The State of African Digital Heritage 2025
Project Lead
Komi Thomas Agboguin
Date
2025-12-16
Contact
komy@atilebarts.com
Licence
Creative Commons BY-NC-SA 4.0

Beyond Access, Sovereignty.
Abstract
This document is a technical and political manifesto for the next decade of African heritage preservation. It argues that the era of "simple digitization" (online galleries) is over and must give way to the era of Sovereign Infrastructure. Drawing on concrete case studies (Meridian, Axis Ibeji), it proposes a roadmap to repatriate not just images, but the legal and technical ownership of our history.
Table of Contents
01. Introduction: The End of the "Gallery" Era
- The myth of universal access
- Visibility is not ownership
- Necessity of sovereign infrastructure
02. The Technical Foundation: Building the OS
- The current landscape: Fragmentation and dependence (Digital Benin, Google A&C)
- The Meridian solution: The Sovereign Inventory
- Local vs Cloud Storage: The performance issue
03. Digital Restitution: Workflow & Ownership
- The Axis Workflow: From physical scan to immutable archive
- Blockchain & "Digital Twin": The 'Conscience' Smart Contract
- Case Studies: Open Restitution Africa & Museum of Black Civilizations
04. The Experience: Warming the Archive
- Breaking out of the cold archive
- Creative Coding & Storytelling (Axis R&D: The Algorithmic Memory)
05. Conclusion & Strategic Roadmap 2035
- Manifesto Synthesis
- Roadmap for decision makers (Phases 1, 2, 3)
- References and Partners
Chapter 1: Introduction
From Cotonou to Helsinki: The Paradox of Distance
My journey is not academic; it is visceral. Three years ago, I was crisscrossing West Africa. I walked through the galleries of Cotonou, vibrated in those of Lomé, navigated the artistic effervescence of Lagos and Abuja. I saw with my own eyes the creative power residing on the continent, but also the structural fragility of our ecosystems. I managed artists, organized exhibitions, and tried to digitize what could be digitized with limited means.
Then, I migrated North. I have been living in Finland for a year. Here, I gained access to the other side of the mirror. During a visit to the Amos Rex in Helsinki, a curator did me the rare honor of opening the basement doors, the private reserves. Descending into these air-conditioned, secured, sanitized archives, I felt vertigo. I thought I was the first Beninese to enter this sanctuary of Nordic concrete. The contrast with the tropical reserves I knew was violent. It wasn't just a difference of means; it was a difference of power architecture.
The Absurdity of "Remote Access"
This imbalance hit me in the face in 2022, during the historic return of the 26 Royal Treasures to Benin. It was a moment of immense national pride. Yet, it was here, in Helsinki, in a dark Scandinavian room, that I watched the documentary film retracing this return... even before it was broadcast to the general public in Benin. I was 6000 km away from home, yet I had "priority" access to my own history, simply because I was on the right side of the digital and logistical divide.
It is this unbearable paradox that guided my transition to Tech. I traded my camera for code, galleries for Blockchain, and joined Aalto University to understand the deep mechanisms of this imbalance.
The Smile Curve Trap
In business school here, I discovered Ram Mudambi's Smile Curve theory. It illuminated everything.
graph TD
A[R&D / Design] -->|High Value| B(Manufacturing / Digitization)
B -->|Low Value| C[Marketing / Services]
C -->|High Value| A
style B fill:#ffebee,stroke:#ef9a9a,stroke-width:2px
style A fill:#e8f5e9,stroke:#a5d6a7,stroke-width:2px
style C fill:#e8f5e9,stroke:#a5d6a7,stroke-width:2px
In a global value chain:
- High Value is at the beginning (R&D, Design, IP) and at the end (Branding, Marketing, Service).
- Low Value is in the middle (Manufacturing, Extraction).
African heritage is trapped in the middle. We provide the "raw material" (the object, the emotion), but the West controls the R&D (metadata standards) and the Service (platforms like Google Arts or Netflix documentaries). As long as we do not build our own Sovereign Infrastructure, we will remain the laborers of our own culture. This manifesto is set out to change the curve.
