distributed protocol that nobody owns but everybody can verify. A shared, public, immutable audit trail maintained by many independent parties. No single company can manipulate it for profit. No single government can censor it unilaterally. The architecture itself prevents the concentration of power.</p><p>The identity layer can be provided by existing infrastructure: the EUDI Wallet and the network of KYC providers across Europe. The audit trail layer requires a separate, immutable ledger where all online actions are recorded pseudonymously.</p><p>This is not hypothetical. The technology exists. At mintBlue, we facilitate the integration of platforms and applications into this distributed protocol. We provide the infrastructure layer that enables any online service to connect to a shared audit trail without building it themselves. The EUDI Wallet handles identity. The distributed ledger handles accountability. Together, they create the architecture for trustworthy online communication.</p><p>The protocol creates the accountability we need without creating the surveillance infrastructure we fear.</p><h2>Europe&#8217;s Digitalisation Opportunity</h2><p>Europe is uniquely positioned to lead this transition. And it is already building the infrastructure.</p><p>The EU has already built the regulatory foundation. The Digital Services Act and Digital Markets Act establish accountability requirements for platforms. The Digital Product Passport mandates traceability for physical goods. EUDR requires supply chain auditability. The AI Act demands transparency for AI systems. Traceability, auditability, and accountability are already mandated across multiple domains.</p><p>More importantly, the EU is deploying the technical infrastructure. The European Digital Identity Wallet (EUDI Wallet), mandated by eIDAS 2.0, launches across all Member States by the end of 2026. Every EU citizen will have access to a digital wallet that stores verifiable credentials: identity documents, diplomas, professional licenses, and age verification. The wallet is built on W3C Verifiable Credentials and supports pseudonymous authentication by design.</p><p>The EUDI Wallet is a puzzle piece to what this article proposes. Users can authenticate to platforms using pseudonyms unique to each service, preventing cross-platform tracking. They can prove attributes selectively, sharing only what is necessary. And, when legally required, their identity can be verified by the KYC providers that issued their credentials, with appropriate judicial oversight.</p><p>By November 2027, large online platforms must accept the EUDI Wallet for authentication upon user request. The infrastructure for accountable, pseudonymous online identity is not hypothetical. It is being built right now.</p><p>A protocol for accountable online communication fits naturally into this regulatory landscape. The infrastructure requirements for sustainable supply chains and for trustworthy online content are fundamentally the same: immutable audit trails with privacy-preserving verification.</p><p>Europe can pioneer an accountable, level-playing-field online. Tools for legislators to govern digital spaces. Enforcement of the rule of law online without infringing on privacy.</p><h2>Unifying the Online with the Offline World</h2><p>The offline world has accountability built in. Your face is your pseudonym. Your movements create audit trails. You can be traced if you break the law. Privacy exists: your medical records, your conversations, and your home life remain private. But pseudonymity, not anonymity, is the default.</p><p>Distributed protocols enable the same model to run online. Your actions are traceable yet pseudonymous. Authorities accountable to democratic institutions can link your online identity to your real identity when authorised by a court order. Just like they can identify you from security footage offline.</p><p>We do not need to choose between privacy and surveillance. We need the same balance online that we have offline.</p><p>Five years ago, I wrote the first version of this piece. The problem has only gotten worse. AI made synthetic content exponentially easier to create and harder to detect. Regulations tried to catch up, but they are still chasing symptoms.</p><p>The solution has not changed. We need accountability. And accountability requires identity: not surveillance, but pseudonymous identity with judicial oversight, accountable to the democratic process.</p><p>The question is: do we build it before the next deepfake election? Or after?</p><p><em>Originally published January 2021. Updated January 2026.</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.nielsvandenbergh.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Niels' Letter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Europe's 30-Year Wait for Data Sovereignty]]></title><description><![CDATA[Why data companies had no alternative to trading data, how micropayments could change everything, and what happens when users become data controllers.]]></description><link>https://www.nielsvandenbergh.com/p/eu-data-sovereignty</link><guid isPermaLink="false">https://www.nielsvandenbergh.com/p/eu-data-sovereignty</guid><dc:creator><![CDATA[Niels V. van den Bergh]]></dc:creator><pubDate>Thu, 22 Jan 2026 11:12:15 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!N9kh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91205892-329f-4bea-a228-ccd53d71bd3f_820x906.gif" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In 1979, the <a href="https://en.wikipedia.org/wiki/Third-party_doctrine">US Supreme Court affirmed</a> that &#8220;a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties.&#8221;</p><p>This ruling made sense in 1979. If you reported a suspicious transaction to your bank, the bank could share it with authorities. If you wrote a letter to a friend, you couldn&#8217;t claim privacy once they had it. You chose to share. You accepted the consequences.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.nielsvandenbergh.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Niels' Letter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p><strong>But in 2026, this principle has become the legal foundation for the largest transfer of wealth and power in human history.</strong></p><blockquote><p><strong>In this article, we&#8217;ll explore:</strong></p><ul><li><p>Why data companies had no alternative to trading data</p></li><li><p>How micropayments could offer an alternative</p></li><li><p>The effects of a public data commodity ledger</p></li><li><p>The impact of making the user a data controller</p></li></ul></blockquote><h2>The World&#8217;s Most Valuable Resource</h2><p>The <a href="https://www.economist.com/leaders/2017/05/06/the-worlds-most-valuable-resource-is-no-longer-oil-but-data">Economist</a> put it simply: </p><div class="pullquote"><p>&#8220;The world&#8217;s most valuable resource is no longer oil, but data.&#8221;</p></div><p>And yet, we don&#8217;t own it&#8230;</p><p>1.8 billion people use Gmail. Every email you write, every search you make, every attachment you send - it all belongs to Google. You&#8217;re not the customer. You&#8217;re the product. The actual customers are advertisers buying access to your attention, your behaviour, your life.</p><p>Facebook&#8217;s Cambridge Analytica scandal revealed how 87 million user profiles were harvested and weaponised for political manipulation. Mark Zuckerberg stood before Congress and promised change. At the 2019 F8 Conference, he declared: &#8220;The future is private.&#8221;</p><p>Seven years later, Meta&#8217;s business model hasn&#8217;t fundamentally changed. Privacy remained a marketing slogan, not a product feature.</p><h2>We&#8217;re Not Choosing This. We Have No Choice.</h2><p>&#8220;In today&#8217;s digital economy, we have little choice but to use services at the expense of privacy.&#8221;</p><p>Want to apply for a job? You need a LinkedIn profile.</p><p>Want to communicate with colleagues? You need Slack, Teams, or email.</p><p>Want to run a business? You need cloud services, CRM tools, payment processors.</p><p>Want to participate in modern society? You need to hand over your data to third parties.