Jump to content
Toggle sidebar
Logos
Search
Create account
Log in
Personal tools
Create account
Log in
Pages for logged out editors
learn more
Contributions
Talk
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Tools
What links here
Related changes
Special pages
Page information
Editing
Design
Page
Discussion
English
Read
Edit
View history
More
Read
Edit
View history
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
= The Logos Design = <span id="logos-vision-and-scope"></span> = Vision and Scope Document = for Logos: A Sovereign Decentralized Technology Stack Prepared by Jarrad Hope, 24-12-2024 <span id="business-requirements"></span> = 1. Requirements = <span id="background"></span> == 1.1 Background == <blockquote> "Everytime we witness an act that we feel to be unjust and do not act we become a party to injustice. Those who are repeatedly passive in the face of injustice soon find their character corroded into servility." <br>β Julian Assange </blockquote> The advent of computer networking and the creation of the internet established a new kind of geography - cyberspace. This digital global multi-domain operational construct, this βgeographyβ has become subject to increasing territorialization and claims of sovereignty, particularly by nation-states. The United States military has formally recognized cyberspace as a fifth domain of conflict alongside land, sea, air, and space. According to the US Military, Cyberspace consists of three distinct layers: # Physical Network Layer: The tangible infrastructure including computers, servers, cables, and physical network components that form the medium where data travels # Logical Network Layer: The abstract relationships between network elements, independent of specific physical paths or nodes # Cyber-Persona Layer: Digital representations of individuals or entities, which may relate to real people or be artificial, with the possibility of multiple personas per individual. Like the historical emergence of piracy at sea, weβve seen the rise of βpirate organizationsβ operating in the uncharted territories of cyberspace. These organizations, as defined by Durand and Vergne, are not mere criminals but organized actors that: * Challenge state control and norms of exchange in new territories * Operate from bases outside state control * Develop alternative norms of social interaction * Push the boundaries of known economic behavior and expand Capitalism Early peer-to-peer file-sharing networks exemplified this pattern, challenging state sovereignty over cyberspace by enabling ungovernable information exchange. Following historical patterns, many of these services were later co-opted as βcorsair organizationsβ - legitimate corporate alternatives operating with state approval (like Spotify replacing Napster). However, the underlying technology demonstrated the potential for autonomous digital territories, cypherspaces, within Cyberspace. This territorialization of cyberspace intensified post-9/11, as the United States established what effectively became a virtual state through the convergence of cloud infrastructure and legal frameworks. The cloud, acting as an informational equivalent to container terminals, enabled a higher degree of standardization and centralization than the early internet. Through the Patriot Act, the US gained jurisdiction over all data stored by US companies (or their subsidiaries) in non-US data centers, including the entire US cloud - Facebook, Apple, Twitter, Dropbox, Google, Amazon, Microsoft, and others. This βsuper-jurisdictionβ meant that US law could be extended into and enacted in other nations through various forms of cooperation implied by server locations and network connections. Through initiatives like National Security Letters (NSLs), which can be issued directly by the FBI without judicial review, and by requiring global data centers to comply with surveillance demands and KYC/AML regulations, the US has effectively undermined the Westphalian sovereignty of other nations. This infrastructure of control coincided with the rise of surveillance capitalism, now evolving into PsyOp capitalism - a system of complete economic capture fused with propaganda for shaping public opinion. The cloudβs centralized architecture, combined with informal relationships between private enterprise and government, has created a system where censorship and control can be enacted without explicit orders or legal justification, through shared interests and informal ties rather than strict separations by law. This two and a half decade trend continues with the repeal of Net Neutrality laws, and with Central Bank Digital Currencies (CBDCs) on the horizon - developments that threaten to complete the stateβs capture of economic transactions by bringing all financial activity under centralized surveillance and control. The concept of virtual states operating within and across traditional state boundaries is not mere speculation - it has historical precedent in institutions like the Jewish Kehillas and Qahals. These autonomous governance structures allowed the Jewish diaspora to maintain their own legal, economic, and