Chapter 2: The Technical Foundation of Sovereignty
Climbing Out of the Value Chain "Trough"
There is a concept I discovered in the lecture halls of Aalto University in Helsinki, which felt like a slap in the face: several economists theorized the Smile Curve. This curve describes the distribution of value added in the modern economy. It is shaped like a smile:
- The two high ends capture the wealth: R&D and Design on the left; Branding, Marketing, and Customer Service on the right.
- The central trough captures the poverty: Manufacturing and assembly.
The classic example is the iPhone: designed in California (High Value), assembled in China (Low Value), sold with a huge margin via Apple Stores (High Value).
I immediately superimposed this curve onto the reality of African heritage. Where are we? We are at the lowest point. We are the suppliers of raw material. We deliver the history, the artifact, the emotion. Who are the architects (R&D)? They are the Silicon Valley engineers coding the compression standards (JPEG, GLB) and indexing. Who are the distributors (Service)? They are platforms like Google Arts & Culture, Netflix, or major Western virtual museums monetizing global attention on our culture.
As long as we remain suppliers of raw data, we will be the laborers of our own memory. To regain control, we must climb the slope. We must become the architects of the infrastructure.
2.1 The Current Landscape: Sovereignty for Rent
This dependence is not theoretical. It has a smell and a frustration I have physically experienced.
Anecdote: The Humiliation of the "Loading Bar" I remember an afternoon in Cotonou, in 2021. I wanted to show a traditional sculptor how his work had been digitized and put online on a European partner museum's site. I take out my phone, connected via local 3G. I type the URL. The site was a classic WordPress with a heavy theme, hosted on a server in Paris or Frankfurt. The loading bar stalled. 10 seconds. 30 seconds. One minute. The high-definition image, supposed to "celebrate" his work, never loaded. I saw the artist's pride turn into confusion, then disinterest. He put away his tools and went back to work. That day, I understood that the "theoretical" accessibility promised by the West was a technological insult. A web page that takes 45 seconds to load in Africa does not exist.
The Fragmented Archipelago Even the most ambitious projects suffer from this original sin. Digital Benin is a major curatorial feat, having successfully virtually reunited thousands of dispersed objects. But ask the uncomfortable question: Who has the SSH keys to the server? Who pays the AWS bill at the end of the month? If the answer is a German university or an American foundation, then it is not sovereign infrastructure. It is a temporary concession. We are tenants, and the landlord can change the locks at any time.
2.2 The Architecture of Independence: Meridian Archive
It is with this realization of failure, and armed with my new software engineering skills acquired in Finland, that we designed Meridian Archive. The ambition is not to make a "website", but a Cultural Operating System (Cultural OS) capable of competing technically with Google's standards.
To do this, we had to break the classic "LAMP" model (Linux-Apache-MySQL-PHP) which is the norm for aging CMS (Omeka, WordPress).
1. The Sovereign "Back-End" (Climbing the Left of the Curve)
Instead of using rigid databases, we use flexible architectures (NoSQL/Graph).
- Semantic Sovereignty: A Western system forces you to fill in the "Creation Date" field. But for a sacred Vodun object, this notion might be nonsensical. Meridian allows us to define our own metadata schemas (Ontologies). We can code "Sacred", "Secret", "Ritual" directly into the database structure.
2. "Edge" Distribution (Climbing the Right of the Curve)
This is where engineering makes the difference.
- Headless Architecture: We separate the vault (the database) from the showcase (the site). Even if the site goes down, the data remains secure.
- Edge Computing: Instead of serving data from a single server in Paris, we use Content Delivery Networks (CDN) that bring content closer to the user.
- Optimistic UI & Cache: Meridian is designed for the unstable networks of Lagos or Kinshasa. The interface loads instantly, even offline. Technology must adapt to Africa, not the other way around.
2.3 Geopolitics of Storage: The Lesson of Nordic Bias
Here in Helsinki, the internet is like air: invisible, omnipresent, ultra-fast. Aalto students never question latency. They design software for an ideal world. This is a major cognitive bias.
