Get AI summaries of any video or article — Sign up free
Developing Open Source Software is a Political Act thumbnail

Developing Open Source Software is a Political Act

Zettlr·
6 min read

Based on Zettlr's video on YouTube. If you like this content, support the original creators by watching, liking and subscribing to their content.

TL;DR

The extended mind framework treats external tools—like notebooks, keyboards, and cloud services—as part of how people remember and think, making cognition dependent on infrastructure.

Briefing

The core claim is that software—especially proprietary, cloud-based, and subscription-driven software—functions like a political system because it reliably enforces rules, shapes what people can do, and can quietly lock away parts of identity and decision-making. That matters because modern life increasingly depends on these systems for memory, communication, visibility, and even basic social participation; when the “rules of the game” are controlled by companies, users lose democratic leverage.

A philosophical starting point becomes a practical one: the “extended mind” idea argues that cognition isn’t confined to the brain. External tools can become part of how people think and remember. The transcript illustrates this with everyday examples—looking up an address versus recalling it, or using a notebook as “spare memory” in Alzheimer’s. It then pushes the analogy into the digital era: keyboards, cloud storage, smartphones, and online services act like external memory systems. But this reliance creates a new vulnerability. If the coupling between a person and the tool is disrupted—no reception, a stolen or inaccessible notebook, a cloud outage—core cognition and daily functioning degrade.

That fragility becomes an argument for why software development is political. Reliability used to be a reason to trust computers; now complexity and interdependence create “chain dependencies” across operating systems, internet connections, cloud providers, and developers. A concrete example is Cloudflare’s load balancing: it routes traffic through its infrastructure and can keep popular sites online, yet even a small bug can make major services inaccessible for hours. The transcript links this to broader systemic risks: cloud outages, vendor lock-in, and the way subscription models shift power to companies that can cut access—citing Adobe’s 2019 Creative Cloud disruption in Venezuela after U.S. export sanctions.

Beyond outages and pricing, the transcript argues that proprietary formats and hidden source code create a form of captivity. When file formats are proprietary and export options are controlled by vendors, switching becomes difficult. Even when companies offer “read-only” tools after subscriptions end, users effectively accept ongoing control over their own data. The same logic extends to platforms like YouTube, Facebook, and Twitter, which present themselves as neutral “platforms” while monetizing user data and shaping visibility—making protests and activism more dependent on online reach.

Finally, the transcript ties software to governance and checks-and-balances. Unlike laws that can be debated and interpreted by courts, software rules are enforced automatically at the lowest level. That removes ambiguity but also removes democratic contestation: users can’t vote on features, and developers can change behavior unilaterally. Functions embedded in software—such as form validation—can constrain identity categories and choices without any “political” label.

The proposed remedy is open source. Public source code enables scrutiny, community oversight, and easier data migration through machine-readable formats. The transcript frames open source as a way to reintroduce transparency and accountability into the “outsourced mind” of modern computing—turning software into a political arena where users can demand changes through public issues and collective review.

Cornell Notes

The transcript argues that software is political because it enforces rules automatically and increasingly shapes cognition, identity, and access to information. Using the “extended mind” idea, it treats external tools—like notebooks, keyboards, and cloud services—as part of how people remember and act. But digital reliance creates fragility: outages, chain dependencies, vendor lock-in, and subscription or sanctions can abruptly cut off access to essential tools and data. Proprietary software intensifies the problem by hiding source code and controlling formats, making users unable to meaningfully challenge or migrate away. Open source is presented as a checks-and-balances mechanism: public code invites scrutiny, supports interoperability, and helps preserve user control over data even if a service is abandoned.

How does the “extended mind” idea connect to everyday digital tools like smartphones and cloud storage?

The extended mind view treats cognition as distributed across brain and environment. The transcript uses examples where external aids serve as memory: looking up an address versus recalling it, or using a notebook as “spare memory” in Alzheimer’s. In the digital era, keyboards, servers, and especially smartphones and cloud apps function similarly—people offload remembering appointments, passwords, and documents to external systems. That offloading can speed up action, but it also means cognition depends on the reliability and availability of those external tools.