</p><p>The 1979 Supreme Court ruling assumed voluntary exchange. But when every service requires you to &#8220;voluntarily&#8221; surrender your data just to function in society, is it really voluntary?</p><p>We&#8217;re not choosing between privacy and convenience. We&#8217;re choosing between privacy and participation.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!N9kh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91205892-329f-4bea-a228-ccd53d71bd3f_820x906.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!N9kh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91205892-329f-4bea-a228-ccd53d71bd3f_820x906.gif 424w, https://substackcdn.com/image/fetch/$s_!N9kh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91205892-329f-4bea-a228-ccd53d71bd3f_820x906.gif 848w, https://substackcdn.com/image/fetch/$s_!N9kh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91205892-329f-4bea-a228-ccd53d71bd3f_820x906.gif 1272w, https://substackcdn.com/image/fetch/$s_!N9kh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91205892-329f-4bea-a228-ccd53d71bd3f_820x906.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!N9kh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91205892-329f-4bea-a228-ccd53d71bd3f_820x906.gif" width="570" height="629.780487804878" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/91205892-329f-4bea-a228-ccd53d71bd3f_820x906.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:906,&quot;width&quot;:820,&quot;resizeWidth&quot;:570,&quot;bytes&quot;:495713,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/gif&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.nielsvandenbergh.com/i/185158440?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91205892-329f-4bea-a228-ccd53d71bd3f_820x906.gif&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!N9kh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91205892-329f-4bea-a228-ccd53d71bd3f_820x906.gif 424w, https://substackcdn.com/image/fetch/$s_!N9kh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91205892-329f-4bea-a228-ccd53d71bd3f_820x906.gif 848w, https://substackcdn.com/image/fetch/$s_!N9kh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91205892-329f-4bea-a228-ccd53d71bd3f_820x906.gif 1272w, https://substackcdn.com/image/fetch/$s_!N9kh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91205892-329f-4bea-a228-ccd53d71bd3f_820x906.gif 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>The Economic Trap That Made This Inevitable</h2><p>Here&#8217;s what most people don&#8217;t understand: This wasn&#8217;t always inevitable.</p><p>In the early 1990s, Tim Berners-Lee envisioned a different internet. One where users could make tiny payments for services - <strong>micropayments</strong> - instead of trading their privacy for &#8220;free&#8221; access.</p><p>He even reserved HTTP error code 402: &#8220;Payment Required.&#8221; It&#8217;s been sitting there, unused, for over 30 years.</p><p>Why didn&#8217;t micropayments happen?</p><p><strong>Transaction fees destroyed the economics.</strong></p><ul><li><p>Stripe charges 2.9% + &#8364;0.30 per transaction.</p></li><li><p>PayPal charges 3.4% + &#8364;0.35.</p></li><li><p>Adyen charges similar rates.</p></li></ul><p>If you want to charge &#8364;0.05 per article, the payment processor charges &#8364;0.35 in fees. You lose money on every transaction.</p><p>So companies had two choices:</p><ol><li><p><strong>Charge enough to cover fees</strong> (minimum &#8364;5-10 transactions)</p></li><li><p><strong>Make it &#8220;free&#8221; and sell user data instead</strong></p></li></ol><p>They chose #2. Not because they&#8217;re evil. Because the economics of payment processing made micropayments impossible.</p><p>And once they chose data-selling as the business model, the incentives changed forever. The more data they collect, the more valuable they become. The longer they keep you on the platform, the more they know. The harder it is to leave, the more locked-in you are.</p><p>Winner takes all. And the winners are the platforms, not the users.</p><h2>The Lock-In Effect</h2><p>Switching costs are massive when platforms own your data.</p><p>Try leaving Facebook. Your photos, your connections, your memories - locked in their system. Sure, you can &#8220;download your data,&#8221; but good luck importing it anywhere useful.</p><p>Try leaving Google. Your emails, your calendar, your documents, your entire digital life - built on their infrastructure.</p><p>Try leaving Apple&#8217;s ecosystem. Your photos, your messages, your purchases - designed to make leaving painful.</p><p>This isn&#8217;t by accident. Data ownership creates a competitive advantage. Not through better service, but through higher switching costs.</p><p>The platform that owns your data owns your lock-in.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FiGK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F461db5ca-39ca-4c95-8f00-dc325ce75b2a_746x796.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FiGK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F461db5ca-39ca-4c95-8f00-dc325ce75b2a_746x796.png 424w, https://substackcdn.com/image/fetch/$s_!FiGK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F461db5ca-39ca-4c95-8f00-dc325ce75b2a_746x796.png 848w, https://substackcdn.com/image/fetch/$s_!FiGK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F461db5ca-39ca-4c95-8f00-dc325ce75b2a_746x796.png 1272w, https://substackcdn.com/image/fetch/$s_!FiGK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F461db5ca-39ca-4c95-8f00-dc325ce75b2a_746x796.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FiGK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F461db5ca-39ca-4c95-8f00-dc325ce75b2a_746x796.png" width="460" height="490.83109919571046" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/461db5ca-39ca-4c95-8f00-dc325ce75b2a_746x796.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:796,&quot;width&quot;:746,&quot;resizeWidth&quot;:460,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A schematic of the internet's current incentive model and the one Metanet aims to fix&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A schematic of the internet's current incentive model and the one Metanet aims to fix" title="A schematic of the internet's current incentive model and the one Metanet aims to fix" srcset="https://substackcdn.com/image/fetch/$s_!FiGK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F461db5ca-39ca-4c95-8f00-dc325ce75b2a_746x796.png 424w, https://substackcdn.com/image/fetch/$s_!FiGK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F461db5ca-39ca-4c95-8f00-dc325ce75b2a_746x796.png 848w, https://substackcdn.com/image/fetch/$s_!FiGK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F461db5ca-39ca-4c95-8f00-dc325ce75b2a_746x796.png 1272w, https://substackcdn.com/image/fetch/$s_!FiGK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F461db5ca-39ca-4c95-8f00-dc325ce75b2a_746x796.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Error 402: The Internet&#8217;s Most Forgotten Standard</h2><p>Everyone knows Error 404: Page Not Found.</p><p>But Tim Berners-Lee predicted we would see Error 402: Payment Required just as often.</p><p>In 1992, when he designed the HTTP protocol that powers the web, he reserved error code 402 for your future digital payments. He envisioned an internet where users could pay tiny amounts - micropayments - for individual services, articles, videos, or features.</p><p>Pay &#8364;0.05 to read an article. Pay &#8364;0.50 to skip YouTube ads. Pay &#8364;0.0001 to send a message.</p><p>Instead of building your entire business on advertising and data collection, you could charge users directly. Tiny amounts. Friction-free. Voluntary.</p><p>It was a beautiful vision.</p><p>It never happened.</p><p>For 34 years, Error 402 has sat there, unused, waiting for technology to catch up to Tim&#8217;s vision.</p><h3>What Micropayments Would Enable</h3><p>Let&#8217;s be specific about what becomes possible when transaction fees drop to nearly zero.</p><h4>The Free Washing Machine</h4><p>A washing machine vendor offers you a deal: Take the machine for free. Pay &#8364;0.50 every time you press start.</p><p>Why would they do this?