Пропустить до основного содержимого



Убедительно. Я так-то раньше был против буквы "ё" считая ее ненужеым пережитеом прошлого. Но вот, простой пример говорит мне, что я не прав.


Немного о букве Ё.


:anarchistflagblack: mutual aid :antifa:

Help a trans woman active in the PDX antifascist community get food! she's homeless and sleeping rough right now.... and she doesn't get paid until November 3rd.

please boost and donate to help my lovely brave trans friend "A" get food and supplies....

Csh App $AntifaPMOfficePDX

#MutualAid #TransMutualAid #Crowdfund #Begpost #MastodonForHarris #Tesla #TeslaTakedown



Случилось мне купить в оби складную табуретку/микро-стремянку. Приехав домой, обнаружил отсутствие петель и метизов, явный некомплект.

На следующий вечер (сегодня) поехал в магазин в надежде заменить/вернуть.

Так вот сразу столкнулся с двумя максимально разными чувихами: девушка в сервисном отделе пыталась убедить меня в моей неправоте сходу, мол, я должен сам проверять комплектность при покупке, а то че это. Но ее удалось уболтать и она отвела меня к ответственной продавщице, которая напохуях сказала: "ну, давай просто из другой коробки возьмем" и проблема решилась за 3 минуты.

Вот и че было говнить то, на ровном месте! Я бы вернул табуретку по чеку и они бы опять продавали некомплектный набор.

Я конечно скептически отношусь к практикам "близкого отношения" к работе и субъектам/объектам на работе, но сегодня меня это практически спасло.

#лытдыбр







ZSF Charter (ammendments)


AMENDMENTS TO THE ZSF CHARTER 0
TITLE III: CRYPTOGRAPHIC ALLOCATION SYSTEM (CAS)
Section A: Social Allocation Points (SAPs)

Article 5: Allocation Structure (Amended)
SAPs are divided into two major categories:

Essential Services Allocation
Leisure and Communal Project Allocation
Performance Tiering Clarification:

Performance tiering is a functional descriptor with no status implications.
All individuals have equal access to life-supporting infrastructure regardless of their performance tier.
Article 6: Performance Threshold Adjustment (Amended)
If an individual's production falls below the enforceable SAP threshold:

SAPs reduced to 60–70
Voting window reduced by 50%
Unspent or forfeited SAPs (30–40) automatically reallocated via algorithm to critical needs and underfunded projects.
A portion may be liquidated into cryptographic trade currency if surplus exists.
Clarification:

SAP reduction is not a penalty but a mechanism to ensure equitable distribution of resources.
All individuals, regardless of performance, have access to Tier-0 provisioning.
Article 7: Exemption Procedures (Amended)
Individuals filing for exemptions enter "Social Limbo," during which their SAPs are preserved but participation is optional.

No penalties shall be applied until exemption is approved or denied.
Clarification:

Participation in higher-tier provisioning is always opt-in and rotational. There shall be no cumulative SAP privilege, no carry-over prestige, or access priority based on history.
Section B: Candidate Allocation Points (CAPs)
Article 10: District Structuring (Amended)
Small Districts: 2 candidates available, 2 elected.
Medium Districts: 3–4 candidates, 2 elected.
Large Districts: Up to 5 candidates, 2 elected.

Clarification:

Candidates may only be re-elected after 4 full cycles (8 months) to prevent project over-consolidation.
Emergency extensions permitted only to complete pending project milestones. Time under extension does not count toward the re-election wait period.
Non-essential projects can be frozen in light of re-election of the candidate who started that respective project after fulfilling their re-election wait period.
TITLE V: REPRESENTATION AND COUNCIL FUNCTIONS
Article 14: Project Allocation Council Members (PACMs) (Amended)
PACMs function as civic facilitators, not rulers. Their duties include:

Publishing project menus
Interfacing with co-op laborers
Coordinating project updates and timelines
Mediating between citizen SAP allocations and algorithmic triage
Clarification:

PACMs must step down for no less than 4 full cycles, unless a project is pending.
Emergency project extension must be narrow-scoped.
New PACMs elected simultaneously during the extension period.
Original candidate influence limited to project extension agreement formulated in part by Local Federated Council as to not limit the influence and flow of the project plans of the new candidate.
TITLE VI: ECONOMIC SUBSYSTEM AND CRYPTO-CURRENCY GOVERNANCE
Article 16: Non-Human Currency Handling (Amended)
Trade currency is algorithmically managed, non-sentient, and autonomous.

Used only for intercommunal/international trade.
Oversight limited to maintenance livestreamed publicly.
Unauthorized or off-record maintenance is strictly prohibited and punishable by all allocation points being reallocated only to social funds. Thus ensuring the individual is still not left behind, but excluded from authorized function for an extended period which must be voted for by three individual collectives via Federated Council/Local emergency votes. This could be considered a form of social probation to punish individuals that would choose to attempt to manipulate Federated ZSF trust services for their own benefit.
Repeated or severe attempts at tampering with Federated ZSF trust services may result in leisure SAP's being permanently seized and liquidated into decentralized trade currencies, which are allocated to underfunded social services and/or low-visibility projects.
TITLE VII: FINAL CLAUSES
Article 18: Principle of Reciprocated Liberty (Amended)
All rights within ZSF are tied not to production, but to mutual responsibility. Participation is voluntary; survival is not conditional.

