Federated infrastructure but user sovereignty: a “third way” between federated and P2P networks.

But we don’t need to go the whole P2P hog to get robust user sovereignty. Cryptography lets us separate who stores and routes data from who truly owns it. We can combine the easier infrastructure design of a federated protocol with the full decentralized security of a peer-to-peer protocol.