</p><ul><li><p><strong>Upfront cost barrier gone:</strong> You don&#8217;t need &#8364;800 to buy a machine</p></li><li><p><strong>Predictable revenue:</strong> They earn money every wash cycle</p></li><li><p><strong>Maintenance included:</strong> If the machine breaks, they fix it (it&#8217;s their revenue source)</p></li><li><p><strong>Alignment of incentives:</strong> They want it to last forever, not break after warranty</p></li></ul><p>This only works if charging &#8364;0.50 per use costs them nothing in fees.</p><h4>The Journalist&#8217;s Tip Jar</h4><p>You read an article that changed your thinking. You want to thank the author.</p><p><strong>Pay &#8364;0.05 directly to the journalist.</strong></p><p>Not to the platform. Not split with advertisers. Directly to the writer.</p><p>Multiply that by 10,000 readers, and a single article earns &#8364;500. Not from ads. Not from subscriptions. From readers who found value.</p><h4>Website Uptime Monitoring</h4><p>Your website needs to be monitored every 5 minutes. That&#8217;s 288 checks per day.</p><p><strong>Pay &#8364;0.01 per check.</strong> &#8364;2.88 per day. &#8364;87 per month.</p><p>Or bundle it: subscribe to unlimited checks for &#8364;100/month.</p><p>The point isn&#8217;t which option is better. The point is, you have a choice when micropayments work.</p><h4>Messaging Without Surveillance</h4><p>WhatsApp is &#8220;free.&#8221; How does Facebook make money?</p><p>Your data.</p><p>But what if messaging worked differently? Pay &#8364;0.0001 per message. That&#8217;s &#8364;0.10 for 1,000 messages - maybe &#8364;1-2 per month for most users.</p><p>Split the revenue: half to the app developer, half to data centres covering infrastructure costs.</p><p>No ads. No tracking. No data mining. Just messaging.</p><h2>The Creator Economy That Could Have Been</h2><p>In 2026, the creator economy is massive. Billions flow through Patreon, Substack, YouTube memberships, OnlyFans, and TikTok creator funds.</p><p>But it&#8217;s built on platforms that take 30-50% cuts and control access to your audience.</p><p>Micropayments would have changed everything:</p><p><strong>YouTube ad-free:</strong> Pay &#8364;0.10 per video to skip ads</p><ul><li><p>User pays &#8364;3-5/month for typical viewing</p></li><li><p>Creator earns 10x more than ad revenue</p></li><li><p>No tracking needed</p></li></ul><p><strong>Spotify without ads:</strong> Pay &#8364;0.005 per song</p><ul><li><p>User pays &#8364;5-10/month</p></li><li><p>Artists earn directly per play</p></li><li><p>No algorithmic gatekeepers</p></li></ul><p><strong>Newsletter tips:</strong> Pay &#8364;0.25 per post you love</p><ul><li><p>Readers reward value directly</p></li><li><p>Writers aren&#8217;t forced into paywalls</p></li><li><p>Quality content earns more</p></li></ul><p>A McGuffin survey suggested YouTube could generate 2000% more revenue through subscription-based micropayment models compared to advertising.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PgNG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f3ae71c-b2a8-4518-a6f1-c5db1bed4680_995x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PgNG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f3ae71c-b2a8-4518-a6f1-c5db1bed4680_995x1024.png 424w, https://substackcdn.com/image/fetch/$s_!PgNG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f3ae71c-b2a8-4518-a6f1-c5db1bed4680_995x1024.png 848w, https://substackcdn.com/image/fetch/$s_!PgNG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f3ae71c-b2a8-4518-a6f1-c5db1bed4680_995x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!PgNG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f3ae71c-b2a8-4518-a6f1-c5db1bed4680_995x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PgNG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f3ae71c-b2a8-4518-a6f1-c5db1bed4680_995x1024.png" width="580" height="596.9045226130653" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5f3ae71c-b2a8-4518-a6f1-c5db1bed4680_995x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:995,&quot;resizeWidth&quot;:580,&quot;bytes&quot;:74525,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.nielsvandenbergh.com/i/185158440?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f3ae71c-b2a8-4518-a6f1-c5db1bed4680_995x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PgNG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f3ae71c-b2a8-4518-a6f1-c5db1bed4680_995x1024.png 424w, https://substackcdn.com/image/fetch/$s_!PgNG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f3ae71c-b2a8-4518-a6f1-c5db1bed4680_995x1024.png 848w, https://substackcdn.com/image/fetch/$s_!PgNG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f3ae71c-b2a8-4518-a6f1-c5db1bed4680_995x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!PgNG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f3ae71c-b2a8-4518-a6f1-c5db1bed4680_995x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>But none of this works when transaction fees eat 30-40% of every payment.</p><h2>What changed? Distributed infrastructure matured</h2><p>For 30 years, Error 402 collected dust because payment processors made micropayments economically impossible.</p><p>So what changed?</p><p><strong>Distributed infrastructure reduced transaction fees to near zero.</strong></p><p>Not through traditional payment rails (Visa, Mastercard, PayPal).</p><p>Through a different architecture entirely. One where:</p><ul><li><p>No single company controls the payment network</p></li><li><p>Transaction fees are fractions of a cent</p></li><li><p>Micropayments finally make economic sense</p></li><li><p>Data ownership can shift back to users</p></li></ul><p>This is what Tim Berners-Lee envisioned in 1992. Technology finally caught up.</p><p>This infrastructure is a unique type of blockchain architecture. And it&#8217;s already running and ready to be used by my company <a href="https://mintblue.com">mintBlue</a>.</p><h2>How It Works (Without the Jargon)</h2><p>Here&#8217;s what most people don&#8217;t understand: </p><div class="pullquote"><p><strong>The problem isn&#8217;t technology. It&#8217;s architecture.</strong></p></div><p>To be clear: this isn&#8217;t a cryptocurrency project. No tokens. No speculation. Just infrastructure. The underlying technology is decentralised, but the approach is engineering-first, not ideology-first.</p><p>The current internet is built on a client-server model:</p><ul><li><p>You (client) connect to Facebook&#8217;s servers</p></li><li><p>Your data lives on their infrastructure</p></li><li><p>They control access, rules, and pricing</p></li><li><p>You have to trust them not to misuse it</p></li></ul><p>This architecture creates power centralisation. Whoever owns the servers owns the data. Whoever owns the data owns the lock-in.</p><p>This compliance infrastructure flips this model:</p><ul><li><p><strong>Distributed infrastructure</strong> where your data isn&#8217;t stored on a company&#8217;s servers - it&#8217;s stored on a network of independent data centers that compete to verify and host information.</p></li></ul><p>Think of it like this:</p><ul><li><p>Current model: Your photos are on Google&#8217;s servers. Google controls them.</p></li><li><p>New model: Your photos are stored across a group of independent data centres, free to participate. You control them. Companies can request access. You decide.</p></li><li><p>No single company owns the infrastructure. No single company can manipulate, delete, or lock you in.</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!G1-W!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb62825e0-cbe9-4073-8ecd-89c0cf52e67e_917x525.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!G1-W!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb62825e0-cbe9-4073-8ecd-89c0cf52e67e_917x525.png 424w, https://substackcdn.com/image/fetch/$s_!G1-W!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb62825e0-cbe9-4073-8ecd-89c0cf52e67e_917x525.png 848w, https://substackcdn.com/image/fetch/$s_!G1-W!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb62825e0-cbe9-4073-8ecd-89c0cf52e67e_917x525.png 1272w, https://substackcdn.com/image/fetch/$s_!G1-W!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb62825e0-cbe9-4073-8ecd-89c0cf52e67e_917x525.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!G1-W!