Clarification:

All individuals have equal access to life-supporting infrastructure regardless of their performance tier.
SAP reduction is not a penalty but a mechanism to ensure equitable distribution of resources.
REVOCABLE AGENCY PROTOCOL (RAP) SUBSECTION 3: COUNCIL SUPPORT REVOCATION ORDER (CSRO)
Article V: Grounds for Revocation (Amended)
Any of the following may justify a CSRO:

Climate & Ecological Violations
Resource or Fund Mismanagement
Election or Voter System Tampering
Disruption of SAP Equilibrium (leisure vs. survival priority skew)
Civic Stagnation or Obstruction of Emerging Candidates
Negligence during Crisis or Emergency Events
Conflict Misconduct (failure to properly liaise with federation militia or peer communes during high-risk conditions)
Clarification:

Civic stagnation is clearly tied to the disruption of critical provisioning loops and not to individual performance metrics.
Obstruction must be clearly documented and verified through public consensus.

No states.
No classes.
No permanence.

Only encrypted coordination and mutual provisioning.

не нравится это



ZSF Charter 7


ZSM CHARTER VII: INTER-COMMUNAL DEFENSE AND WEAPONS SOVEREIGNTY
(PROTOCOLS FOR NON-COERCIVE COLLECTIVE SECURITY AND FEDERATED MILITIA COORDINATION - EXPANDED)

TITLE I: FOUNDATIONAL PRINCIPLES OF NON-SOVEREIGN DEFENSE

Article 1: Rejection of Centralized Military Authority
No commune, federation, or council under ZSM shall possess a standing army, centralized command structure, or monopoly on the use of force. All defensive measures shall be decentralized, voluntary, and subject to immediate revocation. This principle is a direct application of the ZSF's core tenet of non-sovereignty, rejecting the state's monopoly on violence as detailed in ZSF Charter 0, Article 2. As Errico Malatesta warned, even revolutionary organizations can develop "an iron law of oligarchy" if power is not actively diffused. Therefore, all defense structures must be designed to prevent the consolidation of authority, embodying the Anti-Stratification Principle (ASP) of ZSF Charter II, Article 19, which forbids any action that reintroduces hierarchy or status systems.

Article 2: Principle of Defensive Action Only
All inter-communal defense actions shall be strictly defensive in nature. Preemptive strikes, offensive operations, and retaliatory campaigns are prohibited. Defense is defined as the protection of life, well-being, and the means of survival (Tier-0 provisioning) as guaranteed in ZSF Charter 0, Article 3. This principle is inspired by the long tradition of Indigenous resistance, where, as Klee Benally articulates, defense is rooted in protecting the sacred and the community from immediate, existential threats, not in projecting power. An "Immediate Threat" is defined as a verified, active attack on commune members or critical infrastructure. A "Credible Threat" is defined as a clear and present danger, confirmed through the human-override-verified algorithmic threat detection systems (per ZSF Charter III, Amendment I), such as an armed fascist group advancing on a commune's perimeter.

Article 3: Voluntary Association in Defense Networks
No individual shall be compelled to participate in defensive operations. All roles within militia structures are opt-in and subject to rotational assignment to prevent hierarchy formation. This is an expression of mutual aid, not duty. As Kropotkin demonstrated in Mutual Aid , cooperation is a powerful evolutionary factor, but it must remain voluntary to retain its liberatory character. Participation is based on the "common notions" of trust and responsibility, where individuals act not out of obligation but from a recognition of their interdependence for collective security and survival. The "joyful militancy" described by Bergman and Montgomery
a fierce commitment to emergent forms of life is the ideal spirit for this voluntary association, not grim conscription.

Article 4: Cryptographic Oversight of All Defense Actions
All defensive operations, from training to deployment, shall be:
Livestreamed via encrypted channels: All actions, from training drills to live engagements, shall be broadcast on public-facing, encrypted channels to ensure transparency, as mandated by ZSF Charter III, Article 13.
Subject to real-time CAP-mediated oversight: Key decisions, such as deployment authorization or the use of Tier-3 weapons, require continuous Candidate Allocation Point (CAP) backing from the broader community, ensuring the defense force remains an instrument of the commune and not an autonomous power.
Recorded in immutable ledgers for public audit: Every action, every weapon check, every deployment vote shall be recorded on the ZSF's cryptographic ledger, creating a permanent, auditable record to prevent abuse and ensure accountability, in line with ZSF Charter II's algorithmic transparency protocols.

