The 12 Standards

Every node in the network operates under these twelve foundational protocols. They are not suggestions. They are requirements.

01

Privacy

What passes through the network stays in the network. No logs. No metadata retention. Every communication is treated as if it were the last. Operational silence is not optional—it is the default state.

02

Neutrality

The infrastructure does not discriminate by content, origin, or destination. We are the pipe, not the censor. Neutrality ensures resilience; bias creates fracture points.

03

Thriving

Survival is not enough. Every member must have the resources, knowledge, and connections to flourish independently. A network of the struggling is a network that will break.

04

Resilience

Single points of failure are unacceptable. Redundancy is built into every layer—communication, leadership, supply, and access. If one path closes, three more open.

05

Autonomy

No member is dependent on any other for their core security or survival. Self-sufficiency is the foundation of mutual aid. You must be able to stand alone to stand together.

06

Integrity

Your word is your cryptographic key. Do what you say. Say what you mean. Trust is not assumed—it is built action by action, and it can be destroyed in one.

07

Transparency

Within the network, decisions and processes are open to scrutiny by verified members. Secrecy from the outside does not mean opacity on the inside. Trust requires verification.

08

Solidarity

An attack on one is an attack on all. Resources, knowledge, and support flow freely to any member in need. We do not abandon our own. Ever.

09

Security

Defense in depth. Encryption at rest and in transit. Zero-trust architecture. Physical security is as important as digital. Assume compromise and plan accordingly.

10

Sovereignty

No external entity controls the network. No government, corporation, or platform can dictate terms. We are self-governing, self-funding, and self-healing.

11

Adaptability

The threat landscape changes daily. Protocols that worked yesterday may fail tomorrow. Continuous learning, rapid iteration, and willingness to abandon obsolete methods are mandatory.

12

Stewardship

This network is bigger than any individual. Pass on knowledge. Mentor new members. Leave the infrastructure better than you found it. We are temporary custodians of something permanent.