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb62825e0-cbe9-4073-8ecd-89c0cf52e67e_917x525.png" width="917" height="525" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b62825e0-cbe9-4073-8ecd-89c0cf52e67e_917x525.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:525,&quot;width&quot;:917,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A simple Metanet visualisation of you in control of your data, granting and revoking access to whoever asks for it.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A simple Metanet visualisation of you in control of your data, granting and revoking access to whoever asks for it." title="A simple Metanet visualisation of you in control of your data, granting and revoking access to whoever asks for it." srcset="https://substackcdn.com/image/fetch/$s_!G1-W!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb62825e0-cbe9-4073-8ecd-89c0cf52e67e_917x525.png 424w, https://substackcdn.com/image/fetch/$s_!G1-W!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb62825e0-cbe9-4073-8ecd-89c0cf52e67e_917x525.png 848w, https://substackcdn.com/image/fetch/$s_!G1-W!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb62825e0-cbe9-4073-8ecd-89c0cf52e67e_917x525.png 1272w, https://substackcdn.com/image/fetch/$s_!G1-W!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb62825e0-cbe9-4073-8ecd-89c0cf52e67e_917x525.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>The Three Layers of Security</h2><p>&#8220;But if my data is distributed across hundreds of places, isn&#8217;t that less secure?&#8221;</p><p>Actually, more secure. Here&#8217;s why:</p><h3>Layer 1: Economic Competition Prevents Fraud</h3><p>Data centres compete economically to verify uploads and store data.</p><p>If one data centre tries to upload false information or manipulate records, the others reject it. There&#8217;s an economic incentive to maintain integrity - data centres that cheat lose revenue.</p><p>This isn&#8217;t trust-based. It&#8217;s incentive-based. The architecture makes honesty more profitable than fraud, and their business model is completely separate from&nbsp;<em>what</em>&nbsp;they store/process, unlike with major cloud providers like Google.</p><h3>Layer 2: Encryption Protects Storage</h3><p>Standard database encryption protects your stored data. Cryptographic functions enable (multi-party) access control and blind verification, like zero-knowledge proofs, allowing you to prove certain information without revealing the raw data. </p><p>For example: &#8216;I paid for the potatoes I bought, without revealing how many potatoes I bought and what the price was&#8217;.</p><h3>Layer 3: Data Fragmentation Makes Breaches Useless</h3><p>Here&#8217;s the clever part:</p><p>Your data isn&#8217;t stored in a single file on a single server. It&#8217;s fragmented into hundreds of pieces, scattered across different data centres.</p><p>Even if a data centre is breached and attackers steal data, they get random fragments. Useless without the other 99 pieces stored elsewhere.</p><p>You need access credentials to reconstruct the complete file. Attackers don&#8217;t have that.</p><h2>Internet Era vs. Data Sovereignty Era</h2><p>Let&#8217;s make the comparison explicit:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PimG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3286ac7b-04ba-4c7c-96db-90d9c3f6bb38_1023x910.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PimG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3286ac7b-04ba-4c7c-96db-90d9c3f6bb38_1023x910.png 424w, https://substackcdn.com/image/fetch/$s_!PimG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3286ac7b-04ba-4c7c-96db-90d9c3f6bb38_1023x910.png 848w, https://substackcdn.com/image/fetch/$s_!PimG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3286ac7b-04ba-4c7c-96db-90d9c3f6bb38_1023x910.png 1272w, https://substackcdn.com/image/fetch/$s_!PimG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3286ac7b-04ba-4c7c-96db-90d9c3f6bb38_1023x910.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PimG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3286ac7b-04ba-4c7c-96db-90d9c3f6bb38_1023x910.png" width="1023" height="910" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3286ac7b-04ba-4c7c-96db-90d9c3f6bb38_1023x910.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:910,&quot;width&quot;:1023,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1445385,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.nielsvandenbergh.com/i/185158440?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3286ac7b-04ba-4c7c-96db-90d9c3f6bb38_1023x910.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PimG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3286ac7b-04ba-4c7c-96db-90d9c3f6bb38_1023x910.png 424w, https://substackcdn.com/image/fetch/$s_!PimG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3286ac7b-04ba-4c7c-96db-90d9c3f6bb38_1023x910.png 848w, https://substackcdn.com/image/fetch/$s_!PimG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3286ac7b-04ba-4c7c-96db-90d9c3f6bb38_1023x910.png 1272w, https://substackcdn.com/image/fetch/$s_!PimG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3286ac7b-04ba-4c7c-96db-90d9c3f6bb38_1023x910.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The fundamental shift: Users become data controllers. Companies become service providers.</p><h3><strong>What This Enables</strong></h3><p>The Metanet makes three things possible that were impossible before:</p><h4><strong>1. Private Data Storage Under User Control</strong></h4><p>Your data lives on a distributed infrastructure you control. Companies request access. You decide permissions. You can revoke anytime.</p><p>This isn&#8217;t a privacy policy promise. It&#8217;s an architectural reality.</p><h4><strong>2. Digital Identity Without Surveillance</strong></h4><p>Prove who you are without revealing unnecessary information.</p><p>Need to prove you&#8217;re over 18? Share that fact&#8212;not your birthdate, address, or ID number.</p><p>Need to prove creditworthiness? Share your score&#8212;not your purchase history.</p><p>Biometric encryption makes this possible. You prove attributes without exposing the underlying data.</p><h4><strong>3. Business Models That Were Previously Impossible</strong></h4><p>When transaction fees drop to near-zero, business models that made no sense suddenly become viable:</p><ul><li><p>Pay-per-use washing machines</p></li><li><p>Micropayment journalism</p></li><li><p>Ad-free subscriptions at &#8364;0.10/video</p></li><li><p>Direct creator payments at &#8364;0.05/post</p></li></ul><p>Companies that couldn&#8217;t exist in a high-fee world can now compete.</p><h2><strong>Why Companies Would Participate</strong></h2><p>At the moment, organisations struggle with data controller issues. Privacy laws and technical standards make it hard for organisations to exchange data easily. Another significant problem is fraud due to operating with multiple unverified accounting books.</p><h4><strong>Free Flow of Data</strong></h4><p>The proposed solution: make the creator the data controller, not the organisation. This way, organisations can request access to read consumer data and data from other companies without actually owning it.</p><h4><strong>New Business Models</strong></h4><p>The main benefit of this open standard would be the creation of new business models. Innovative services we currently only see within ecosystem companies&#8212;like Alphabet&#8217;s integration of Android, YouTube, and Google&#8212;could become standard as data moves more freely between organisations (with user permission).</p><h4><strong>Reduce Fraud</strong></h4><p>Research shows organisations allocate around 2% of total revenue to fraud prevention. The Metanet solves this by enabling stakeholders to work in the same accounting system while maintaining privacy. You can&#8217;t falsify a record that hundreds of independent parties verify simultaneously.</p><h4><strong>Enterprise and Government Implications</strong></h4><p>For government and enterprise organisations, the implications go further. Immutable audit trails that satisfy regulators. Data sharing between agencies without surrendering control. Compliance-ready infrastructure where every action is verifiable, every record is timestamped, and every permission is logged.