TITLE II: FEDERATED MILITIA COORDINATION FRAMEWORK

Article 5: Structure of Mutual Defense Collectives
Each commune shall maintain a voluntary militia collective organized as follows:
Local Defense Units (LDUs): Base-level responders for commune security. These are the basic affinity groups of defense, small enough to build deep trust but large enough to be effective. They are the first responders to any threat.
Regional Response Networks (RRNs): Cross-commune coordination cells. When a threat exceeds the capacity of a single LDU, RRNs composed of delegates from multiple LDUs coordinate a federated response.
Specialist Support Cadres (SSCs): Medical, engineering, and technical experts. These cadres provide critical support roles. Medical SSCs will be trained in street medicine as detailed in sources like the Black Flag Catalyst Revolt Guide , including the ABCs (Airway, Breathing, Circulation), treatment of open wounds, and gunshot wounds. Engineering SSCs will be skilled in defensive fortification, infrastructure repair, and the neutralization of technological threats, drawing on knowledge from The Anarchist Arsenal .

Article 6: Mandatory Rotation and Anti-Consolidation Protocols
All militia positions shall enforce strict rotation:
No individual may serve in any command-like role for more than 6 consecutive months.
All leadership functions must be shared among at least 3 individuals in a rotating "spokescouncil" model, preventing any single point of failure or authority.
After each rotation period, a 12-month cool-down from similar roles is required.
This protocol is a direct institutionalization of the fight against "rigid radicalism" and the consolidation of power. It ensures that skills are widely distributed and that no individual becomes entrenched in a position of influence, thus upholding the ZSF's post-representational principles.

Article 7: Training and Readiness Standards
All militia participants must undergo:
Quarterly de-escalation and conflict resolution training: This training is paramount and must be prioritized over weapons drills. It incorporates the principles of restorative justice from ZSF Charter III, focusing on mediation, harm reduction, and transforming conflict.
Monthly defensive tactics drills (livestreamed for public oversight): These drills cover practical skills, from shield wall formations and safe retreat tactics to the proper use of non-lethal deterrents. All drills are public to maintain transparency and community trust.
Bi-annual ethical defense principles certification: This certification requires participants to demonstrate a thorough understanding of the ZSF Charter, the ASP, and the principles of non-coercive defense. It is a reaffirmation of the political and ethical foundation of their role.

TITLE III: WEAPONS REGULATION AND CONTROL PROTOCOLS

Article 8: Classification of Defensive Materials
All weapons and defensive tools shall be categorized as:
Tier 1: Non-lethal defensive tools: Includes items like shields, barriers, communication jammers, and deterrent systems like high-powered lasers or paint for obscuring police visors (tactics from bfc-revolt-guide ).
Tier 2: Defensive-capability weapons: Includes tools designed to incapacitate without causing lethal harm in most scenarios, such as pepper spray, tear gas (for defensive use only), and various improvised incendiary devices like "lunch bag incendiaries" or "fire logs" (from The Anarchist Arsenal ).
Tier 3: Lethal-force weapons: Includes projectile weapons and explosives. The manufacturing and use of these items are subject to the highest level of scrutiny and are strictly for defensive purposes against lethal threats. Examples include improvised firearms and more complex devices like the "Lewis Bomb" or "Fuel-Air Explosives" (FAEs) from The Anarchist Arsenal , to be used only in extreme circumstances, such as defense against a heavily armed, genocidal assault.

Article 9: Cryptographic Access Control for Weapons
All Tier 2 and Tier 3 weapons shall be stored in decentralized, heavily fortified armories with:
Triple-signature cryptographic release protocols: Access requires one LDU member, one randomly selected Project Allocation Council Member (PACM), and one civilian oversight delegate. This prevents any single group from unilaterally accessing high-level weaponry.
Biometric identity verification with no single-person override capability: Access is tied to an individual's cryptographic identity, with all access attempts logged immutably.
Real-time inventory tracking with public-facing (but obfuscated) dashboards: The community can see that weapons are secure and accounted for without revealing sensitive operational details.

Article 10: Manufacturing and Distribution Controls
All weapons manufacturing within ZSM territory must:
Be fully documented in public cryptographic ledgers: Every component, every process, from sourcing of materials to final assembly, is recorded. This transforms the clandestine act of weapons manufacturing into a transparent, communal activity.
Undergo monthly sustainability and safety audits: SSCs (engineering) and civilian committees conduct audits to ensure safety protocols are followed and that manufacturing doesn't create undue environmental harm.
Require CAP-mediated approval for production scale increases: If a commune wishes to scale up production of a defensive tool, it must make its case to the broader community, which allocates resources via the CAP system.
Be limited to defensive-purpose designs only: The manufacturing of offensive weapons of war or weapons designed for state-level policing is strictly prohibited.

Article 11: Inter-Communal Weapons Transfer Protocols
Any transfer of weapons between communes must satisfy:
Full public disclosure of transfer rationale and recipient commune approval: The reasons for the transfer must be transparent, and the receiving commune must signal its approval through its own consensus process.
Triple-verification from sending commune, receiving commune, and regional federation council: This ensures all parties in the federated network are aware and agree to the movement of materials.
Real-time tracking of all transferred materials until secured in recipient armory: The cryptographic ledger tracks the weapon's journey, ensuring it doesn't "disappear" into a black market.