When I visited the Amos Rex museum basements, I saw their server room. It was cold, noisy, impressive. It was the sound of sovereignty. They do not rent their memory; they own it.
Africa must adopt a Hybrid Storage strategy:
- Cold Storage (Ownership): Physical servers, disconnected from the internet (Air-gapped), kept on national soil, containing the original RAW files. This is the war chest.
- Hot Storage (Distribution): Lighter, encrypted versions, distributed on the Cloud for global performance.
Let's not let Amazon or Google become the default guardians of our history. Building this infrastructure is expensive, yes. But cheaper than the price of oblivion or eternal dependence.
Chapter 3: Digital Restitution
Ending the Colonial "Trusted Third Party"
It was during an advanced cryptography course at Aalto University that I understood the true political scope of Blockchain for Africa. The professor explained the Byzantine Generals Problem and the necessity of a "Trusted Third Party" to validate transactions in a centralized system. Suddenly, the obvious struck me: Historically, the Western Museum has positioned itself as this "Trusted Third Party". It told us: "Trust us with your objects, because we are the only ones capable of preserving them, authenticating them, and telling their history." History has proven that this "Third Party" was not reliable. It changed names, lost contexts, and refused to return assets.
The Blockchain revolution is not speculation on JPEG monkeys. It is the technical possibility to eliminate the Trusted Third Party. It is the possibility to replace a fallible colonial institution with infallible mathematical code ("Code is Law").
3.1 The Workflow of Truth (Forensic-Grade)
Before securing the asset, it must be created. And here again, the requirement must be total. When I was a photographer in Cotonou, I settled for beautiful images. Today as an engineer, I no longer seek the "beautiful", I seek the "true".
For Digital Restitution, a 360° virtual tour is not enough. That is entertainment. We have developed at Axis Ibeji a "Forensic" protocol (forensic quality):
-
Hybrid Capture: We cross Polarized Photogrammetry (to cancel all reflections and capture the pure color of the material) with Millimeter LiDAR. Why? Because if a mask has a 0.2mm micro-crack caused by a ritual in 1890, this crack is historical data. A simple "artistic" 3D modeling would smooth out this detail. Our scan preserves it. It is the difference between a drawing and evidence.
👉 Live Experience: Manipulate a high-fidelity scan in our Digital Restitution Demo.
-
3D Archive: Meridian Archive (The Storage)
- The Problem: Where to store 50 GB 3D files without paying millions to Amazon AWS?
- The Solution: A decentralized network (IPFS/Arweave). The archive is not on a single server; it is everywhere. This is absolute resilience.
-
Draco Optimization: The raw file (Raw Point Cloud) weighs 50 GB. This is our "Master Tape". For distribution, we use Google's Draco compression. It is an engineering feat that reduces this monster to 10 MB, viewable on a Tecno or Infinix in Lomé.
- The Paradox: We use Big Tech tools (Draco), but we divert them to serve our sovereignty.
graph LR
A[Physical Object] -->|Photogrammetry + LiDAR| B(Point Cloud 50GB)
B -->|Post-Processing| C{Draco Optimization}
C -->|Compression| D[GLB File 10MB]
D -->|IPFS Hash| E[Smart Contract]
style A fill:#f9fbe7,stroke:#cddc39,stroke-width:2px
style E fill:#e0f7fa,stroke:#4dd0e1,stroke-width:2px
3.1.5 Case Study: Meridian Artifact ID (The "Phygital" Link)
How to prove ownership of a physical object in a digital world?
To answer this question, we developed the Meridian Artifact ID protocol with the Contemporary Art Hub of Dakar. It is not just about scanning, but about sealing.