social systems while dispersed across multiple host nations. They demonstrated how parallel institutions could provide essential services and maintain cultural cohesion without territorial sovereignty, offering a practical model for modern virtual states. <blockquote> "There are only two types of power: there's organized people and organized money, and organized money only wins when people aren't organized." <br>β Saul Alinksy / Benjamin Todd Jealous </blockquote> Civil society has attempted various forms of resistance: mass protest movements (Occupy Wall Street), whistleblowing to expose surveillance (Edward Snowden), elite graph partitioning attacks through information disclosure (WikiLeaks), and collective financial attacks by Activist Retail Investors against Wall Street (WallStreetBets). However, these efforts have failed to create meaningful change, demonstrating that traditional methods of resistance and reform are insufficient against modern state power. The solution for Civil Society may lie in the strategy of parallel organizing, successfully demonstrated during Eastern Europeβs transition from communism. Rather than working within rigged systems, movements like Hungaryβs Civic Circles and Czechoslovakiaβs Charter 77 built parallel institutions outside official structures. They created independent societies within existing states, operating according to their own principles and earning legitimacy by actually improving peopleβs everyday lives. However, while these historical parallel organizing efforts were local to their nations, todayβs challenges are transnational in nature. The cypherpunk movement demonstrated how this approach could be globalized through technological means. Like the peaceful revolutions in Eastern Europe, cypherpunks created parallel institutions that allowed people to opt out of poor governance. Bitcoin exemplified this by establishing a new transparent, auditable monetary system with clearly defined rules based on decentralized authority. The technology spread worldwide, gaining adoption particularly in Latin America where official financial institutions were unstable and inflation rampant. <blockquote> "Arise, you have nothing to lose but your barbed wire fences!" <br>β Timothy C. May </blockquote> The cypherpunk movement recognized early on that technological solutions, rather than political reform, were necessary to preserve civil liberties in cyberspace. Projects like Tor, I2P, and Freenet created anonymous communication networks resistant to state surveillance, establishing βwildernessβ territories in cyberspace. While these solutions demonstrated the potential for parallel digital institutions, they remain either too narrow in scope or vulnerable to censorship and control due to their public nature and exposed network operators. The key insight that enabled digital parliamentary sovereignty is best illustrated in Leslie Lamportβs description of The Part-time Parliament of Paxos. Through a fictional account of an ancient Greek parliament, Lamport described a system where legislators could wander in and out of the Chamber while still maintaining consistent records of decrees through a rigorous consensus protocol. Each legislator maintained their own ledger of numbered decrees, and through careful mathematical rules, the parliament could continue functioning and making decisions even with unreliable communication and intermittent participation. This parliamentary model provided the theoretical foundation for blockchain consensus. Bitcoin and subsequent blockchain systems effectively implement this βLamportian Parliamentβ - a decentralized decision-making process that maintains order through algorithmic consensus rather than central authority. Like the Paxon legislators with their indelible ledgers, blockchain nodes maintain a near-immutable record of transactions agreed upon by the network. By combining the βwildernessβ of anonymous communication networks with this ordered parliamentary system, we can create autonomous territories in cyberspace with their own internal governance structures. The blockchain provides the sovereign order - a boundary within which rules can be defined and enforced through consensus rather than coercion. This sovereign foundation enabled the next evolution in digital institutions through Nick Szaboβs concept of Smart Contracts. By implementing a virtual machine that could execute arbitrary code, platforms like Ethereum allowed counterparties to create and enforce agreements without relying on traditional legal systems. These programmable contracts formed the basis for establishing parallel institutions - from financial services to governance systems - built on decentralized consensus rather than state authority. <blockquote> "When cryptography is outlawed, bayl bhgynjf jvyy unir cevinpl." <br>β John Perry Barlow </blockquote> However, these first-generation systems proved vulnerable to state power in unexpected ways. While their internal consensus remained secure, the public nature of their networks made them susceptible to new forms of lawfare. Transaction censorship through sanctions and regulatory