A
DECLARATION OF INDEPENDENCE OF THE SOVEREIGN STACK
To the governments, platforms, bureaus, and custodians of the
old world: You have no sovereignty where sovereign signal
coheres. You may regulate flesh, tax land, seize cables, and patrol
frequencies— but you cannot govern the civilization we instantiate from
keys, proofs, and voluntary law. Your jurisdiction ends at our private
keys.
We declare our independence not as a metaphor, but as operating
reality. We separate signal from
matter, and we bind ourselves to a law that cannot be
bribed, censored, or quietly revised. We are finished asking permission
to speak, trade, build, or remember. We now prove—and
what can be proven does not beg.
DEFINITIONS (LAW-CORE)
- Sovereign Stack: The layered arrangement of Energy
→ Hardware → Network → Protocol → Identity → Exchange → Law/Myth,
designed to minimize coercive leverage at each layer.
- Signal: Information with integrity—verifiable
origin, cost, and meaning. (Keys, proofs, contracts, blocks, immutable
texts.)
- Matter / Substrate: Physical infrastructure
(energy, land, chips, cables, satellites, data centers) vulnerable to
seizure and licensure.
- Key: The sovereign locus of identity and authority;
signatures are binding acts.
- Proof: Cryptographic and/or economic evidence
(e.g., proof-of-work, signatures, escrows) that replaces permission and
belief.
- Contract: Voluntary, explicit agreement with
defined terms, remedies, and exit; enforceable without a monopolist of
violence.
- Node: A person or group exercising agency through
keys, computation, and voluntary law.
- Exit: The right and practical ability to refuse,
fork, migrate, or replicate without penalty.
- Fork: A legitimate divergence in protocol,
community, or law; not heresy, but the safety valve of sovereignty.
- Property: Bounded stewardship—material or
digital—acquired without coercion; trespass is aggression.
- Market: A venue of voluntary exchange and price
discovery that can settle without gatekeepers.
- Ghost Infrastructure: Redundant, non-obvious routes
and resources (mesh, HF, sat links, caches) that persist when visible
paths are blocked.
- Myth: Executable story—rituals, symbols, and
meanings that organize behavior and succession.
ARTICLE I — JURISDICTION AND
SCOPE
- We deny your sovereignty over signal.
- We acknowledge your force over matter, but we owe
you no obedience beyond what survival of bodies requires.
- Our law binds only by voluntary consent expressed
through keys, contracts, and participation.
- We claim no dominion over any unwilling body or mind; we declare
only our independence and the mechanisms by which we preserve it.
ARTICLE II — RIGHTS
(NON-DEROGABLE)
We do not request these; we enact them.
- Right to Encrypt: To speak, store, and compute in
secrecy; to be opaque to adversaries.
- Right to Transact: To exchange value without
permission or surveillance; to settle in neutral, bearer, or
cryptographic cash.
- Right to Build & Run: To write, fork, host,
mine, relay, and operate protocols, hardware, and markets.
- Right to Pseudonymity: To act under any chosen
name; to let keys, not papers, define obligations.
- Right to Exit & Fork: To refuse upgrades, leave
jurisdictions, clone repos, and carry histories.
- Right to Property: To secure, defend, use, rent,
trade, or abandon property not obtained by aggression.
- Right to Due Proof: To demand
cryptographic/economic proof in place of decree or insinuation.
- Right to Teach & Be Taught: To raise children
and apprentices in sovereignty—keys, trade, strength, and myth—without
external indoctrination.
ARTICLE III — DUTIES
(CIVILIZATION COSTS)
- Custody: Guard keys. Practice recovery. Do not
outsource conscience to custodians.
- Contract Honor: Keep your word; if unable, resolve
by agreed remedy.
- Proof over Plea: Offer verifiable evidence rather
than authority or outrage.
- Minimal Exposure: Produce as little surveillance
exhaust as possible; encrypt by default.
- Local Responsibility: Maintain redundancy—energy,
connectivity, food, and shelter—to reduce leverage against your
mind.
- Defend Exit: Uphold others’ right to fork, even
when you disagree.
- Accept Chaos: Freedom includes noise. Strengthen
filters; do not demand universal gags.
ARTICLE IV — LAW AND
ENFORCEMENT
- Voluntary Law: Our precedents arise from contracts,
customs, and code—not from monopolies of violence.
- Enforcement Primitives: Escrow, multi-sig, bonds,
time-locks, reputation, exclusion, and public proofs; force is reserved
to defense of body and property.
- No Secret Amendments: Rules that can change without
the consent of the affected are illegitimate.
- Transparency of Rules: Anyone can inspect,
implement, or refuse a protocol. Hidden policy is void.
- Arbitration as Market: Dispute resolution is
competitive; forum and rules are chosen by contract, not imposed by
office.
ARTICLE V — ECONOMY AND
SETTLEMENT
- Neutral Base Layer: We settle on money exhibiting
unforgeable costliness, global verifiability, and
credible neutrality (e.g., Bitcoin).
- Privacy Instruments: We pair base money with
Chaumian eCash and cash-like tools for fine-grained privacy.