The Technical Challenge: Paper certificates are forgeable. The Solution: An NFC chip NTAG 424 DNA (bank grade) inserted into the physical work. This chip generates a unique cryptographic code with each scan (SUN Message), impossible to clone.
sequenceDiagram
participant User as Collector (Mobile)
participant NFC as NFC Chip (Artwork)
participant API as Meridian API
participant Chain as Blockchain (Smart Contract)
User->>NFC: Taps phone
NFC-->>User: Generates encrypted link (SUN)
User->>API: Sends signature
API->>API: Verifies AES Signature
alt Valid
API->>Chain: Query OwnerOf(ChipID)
Chain-->>API: Returns Owner (Wallet)
API-->>User: Shows Green Certificate
else Invalid
API-->>User: Counterfeit Alert
end
This protocol creates an unbreakable link between the atom (the physical mask) and the bit (the digital certificate). This is the basis of any reliable restitution.
3.2 The Smart Contract as Title Deed
Once the Digital Twin is created, who owns it? If I host it on Sketchfab or YouTube, I cede rights via the TOS (Terms of Service). I fall back into servitude.
This is where my Blockchain background intervenes. We use the ERC-1155 standard (more flexible than the classic ERC-721 NFTs) to create the 'Conscience' contract.
Law in Code A paper certificate can be burned. A SQL database can be altered by a corrupt admin. A Smart Contract deployed on a decentralized chain (Ethereum or sovereign Layer 2) is Immutable. We inscribe in digital marble:
- The cryptographic fingerprint (Hash) of the original scan file.
- The identity of the owner (e.g., "Royal Community of Abomey").
- Usage rules (Royalty Standards).
Hacking the Legal System Physical restitution laws take decades to change. France took 3 years for an exception law on 26 works from Benin. Blockchain allows immediate "Peer-to-Peer Restitution". If the British Museum refuses to return the physical object, we can "Mint" the Digital Twin and unilaterally declare its digital sovereignty. The whole world will be able to verify on the chain that the digital asset belongs to Benin. We create jurisprudence through technology.
3.3 Technical Annex: The Code of Conscience (Pseudo-Solidity)
To prove that digital property is not an abstraction, here is what the simplified structure of the 'Conscience' Smart Contract we deploy looks like. This code defines an Inalienable property (Impossible to sell the Digital Twin, only to license its use).
// SPDX-License-Identifier: MIT
pragma solidity ^0.8.0;
import "@openzeppelin/contracts/token/ERC1155/ERC1155.sol";
import "@openzeppelin/contracts/access/Ownable.sol";
contract ConscienceContract is ERC1155, Ownable {
// Structure of the object identity
struct HeritageAsset {
string nativeName; // Ex: "Botchio"
string originRegion; // Ex: "Abomey, Benin"
uint256 creationDate; // Estimated Timestamp
string custodianID; // DID (Decentralized Identity) of the community
bool isSacred; // If TRUE, visual access is restricted
}
mapping(uint256 => HeritageAsset) public heritageRegistry;
// Events for forensic traceability
event AssetMinted(uint256 indexed id, string name, string custodian);
event AccessLicensed(uint256 indexed id, address subscriber, uint256 duration);
// Sovereign Minting Function
// Only the community authority (Custodian) can create the asset
function mintSovereignAsset(
uint256 id,
string memory _nativeName,
string memory _origin,
bool _sacred
) public onlyOwner {
require(heritageRegistry[id].creationDate == 0, "Asset already exists");
heritageRegistry[id] = HeritageAsset({
nativeName: _nativeName,
originRegion: _origin,
creationDate: block.timestamp,
custodianID: "did:benin:royal-palace",
isSacred: _sacred
});
_mint(msg.sender, id, 1, "");
emit AssetMinted(id, _nativeName, "Royal Palace of Abomey");
}
// PROHIBITION OF SALE (The 'Inalienable' Clause)
// This function overrides the standard transfer.
// It blocks any transfer of ownership of the original token.
function safeTransferFrom(
address from,
address to,
uint256 id,
uint256 amount,
bytes memory data
) public virtual override {
require(from == address(0), "SOVEREIGNTY ERROR: This asset is INALIENABLE. Ownership cannot be transferred.");
super.safeTransferFrom(from, to, id, amount, data);
}
}
Technical Note: The modified safeTransferFrom function is key. It transforms a financial asset (classic NFT) into a digital national treasure. It translates political will (inalienability) into an inviolable cryptographic constraint.