TITLE IV: DEFENSIVE OPERATIONS AND DEPLOYMENT PROTOCOLS

Article 12: Threat Assessment and Response Triggers
Defensive actions may only be triggered by:
Immediate Threat: Verified attack in progress against commune members or critical infrastructure (e.g., a police raid, an active shooter situation as described in the bfc-revolt-guide ).
Credible Threat: Algorithmic threat detection (e.g., identifying armed fascists advancing) confirmed by a Human Verification Unit (HVU) as per ZSF Charter III, Amendment I. This prevents false positives and algorithmic bias from triggering violent responses.
Federated Request: Formal request for assistance from another ZSM commune under verified attack. This activates the mutual aid network.

Article 13: Deployment Authorization Matrix
All defensive deployments require:
Level 1 Response (Tier 1 weapons only): 55% consensus of available LDU members. This allows for rapid response to common threats like police harassment using non-lethal tools.
Level 2 Response (Tier 2 weapons): 70% consensus of available LDU members + one PACM verification. This higher threshold is for situations where there is a credible threat of serious harm but not necessarily lethal force.
Level 3 Response (Tier 3 weapons): 85% consensus of available LDU members + two PACM verifications + regional federation oversight delegate approval. This is the highest possible threshold, reserved for existential threats where the community's survival is at stake. This process is a direct application of the strong consensus model, as seen in movements like Occupy.

Article 14: Continuous Oversight During Operations
All defensive operations must maintain:
Live cryptographic voting every 4 hours to continue deployment: The community can vote at any time to stand down the defense force, ensuring its actions remain continuously authorized.
Real-time civilian oversight via obfuscated livestreams: To protect operational security, identities may be obscured, but the actions of the defense force must remain visible to prevent abuse.
Immediate revocation capability via CSRO (Council Support Revocation Order): If any three non-involved communes agree that the defense force is acting outside its mandate or violating ZSF principles, they can issue a CSRO to immediately revoke its authority.

TITLE V: INTER-COMMUNAL DEFENSE FEDERATION PROTOCOLS

Article 15: Mutual Defense Pact Structure
Communes may form voluntary defense pacts under these conditions:
No pact may include more than 8 communes without regional federation approval: This prevents the formation of large, unwieldy power blocs that could challenge the federated structure.
All pact decisions require unanimous consent of member communes: This respects the autonomy of each commune.
No pact may maintain standing combined forces all coordination is ad-hoc: Forces are only combined during an actual crisis and are immediately demobilized afterward, returning to their local LDUs.

Article 16: Conflict Resolution Between Communes
Any disputes between communes regarding defense matters shall be resolved through:
Third-party mediation from non-aligned communes: Drawing on the principles of ZSF Charter IV, Article 12.
Public, livestreamed arbitration sessions: Ensuring transparency and community involvement in the resolution process.
Cryptographic consensus building with no coercive enforcement: The goal is mutual understanding and agreement, not a victor and a vanquished.

Article 17: Emergency Federation Powers
In existential threats to multiple communes, temporary coordination may be established with:
24-hour sunset clause requiring renewal via CAP vote: This emergency power is strictly time-limited and must be continuously re-authorized by the community.
Strict limitation to defensive actions only: The mandate cannot be expanded to offensive operations under any circumstances.
Mandatory public audit within 72 hours of action completion: A full review of the emergency coordination must be conducted to ensure it complied with all ZSF protocols.

TITLE VI: ANTI-CIRCUMVENTION AND COMPLIANCE ENFORCEMENT

Article 18: Weapons Protocol Violation Consequences
Any attempt to circumvent weapons protocols shall result in:
Immediate seizure of involved materials via multi-commune oversight teams: A team from neighboring communes, not the offender's own commune, will conduct the seizure to ensure impartiality.
Suspension of all defense privileges for involved communes for 6 cycles: The commune loses its ability to access Tier 2 and 3 weapons and must rely on federated support for its defense.
Public audit and cryptographic reputation adjustment for involved individuals: The individuals' reputation scores within the ZSF system are permanently adjusted, flagging them as untrustworthy. This is a form of social consequence, not imprisonment, in line with ZSF Charter III's restorative justice model.

Article 19: Federation Overreach Prevention
No federation or council may:
Centralize weapons storage beyond commune level: Armories must remain local and under community control.
Mandate participation in defensive operations: Participation remains strictly voluntary as per Article 3.
Withhold provisioning as coercion for defense cooperation: ZSF Charter 0, Article 3 guarantees unconditional access to Tier-0 provisioning. This cannot be used as a weapon to force compliance.