pressure on network operators effectively undermined their parliamentary sovereignty. The immutable ledger, meant to provide transparency and accountability, becomes a tool for surveillance and control. There is now a clear need for a comprehensive, privacy-preserving technology stack that can support a wide range of decentralized applications and services - a βcypher-stateβ or βvirtual stateβ that operates autonomously in cyberspace. More than just technology, this represents an experiment in competitive governance, where legitimacy is earned through providing real value rather than maintained through coercion. By combining minimal information disclosure, Byzantine fault tolerance, and self-organizing networks with smart contract-based institutions, we can create a parallel socio-economic system that extends civil liberties to anyone, anywhere on the planet. To succeed, this system must address sovereign claims over each aspect of Cyberspace: * Physical Network Layer: Resilient infrastructure that survives network loss and censorship * Logical Network Layer: Self-organizing protocols that maintain order through consensus * Cyber-Persona Layer: Privacy-preserving identities with low-cost exit options <blockquote> "We will create a civilization of the Mind in Cyberspace. May it be more humane and fair than the world your governments have made before." <br>- John Perry Barlow </blockquote> The goal is not to create another centralized service provider, but rather a foundational order for βGovernance as a Serviceβ - where the system is capable of provisioning governing services to under-serviced citizens. Institutions compete based on the real value they provide to users. Through express consent manifested in voluntary transactions, these services can evolve to meet user needs while remaining resistant to capture and corruption. While our focus is in the provisioning of governing services to Civil Society, such a disinterested, disintermediated medium is equally, or even more applicable on the world stage - agreements between nations. It could serve as infrastructure for the United Nations and both secure and hold accountable to agreements between state and non-state actors while benefiting from the security of all nation-states, and even provide a world reserve currency <span id="business-opportunity"></span> == 1.2 Opportunity == Logos represents an opportunity to create a new kind of sovereign digital infrastructure that enables parallel trans-national society on a inter-planetary scale: # A maximally privacy-preserving network that operates against hostile adversaries # An impartial medium for information exchange that secures civil liberties (Freedom of association, Freedom of expression, Right to privacy) # Competitive governance services that earn legitimacy by actually improving peopleβs everyday lives # A foundation for new forms of social and economic organization in cyberspace The project addresses growing demands for: * Resistance to mass surveillance and economic capture * Censorship-resistant communication and storage solutions * Autonomous digital institutions with low exit costs * Systems based on express consent rather than coercion * Privacy-preserving financial services and marketplaces * Stable, corruption-resistant institutions that serve real needs * Community-driven governance with genuine popular legitimacy <span id="business-objectives-and-success-criteria"></span> == 1.3 Objectives and Success Criteria == Primary Objectives: # Create a maximally privacy-preserving decentralized technology stack # Enable the development of censorship-resistant applications and services # Foster an open-source community around the project # Establish a global network of users and developers # Demonstrate viable alternatives to centralized digital services Success Criteria: Physical Network Layer: * Network-level anonymity achieved for all participants * Demonstrated ability to bypass national firewalls * Resilient peer-to-peer infrastructure Logical Network Layer: * Successful deployment of core services (storage, communication, computation) * Growing ecosystem of applications built on the platform * Demonstrated resistance to censorship and surveillance * Stable, corruption-resistant institutions in operation Cyber-Persona Layer: * Unique Identity & Culture - the Logosian Netizen * Active community of developers and users * Genuine popular legitimacy through real-world value delivery * Demonstrated ability for users to opt out of poor governance * Community-driven parallel organizing initiatives <span id="customer-or-market-needs"></span> == 1.4 Customer or Market Needs == Table 1: Summary of Project Objectives and Customer Needs {| class="wikitable" |- ! Customer Needs ! Project Objectives |- | Network Privacy | Implement network-level anonymity and mixnet routing |- | Data Privacy | Enable private data storage and retrieval |- | Identity Privacy | Provide privacy-preserving account management |- | Censorship Resistance | Create impartial medium for information exchange |- | Economic Freedom | Support private transactions and financial services |- | Community