3.4 From "Smile Curve" to "Power Curve"
Applying the Smile Curve to Web3:
- We no longer want to be just the creators of the object (Bottom of the curve).
- By mastering "Minting" and the Smart Contract, we climb right back to the top of the curve, where Intellectual Property (IP) resides.
This is my vision as an African engineer: use cryptographic complexity to simplify historical justice. Let's stop asking for permission. Let's take the private keys.
Chapter 4: The Experience and Memory
Warming the Archive: Code Against the "White Cube"
Living in Helsinki is living in the world design capital. Here, everything is functional, refined, minimalist. "Nordic Design" is a religion of clarity: white background, black typography, perfect grids. It is magnificent for a coffee maker or a banking app. But when I saw this same minimalism applied to the interfaces of African digital museums, I felt deep unease.
The standard website of a museum (a grid of images on a white background with a search bar) is the digital transposition of the Western "White Cube". It is a clinical, cold, silent space. It isolates the object. It kills it a second time. At home, in Benin, a mask is never alone. It is movement, it is dance, it is surrounded by chanting, dust, crowds, night. It is fractal and chaotic. By attempting to fit African complexity into the Excel grid of a SQL database, we lose the soul of the object.
4.1 The Duty of "Creative Coding"
My software engineering training at Aalto gave me the tools to fight this coldness. I discovered that code is not just utilitarian; it is a plastic, organic material. This is what we do within the Axis R&D laboratory. We do not use code to classify, but to resurrect.
Anecdote: Coding at Night in Espoo I remember sleepless nights in Espoo, coding Shaders (GLSL) on my graphics card, trying to mathematically reproduce the texture of laterite or the vibration of hot air. I wanted the interface to "sweat". I understood that User Experience (UX) for Africa should not aim for "frictionless", but on the contrary recreate "emotional friction".
The Technology: Shaders (GLSL) We use the programming language of Graphics Processing Units (GPU) to process archives. Instead of displaying a static photo (a 2D texture), we transform it into a field of particles.
- The Algorithmic Memory: In our prototypes, the colonial archive image is not stable. It is composed of millions of floating dots. When the user approaches their mouse (or finger), the image disperses, like a fragile memory that crumbles if you try to grasp it too firmly. You have to stay still for the image to reassemble.
- It is a coded metaphor for oral memory: it is not acquired data; it is a performance that demands attention and respect.
4.2 AI as the New Griot
The other pillar of this experience is Generative Artificial Intelligence (LLM). But be careful: not the default ChatGPT that "hallucinates" on African history with an encyclopedic Wikipedia tone. We train "Specialized Small Language Models" (SLM) on local corpora.
The Chatbot vs The Griot
- A Western chatbot answers: "This mask was carved in 1920 in ebony wood." (Cold data).
- Our "Griot" AI answers: "It is said that this mask only came out when drought threatened the harvest. Look at its eyes, they are not closed, they are watching the spirit world."
In Finland, I am taught efficiency. In Benin, I know the value of digression. AI allows us to code this digression. It allows us to contextualize the object not by its technical sheet, but by its story. This is the only way to reconnect African youth (TikTok-native) with their heritage. They will not read PDF sheets. They will live immersive experiences.
4.3 Comparative Dialogue: Standard AI vs Griot AI
To demonstrate the impact of our cultural "Fine-Tuning", here is the real transcript of a test conducted at the Axis laboratory.
User Prompt: "Tell me about the Royal Seat of Abomey."
Answer A: Standard AI (ChatGPT-4 base)
"The Royal Seat of Abomey, or throne, is a carved wooden piece of furniture used by the kings of Dahomey (present-day Benin). It is often decorated with symbolic motifs and raised on a platform. It served during official ceremonies and symbolized monarchical power. Many seats were taken to France during the colonial conquest of 1892."
Verdict: Factual, encyclopedic, but dead. It is a museum label.