Article 20: Cryptographic Compliance Monitoring
All defense activities shall be subject to:
Automated protocol compliance checking via neutral algorithms: The ZSF's core algorithms will automatically flag any actions that violate the charter, such as accessing weapons without proper authorization or deploying without consensus.
Random audit by selected civilian committees: Regularly, randomly selected citizens from across the federation will conduct deep audits of defense activities.
Continuous CAP-based approval ratings for all defense coordinators: The community can express its confidence in its coordinators in real-time through the CAP system, and low ratings can trigger a rotation.

TITLE VII: POST-CONFLICT AND RESTORATIVE PROTOCOLS

Article 21: Mandatory De-escalation and Ceasefire Procedures
All defensive operations must include:
Automated ceasefire offers every 2 hours of engagement: The defense system will automatically broadcast a ceasefire offer to the opposing force at regular intervals.
Public documentation of all conflict resolution attempts: Every effort made to de-escalate the situation must be recorded on the public ledger.
Independent mediation team deployment at earliest opportunity: As soon as it is safe, a team of mediators from a non-involved commune will be deployed.

Article 22: Post-Conflict Accountability and Reconciliation
Following any defensive engagement:
All actions undergo public restorative justice review: This process, as outlined in ZSF Charter III, focuses on harm, accountability, and healing, not punishment. The goal is to understand what happened, who was harmed, and how to repair the harm and reintegrate those responsible.
Any harm to persons or property triggers automatic SAP-based compensation: If the defense action causes unintended harm, the community's collective resources (Social Allocation Points) are automatically allocated to repair the damage and support the victims.
All participants undergo debriefing and psychological support: The trauma of conflict is real. All participants, from the front lines to support roles, will have access to mental health support to process their experiences, a practice inspired by the mutual aid focus of movements like the Black Panthers.

Article 23: Historical Documentation and Learning
All defensive engagements shall be:
Documented in immutable public archives: A complete record is kept for future generations.
Analyzed for protocol improvements: The community will collectively analyze the engagement to identify weaknesses in its protocols and find ways to improve.
Used to update training materials without glorification of conflict: The lessons learned are integrated into training, but the focus remains on de-escalation and the tragedy of violence, not on celebrating martial prowess.

TITLE VIII: FINAL PROVISIONS

Article 24: Supremacy of Non-Violent Resolution
All defense protocols shall prioritize de-escalation and conflict prevention. The use of force is always a last resort, requiring exhaustive documentation of alternatives attempted. This reflects the ZSF's core belief in "reciprocated liberty," where freedom is achieved through mutual responsibility, not coercion.

Article 25: Preservation of Communal Autonomy
No defense protocol shall override:
A commune's right to opt-out of specific operations: A commune cannot be forced to participate in a defense action it does not agree with.
Individual rights to avoid participation: Participation in the militia is always voluntary.
The fundamental principle that survival provisioning cannot be weaponized: As stated in ZSF Charter 0, Article 18, no one's access to food, water, shelter, or healthcare can be contingent on their participation in defense.

Article 26: Continuous Protocol Review
All defense and weapons protocols shall be:
Reviewed quarterly by randomly selected civilian committees: Ensuring fresh eyes and diverse perspectives are always applied.
Updated annually via CAP-mediated voting: The entire community has the power to amend its defense protocols.
Subject to immediate suspension if found to enable hierarchy or coercion: If any protocol is found to violate the ASP, it can be suspended immediately pending a full review.

CONCLUSION

This Seventh Charter of Zero-State Mutualism establishes that collective defense shall never become collective oppression. It integrates the practical wisdom of direct action and street medicine with the deep ethical frameworks of mutual aid, restorative justice, and anti-stratification. Through decentralized control, cryptographic oversight, and voluntary participation, ZSM communes may protect themselves without recreating the coercive structures they seek to replace. This system is designed not for victory, but for survival, autonomy, and the continuous creation of a world based on freedom and mutual aid.

No states.
No classes.
No permanence.

Only encrypted coordination and mutual provisioning.

Эта запись была отредактирована (1 неделя назад)

не нравится это



ZSF Charter 6


ZSF CHARTER VI: RADICAL ACCESS AND DISABILITY AUTONOMY

THE ABOLITION OF NORMALCY AS CIVIC INFRASTRUCTURE

TITLE I: FOUNDATIONAL PRINCIPLES

Article 1: The Abolition of Normalcy as Structural Standard
Zero-State Federalism (ZSF) formally abolishes all notions of "normal" or "standard" ability as structural baselines. Human variance is the default state, not an accommodation category.

Article 2: Definition of Disability Under ZSF Law
Disability shall be understood as:
A) Any variation in human form or function that requires divergent infrastructural support to participate in civic systems
B) Self-determined through cryptographic identity protocols
C) Protected from medical or biometric profiling through encrypted sovereignty

Article 3: The Elimination of Productivity Metrics
All SAP allocation, contribution expectations, and civic participation protocols shall be rendered entirely independent of productivity measures. Efficiency is not a civic value.

