Summary of "Elbows Up: How Canada Can Disenshittify Tech, Reclaim Its Sovereignty, & Launch a New Tech Sector"
High-level summary
Cory Doctorow argues that Canada should repeal anti-circumvention law (e.g., Bill C‑11 / DMCA-style rules), legalize “jailbreaking,” and foster an export-oriented industry that supplies tools and open firmware to break vendor lock on phones, TVs, cars, tractors, printers, medical devices, streaming services, and social apps.
The pitch is technological, economic, and national-security driven:
- Legalize circumvention and build auditable, open replacements to capture monopoly rents currently held by U.S. Big Tech.
- Restore consumer rights (repair, record, choose) and strengthen digital sovereignty.
- Create a new export sector based on jailbreak toolkits, open firmware, alternative app stores and clients, and inspectable silicon.
No product reviews or step‑by‑step technical tutorials were presented; the talk focused on market opportunities, technical directions, and policy changes required to enable them.
Key technological concepts and problems
-
Anti‑circumvention / access controls Laws that make bypassing device/software locks a felony, even for owners, letting corporations enforce business models by fiat.
-
Vendor lock and the “app tax” Examples include Apple’s 30% app-store take and forced payment rails that prevent competition for app stores and payment methods.
-
Trusted Execution Environments, signed bootloaders, and hardware root-of-trust Technical mechanisms that prevent installing alternative OS/firmware.
-
“Felony contempt of business model” Regulatory and technical mechanisms that allow companies to criminalize user control over purchased hardware.
-
Security-through-obscurity fallacy Proprietary, opaque firmware/hardware is not inherently more secure; secrecy can hide vulnerabilities.
-
Supply-chain / hardware backdoor risks Chips may contain uninspected logic (“dark matter”) requiring techniques such as decapping and electron microscopy to inspect.
-
Cloud / sovereignty risks Legal instruments (e.g., the U.S. Cloud Act) and state pressure on cloud providers can force data handovers or service shutdowns; remote bricking (e.g., John Deere tractors) is highlighted as a national-security failure mode.
Product and service opportunities (concrete examples)
- Jailbreaking kits and services: legal toolkits and support to unlock consumer devices.
- Alternative app‑store infrastructure: global app stores that undercut Apple/Google fees and allow alternative payment methods.
- Multi‑protocol social clients: aggregate feeds (Facebook/Instagram/Twitter/LinkedIn/BlueSky/Mastodon), block ads/tracking, and restore media/news.
- Streaming alternative clients + PVR: search/stream across subscriptions, record shows to avoid removals or time-limited availability, and skip ads.
- Printer jailbreak library: subscription library of jailbreaks to enable generic consumables and break monopolistic ink pricing.
- Vehicle diagnostic/jailbreak services: subscription diagnostic tools and persistent jailbreaks to avoid manufacturer-held diagnostic monopolies.
- Tractor/industrial device firmware: open, auditable firmware for farming equipment and other critical infrastructure to prevent remote kill-switches.
- Commons of auditable firmware/code (Euro‑stack style): a shared, peer-reviewed repository of transparent firmware and services for critical device classes.
- Open, inspectable silicon initiatives: efforts to audit, add visible logic, produce open RISC chips, and inspect wafers to reduce hidden functionality.
Security, legal and national‑security analysis
- Repeal plus legalize circumvention is framed as economic policy and national security: reducing single-point control by U.S. cloud/providers that could be coerced to shut services or hand over data.
- Building auditable stacks and permitting legal circumvention tooling is necessary for meaningful migration off U.S. silos — otherwise alternative stacks risk being unused behind their own walled gardens.
- Legal and technical measures that weaken monopoly control reduce the “blast radius” more precisely than broad retaliatory measures (e.g., tariffs) that would also hurt consumers.
- Companies cannot be trusted as sole guardians of user safety/privacy because of conflicts with shareholder interests; strong laws and enforceable penalties (fines or corporate-level sanctions) are needed.
Economic case
- Big Tech’s rents (app store fees, surveillance advertising, repair lockouts, consumables) represent recoverable value.
- A country that legalizes circumvention and builds an industry around open stacks and jailbreak tools could capture those rents as export revenues.
- Regulatory-arbitrage analogy: similar to how some countries attract business via tax policy (e.g., Ireland), a “defector” country could attract global demand for circumvention and open-stack services.
- Feasibility: technologists (including defectors from U.S. firms), investor capital, and several low‑hanging technical opportunities exist; the industry could scale quickly if legal barriers are removed.
Practical issues and responses from Q&A
-
Geopolitical retaliation risk (e.g., U.S. pressure or sanctions) Doctorow’s response: hardline actors won’t be mollified by concessions; build resilience and sovereignty now rather than hoping for appeasement.
-
Hardware “kill switch” / silicon ownership Response: inspect hardware (decapping, microscopy), demand auditable firmware, promote open silicon and supply-chain inspection; engage hardware-hacker communities and multiple‑RISC die approaches.
-
Data‑breach risk from legalized jailbreaking Response: transparency and auditable code improve security more than obscurity; because companies have conflicts of interest, public regulation and independent audits are preferable to relying on corporations.
-
Who should lead this movement A coalition of digital-rights activists, entrepreneurs/VCs, and national-security advocates; political leadership is possible if the issue becomes a public campaign (reference to the “Carney doctrine”).
-
Why this hasn’t happened already The U.S. Trade Representative historically pushed anti‑circumvention rules globally. Recent geopolitical shifts (tariffs, unpredictable U.S. policy) create an opportunity for a country to “defect.”
Main speaker / primary source
- Cory Doctorow (presenter).
- Secondary references and actors cited: DMCA/Bill Clinton, U.S. Trade Representative, Bill C‑11 (Canada), James Moore, Tony Clement, Stephen Harper, Apple, Google, Microsoft, Amazon, John Deere, and Euro‑Stack / EU technology sovereignty efforts.
Category
Technology
Share this summary
Is the summary off?
If you think the summary is inaccurate, you can reprocess it with the latest model.