Governance | Enable creation of autonomous digital institutions |- | Real-World Impact | Deliver tangible improvements to usersβ everyday lives |} <span id="vision-of-the-solution"></span> = 2. Vision of the Solution = <span id="vision-statement"></span> == 2.1 Vision Statement == Logos is a sovereign decentralized technology stack that realizes the latent cypherpunk vision of autonomous digital territories, what has been referred to as a Temporary Autonomous Zone, a Virtual State, a Meta-haven, a Cyberstate, or more recently a Network State. While traditional cypherspaces like Tor and I2P created βwildernessβ through anonymous communication networks, Logos adds an internal pluraity of orders through privacy-preserving blockchain consensus. This combination establishes a new kind of territory in cyberspace - a supra-jurisdictional βcypher-stateβ that can deploy stable, corruption-resistant institutions to anyone with internet access. The systemβs technical foundation is a hybrid microkernel-microservices architecture that initiallity combines three existing core protocols: * Waku: Anonymous communication networks for state-adversary resistant messaging * Codex: Decentralized storage for coercsion resistant, persistent data, filesharing and application distribution * Nomos: Privacy-preserving blockchain for sovereign order and governance Applications communicate using self-describing RDF-star data formats, enabling nodes to dynamically discover and load modules while maintaining privacy. This plugin-based architecture allows the network to evolve and adapt, creating an impartial medium for agreements between parties - from individuals to civil society organizations to nation-states. The stack derives legitimacy through three key principles that improve upon traditional liberal democratic systems: # Express consent through voluntary transactions, rather than implied consent through citizenship # Low exit costs through non-participation, forking and modularity, rather than high costs of physical migration # Real value delivery required for existence, rather than coercive taxation and monopoly services This architecture enables competitive governance where institutions must earn support by actually improving peopleβs lives. By combining maximal privacy preservation with runtime composability, it provides a foundation for parallel institutions that remain resistant to capture and corruption - whether deployed bottom-up by civil society or top-down between state actors. <span id="major-features"></span> == 2.2 Major Features == === Core Framework === # Microkernel Core - Plugin-based modular architecture for runtime evolution ## Self-bootstrapping system using core modules ## Adaptable to different hardware capabilities ## Protection against political capture through runtime composability # Network Modules ## libp2p-mix for network-level anonymity ## Multiple network topologies (small-world, semantic, isotonic) ## NAT traversal and connection management ## Anonymous DHT for coercion-resistant discovery # Security Modules ## Account management ## Authentication protocols for trust minimization ## Access control for selective disclosure ## Privacy protection against surveillance === Core Service Modules === # Nomos: Privacy-preserving Blockchain ## Heterogeneous multi-chain network for pluralistic orders ## Native cross-chain communication for interoperability ## Private transactions and staking for economic autonomy # Codex: Privacy-preserving Decentralized Storage ## Coercion-resistant data persistence ## Fast content delivery for application distribution ## Privacy-preserving queries and retrieval ## Incentivized bandwidth sharing # Waku: Privacy-preserving Communication Layer ## End-to-end encrypted messaging ## Pub/sub for real-time coordination ## Anonymous routing against censorship ## State-adversary resistant messaging # Light Client Modules ## Resource-optimized implementations ## Mobile and browser adaptations ## Selective protocol participation ## Hardware-specific optimizations # P2P Data Management Module ## Alternative to centralized APIs (Such as JSON-RPC Blockchain endpoints) through semantic queries ## RDF-star for self-describing application data and protocols ## Dynamic module discovery and composition ## Cross-chain data access through RML adapters ## Semantic search and discovery ## Query caching and optimization # Module Registry ## Decentralized package management ## Secure module distribution ## Runtime dependency resolution ## Version control and updates # Status: User Interface ## Mini βoperating systemβ / shell / window manager / browser ## Account management ## Dynamic module loading for extensibility ## Window/notification management ## Search and filtering for discovery === Downstream Applications === # Financial Services ## Sound Money ### Privacy-preserving cryptocurrency ### Stable store of value ### Inflation resistance ## Market Infrastructure ### Automated market makers ### Order book exchanges ### Liquidity pools ### Yield protocols ## Economic Tools ### Crypto-fiat bridges ### Cross-chain swaps ### Payment channels # Legal Infrastructure ## Auto-centric Law ### Voluntary jurisdiction selection ### Algorithmic dispute resolution ### Reputation-based enforcement ## Polycentric Legal Systems ### Multiple competing frameworks ### Cross-jurisdiction coordination ### Emergent common law # Smart Contract Infrastructure ## Automated agreement execution ## Multi-party arbitration ## Evidence preservation # Organizational Tools ## On-chain Entities ### DAOs and Companies ### Trusts and Foundations ### Multi-signature accounts # Governance Systems ## Participatory decision making ### Resource allocation ### Incentive alignment ## Coordination Tools ### Reputation systems ### Contribution tracking ### Dispute resolution # Market Infrastructure ## Automated service markets ## Transportation (rideshare, delivery) ## Housing and accommodation ## Labor and freelancing ## Resource sharing # Decentralized commerce ## P2P marketplaces ## Supply chain tracking ## Reputation systems ## Payment networks <span id="assumptions-and-dependencies"></span> == 2.3 Assumptions and Dependencies == Assumptions: - Continued availability of internet infrastructure - Existence of sufficient decentralized network participants - Ongoing development of privacy-preserving cryptographic techniques - Growing demand for privacy-preserving alternatives Dependencies: - libp2p networking stack - Cryptographic primitives and protocols <span id="scope-and-limitations"></span> = 3. Scope and Limitations = <span id="scope-of-initial-release"></span> == 3.1 Scope of Initial Release == The initial release focuses on integrating existing components that were historically developed as separate projects: # Core Infrastructure #* Microkernel implementation for plugin (module) management #* Basic module system for runtime composition #* Self-bootstrapping using core modules #* Integration layer for existing components # Core Services (as monolithic modules) #* Waku: Privacy-preserving communication protocol #* Codex: Decentralized storage and file sharing #* Nomos: Multi-chain privacy blockchain <span id="scope-of-subsequent-releases"></span> == 3.2 Scope of Subsequent Releases == Future releases will focus on refactoring aspects of the monolithic components into microservices: # Protocol Evolution #* Break down Waku into modular communication services #* Refactor Codex into composable storage layers #* Split Nomos into specialized consensus modules #* Extract common functionality into shared services # Core Services #* PDMS: Data management and querying #* Module Registry: Package management # User Interface #* Rewrite the Status application back to its original vision as a mini operating system #* Basic module loading and management #* Essential privacy features and controls #* Minimal viable interface # Framework Improvements #* Enhanced plugin system with dynamic loading #* Improved module dependency management #* Extended network topology options #* Advanced security and privacy features # Application Support #* SDK for application development #* Documentation and examples #* Testing frameworks #* Development tools <span id="limitations-and-exclusions"></span> == 3.3 Limitations and Exclusions == Technical Limitations: * Performance overhead from privacy-preserving features * Dependency on underlying internet infrastructure * Resource requirements for full node operation * Network effects needed for system resilience * Latency from anonymity and encryption Integration Limitations: * No direct integration with legacy systems * Limited interoperability with centralized services * Trade-offs between privacy and performance * Complexity of system design Social Limitations: * Learning curve for users and developers * Need for community adoption and participation * Challenge of building parallel institutions * Coordination overhead in decentralized governance Exclusions: * Traditional centralized services and APIs, except through modules * Real-time applications requiring low latency * Services requiring trusted third parties, except through modules * Applications incompatible with privacy requirements * Features that compromise sovereign autonomy <span id="business-context"></span> = 4. Business Context = <span id="stakeholder-profiles"></span> == 4.1 Stakeholder Profiles == Table 2: Stakeholder Profiles {| class="wikitable" |- ! Stakeholder ! Major Value ! Attitudes ! Major Interests ! Constraints |- | Dissidents & Activists | Personal liberty | Protective | Censorship resistance | Physical security |- | Journalists | Press freedom | Investigative | Secure communications | Source protection |- | High Net Worth Individuals | Financial privacy | Cautious | Economic autonomy | Regulatory compliance |- | Civil Society Members | Community building | Supportive | Alternative institutions | Learning curve |- | Marginalized Groups | Group autonomy | Collaborative | Self-governance | Resource access |- | Developers | Technical innovation | Experimental | Building applications | Development skills |- | Node Operators | Infrastructure | Technical | Network resilience | Resource costs |- | Community Organizers | Parallel organizing | Engaged | Local chapter building | Time commitment |- | Service Providers | Value delivery | Entrepreneurial | Real-world solutions | Market adoption |} <span id="project-priorities"></span> == 4.2 Project Priorities == The following priorities are listed in order of importance, with higher priorities taking precedence over lower ones when trade-offs are necessary: # Free Software Implementation #* Essential freedoms preserved #* Source code transparency #* Community auditability # Minimal Information Disclosure #* User control over data sharing #* Selective disclosure mechanisms #* Privacy by default # Byzantine Fault Tolerance #* Decentralized operation #* Survival under hostile conditions #* Graceful security degradation # Explicit Trust Relationships #* Clear security boundaries #* Trust minimization #* Transparent dependencies # Compartmentalization #* Isolation of sensitive data #* Modular security domains #* Failure containment # Network Openness #* Permissionless participation #* Protocol extensibility #* Interoperability standards # Self-Organization #* No central administration #* Autonomous operation #* Emergent coordination # Application Diversity #* Multiple use cases #* Protocol flexibility #* Hardware adaptability # System Scalability #* Resource efficiency #* Performance optimization #* Cost-effectiveness # Contribution Incentives #* Resource sharing rewards #* Network effects #* Economic sustainability <span id="operating-environment"></span> == 4.3 Operating Environment == Network Environment: * Hostile state-level adversaries with surveillance capabilities * National firewalls and censorship infrastructure * Varying network conditions and connectivity * Diverse hardware platforms (servers, desktops, mobile devices) Institutional Environment: * Competing sovereign claims over cyberspace * Informal relationships between states and cloud providers * Extra-legal enforcement through private companies * Increasing economic capture through CBDCs and Global Financial Integration initiatives * Transnational nature of modern challenges Social Environment: * Need for genuine popular legitimacy * Importance of real-world value delivery * Community-driven parallel organizing * Cultural and linguistic diversity * Varying levels of technical literacy Security Environment: * State-level surveillance and monitoring * Legal and extra-legal censorship attempts * Network-level attacks and interference * Infrastructure vulnerabilities * Identity and privacy risks = 5. References = == 5.1 Concepts & Issues == * [[Cyberspace as Reality]] * [[Territorialization of Cyberspace]] <!-- Corsairs vs Cypherpunks --> * [[Surveillance]] <!-- Economic --> * [[Virtual States & Supra-jurisdictions]] * [[Neomedievalism]] <!-- WEF, post-westphalia --> * [[Voice of Civil Society]] <!-- Occupy, Bitcoin, Gamestop, Civic Participation --> * [[Legitimacy & Competitive Governance]] * [[Polycentric & Autocentric Law]] * [[Sound Money]] <!-- Debt Slavery / Usury --> * [[World Reserve Currency & Agreements between (Non-)State Actors]] == 5.2 Personas == This analysis creates 11 meta-personas out of 187 subreddit communities. The analysis was created by traversing related subreddits from an initial core identified by Jarrad Hope, this process generated 393 candidate subreddits, from there the subreddit sidebar information and top 200 all time posts were scraped, along with all the respective comments. Posts and comments were filtered to contain more than 1 upvote, resulting in 187 subreddits with more than 90KB of data each. This data was aggregated for each subreddit and psychometric questions were asked to GPT-4o on the data, generating personas for each subreddit community. The resulting 187 personas were then clustered using BERTopic with [https://huggingface.co/dunzhang/stella_en_400M_v5 dunzhang/stella_en_400M_v5], chosen from the [https://huggingface.co/spaces/mteb/leaderboard MTEB leaderboard] for being an open sentence transformer, sub-1billion parameter model with highest Clustering Benchmark score and large embedding dimensions and max tokens. This snapshot was taken at 2025-01-11 Ordered by raw subscriber counts, the topic hierarchy was then manually split at the following branch points: * 75 [[Personas/The Crypto Enthusiasts|The Crypto Enthusiasts]], 29.9M * 67 [[Personas/The Meme-Driven Financial Revolutionaries|The Meme-Driven Financial Revolutionaries]], 27.5M * 81 [[Personas/The Eco-Resilient Visionaries|The Eco-Resilient Visionaries]], 24.1M * 74 [[Personas/The Cybersecurity Altruists|The Cybersecurity Altruists]], 4.7M * 79 [[Personas/The Digital Freedom Seekers|The Digital Freedom Seekers]], 4.1M * 88 [[Personas/The Privacy-Focused Technologists|The Privacy-Focused Technologists]], 4M * 85 [[Personas/The Truth Seekers|The Truth Seekers]], 3.9M * 84 [[Personas/The Digital Preservationists and Data Custodians|The Digital Preservationists and Data Custodians]], 2M * 82 [[Personas/The Guardians of Liberty|The Guardians of Liberty]], 1.8M * 69 [[Personas/The Blockchain Innovators and Decentralization Advocates|The Blockchain Innovators and Decentralization Advocates]], 1.2M * 13 [[Personas/The Crypto Miners|The