</p><p>Banks, regulators, and financial institutions can operate in shared accounting systems while each maintains sovereignty over their own data. Government agencies can collaborate across jurisdictions without creating new data silos or privacy risks. Supply chains can prove provenance without exposing competitive information.</p><p>This isn&#8217;t about replacing existing systems. It&#8217;s about adding a layer that enables multi-stakeholder collaboration without the trust issues that currently make it impractical.</p><h2><strong>The Vision Forward</strong></h2><p>Seven years ago, when I first wrote about data ownership and micropayments, it felt like a technical curiosity. An interesting idea for the future.</p><p>In 2026, it&#8217;s a geopolitical imperative.</p><p>Europe depends on US cloud infrastructure for 90% of its digital operations. Every European email, every business document, every government file, hosted on servers subject to the US CLOUD Act. No American company can guarantee that the US government won&#8217;t access your data. That&#8217;s not a conspiracy theory. It&#8217;s the law.</p><p>Think of distributed infrastructure like HTTPS didn&#8217;t replace HTTP, it added security. This technology adds data ownership. A sovereignty layer for the internet.</p><p>The question is no longer <em>whether</em> this technology works. It does. The question is whether Europe will build on it before the current crisis forces its hand.</p><h3><strong>The Choice Ahead</strong></h3><p>We&#8217;re at a crossroads, and for Europe, the stakes have never been higher.</p><p>In December 2025, the Trump administration threatened &#8220;every tool at its disposal&#8221; against EU tech regulation. Named European companies - Spotify, SAP, Siemens - as potential retaliation targets. Banned EU regulators from entering the United States.</p><p>The message is clear: digital dependence is political vulnerability.</p><p>Europe has two paths forward.</p><ul><li><p><strong>Path one</strong>: Continue building on American platforms. Accept that 90% of your cloud infrastructure is subject to foreign law. Accept that trade negotiations can be weaponised against your digital economy. Accept that your citizens&#8217; data is one executive order away from compromise.</p></li><li><p><strong>Path two:</strong> Build sovereign digital infrastructure. Not autarky, but sovereignty. As Gaia-X&#8217;s CTO puts it: &#8220;Sovereignty doesn&#8217;t mean you do everything yourself. It means for critical things, you have strategic options.&#8221;</p></li></ul><p>Distributed infrastructure gives Europe those options. Data ownership enforced by architecture, not by policy promises that can be revoked. Micropayments that don&#8217;t flow through American payment processors. Digital identity that doesn&#8217;t depend on foreign gatekeepers.</p><p>For over 30 years, Error 402 sat unused in the HTTP protocol, waiting for technology to catch up to Tim Berners-Lee&#8217;s vision of an internet where users could pay directly rather than pay with their data.</p><p>Technology caught up.</p><p>The infrastructure exists. The economics work. The incentives finally align.</p><p>For Europe, this is no longer a theoretical debate about privacy or a technical discussion about transaction fees. It&#8217;s a question of strategic autonomy in an increasingly hostile digital landscape.</p><p>The 1979 Supreme Court ruling that opened this article was American law, applied to American citizens. But through the architecture of the internet we built, it became the de facto standard worldwide.</p><p>We can build a different architecture. We can choose different defaults.</p><p>The question for Europe is simple: <strong>Will you own your digital future, or will someone else?</strong></p><h2><strong>FAQ</strong></h2><p><strong>What is a distributed data infrastructure?</strong></p><p>An architecture layer for the internet that enables tracking, monetizing, and controlling data in a peer-to-peer manner. Think of it as adding data ownership to the internet, the same way HTTPS added security.</p><p><strong>Is this a cryptocurrency or blockchain project?</strong></p><p>No. This uses distributed ledger technology, but it&#8217;s not a cryptocurrency project. No tokens, no speculation, no ideology. Just engineering-focused infrastructure for data ownership and micropayments.</p><p><strong>How is this different from other decentralised projects?</strong></p><p>Most decentralised projects focus on tokens and speculation. This approach focuses on practical infrastructure: micropayments that actually work, data ownership that&#8217;s architecturally enforced, and business models that don&#8217;t require surveillance.</p><p><strong>What about European alternatives like Gaia-X?</strong></p><p>Gaia-X is a governance framework. Important for setting standards and rules. But frameworks need infrastructure to run on. A distributed data infrastructure provides the technical layer that makes sovereignty architecturally enforceable, rather than policy-dependent.</p><p><strong>How do micropayments work?</strong></p><p>Transaction fees on distributed infrastructure are fractions of a cent, making it economically viable to charge tiny amounts (&#8364;0.01, &#8364;0.001, even smaller). This enables business models that were impossible when payment processors took &#8364;0.30+ per transaction.</p><div><hr></div><p><em><strong>Originally published December 2019. Updated January 2026. </strong></em></p><p><em><strong>Since this original post, I decided to help drive this change and built <a href="https://mintblue.com/">mintBlue</a>, a data collaboration infrastructure. While we are still early, our technology is currently in use in the Enterprise and Government context, and we have not been able to truly drive adoption for consumer data ownership applications, but we won&#8217;t give up; this is too important.</strong></em></p><p>Niels van den Bergh</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.nielsvandenbergh.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Niels' Letter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Your Compliance Data Shouldn't Live in Someone Else's Database]]></title><description><![CDATA[The EU mandated Digital Product Passports. There's just one problem: current solutions are not built for multi-company data collaborations.]]></description><link>https://www.nielsvandenbergh.com/p/why-our-european-infrastructure-needs</link><guid isPermaLink="false">https://www.nielsvandenbergh.com/p/why-our-european-infrastructure-needs</guid><dc:creator><![CDATA[Niels V. van den Bergh]]></dc:creator><pubDate>Wed, 07 Jan 2026 06:30:35 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Wk51!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F844f9ecf-498f-435a-bc8a-dd3ca197fcf6_1056x545.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Wk51!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F844f9ecf-498f-435a-bc8a-dd3ca197fcf6_1056x545.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Wk51!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F844f9ecf-498f-435a-bc8a-dd3ca197fcf6_1056x545.png 424w, https://substackcdn.com/image/fetch/$s_!Wk51!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F844f9ecf-498f-435a-bc8a-dd3ca197fcf6_1056x545.png 848w, https://substackcdn.com/image/fetch/$s_!Wk51!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F844f9ecf-498f-435a-bc8a-dd3ca197fcf6_1056x545.png 1272w, https://substackcdn.com/image/fetch/$s_!Wk51!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F844f9ecf-498f-435a-bc8a-dd3ca197fcf6_1056x545.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Wk51!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F844f9ecf-498f-435a-bc8a-dd3ca197fcf6_1056x545.png" width="632" height="326.17424242424244" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/844f9ecf-498f-435a-bc8a-dd3ca197fcf6_1056x545.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:545,&quot;width&quot;:1056,&quot;resizeWidth&quot;:632,&quot;bytes&quot;:1047114,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://nillavanilla.substack.com/i/182236478?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe73f9d9a-8324-4741-9cba-1fde8f5278f2_1056x992.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Wk51!