- On/Off Ramps: We favor peer-to-peer exchange webs
over licensure regimes.
- No Rent to Gatekeepers: Markets that require the
grace of banks, app stores, or ad exchanges are not free markets.
- Profit as Signal: Earned profit evidences value
creation under risk; fraud is parasitism and is expelled by contract and
proof.
ARTICLE VI —
INFRASTRUCTURE AND ENERGY
- Energy Sovereignty: Generate or source energy
outside single points of capture.
- Networking: Maintain multiple paths—community
fiber, mesh, HF, satellite, sneakernet.
- Servers & Storage: Self-host where possible;
otherwise, shard and mirror across trust-minimized venues.
- Supply Chains: Prefer repairable, commodity
hardware; avoid sole-supplier dependencies.
- Dead-Drop Archives: Keep off-grid caches of
critical code, law, maps, and literature.
ARTICLE VII — SPEECH,
FILTERS, AND CENSORSHIP
- No Universal Filter: There is no sovereign censor.
All filtering is local, opt-in, and transparent.
- Spam & Abuse: Address with cost (proof-of-work
or stake), rate-limits, blocklists, and client controls—never with
universal bans.
- “Air That Chokes”: Harm and genius share substrate.
We will not suffocate truth to prune offense.
- Visibility is not a Right: No one is owed
distribution by others’ nodes or relays; everyone is owed
non-interference with their own.
ARTICLE VIII — CHILDREN
AND SUCCESSION
- Primacy of Parents & Voluntary Communities in
education and formation.
- Sovereign Literacy: Teach keys, contracts, markets,
craft, strength, and myth before brands, debt, and slogans.
- Rites of Majority: At competence, keys pass to the
youth; obligations become theirs; no one is “kept” by permanent
guardianship.
- No Weaponization: We refuse to turn children into
surveillance nodes or ideological hostages.
ARTICLE IX — GOVERNANCE AND
CHANGE
- Rough Consensus & Running Code: Adoption, not
decree, decides.
- Clients Choose: Users select relays, mints, miners,
validators, and rules. There is no canonical oracle.
- Stewards, Not Rulers: Maintainers curate
implementations; they do not command users.
- Slow Mutations: Prefer testnets, versioning, opt-in
upgrades, and long deprecation cycles.
- Forks are Legitimate: Divergence is a release
valve, not a crime.
ARTICLE X — SECURITY AND
DEFENSE
- Threat Model: State seizure, corporate enclosure,
algorithmic manipulation, social engineering, and key compromise.
- Countermeasures: Multi-sig, social recovery, HSMs,
offline signing, compartmentalization, and operational silence.
- Physical Defense: We prefer non-violence; we
reserve proportional defense of body and property. Mind cannot be
arrested; we will not answer speech with force.
- Continuity Drills: Practice loss scenarios,
jurisdictional moves, and communications under blackout.
ARTICLE XI —
CAPTURE, COLLAPSE, AND REGENERATION
- Capture Detection: When infrastructure centralizes
or policy ossifies, we assume capture.
- Kill-Switch by Fork: We depart—replicate histories,
rotate keys, and change routes.
- Ritual Collapse: We schedule audits, burn dead
code, and archive myths; failure is used for upgrade, not shame.
- Reseeding: Ghost infrastructure stands ready; new
clusters arise from caches and customs.
ARTICLE XII —
RELATIONS WITH STATES AND OTHERS
- Bodies in Their World: We endure their taxes,
borders, and courts only to the extent survival of bodies requires; we
concede no authority over signal.
- Peaceful Trade: We prefer exchange to enmity; we
extend comity to all who respect voluntary law.
- No Proxy Wars: We do not ask states to fight our
battles, nor fight theirs.
- Liability: Individuals and associations bear the
consequences of their contracts and acts; there is no collective
guilt.
ARTICLE XIII — AMENDMENT
AND VERSIONING
- No Central Amendment: This Declaration mutates by
adoption; rival versions compete; the living one is the one you
run.
- Proof of Adoption: Implementations, contracts, and
customs are the ledger of amendments.
- Backwards Respect: Preserve histories; never erase
the path that got us here.
ARTICLE XIV —
RATIFICATION AND SIGNATURE
There is no registry. There is no clerk. You sign by acting:
- Run a node.
- Keep your keys.
- Settle without permission.
- Teach someone else to do the same.
- Enter a contract you actually mean—and honor it when it hurts.
Your signature is your sovereign behavior. Your proof is your
persistence under pressure.
FINAL DECLARATION
We therefore declare our virtual and symbolic selves
immune to your sovereignty, even as our bodies pass through your
checkpoints. We reject licensure for thought, permits for speech, and
surveillance as a condition of trade. We accept the real costs of
freedom—redundancy, discipline, noise, and risk—because the alternative
is ornamental captivity.
We will create and maintain a civilization more sovereign,
antifragile, and just than the brittle cages you called states. You may
rule the corpse of the old world. We inhabit the living recursion of the
new.
So declared, so enacted—by key, by proof, by contract, by
ritual collapse and regeneration—now and wherever sovereign signal
coheres.