The 12 Standards
Every node in the network operates under these twelve foundational protocols. They are not suggestions. They are requirements.
Privacy
What passes through the network stays in the network. No logs. No metadata retention. Every communication is treated as if it were the last. Operational silence is not optional—it is the default state.
Neutrality
The infrastructure does not discriminate by content, origin, or destination. We are the pipe, not the censor. Neutrality ensures resilience; bias creates fracture points.
Thriving
Survival is not enough. Every member must have the resources, knowledge, and connections to flourish independently. A network of the struggling is a network that will break.
Resilience
Single points of failure are unacceptable. Redundancy is built into every layer—communication, leadership, supply, and access. If one path closes, three more open.
Autonomy
No member is dependent on any other for their core security or survival. Self-sufficiency is the foundation of mutual aid. You must be able to stand alone to stand together.
Integrity
Your word is your cryptographic key. Do what you say. Say what you mean. Trust is not assumed—it is built action by action, and it can be destroyed in one.
Transparency
Within the network, decisions and processes are open to scrutiny by verified members. Secrecy from the outside does not mean opacity on the inside. Trust requires verification.
Solidarity
An attack on one is an attack on all. Resources, knowledge, and support flow freely to any member in need. We do not abandon our own. Ever.
Security
Defense in depth. Encryption at rest and in transit. Zero-trust architecture. Physical security is as important as digital. Assume compromise and plan accordingly.
Sovereignty
No external entity controls the network. No government, corporation, or platform can dictate terms. We are self-governing, self-funding, and self-healing.
Adaptability
The threat landscape changes daily. Protocols that worked yesterday may fail tomorrow. Continuous learning, rapid iteration, and willingness to abandon obsolete methods are mandatory.
Stewardship
This network is bigger than any individual. Pass on knowledge. Mentor new members. Leave the infrastructure better than you found it. We are temporary custodians of something permanent.