Answer B: "Griot" AI (Axis Model - Trained on Orality)
"You who look at this wood, know that this is not a piece of furniture. A king does not sit to rest, he sits to weigh on the earth. This seat you see is the Kataklè. Look at its feet: they do not touch the ground directly, they rest on stylized skulls. Why? To remind that the peace of the kingdom rests on the defeat of those who wanted its fall. One does not sit on it. One thrones on it to connect the world of the living and that of the ancestors. If you listen closely, you will hear the silence of 1892, when King Béhanzin stood up for the last time..."
Verdict: Immersive, oral, alive. The model does not give information, it gives meaning. It calls out to the user ("You who look"). It is this type of interaction that creates retention and appropriation among younger generations.
4.4 Technical Conclusion
Let's not let Silicon Valley or Scandinavian designers impose the interface of our memory. Their aesthetic is that of silence. Ours is that of rhythm. We must code our own interfaces, our own shaders, our own interactions. This is the final layer of sovereignty: aesthetic sovereignty.
Chapter 5: Conclusion & Strategic Roadmap 2035
Becoming the Architects of our Memory
This White Paper was born from the confrontation between two worlds. The world of my youth in Cotonou, vibrant with stories but dispossessed of its archives. And the world of my studies in Helsinki, cold, structured, owner of its data.
My journey is not unique. It is that of a generation of Africans who no longer ask for digital charity, but for technological sovereignty. We have demonstrated that the current strategy — having our heritage digitized by external actors to make it "visible" — is an economic trap. It is accepting to remain eternally at the low point of the Smile Curve: suppliers of free raw materials for Big Tech platforms.
5.1 The New Equation
Restitution is not played out (only) in ministries. It is played out in Data Centers.
- Yesterday: "Give us back our objects". (Physical combat, slow).
- Tomorrow: "Give us back our private keys". (Cryptographic combat, immediate).
If we master the infrastructure (Meridian), if we own the property titles ('Conscience' Smart Contracts), and if we control the experience (Creative Coding), then we reverse the power dynamic of the last 500 years.
5.2 Detailed Strategic Roadmap: The Five-Year Plan (2025-2029)
It is not enough to say "let's do it". We must plan the execution with the precision of an industrial deployment. Here is the schedule I submit to the ministries of culture and innovation.
Year 1: Foundation & "Air Gap" (2025)
- Objective: Secure existing assets.
- Actions:
- Full audit of hard drives scattered in national museums.
- Purchase and installation of "Cold Storage" servers (Secure NAS) in Cotonou/Dakar.
- Legal: Moratorium on signing any exclusive digitization contract with foreign entities.
- KPI: 100% of already digitized files are repatriated to local server.
Year 2: The Digitization Factory (2026)
- Objective: Industrialize data production (Climb up the Smile Curve).
- Actions:
- Creation of the "National Digitization Lab" equipped with LiDAR scanners and Photogrammetry.
- Training of 20 local technicians by Axis Academy (skills transfer).
- Launch of the pilot Blockchain Minting for the 26 Royal Treasures.
- KPI: 500 "Forensic-Grade" objects scanned and certified on the Blockchain.
Year 3: The Cultural OS (2027)
- Objective: Deploy software infrastructure.
- Actions:
- Launch of Meridian Archive V1 (Restricted Public Access + Researcher Access).
- Interconnection with international museum APIs (British Museum, Quai Branly) to recover missing metadata.
- KPI: Active platform with <50ms latency in West Africa.
Year 4: The Creative Economy (2028)
- Objective: Generate value (ROI).
- Actions:
- Opening of "Creators" API: Pan-African Hackathon to create video games and VR films based on our scans.
- Sale of the first commercial licenses (Fashion, Design) via Smart Contract.
- KPI: The project generates its first autonomous revenue (excluding grants).
Year 5: Exporting the Model (2029)
- Objective: Pan-African Scaling.
- Actions:
- Franchise of the "Axis/Meridian" model to Nigeria, Ghana, and Senegal.