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F844f9ecf-498f-435a-bc8a-dd3ca197fcf6_1056x545.png 424w, https://substackcdn.com/image/fetch/$s_!Wk51!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F844f9ecf-498f-435a-bc8a-dd3ca197fcf6_1056x545.png 848w, https://substackcdn.com/image/fetch/$s_!Wk51!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F844f9ecf-498f-435a-bc8a-dd3ca197fcf6_1056x545.png 1272w, https://substackcdn.com/image/fetch/$s_!Wk51!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F844f9ecf-498f-435a-bc8a-dd3ca197fcf6_1056x545.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The EU mandated Digital Product Passports. Simple enough on paper: every product needs lifecycle data aggregated from multiple suppliers across the value chain. Battery manufacturers, recyclers, logistics providers, retailers &#8212; all contributing to one unified record.</p><p>By 2027, this will affect an estimated 30+ product categories across the EU market. Batteries first. Then textiles. Then electronics. The list keeps growing.</p><p>There&#8217;s just one problem.</p><p><strong>There&#8217;s no infrastructure to do this.</strong></p><p>The Omnibus delays happened because vendors couldn&#8217;t deliver. Not because they lacked ambition or funding. Because the underlying infrastructure doesn&#8217;t exist, multiple organisations can&#8217;t easily write to shared registries that regulators can access.</p><p>Who&#8217;s going to fill this gap? And on whose terms?</p><h2>Who controls the data of Product Passports?</h2><p>This isn&#8217;t a DPP problem. It&#8217;s a systemic gap that shows up across every central compliance mandate:</p><p>ViDA (VAT in the Digital Age): Real-time invoice data from multiple processors, accessible to tax authorities across borders. What happens when your French supplier&#8217;s invoice system can&#8217;t talk to German tax authorities? Someone has to bridge that gap.</p><p>CSRD/CSDD: Sustainability data aggregated across entire supply chains &#8212; not just your operations, but your suppliers&#8217; suppliers. Your Scope 3 emissions require verified data from dozens of partners, each running different systems. Good luck with that spreadsheet.</p><p>Real-time taxation: Transaction data flows to authorities in real time. The Dutch Tax Office is already piloting this&#8212;point-of-sale systems that calculate and transfer VAT in real time. It works. But it requires infrastructure that doesn&#8217;t exist at scale.</p><p>The common thread: multi-party data aggregation with auditability. Multiple organisations contribute data to shared registries that regulators (and sometimes consumers) can access.</p><p>Current infrastructure can&#8217;t do this. It wasn&#8217;t designed for cross-organisational data flows. And if we wait for the gap to become painful enough, we know who will fill it.</p><h2>Your supply chain data is locked up in a platform</h2><p>What do consultancies sell today for compliance? </p><p>SAP. Oracle. Microsoft Dynamics: platform solutions.</p><p>For single-company operations, platforms work fine. Your ERP handles your invoices. Your sustainability software tracks your emissions. Your product management system logs your inventory.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mCWy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F296a8f42-eac6-46ed-b02f-fb39b4a93d50_960x384.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mCWy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F296a8f42-eac6-46ed-b02f-fb39b4a93d50_960x384.png 424w, https://substackcdn.com/image/fetch/$s_!mCWy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F296a8f42-eac6-46ed-b02f-fb39b4a93d50_960x384.png 848w, https://substackcdn.com/image/fetch/$s_!mCWy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F296a8f42-eac6-46ed-b02f-fb39b4a93d50_960x384.png 1272w, https://substackcdn.com/image/fetch/$s_!mCWy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F296a8f42-eac6-46ed-b02f-fb39b4a93d50_960x384.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mCWy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F296a8f42-eac6-46ed-b02f-fb39b4a93d50_960x384.png" width="653" height="261.2" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/296a8f42-eac6-46ed-b02f-fb39b4a93d50_960x384.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:384,&quot;width&quot;:960,&quot;resizeWidth&quot;:653,&quot;bytes&quot;:495547,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://nillavanilla.substack.com/i/182236478?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F296a8f42-eac6-46ed-b02f-fb39b4a93d50_960x384.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mCWy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F296a8f42-eac6-46ed-b02f-fb39b4a93d50_960x384.png 424w, https://substackcdn.com/image/fetch/$s_!mCWy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F296a8f42-eac6-46ed-b02f-fb39b4a93d50_960x384.png 848w, https://substackcdn.com/image/fetch/$s_!mCWy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F296a8f42-eac6-46ed-b02f-fb39b4a93d50_960x384.png 1272w, https://substackcdn.com/image/fetch/$s_!mCWy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F296a8f42-eac6-46ed-b02f-fb39b4a93d50_960x384.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>But DPP, ViDA, and CSRD don&#8217;t stay inside your walls. They require cross-organisational data flows - multiple suppliers, multiple systems, one coherent record.</p><p>Here&#8217;s where platforms break down:</p><p>Vendor lock-in. Your data lives in their system. Their database, schema, and access rules.</p><p>Single point of control. One vendor, one failure point, one set of terms that can change with their next board meeting.</p><p>Interoperability nightmare. Connecting Platform A to Platform B requires expensive custom integrations. Every new supply chain partner means another integration project.</p><p>Dependency. Switch costs are enormous once you&#8217;re in. They know this. Their business model depends on it.</p><p>Platforms weren&#8217;t designed for multi-party compliance. They were designed to keep you inside.</p><p>And here&#8217;s the risk nobody&#8217;s talking about: if Big Tech builds the compliance infrastructure, and they will try, platform lock-in will occur at the regulatory level. Your compliance data, supply chain records, tax information, and sustainability reporting are trapped in another walled garden.</p><p>Not because of technical necessity. Because of business models.</p><h2>Platform vs. Protocol: The Difference That Matters</h2><p>The distinction isn&#8217;t technical pedantry. It determines who controls your compliance infrastructure for the next decade.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Sg6j!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1676135-e359-49df-9186-1393e20ef4c7_1472x680.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Sg6j!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1676135-e359-49df-9186-1393e20ef4c7_1472x680.png 424w, https://substackcdn.com/image/fetch/$s_!Sg6j!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1676135-e359-49df-9186-1393e20ef4c7_1472x680.png 848w, https://substackcdn.com/image/fetch/$s_!Sg6j!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1676135-e359-49df-9186-1393e20ef4c7_1472x680.png 1272w, https://substackcdn.com/image/fetch/$s_!Sg6j!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1676135-e359-49df-9186-1393e20ef4c7_1472x680.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Sg6j!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1676135-e359-49df-9186-1393e20ef4c7_1472x680.png" width="1472" height="680" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a1676135-e359-49df-9186-1393e20ef4c7_1472x680.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:680,&quot;width&quot;:1472,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1412054,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://nillavanilla.substack.com/i/182236478?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb97f701d-7bcc-4a53-9ce1-a57f8942b933_1472x704.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Sg6j!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1676135-e359-49df-9186-1393e20ef4c7_1472x680.png 424w, https://substackcdn.com/image/fetch/$s_!Sg6j!