Digital Commons Versus Digital Enclosure — The Fight For The Internet
The Original Architecture
The internet was built on three design principles that its founders treated as inseparable: openness, decentralization, and interoperability.
Openness meant that the protocols were available to anyone to use and build on. TCP/IP, the foundation of internet communication, was published as an open standard in 1974 by Vint Cerf and Bob Kahn. There was no licensing fee, no permission required, no proprietary lock-in. This openness was a deliberate choice, made possible partly because the research was publicly funded and partly because the designers understood that openness was what would allow the internet to scale.
Decentralization meant that the network had no central node. Any computer could communicate with any other computer by following the same protocols. The network routed around failures because there was no single point of failure. This was the ARPANET design principle, driven by Cold War concerns about network resilience, but it had profound implications: no single entity could control the network.
Interoperability meant that systems built on the same protocols could communicate with each other regardless of who built them. A computer running UNIX on one coast could exchange email with a VAX minicomputer on the other, using the same protocols. This interoperability was what allowed the internet to grow: every new node that followed the protocols could communicate with every existing node.
These three principles together created what legal scholar Jonathan Zittrain called the "generative internet" — a platform from which anyone could develop applications without seeking permission from anyone. The World Wide Web, invented by Tim Berners-Lee in 1989, was itself an application built on the internet's open protocols without permission. Email, file transfer, video conferencing, peer-to-peer networks — all were developed by people who did not need to ask anyone's permission to build on the public infrastructure.
This is what the internet was designed to be: a commons of communication infrastructure, available to anyone, controlled by no one.
How Enclosure Happened
The enclosure of the internet happened through several mechanisms operating simultaneously.
Platform capture through network effects. The most powerful mechanism was not legal or technical — it was economic. Digital networks exhibit strong network effects: the value of a network to each user increases with the number of users. This creates winner-take-all dynamics in markets where users benefit from being on the same platform as their contacts.
Social networking is the starkest example. Facebook became the dominant social network not because it was technically superior to MySpace or Friendster, but because it achieved critical mass first in specific demographic segments and the network effect did the rest. Once most of your friends are on Facebook, being on a different platform means being without your social graph. This creates switching costs that are not technical but social — you can't take your connections with you.
API closure. The early social platforms built their networks on open APIs — Application Programming Interfaces that allowed anyone to read and write to the platform's data. Twitter's API, in its early years, allowed thousands of third-party clients, analytics tools, and developer applications to access Twitter's content and social graph. This openness catalyzed enormous innovation on top of the platform. It also meant that the platform was not fully enclosed — alternative clients could give users experiences the platform itself didn't offer.
As platforms matured and the value of their data became clear, they closed their APIs. Twitter progressively restricted API access from 2010 onward, and in 2023 dramatically increased API pricing to a level that effectively shut out most third-party developers. Twitter's argument was that it owned the infrastructure and had the right to charge for access. The counter-argument is that the platform's value was created by its users and by the developer ecosystem that open APIs enabled — that the enclosure was appropriation of collectively created value.
Intellectual property maximalism. Copyright, patent, and trade secret law have been used extensively to enclose digital content and functionality. The entertainment industry's response to digital distribution — the DMCA, aggressive litigation against file-sharing platforms, region-locking of digital goods — converted what could have been an open digital cultural commons into a highly regulated market of licensed access. The principle of copyright — a limited monopoly granted to incentivize creation — has been stretched into a permanent enclosure of cultural output, with copyright terms extending to 70 years after the creator's death.
Surveillance as enclosure. The business model of surveillance capitalism — as Shoshana Zuboff documented in her 2019 book "The Age of Surveillance Capitalism" — is itself a form of enclosure. Users' behavioral data, generated through their use of ostensibly free services, is converted into a proprietary resource: predictive models of human behavior sold to advertisers and other customers. The users who generate this data have no ownership rights, no access rights, and typically no knowledge of the extent of collection. The data commons that individuals collectively constitute through their online behavior has been enclosed by the platforms that collect it.
Acquisition of potential competition. Platform companies have systematically acquired potential competitors before they could challenge the incumbent's network position. Facebook's acquisition of Instagram for $1 billion in 2012 — when Instagram had 13 employees and no revenue — was explicitly motivated by the threat Instagram posed to Facebook's photo-sharing features. The WhatsApp acquisition in 2014 for $19 billion removed what might have become an alternative to Facebook Messenger. Google's acquisition of YouTube, DoubleClick, and dozens of other companies removed potential competition in search, advertising, and video.
Regulators approved these acquisitions without serious scrutiny. The theory of harm that would have justified blocking them — that the acquisitions would foreclose competition in social networking or video — was not yet in regulators' vocabulary. By the time the anticompetitive effects were clear, the network effects had made unwinding the consolidation technically and practically very difficult.
What Has Been Enclosed
The digital commons that has been enclosed is not abstract. It includes:
The social graph. The network of human social connections — who knows whom — is one of the most valuable resources in the digital economy. It is used to target advertising, spread information, enable social coordination, and build products. This social graph was built by billions of individuals over decades of online interaction. It is now owned by platforms. Users cannot access their own social graphs in portable form — they cannot take their friend list and connections to a different platform.