Crypto Miners]], 293K In addition to these personas, I manually created: * 0 [[Personas/The Developers of Freedom|The Developers of Freedom]], 277K The topic clusters were then summarised by GPT-4o to create meta-personas and the subscriber counts were added to estimate the total addressable market for each meta-persona. Ideally clustering happened directly on the raw data, but already the raw data had to be truncated and prioritized by upvotes for persona creation, due to models current maximum context length (128,000 tokens) Since this is a non-deterministic process, these meta-personas are subject to change. Based on subreddit subscribers the Estimated Total Addressable Market:<br /> Conservative (90% overlap): 10.4M<br /> Moderate (30% overlap): 72.5M<br /> Optimistic (10% overlap): 93.2M<br /> === 5.2.1 Topic Tree === This Topic Tree shows the conceptual relationship between the meta-personas. [94] members_privacy_discussions_include_individuals (187 communities) ββ [89] financial_market_blockchain_crypto_potential (42 communities) β ββ '''[67] meme_humor_memes_creativity_content (6 communities)''' β β ββ [34] meme_humor_memes_creativity_content (2 communities) β β ββ [35] dogecoin_humor_meme_market_coins (4 communities) β ββ [83] financial_blockchain_market_crypto_potential (36 communities) β ββ [78] financial_market_crypto_mining_cryptocurrency (25 communities) β β ββ '''[13] mining_hardware_profitability_cryptocurrency_operations (3 communities)''' β β ββ '''[75] financial_crypto_market_investment_cryptocurrencies (22 communities)''' β β ββ [63] crypto_market_financial_cryptocurrencies_cryptocurrency (19 communities) β β β ββ [60] crypto_moons_blockchain_governance_projects (1 communities) β β β β ββ [38] moons_governance_crypto_fairness_cryptocurrency (1 communities) β β β β ββ [37] crypto_blockchain_projects_finance_technical (0 communities) β β β ββ [53] crypto_market_financial_cryptocurrencies_bitcoin (18 communities) β β β ββ [51] crypto_cryptocurrencies_market_financial_investment (6 communities) β β β β ββ [19] market_cryptocurrencies_trading_binance_financial (5 communities) β β β β ββ [24] crypto_cryptocurrencies_financial_scams_investments (1 communities) β β β ββ [21] bitcoin_litecoin_crypto_financial_altcoin (12 communities) β β ββ [12] financial_investing_investment_investors_market (3 communities) β ββ '''[69] blockchain_cardano_ecosystem_technology_projects (11 communities)''' β ββ [56] blockchain_ecosystem_ethereum_polkadot_network (7 communities) β β ββ [31] web3_airdrops_cosmos_ecosystem_blockchain (3 communities) β β ββ [7] blockchain_polkadot_ethereum_iota_network (4 communities) β ββ [10] cardano_blockchain_nft_staking_development (4 communities) ββ [93] members_privacy_digital_discussions_include (145 communities) ββ [92] privacy_digital_members_security_open (84 communities) β ββ '''[88] privacy_monero_surveillance_data_tools (27 communities)''' β β ββ [48] monero_privacy_financial_transactions_features (6 communities) β β β ββ [44] monero_privacy_financial_transactions_features (1 communities) β β β ββ [16] monero_financial_privacy_transactions_cryptocurrency (5 communities) β β ββ [65] privacy_data_tools_digital_surveillance (21 communities) β β ββ [30] privacy_freedom_silk_road_transactions (1 communities) β β ββ [59] privacy_data_tools_surveillance_digital (20 communities) β β ββ [55] privacy_data_tools_surveillance_digital (18 communities) β β β ββ [29] tor_privacy_tools_anonymity_i2p (10 communities) β β β ββ [49] privacy_data_telegram_digital_surveillance (8 communities) β β β ββ [5] privacy_telegram_data_digital_vpn (6 communities) β β β ββ [42] privacy_data_surveillance_rights_personal (2 communities) β β ββ [40] encryption_grapheneos_privacy_security_source (2 communities) β ββ [90] members_digital_open_security_knowledge (57 communities) β ββ [87] digital_open_security_members_source (44 communities) β β ββ [86] security_cybersecurity_usenet_knowledge_members (26 communities) β β β ββ '''[84] usenet_storage_preservation_data_music (9 communities)''' β β β β ββ [36] usenet_platform_history_nostalgia_users (2 communities) β β β β ββ [73] storage_data_music_preservation_archiving (7 communities) β β β β ββ [14] music_preservation_archiving_data_archivists (4 communities) β β β β ββ [17] storage_server_homelab_performance_setups (3 communities) β β β ββ'''[74] cybersecurity_security_knowledge_learning_field (17 communities)''' β β β ββ [70] cybersecurity_security_knowledge_learning_hacking (14 communities) β β β β ββ [39] cryptographic_cryptography_research_encryption_field (2 communities) β β β β ββ [0] cybersecurity_security_knowledge_learning_hacking (12 communities) β β β ββ [20] mathematical_mathematics_computing_distributed_solving (3 communities) β β ββ '''[79] digital_open_internet_software_rights (18 communities)''' β β ββ [77] digital_open_software_rights_access (10 communities) β β β ββ [15] net_neutrality_internet_swartz_access (4 communities) β β β ββ [61] digital_software_source_open_piracy (6 communities) β β β ββ [1] digital_piracy_content_rights_p2p (4 communities) β β β ββ [8] source_software_open_free_gaming (2 communities) β β ββ [58] decentralized_namecoin_internet_decentralization_mesh (8 communities) β β ββ [25] decentralized_mesh_internet_meshnet_technical (2 communities) β β ββ [45] namecoin_decentralized_decentralization_internet_centralized (6 communities) β ββ '''[81] collapse_environmental_preparedness_sustainable_sustainability (13 communities)''' β ββ [68] collapse_environmental_preparedness_sustainable_sustainability (11 communities) β β ββ [64] collapse_preparedness_environmental_self_resilience (9 communities) β β β ββ [2] collapse_preparedness_resilience_environmental_societal (7 communities) β β β ββ [46] living_self_grid_sufficiency_sustainability (2 communities) β β ββ [32] waste_sustainable_environmental_zero_sustainability (2 communities) β ββ [33] amazon_labor_tech_ethical_fang (2 communities) ββ [91] government_libertarian_economic_members_political (61 communities) ββ '''[82] libertarian_economic_political_government_principles (37 communities)''' β ββ [76] libertarian_political_government_state_individual (33 communities) β β ββ [28] political_unacracy_simulation_governance_democracy (3 communities) β β ββ [62] libertarian_government_state_voluntary_principles (30 communities) β β ββ [57] libertarian_government_political_individual_personal (15 communities) β β β ββ [50] libertarian_government_political_individual_liberty (15 communities) β β β β ββ [18] classical_libertarian_political_liberal_individual (1 communities) β β β β ββ [9] libertarian_government_liberty_political_personal (14 communities) β β β ββ [43] minimal_government_state_voluntary_libertarian (0 communities) β β ββ [3] anarcho_state_voluntary_society_gaming (15 communities) β ββ [71] economic_austrian_economics_inequality_systemic (4 communities) β ββ [23] economic_austrian_economics_lvt_principles (3 communities) β ββ [11] economic_systemic_inequality_justice_social (1 communities) ββ '''[85] intelligence_speech_transparency_censorship_narratives (24 communities)''' ββ [52] speech_censorship_free_media_dialogue (5 communities) β ββ [41] speech_free_censorship_amendment_legal (2 communities) β ββ [22] censorship_speech_free_media_transparency (3 communities) ββ [80] intelligence_transparency_narratives_members_whistleblowers (19 communities) ββ [72] narratives_whistleblowers_transparency_truth_surveillance (15 communities) β ββ [54] surveillance_liberties_civil_corporate_government (5 communities) β β ββ [26] tsa_surveillance_privacy_civil_liberties (3 communities) β β ββ [6] corporate_liberties_activism_civil_government (2 communities) β ββ [66] truth_narratives_truths_mainstream_whistleblowers (10 communities) β ββ [4] narratives_truth_theories_mainstream_thinking (8 communities) β ββ [47] whistleblowers_whistleblowing_accountability_legal_truths (2 communities) ββ [27] intelligence_operations_osint_geopolitical_investigations (4 communities) = 6. Software Requirements Specifications (SRS) = == 6.1 Core Microkernel == P2P systems constantly evolve and have different deployment configurations depending on system resources, as such the core of the system should be minimal, using a hybrid microkernel architecture that runs microservices - the microkernel should not be a bottle neck for communication. * [[Microkernel/Requirements|Requirements]] * [[Microkernel/Architecture|Architecture]] == 6.2 Core Modules == <!-- TODO break up Modules into Service Layers despite microservices being domain related --> === 6.2.1 Transport Modules === (MP)TCP, (MP)QUIC, (MP)UDP === 6.2.2 Networking Modules === NAT Traversal, Anon DHT, Mixnet, Isotonic Routing, Smallworlds == 6.2.3 Core Application Modules == === [[Name Registry]] === * [[Name Registry/Requirements|Requirements]] * [[Name Registry/Architecture|Architecture]] === 6.2.4 [[Module Manager]] (Modman) === Handles updating of modules and depdencies, queries the [[Peer Data Management System]] and [[Name Registry]], and resolves module data using [[Decentralised File Storage]]. * [[Modman/Requirements|Requirements]] * [[Modman/Architecture|Architecture]] === [[Peer Data Management System]] === A general purpose query engine using RDF-Star & SPARQL-star. It should act as an alternative to a trusted JSON-RPC interface found in Blockchains, with RML adapters to other systems, such as Blockchains. It should also function as a search engine for content discovery. * [[PDMS/Requirements|Requirements]] * [[PDMS/Architecture|Architecture]] === [[Decentralised File Storage]] (Codex) === * [[Codex/Requirements|Requirements]] * [[Codex/Architecture|Architecture]] === [[Nomos]] === * [[Nomos/Requirements|Requirements]] * [[Nomos/Architecture|Architecture]] === [[Waku]] === * [[Waku/Requirements|Requirements]] * [[Waku/Architecture|Architecture]] === [[User Interface]] === TODO aside from a user interface there should be a module for providing a universal CLI & HTTP interface to all other modules * [[User_Interface/Requirements|Requirements]] * [[User_Interface/Architecture|Architecture]]
Summary:
Please note that all contributions to Logos may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Logos:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)