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1676135-e359-49df-9186-1393e20ef4c7_1472x680.png 848w, https://substackcdn.com/image/fetch/$s_!Sg6j!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1676135-e359-49df-9186-1393e20ef4c7_1472x680.png 1272w, https://substackcdn.com/image/fetch/$s_!Sg6j!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa1676135-e359-49df-9186-1393e20ef4c7_1472x680.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><ul><li><p>Platform Infrastructure</p><ul><li><p>Data ownership: Vendor&#8217;s database</p></li><li><p>Switching cost: Expensive migration project</p></li><li><p>Interoperability: Custom integrations per partner</p></li><li><p>Who controls rules: Vendor/shareholders</p></li><li><p>New partner onboarding: Integration project</p></li><li><p>Regulator access: Negotiate with vendor</p></li></ul><p></p></li><li><p>Protocol Infrastructure:</p><ul><li><p>Data ownership: Public registry you can access from anywhere</p></li><li><p>Switching cost: Change provider, keep your data</p></li><li><p>Interoperability: Built in by design</p></li><li><p>Who controls rules: Locked protocol &#8212; nobody</p></li><li><p>New partner onboarding: Already compatible</p></li><li><p>Regulator access: Direct registry access</p></li></ul></li></ul><h2>The Protocol Alternative</h2><p>What if the data layer were a shared protocol instead of a proprietary platform?</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Mki8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a7f7faa-dd5b-4766-95fb-ebd80e855fc1_960x1088.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Mki8!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a7f7faa-dd5b-4766-95fb-ebd80e855fc1_960x1088.png 424w, https://substackcdn.com/image/fetch/$s_!Mki8!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a7f7faa-dd5b-4766-95fb-ebd80e855fc1_960x1088.png 848w, https://substackcdn.com/image/fetch/$s_!Mki8!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a7f7faa-dd5b-4766-95fb-ebd80e855fc1_960x1088.png 1272w, https://substackcdn.com/image/fetch/$s_!Mki8!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a7f7faa-dd5b-4766-95fb-ebd80e855fc1_960x1088.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Mki8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a7f7faa-dd5b-4766-95fb-ebd80e855fc1_960x1088.png" width="410" height="464.6666666666667" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0a7f7faa-dd5b-4766-95fb-ebd80e855fc1_960x1088.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1088,&quot;width&quot;:960,&quot;resizeWidth&quot;:410,&quot;bytes&quot;:834867,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://nillavanilla.substack.com/i/182236478?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a7f7faa-dd5b-4766-95fb-ebd80e855fc1_960x1088.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Mki8!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a7f7faa-dd5b-4766-95fb-ebd80e855fc1_960x1088.png 424w, https://substackcdn.com/image/fetch/$s_!Mki8!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a7f7faa-dd5b-4766-95fb-ebd80e855fc1_960x1088.png 848w, https://substackcdn.com/image/fetch/$s_!Mki8!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a7f7faa-dd5b-4766-95fb-ebd80e855fc1_960x1088.png 1272w, https://substackcdn.com/image/fetch/$s_!Mki8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a7f7faa-dd5b-4766-95fb-ebd80e855fc1_960x1088.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Think about email. Gmail, Outlook, and ProtonMail all use the same underlying protocol: SMTP. You can switch providers without losing your contacts. They compete on user experience, security features, and storage &#8212;not on holding your data hostage.</p><p>That&#8217;s possible because email is built on an open protocol that anyone can access.</p><p>Applied to compliance infrastructure:</p><ul><li><p>Shared registries for product data (DPP), invoice data (ViDA), and sustainability data (CSRD)</p></li><li><p>- Multiple service providers can read and write to these registries</p></li><li><p>- Data is portable by design</p></li><li><p>- No single vendor controls the infrastructure</p></li></ul><p>How it works in practice: a shared coordination layer acts as the registry &#8212; notarised, auditable, tamper-proof. Multiple providers can index and access the same data. The organisation retains ownership of its contributions.</p><p>Interoperability isn&#8217;t bolted on. It&#8217;s built in.</p><p>The result: switch providers without migration headaches. Regulators get the access they need without relying on a single vendor&#8217;s cooperation. Supply chain partners can collaborate without all using the same platform. Competition is driven by service quality, not data lock-in.</p><p>The protocol doesn&#8217;t care who you use to access it. It just works.</p><h2>How to interface with this protocol?</h2><p>Building on protocol infrastructure requires specialised knowledge that most enterprises don&#8217;t have &#8212; and shouldn&#8217;t need.</p><p>UTXO architecture and cryptographic primitives. Digital identity standards like eIDAS and GLEI. Data mapping and protocol standards. Stablecoin integration for value transfer. Compliance-specific data models that regulators actually accept.</p><p>The reality is simple: enterprises want to connect their supply and demand data to the registries required by regulators. They don&#8217;t want to become protocol engineers.</p><p>That&#8217;s where abstraction layers matter.</p><p>Think of how Stripe handles payments. You don&#8217;t integrate with Visa, Mastercard, or any individual bank. You integrate with Stripe once, and they hold the complexity. The payment network exists underneath. Stripe makes it accessible.</p><p>That&#8217;s what we&#8217;ve built at mintBlue. The protocol infrastructure exists. The complexity is objective. But enterprises need a layer that abstracts it&#8212;integrate once and access shared compliance registries.</p><p>Protocol infrastructure at scale isn&#8217;t theoretical. We&#8217;ve processed 50 million transactions in a single day on a decentralised infrastructure. The technology works.</p><p>The key difference from platforms: no lock-in. The protocol is public. You could build your own stack and still interoperate with everyone using the same registry. We make it easier.</p><p>Think of it like an ISP. We provide access to the network. We don&#8217;t own the network.</p><h2>Auditability Without Surveillance</h2><p>One underappreciated advantage of protocol infrastructure: built-in audit trails.</p><p>Every transaction and every data contribution is notarised in the shared registry. This enables:</p><p>Supply chain traceability. Trace faulty batches back to origin &#8212; critical for DPP compliance and recalls.</p><p>Compliance verification. Regulators can verify claims without needing full data access.</p><p>Accountability. Every claim can be traced to its source. No more &#8220;the data was lost in translation.&#8221;</p><p>Here&#8217;s the part that matters for competitive businesses: you can prove something happened without revealing everything. Verify a product&#8217;s journey without exposing supplier pricing. Confirm compliance without opening your books.</p><p>Privacy for businesses, transparency for oversight &#8212; not the other way around.</p><p>Platforms can&#8217;t offer this. They either share everything or nothing. Protocol infrastructure gives you granular control over what you prove versus what you disclose.</p><h2>Independence, Not Sovereignty</h2><p>This isn&#8217;t about Europe vs. America. It&#8217;s about independent infrastructure vs. dependent infrastructure.</p><p>Dependent:</p><ul><li><p>Your compliance data lives in a vendor&#8217;s cloud</p></li><li><p>- Their terms, their jurisdiction, their business model</p></li><li><p>- Switch costs keep you trapped</p></li><li><p>- When they change, you change</p></li></ul><p>Independent:</p><ul><li><p>Your compliance data lives on a public protocol</p></li><li><p>- You choose your access provider</p></li><li><p>- You can switch, you can self-host</p></li><li><p>- The protocol doesn&#8217;t change based on shareholder meetings</p></li></ul><p>For enterprises: resilience, optionality, negotiating power. You&#8217;re never stuck because the protocol doesn&#8217;t care about retention metrics.