Why does reliability become a political issue rather than just a technical one?

Reliability determines whether people can access the information and capabilities they rely on for daily life. The transcript argues that modern software systems are fragile because of complexity and chain dependencies across multiple layers (operating systems, internet connections, cloud providers, and developers). A small failure can cascade into widespread downtime. Cloudflare is used as an example: even though it load-balances traffic, bugs can make major sites inaccessible for hours, showing how power over access concentrates in a few infrastructure providers.

What is vendor lock-in, and how does it undermine user autonomy?

Vendor lock-in is the difficulty of switching away from a vendor because your data and workflows depend on their ecosystem. The transcript links lock-in to proprietary file formats and controlled export paths, so users may be unable to migrate data if access is denied or export options don’t match their needs. Subscription models intensify this by turning software into ongoing payments and leverage: if you can’t pay, you may lose editing rights or access. The Adobe Creative Cloud example after U.S. export sanctions illustrates how external policy can abruptly cut off an entire country’s ability to use critical software.

How do platforms like YouTube, Facebook, and Twitter fit the argument that software is political?

The transcript argues that platforms claim neutrality but monetize user data and shape visibility. Because protests and public coordination depend on online reach, platform algorithms and data practices influence which events become “real” to wider audiences. The data collected from user activity becomes an economic resource for targeted advertising, meaning political expression and social participation are intertwined with corporate incentives and technical constraints.

Why does the transcript say software lacks the checks and balances that laws have?

Laws can be debated, interpreted, and enforced through institutions like courts and legislatures. Software, by contrast, encodes rules directly into execution: programs validate inputs and enforce permissions automatically at a low level. That reduces ambiguity but also removes democratic contestation—users can’t vote on features, and developers can change behavior. The transcript uses the example of validation functions (including gender-related choices) to show how software can constrain identity categories without “political” framing.

What does open source add to this system, and why is it framed as a remedy?

Open source makes source code publicly viewable, enabling scrutiny and community oversight. The transcript argues that even non-programmers can participate because transparency invites experts to audit privacy and security behavior. It also claims open source increases user control through machine-readable formats and interoperability, making migration easier if a project is abandoned. By shifting oversight from hidden corporate decisions to public review, open source is presented as a way to restore checks-and-balances over outsourced cognition and data.

Review Questions

  1. In what ways does the extended mind analogy change how you evaluate the risks of cloud reliance (outages, access loss, and data migration)?
  2. Which mechanisms in the transcript make proprietary software “political” even when it seems purely functional (e.g., validation functions, subscription enforcement, hidden formats)?
  3. How does open source address both transparency and reliability, and what limitations still remain even with public code?

Key Points

  1. 1

    The extended mind framework treats external tools—like notebooks, keyboards, and cloud services—as part of how people remember and think, making cognition dependent on infrastructure.

  2. 2

    Complex, interconnected software systems create chain dependencies where small failures (bugs or outages) can disable major services and disrupt daily life.

  3. 3

    Vendor lock-in emerges from proprietary formats and controlled export paths, making switching away from a vendor difficult and sometimes impossible.

  4. 4

    Subscription models and external policy shocks (such as sanctions) can abruptly remove access to essential software, turning affordability and legality into access controls.

  5. 5

    Platforms marketed as neutral can still shape political visibility by monetizing user data and influencing what reaches broader audiences.

  6. 6

    Software enforces rules automatically at execution time, reducing ambiguity but also limiting democratic checks and user control over feature decisions.

  7. 7

    Open source is presented as a practical checks-and-balances mechanism through public code review, interoperability, and easier migration when services end.

Highlights

External tools increasingly function as “spare memory,” so losing access to digital systems can directly impair cognition and daily functioning.
Cloud reliability is not just a technical metric; chain dependencies mean a single bug or outage can take down widely used services.
Vendor lock-in turns personal data and workflows into leverage for subscription pricing and policy-driven access restrictions.
Software governance differs from legal governance: code validates inputs and enforces rules automatically, leaving fewer opportunities for democratic contestation.
Open source is framed as restoring transparency and accountability—so users can treat software as a political arena rather than an opaque system.

Topics

Mentioned