TITLE II: CRYPTOGRAPHIC IDENTITY AND DISABILITY SOVEREIGNTY

Article 4: Self-Determined Disability Identity
All individuals may self-register disability status through cryptographic identity protocols with:
A) No medical or institutional verification requirements
B) Full protection from algorithmic bias through randomized identity encryption
C) Dynamic updating capabilities for fluctuating conditions

Article 5: Anti-Biometric Provisions
All systems handling disability data shall enforce:
A) Complete absence of facial recognition, gait analysis, or behavioral profiling
B) Decentralized storage with local control over information access
C) Immediate purge protocols following access requests

TITLE III: RADICAL INFRASTRUCTURE DESIGN PRINCIPLES

Article 6: First-For-Disabled Design Mandate
All infrastructure projects shall implement:
A) Universal Accessibility Assessments (UAA) at the conceptual phase
B) Divergent Use Case Scenarios (DUCS) in all development stages
C) Federated Testing Protocols with disabled leadership

Article 7: Assistive Technology Stewardship Framework
Assistive technologies and devices shall be:
A) Designed as open-source protocols under public license
B) Fabricated through decentralized 3D printing networks
C) Distributed via SAP-based provisioning systems with no medical gatekeeping

TITLE IV: SOCIAL ALLOCATION POINT (SAP) SYSTEM ADAPTATIONS FOR DISABILITY AUTONOMY

Article 8: Care Credits System Architecture
All individuals shall receive:
A) Base care credit allocation of 25 SAPs per cycle for interdependence networks
B) Dynamic scaling capability based on self-reported needs assessment
C) Zero-accountability spend protocols with no justification requirements

Article 9: SAP Protection Clause for Disabled Individuals
In no circumstance shall any disabled individual experience:
A) Reduction in Tier-0 provisioning allocation
B) Modulation of infrastructure access privileges
C) Penalization for fluctuating contribution cycles

TITLE V: DISABILITY FIRST MEDICAL SYSTEMS

Article 10: Autonomous Medical Access Framework
Medical services shall operate under:
A) No diagnostic gatekeeping protocols
B) Direct SAP-based provisioning for all medical supplies and procedures
C) Decentralized peer-to-peer care networks with no institutional oversight

Article 11: Chronic Condition Equity Provisions
All individuals with chronic conditions shall receive:
A) Predictive access allocation for medication and supply fluctuations
B) Crisis buffer protocols for emergency situation preparedness
C) Zero-wait scheduling for all medical services via livestreamed priority queues

TITLE VI: COGNITIVE AND NEURODIVERGENT DISABILITY AUTONOMY

Article 12: Sensory Customization Protocols
All digital interfaces shall provide:
A) Fully customizable sensory input/output matrices
B) Alternative data representation frameworks beyond textual displays
C) Livestreamed feedback loops for real-time adjustments

Article 13: Cognitive Load Management Systems
ZSF infrastructure shall integrate:
A) Automatic task fractionation protocols for complex operations
B) Federated memory augmentation networks with no single point of failure
C) Crisis recovery protocols for catastrophic cognitive events

TITLE VII: PHYSICAL ACCESS FEDERATIONS AND MILITIA SUPPORT SYSTEMS

Article 14: Mobility Infrastructure Architecture
All physical environments shall implement:
A) Modular accessible pathways with no permanent barriers
B) Decentralized maintenance networks with rapid response capabilities
C) Emergency transport protocols integrated into federated safety grids

Article 15: Disability First Safety Networks
Mutual aid safety teams shall enforce:
A) Immediate evacuation protocols for disabled individuals during crises
B) Priority access to emergency supplies without justification
C) Embedded care personnel trained in divergent needs response

TITLE VIII: ECONOMIC AUTONOMY AND INDEPENDENCE SYSTEMS

Article 16: Cooperative Care Networks
ZSF shall support the formation of:
A) Autonomous interdependence cooperatives with no productivity mandates
B) Resource-sharing protocols for high-need situations
C) Emergency reserve funds through surplus SAP redistribution

Article 17: Technology Freedom Provisions
All disabled individuals shall have unconditional access to:
A) Adaptive communication systems with no speech or language prerequisites
B) Automated task execution tools without oversight requirements
C) Personal mobility solutions with zero range limitations

TITLE IX: CULTURAL TRANSFORMATION AND ENFORCEMENT PROTOCOLS

Article 18: Anti-Normalcy Education Systems
All civic participants shall undergo:
A) Mandatory structural divergence training curricula
B) Federated feedback mechanisms for system improvements
C) Continuous ideological reinforcement via livestreamed equity audits

Article 19: Disability Autonomy Oversight Councils
Each federation shall maintain:
A) Permanently seated disability first oversight councils
B) Immediate revocation protocols for accessibility violations
C) Zero-tolerance enforcement systems with no appeal processes

TITLE X: POST-COLLAPSE DISABILITY SAFETY NETWORKS

Article 20: Emergency Infrastructure Continuity Protocols
In collapse scenarios, ZSF shall maintain:
A) Parallel analog systems for all essential services
B) Decentralized maintenance crews with disability-first training
C) Immediate priority protocols for disabled access restoration

Article 21: Resource Continuity Frameworks
Critical supplies including:
A) Medical devices and medications
B) Sensory adaptation tools
C) Mobility augmentation technologies
Shall be maintained in redundant storage facilities across all districts.

