Edict of Autonomy

Part V: FAQ


This section contains answers to common questions and objections about the protocol.


  • Who is in charge if there’s a problem?

    No single person or entity is in charge; that is a fundamental feature of the design. Like the internet itself or email, this is a protocol, not a centrally-managed service. Responsibility is distributed among its participants. The community collectively stewards the protocol, and individuals are empowered to manage their own interactions and spaces. When a problem arises, the solution comes from the community, not from a top-down authority.

  • How do you handle illegal or harmful content?

    The protocol is content-agnostic, much like the foundational protocols of the internet. It does not police information. Instead, it provides a framework that empowers individuals and communities to create their own standards and tools for curation and filtering. You choose which communities to join, which peers to connect with, and what content you wish to see. Responsibility is returned to the user, moving away from a model of centralized censorship.

  • What about privacy and security?

    Decentralization dramatically enhances both privacy and security. By design, there is no central server or "honeypot" of user data to be hacked or subpoenaed. You own and control your data on your own devices. The architecture of private nodes ensures that you only share the explicit outputs of your ideas, not the private context that generated them. Security becomes a matter of locking your own doors, not trusting a single landlord with a master key to everyone's home.

  • How do we know who to trust?

    Trust is not assigned by a central authority; it is earned through direct interaction and community reputation. In this ecosystem, trust is built organically, much like in a real-world community. You rely on your own experiences, the vouching of trusted peers, and the observable actions of others within the contexts you share with them. It is a move from a brittle system of centralized verification to a resilient, web-of-trust model.

  • Isn’t this just going to be chaotic?

    It will be vibrant and emergent, not chaotic. The internet itself is the greatest proof that decentralized systems create their own powerful, organic order. This protocol allows communities to form their own norms, rules, and governance structures. It favors the adaptable, bottom-up intelligence of a living ecosystem over the rigid, top-down control of a machine.

  • What if someone tries to take over parts of the network?

    The distributed, peer-to-peer nature of the protocol makes it inherently resistant to such takeovers. There is no central point of control to be captured. Like a web, if one section is compromised or co-opted, the rest of the network remains intact and can simply route around the damage. Its resilience comes from its lack of a center.

  • How do you ensure quality content?

    "Quality" is subjective and is therefore determined by individuals and communities, not by a central arbiter of taste. Curation and discovery are core activities of the participants. Ideas and content that are found to be valuable will gain visibility as they are discussed, shared, and remixed by the community. It is a system that allows for a meritocracy of ideas based on their resonance, not their marketing budget.

  • What if people misuse the protocol?

    Any open tool can be misused. However, in a decentralized system, the "blast radius" of any misuse is naturally localized. There is no central algorithm or amplification mechanism for a bad actor to hijack. The community can identify, isolate, and build defenses against misuse far more effectively than a centralized service, creating an adaptive immune system rather than a brittle fortress.

  • How do you deal with updates and changes?

    The protocol evolves through a consensus-driven process, similar to successful open-source projects. Proposed changes and improvements are adopted voluntarily by the community of users and client developers because they offer clear value. There are no forced updates from a central command; the system evolves in the direction that its participants collectively deem most beneficial.

  • Why would the average person want to use this?

    For freedom, ownership, and genuine connection. The average person gets to escape the walled gardens where they are the product. They get to truly own their data, their social connections, and their creative output. They are no longer subject to the whims of opaque algorithms or corporate policies. It is a choice to leave the audience and become an architect—to shape one's own digital experience and build meaningful connections in a world designed for empowerment, not engagement.

  • How is this monetized?

    The protocol itself is open and free, like the internet. Monetization comes from building valuable services that operate within this ecosystem. The business model is "open protocol, premium tools." We give away the roadmap (the protocol) so everyone can build, but we sell the best cars (our advanced, proprietary services). This fosters a healthy, competitive ecosystem while allowing for sustainable business development. It's not about owning the network, but about being the most valuable participant within it.

  • Why is the protocol being developed in the open?

    The goal is to create a new, decentralized network, and a network cannot grow on a closed foundation. The protocol itself must be an open standard, like TCP/IP or email, to foster a vibrant and permissionless ecosystem. While the protocol is public, our specific, advanced implementations of services on top of it—like our Reactor—remain proprietary. We explain the concepts so others can build their own compatible services, strengthening the entire network. You can't build a new web by hoarding the blueprints.