Cards
- Containers made immutable deployment nearly free. The industry responded by redesigning software as…
- Technological constraints reshape practices: when a tool makes one approach cheap and another…
- The tools for individual ownership of a digital twin do not yet exist — or remain unknown to me.…
- Protecting one's digital identity demands direct action: building, storing, backing up, and…
- The question is whether individuals must preserve their own digital traces or can rely on…
- The central question about a digital twin is not its existence but its ownership — whether it…
- A digital twin of every user already exists, built by corporations from behavioral data to model…
- Every outward signal — speech, gesture, facial expression, even neural impulse — constitutes a…
- Protecting one's interests requires acting on one's own behalf. No party whose incentives diverge…
- Don't fear being public. Someone learning your secret is far less scary than dying in obscurity.
- Writing in Xettel regularly self-corrects what you consume. You start wanting to read more…
- Xettel is for yourself first. Write about everything you read, study, and think about. It becomes a…
- Connections between cards are separate cards. Each has at most two links: reply_to (continues…
- Xettel = X + Zettelkasten. Note-taking by the Zettelkasten method, but with Twitter's constraints:…