Skip to main content

Field Manual: How to Backup Global Civilization

Fieldmanual: Dual-Core Civilizational Backup Architecture

Fieldmanual: Dual-Core Civilizational Backup Architecture

Public Reconstruction Substrate + Separate Machine Training Substrate.

Offline-first Privacy Absolute Strict Infrastructure Separation
TL;DR
  • CC: Public, human-readable, ~2–4 TB.
  • LTC: Separate, machine-optimized, capped at ~10 TB (v0.5).
  • Rule 0: Never share distribution infrastructure.
  • Rule 1: Ship CC first.
  • Team: ~10 people, ~12 months, frozen scope.

Final Directives

  1. Ship Civilizational Core first.
  2. Enforce absolute privacy filtering in both layers.
  3. Maintain strict infrastructure separation between CC and LTC.
  4. Freeze scope for Version 1.0.

Mission

Build a decentralized, verifiable knowledge substrate capable of surviving institutional failure or systemic disruption.

Architectural Overview

Property CC LTC
Primary Goal Human reconstruction Statistical training
Legal Posture Publicly mirrorable Compartmentalized
Distribution Open torrents / public mirrors Separate infrastructure only

Civilizational Core (CC)

Scope (Version 1.0)

Scope Lock: CC v1.0 is capped at 2–4 TB. No expansion beyond defined domains.
  • Wikipedia (all languages)
  • Wiktionary
  • Open textbooks
  • arXiv snapshot
  • UN + EU corpus
  • Open technical standards

Distribution

  • Public torrent swarms
  • Public IPFS roots
  • Institutional mirrors
  • Physical rotation

LLM Training Core (LTC)

Scope (v0.5)

Scope Lock: LTC capped at ~10 TB for initial deployment. Domain balance target:
  • 60% STEM/technical
  • 30% legal/historical
  • 10% linguistic

Privacy Firewall

No emails, phone numbers, private correspondence, scraped forums, medical records, or non-public personal data.

Infrastructure Separation

CC and LTC must use:
  • Distinct torrent swarms (no shared trackers).
  • Separate IPFS roots.
  • Independent physical rotation schedules.
  • No cross-linking in manifests or documentation.

Non-Goals

  • No user accounts.
  • No cloud dependency.
  • No engagement metrics.
  • No monetization infrastructure.
  • No feature creep beyond defined scope.

Operational Feasibility

~10 disciplined contributors can deliver CC v1.0 within 12 months.

The primary risk is scope expansion, not compute or storage.

Comments

Popular posts from this blog

Field Manual: Epistemic Self-Defense with Large Language Models

Field Manual: Epistemic Self-Defense with Large Language Models Doctrine, Procedures, Constraints 0. Purpose This document defines the primary strategic use of locally operated large language models. Not content generation. Not companionship. Not automation of thought. Primary function: reduce the cost of verifying claims. Outcome: epistemic self-defense. 1. Core Premise Large language models are clerical cognition engines. They compress text, extract structure, reorganize information, and compare documents. They do not originate truth, exercise judgment, or determine correctness. They reduce labor. They do not replace thinking. 2. Historical Constraint Before cheap computation, reading large volumes was expensive, cross-checking sources was slow, and synthesis required staff. Institutions therefore held advantages: think tanks, policy offices, PR operations, lobbying groups, major media. Their edge was processing scale. They could read everything. Individuals could not. Trust in autho...

Field Manual: Minimal Federated Trust-Bound Social Infrastructure

Minimal Federated Trust-Bound Social Infrastructure (Ur-Protocol) Complete Specification and Field Manual v0.5 Part I: Specification 0. Scope Ur-Protocol defines a portable identity + small-group coordination substrate. It is not: a platform a company service a monolithic app a global social graph It is: a protocol that allows many independent servers and many independent clients to coordinate small human groups safely and cheaply The protocol guarantees: identity continuity social proof admission/recovery group ordering/consistency server replaceability client replaceability Everything else (UX, features, aesthetics) is out of scope. 0.1 Notational Conventions The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119. 0.5 Fo...

Sex Work Safety Protocol: A Ready-to-Implement Specification

Sex Work Safety Protocol: A Ready-to-Implement Specification Executive Summary This is a  complete, ready-to-build system  for sex worker collective safety. It provides pseudonymous reputation tracking, verification codes, and mathematical protection against retaliation—without becoming a marketplace or collecting identity data. 1. What You're Building 1.1 Core Purpose For sellers:  Screen buyers safely before meeting For buyers:  Build reputation through safe, reliable behavior For the collective:  Share safety intelligence without exposure 1.2 What It Is NOT ❌ A dating site or escort directory ❌ A booking platform ❌ A payment processor ❌ A social network ❌ An advertising platform It's  screening infrastructure only . 2. The Mathematical Core (Non-Negotiable) 2.1 How Reputation Works Each buyer has two scores calculated from seller ratings: Safety Score (S): text S = 25th percentile of all "Safe?" ratings (0-1) What's the worst 25% of this buyer's safety b...