</p><p>For regulators: access without depending on a single vendor&#8217;s cooperation. No need to negotiate with Big Tech for visibility into your own economy.</p><p>For the ecosystem, innovation can happen at the application layer without permission from the infrastructure owner. Anyone can build. Anyone can compete.</p><p>The compliance mandates are coming regardless. The question is whether we build independent infrastructure now or accept dependent infrastructure later.</p><h2>What&#8217;s Your Compliance Data Architecture?</h2><p>If you&#8217;re facing DPP, ViDA, or CSRD compliance and wondering how to aggregate data across your supply chain without locking into a single vendor, this is worth a conversation.</p><p>Protocol-based infrastructure is a new territory for most consultancies. We&#8217;ve been building it for years.</p><p>What compliance mandate is forcing you to rethink your data architecture?</p>]]></content:encoded></item><item><title><![CDATA[Prove your identity without sharing your passport]]></title><description><![CDATA[What if you could verify identity without ever seeing a passport or ID?]]></description><link>https://www.nielsvandenbergh.com/p/identification-without-surveillance</link><guid isPermaLink="false">https://www.nielsvandenbergh.com/p/identification-without-surveillance</guid><dc:creator><![CDATA[Niels V. van den Bergh]]></dc:creator><pubDate>Fri, 12 Dec 2025 11:13:33 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/9891eb98-2564-435d-bf21-0a9e9dc3ead8_2045x1837.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In the Netherlands, you cannot be compelled to disclose your identity. But you can be forced to look into a camera. That is the problem with biometric identification. And that is why we built an alternative.</p><p><strong>The challenge posed by the Dutch government</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.nielsvandenbergh.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>In late 2025, the Dutch Ministry of Justice and Security posed a simple question to innovators: </p><div class="pullquote"><p>How do you identify someone without an ID card? </p></div><p>The scenario being, you are a police officer on the street and encounter someone without a passport or ID. How would you verify their identity?</p><p>Most teams relied on facial recognition, fingerprint scanning, and centralised databases. We asked ourselves a different question: </p><div class="pullquote"><p>Can it be done <em>without</em> accidentally creating surveillance infrastructure?</p></div><p>The answer is yes. But first: why does this matter?</p><p><strong>Why biometrics is a problem</strong></p><p>Minister Yesilg&#246;z wrote in early 2023, in response to parliamentary questions: </p><blockquote><p>&#8220;There are no legal possibilities to compel someone to disclose their identity.&#8221;</p></blockquote><p>You are required to&nbsp;<em>show</em>&nbsp;your ID when asked by the police. But you cannot be compelled to <em>disclose</em> your identity. A fundamental distinction.</p><p>Biometrics breaks that principle. You can say &#8220;no&#8221; to a question. You cannot say &#8220;no&#8221; to your own face. <a href="https://www.linkedin.com/in/ellajakubowska/?originalSubdomain=be">Ella Jakubowska</a> of EDRi warned that the new AI Act &#8220;could become a blueprint for mass biometric surveillance.&#8221;</p><p>The question became: can you identify someone in a way they can actually refuse?</p><p><strong>Blind identity verification as a lightweight and flexible solution</strong></p><p>The principle <a href="https://mintblue.com">mintBlue</a> proposes is simple: use existing data from existing systems, and validate only <em>that</em> someone is telling the truth, without ever seeing the data itself.</p><p>Hashing makes this possible. Every value, every word, every name, every address, is translated into a unique code of 64 characters. Change one letter? Completely different code. And crucially, you cannot reverse-engineer the original value from the code.</p><p>In practice, this means you can verify that someone said &#8220;Niels&#8221; without ever seeing the word &#8220;Niels&#8221;. A computer matches codes; no heavy computing required. </p><blockquote><p>This, for example, is the hash of &#8216;Niels&#8217; using SHA-256:<br><strong>3717208d4b067d2644265f24225337e69d72a71f78e4761045a507a7593c6607</strong></p></blockquote><p>Any computer in the world can independently verify mathematically that this is the hash of Niels! Pretty cool!</p><p><strong>How blind identity verification works in practice</strong></p><p>Imagine: a police officer stops someone who doesn&#8217;t have an ID card. Instead of biometrics, the person is given a device that prompts them with questions: first name, surname, postcode, pharmacy, GP, perhaps the name of a pet.</p><p>It resembles the security questions you use when you reset your password, but there is one fundamental difference. With Google, Google knows the answer; you are not the owner of that data. In this system, only you and the source see the answer.</p><p>The pharmacy knows your pharmacy. The municipality knows your address. <strong>But nobody has a central database with all that information combined.</strong></p><p>The person provides what they choose to share voluntarily. Don&#8217;t want to share your pharmacy? Fine, skip it, provide something else. Each answer is hashed and matched against the existing sources. A match means &#8220;this is correct.&#8221; No match means &#8220;this is incorrect.&#8221; The police never see the actual values; only ticks or crosses.</p><p>With enough matches, you achieve probabilistic certainty. Just &#8220;Niels&#8221; alone is weak; many people share that name. But &#8220;Niels&#8221; plus &#8220;Van den Bergh&#8221; plus a specific pharmacy plus a specific postcode? That combination is virtually unique. With five correct answers, you typically reach over 99% certainty, comparable to fingerprint matching, but without the privacy intrusion.</p><p><strong>The trade-off with this approach</strong></p><p>We have to be honest about the limitations. This system doesn&#8217;t work for everyone. Homeless people don&#8217;t have a regular pharmacy. People who have just moved may have outdated data. Tourists aren&#8217;t in Dutch systems. There will always be situations where this isn&#8217;t the solution.</p><p>But that&#8217;s precisely the point. No system works for everyone. The question isn&#8217;t which system is perfect, but which system we want to build as the default.</p><p><strong>An alternative to large-scale data scraping</strong></p><p>This is about more than just identification. It&#8217;s about a fundamental choice we make as a society, often without realising it.</p><p>In the physical world, we have invested centuries in the separation of powers. Legislative, executive, and judicial branches; separated, balanced, and held in check. </p><p>Nobody holds absolute power. Enforcement operates reactively: first, something happens; then investigation follows; then a warrant; then, potentially, action.</p><p>In the digital world, systems are built on the premise of <em>proactive</em> enforcement. That collects everything, in case it might be useful someday. That predicts who might do what. Surveillance infrastructure is built under the banner of &#8220;digitalisation.&#8221;</p><p><strong>We propose the opposite: digitalisation, premised on retroactive enforcement under the division of powers.</strong></p><p>Whether we need digital identification is not the question. The question is: do we build it in a way that respects the same principles we have established in the physical world?</p><p>---</p><p>This proposal is now with the Dutch Ministry of Justice and Security. Whether there will be a pilot remains to be seen.</p><p><strong>But the discussion extends beyond a single pilot. If you work on similar challenges in digital infrastructure and privacy, or if you know organisations that are seriously considering this, I&#8217;d love to hear from you. This is a conversation we need to have more broadly.</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.nielsvandenbergh.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>