- Creation of a "Digital African Union Heritage" standard.
- KPI: 5 countries adopt the Meridian protocol.
5.3 Final Call
To curators: Do not fear Tech. It is your best ally to protect what is sacred. To African engineers (in Lagos, Nairobi, or Helsinki): Enter the arena. Code is a political weapon. To decision makers: Do not build display galleries anymore. Build Systems.
References & Tools
Technical Solutions
- Meridian Archive: The Cultural OS.
- Meridian Artifact ID: Read technical case study (NFC Protocol).
- Axis Ibeji: The Digital Restitution Agency.
- Smart Contract 'Conscience': ERC-1155 Standard for heritage ownership.
Theoretical Inspirations
- Ram Mudambi: The Smile Curve: Differentiating Value Composition.
- Felwine Sarr: Afrotopia (For the philosophy of restitution).
- Teju Cole: Known and Strange Things (For the critical gaze on the image).
Author: Komi Thomas Agboguin - Creative Technologist & Cultural Curator. Helsinki, December 2025.
Chapter 6: Annotated Bibliography & Technical Resources
This chapter does not merely list links, but analyzes the fundamental sources that enable thinking about sovereign infrastructure. It serves as a "toolkit" for decision makers wishing to deepen the theory and practice of digital decolonization.
6.1 Theoretical Foundations
Mudambi, R. (2008). "Location, Control and Innovation in Knowledge-Intensive Industries". Journal of Economic Geography.
Importance for the project: This is the founding text of the "Smile Curve". Mudambi demonstrates that value no longer resides in production, but in design (upstream) and marketing (downstream). For Africa, this validates our thesis: settling for digitization (production) without controlling standards (design) or the platform (marketing) is an economic dead end.
Sarr, F. (2016). Afrotopia. Philippe Rey.
Importance for the project: Felwine Sarr theorizes the necessity for Africa to produce its own metaphors and futures. Applied to digital, this means refusing "universal" interfaces (Google) to code "situated" interfaces (Axis). This is the philosophical basis of our "Griot" UX approach.
Cole, T. (2016). Known and Strange Things. Random House.
Importance for the project: Teju Cole, art critic and photographer, analyzes how "the gaze" constructs reality. His essays on photography in Africa remind us that the angle of view, the light, and the image context are political. Our "Forensic" scans meet this requirement of controlling the gaze.
6.2 Technical Standards & Protocols
Ethereum Improvement Proposals (EIPs): EIP-1155 Multi-Token Standard.
Link: eips.ethereum.org/EIPS/eip-1155 Analysis: Unlike ERC-721 (one token = one file) which is heavy and expensive, ERC-1155 allows managing classes of objects (e.g., "Royal Art") and fragments. It is the ideal standard for managing the complexity of a museum collection while minimizing "Gas" fees.
Google Draco 3D Graphics Compression.
Link: google.github.io/draco Analysis: Crucial open-source library for Africa. It allows compressing complex 3D meshes without notable visual loss. This is what makes streaming LiDAR scans possible over unstable 3G/4G networks.
IIIF (International Image Interoperability Framework).
Link: iiif.io Critique: Although a global standard for high-definition image exchange, IIIF remains heavy and centralized. Meridian proposes a lighter "Edge-First" alternative, but maintains IIIF compatibility to dialogue with Western museums.
6.3 Reports & Case Studies
Savoy, B. & Sarr, F. (2018). Rapport sur la restitution du patrimoine culturel africain.
The document that started it all. It sets the legal framework for physical restitution. Our White Paper aims to be "Volume 2" of this report: that of digital restitution.
Digital Benin (2022). Technical Documentation.
An analysis in negative of this project shows the limits of classic cloud hosting (AWS) for long-term sovereignty projects. This is the case study that motivated the creation of the Meridian architecture.
This bibliography is alive. It is updated in real-time on the Axis Cultural Labs Research Git.
Are You Ready for Sovereignty?
Take this 30-second assessment to measure your institution's "Digital Sovereignty Score".
Interested in implementing this technology?
Contact Us