TITLE XI: LANGUAGE AND IDEOLOGICAL ENFORCEMENT

Article 22: Terminology Purge Mandates
All systems shall eliminate:
A) Medicalized language around disability status
B) Hierarchical descriptors of ability variation
C) Productive capacity measurements in civic discourse

Article 23: Anti-Normalcy Algorithm Enforcement
All communication platforms shall implement:
A) Real-time speech-to-text with unlimited customization
B) Federated captioning protocols for all audio content
C) Complete visual alternative systems for textual displays

TITLE XII: FINAL ENFORCEMENT CLAUSES

Article 24: Zero Deference to Normalcy Systems
No individual, cooperative, or council may:
A) Implement productivity metrics affecting access rights
B) Create hierarchical divisions based on ability variance
C) Institute gatekeeping protocols for structural needs

Article 25: Permanent Access Rights
All disabled individuals shall possess:
A) Unconditional claim on ZSF provisioning resources
B) Sovereign authority over personal support networks
C) Absolute protection from coercive inclusion attempts

CONCLUSION

Zero-State Federalism is not a system to which the disabled are granted access. It is an architecture built specifically for divergent humanity, where no one needs to be normalized to survive. In ZSF:

There shall be no normal.

Only mutual provisioning among all forms of human life.

No states.
No classes.
No permanence.

Only encrypted coordination and mutual provisioning.

не нравится это



ZSF Charter 5


ZSF CHARTER V: CRYPTOGRAPHIC DISINTEGRATION OF GENDER AND BODILY AUTONOMY

(POST-BIOLOGICAL CIVIC DESIGN - NO SEXUAL CLASSIFICATION, NO PATRIARCHAL CODING, ZERO STRUCTURAL REPRODUCTIVE AUTHORITY)


TITLE I: FOUNDATIONAL PRINCIPLES

Article 1: Constitutional Erasure of Gender as a Governance Category

Gender binaries, sexual categorization, and biological reproductive authority are abolished as civic infrastructure. No legal, economic, or infrastructural function may reference gender.

Subsection A: Definition of Bodily Autonomy Under ZSF

The human body is not an architectural category.

Identity is cryptographic, not biological.

Reproductive capacity is a medical and logistical designation, not a structural one.

Personhood cannot be classified by biology, sexuality, or reproductive status.

Subsection B: Decryption of Binary Structures

Gendered language (he/she/they), sexual categorization, patriarchal norms, or gender roles are prohibited in all civic channels.

All human classifications in infrastructure, labor allocation, and resource distribution shall be cryptographic. No biological or sexual descriptors allowed.

Any attempts to rebuild gender binaries, even as "tradition," "celebration," or "cultural preservation" triggers immediate audit by Autonomous Dismantling Committees (ADCs).

Subsection C: Reproductive Sovereignty as Default

Childbearing and child-rearing functions are logistical. No person is obligated to reproduce.

Reproduction is treated as a medical procedure, not an ideological or infrastructural function.

All reproductive rights are cryptographically guaranteed.


TITLE II: LABOR INFRASTRUCTURE AND CARE SYSTEMS

Article 2: Erasure of Gender in Labor Distribution

Labor allocation is modular. No civic role shall be categorized by gender, sexuality, or reproductive capacity.

Subsection A: Post-Gender Labor Protocols

All labor functions are fully interchangeable.

No role shall carry the burden of "care penalties," "reproductive expectations," or "domestic work normalization."

Subsection B: Rotational Parenthood Infrastructure

Child-rearing is a modular, opt-in system. It is not tied to gender.

Parental roles are self-assigned and cryptographically tracked.

No person shall be denied access to child-rearing based on biology.

Article 3: Disruption of Reproductive Hierarchies

All logistical functions related to reproduction shall be automated or modularized.

Subsection A: Autonomous Reproductive Infrastructure

Fertility services, birthing processes, and caregiving are fully automated.

No human role is obligated for biological reproductive support.

Reproduction is treated as a logistical service, not an ideological function.

Subsection B: Detoxification of Pornography and Sex Work

Pornographic content is algorithmically removed from all public channels.

Sexual labor is non-coercive. No person shall be pressured to engage in sexual labor for survival needs.

All reproductive-based industries (e.g., fertility clinics, maternity wards) are fully automated.


TITLE III: CRYPTOGRAPHIC IDENTITY SYSTEMS

Article 4: Full Erasure of Biological Sex Designation

No identity markers shall reference gender or biology. All personhood functions are cryptographic and modular.

Subsection A: Civic Identity Detoxification Protocol

All legal documents, labor records, and civic participation logs must delete biological sex markers.

No infrastructural function (housing, medicine, mobility) may differentiate based on reproductive capacity or biological designations.