Behavioral data. Trillions of data points about human behavior — what we read, buy, search for, click on, how long we linger on what content, what our emotional states appear to be based on facial recognition and text analysis — have been captured by platform companies. This data has been used to build predictive models of human behavior that are enormously valuable for advertising and that have applications far beyond advertising. The individuals who generated this data did so without knowing the extent of collection and without consenting to its commercial exploitation.
The attention commons. Human attention is finite. The total amount of time humans spend paying attention to things in the course of a day is fixed. The platform companies have captured an increasing fraction of this attention commons through systems optimized to maximize capture. Time that humans previously spent in unmediated attention — in conversation, in local community, in boredom, in undirected thought — has been redirected to platform interaction. The attention commons has been enclosed.
The protocol layer. While the foundational internet protocols remain open, the application layer protocols that govern much human online communication have been captured. Email is open and federated; messaging is not — WhatsApp, iMessage, and WeChat are proprietary silos. The web is open; the app store ecosystem is not — Apple and Google each operate proprietary distribution monopolies over mobile software that take 30 percent of digital commerce and can reject any application for any reason.
The Counter-Movement
The digital enclosure is real and consequential. So is the resistance to it.
Open-source software. The Linux operating system, the Apache web server, the Python programming language, the Android mobile OS (in its core), Mozilla Firefox, the WordPress CMS, Git version control — these are commons resources, collaboratively developed, freely available, and licensed in ways that prevent enclosure. Open-source software is the foundation of most of the internet's infrastructure. The servers that run the proprietary platforms are themselves mostly running open-source operating systems. Enclosure has happened at the application layer; the infrastructure layer has largely remained open.
Copyleft licensing. The GNU General Public License, developed by Richard Stallman, is a deliberately parasitic legal instrument: software licensed under the GPL can be freely used, studied, modified, and distributed, but any modifications must be released under the same terms. This prevents the enclosure of commons-licensed code by requiring that any derivation remain commons. The GPL and its variants are among the most cleverly designed legal tools in the history of intellectual property.
Federated protocols. The fediverse — federated social networking built on the ActivityPub protocol — is a direct counter to platform consolidation. Mastodon, Pixelfed, PeerTube, and dozens of other applications implement ActivityPub, allowing users on any of these platforms to communicate with users on any other. No single company controls the network. No single entity can shut it down. The governance of each instance is local and transparent.
ActivityPub was developed by the World Wide Web Consortium (W3C) and published as a web standard in 2018. It is now implemented by enough platforms that the fediverse has achieved sufficient scale to be a genuine alternative to corporate platforms for some users and use cases.
Data rights movements. The European Union's General Data Protection Regulation (GDPR), enacted in 2018, established legal rights for individuals over their personal data: the right to know what is collected, the right to access it, the right to correct it, the right to delete it, and the right to data portability. Data portability — the right to take your data to another service — is a direct counter to enclosure. If users can take their data with them, the switching costs created by data accumulation are reduced.
The GDPR's implementation has been imperfect and enforcement inconsistent. But it established a legal framework that treats personal data as something individuals have rights over, rather than as a resource that platforms capture by right of collection.
Antitrust. The U.S. Federal Trade Commission's lawsuit against Facebook (seeking to force the divestiture of Instagram and WhatsApp), the Department of Justice's cases against Google, the EU's Digital Markets Act designating certain platforms as "gatekeepers" subject to special obligations — these represent a resurgence of antitrust enforcement against digital platforms after decades of permissive regulatory posture.
The outcomes are uncertain. Digital markets have characteristics — network effects, zero marginal cost of reproduction, multi-sided markets — that make traditional antitrust frameworks awkward. But the political will to challenge platform power is greater than at any point since the Microsoft antitrust case of the late 1990s.
The Stakes: Control of Civilization's Infrastructure
The internet is not just a commercial marketplace. It is the infrastructure through which an increasing proportion of human social coordination, political organization, economic activity, and cultural production flows. Control of that infrastructure is control of the conditions under which civilization operates.
Medieval enclosure dispossessed peasants from the physical commons they depended on for survival. Digital enclosure dispossesses individuals and communities from the communicative commons that democratic society depends on. The analogy is not perfect — no one is starving because Facebook owns the social graph. But the structural logic is similar: resources that once were common are being converted to private property, and the conversion is happening with insufficient democratic deliberation about its consequences.
The fight for the internet is not a fight between technology companies and their regulators. It is a fight about whether the communications infrastructure of civilization will be governed as a common resource — open, interoperable, accountable — or as private property, with all the concentration of power that implies.
The commons always has to be defended. It was never secured by mere declaration. The Magna Carta affirmed rights to the common that had to be reasserted through centuries of subsequent political struggle. The digital commons, announced in the open protocols of the early internet, requires its own political defense — through law, through technical alternatives, through cultural commitment to the principle that the infrastructure of communication belongs to those who use it.
That defense is underway. Whether it will succeed is not determined. The enclosure is also underway, better-funded and often faster. The outcome of this contest will shape what kinds of communities, what kinds of politics, and what kinds of civilization are possible for the generation that comes after us.
Comments
Sign in to join the conversation.
Be the first to share how this landed.