This paper proceeds from an analysis of the very particular type of vulnerability concomitant with our ‘leaking' data on a daily basis, to show that data ownership is both unlikely and inadequate as an answer to the problems at stake. We also argue that the current construction of top-down...