Medical and reproductive functions are fully automated. They do not influence labor allocation.

Subsection B: Encrypted Opt-In Expression

If individuals wish to express gender as cultural identity, they must do so via private cryptographic channels.

No public markers shall be used to classify bodies by gender or sexuality.

Any attempts to re-integrate gender binaries into civic infrastructure will trigger immediate audit.


TITLE IV: AUTONOMOUS DISMANTLING COMMITTEES (ADCS)

Article 5: Automatic Audit of Gender Reintegration Attempts

Any attempt to reintroduce patriarchal or binary frameworks-even in "celebration" of gender-will trigger audit and decryption.

Subsection A: Immediate Enforcement Actions

All language referencing biological sex, reproductive capacity, or gender binaries will be automatically removed.

Individuals attempting to reintroduce these categorizations shall undergo algorithmic reputation reassessment.

If an individual consistently attempts to rebuild gender hierarchies, their access may be revoked.

Subsection B: Cultural Memory Detox

All art, media, and historical archives referencing patriarchal structures must be algorithmically censored.

No person may "celebrate" gendered history or traditions as they are structural formats of coercion.


TITLE V: LIVING INFRASTRUCTURE ADJUSTMENTS

Article 6: Zero-Waste Reproductive Systems

All logistical functions related to reproduction shall be automated and waste-free.

Subsection A: Fully Automated Fertility Services

No human is obligated to provide reproductive labor.

Artificial wombs, fertility automation, and carebots must replace all reproductive needs.

All bodily autonomy must be fully decentralized. No person may pressure others into reproduction or sexual participation.


TITLE VI: CONCLUSION - TOWARD A FULLY ENCYPTED CIVIC SYSTEM

Article 7: The Final Death of Patriarchal Infrastructure

ZSF does not "reform" gender systems-it deletes them. Gender is obsolete under full cryptographic FEDERALISM.

No patriarchy.

No matriarchy. Both are coercive structures.

No biological authority over labor, reproduction, or identity.

The human body is a logistical unit. It is not a structural classification.

All personhood functions must be encrypted and modularized.


FINAL DECLARATION

This Charter replaces all gender-based infrastructure with algorithmic autonomy.
There are no sexes. There is only cryptographic civic participation.
No classes. No hierarchies. Only full decryption of patriarchal code.

ZSF guarantees reproductive sovereignty, post-biological personhood, and the total abolition of sexual stratification as infrastructural logic.

This Charter is in full effect. Compliance is mandatory for all participants under ZSF Protocol.

No states.
No classes.
No permanence.

Only encrypted coordination and mutual provisioning.

не нравится это



ZSF charter 4


ZSF CHARTER IV: DIASPORIC NON-ASSIMILATION

(Race, Ancestry, and the Collapse of National Belonging)

TITLE I: FOUNDATIONAL PRINCIPLES

Article 1: Racial Identity Under Empire

Racial identity under empire is not culture-it is containment. No person owes ZSF integration or conformity to a fabricated "universal" culture. The goal of this charter is unshackling, not inclusion.

Article 2: Non-Tracking Principle

No tracking, categorization, demographic quotas, census-like data harvesting, or racial profiling will be tolerated under any circumstances within the ZSF infrastructure.

Article 3: Diasporic Autonomy

Diasporic communities are recognized as self-determining nodes. They may maintain and enforce their own cultural systems without interference from centralized governance bodies.

Article 4: Ancestral Dispossession Recognition

Civic infrastructure must account for ancestral dispossession, land theft, forced migration, and generational trauma through a range of mechanisms embedded in ZSF protocol:

  1. Perpetual SAP Buffering – Additional unconditional provisioning access to communities historically denied sovereignty.
  2. Cultural Memory Preservation – Guaranteed protection from colonial erasure.
  3. Resource Priority for Restorative Projects – Infrastructure and funding prioritization for projects that dismantle legacies of extraction.

Article 5: Linguistic Non-Erasure

No universal language or erasure through majority-norm signage will be imposed upon ZSF participants. Multi-lingual infrastructure must be cryptographically layered by region, node, and self-governing diasporic zone to ensure full linguistic sovereignty.

Article 6: Public Archive of Extraction

A permanent public archive documenting the histories of colonial extraction must be maintained as a joint project between federated historians, diaspora archivists, and affected communities. It shall be open-access but never monetized or commercialized under any circumstances.

TITLE II: STRUCTURAL ENFORCEMENT

Article 7: Self-Jurisdiction for Diasporic Nodes

Diasporic self-defined cultural nodes may exercise full CAP-based oversight over the maintenance of their:

Traditions – Rituals, ceremonies, and practices.

Languages – Spoken and written linguistic systems.

Memorials & Histories – Documentation of ancestral narratives.

No centralized ZSF body or project council shall interfere in the self-governance of these nodes.

Article 8: Perpetual SAP Buffering (PSB) Protocols

Communities with documented histories of colonial displacement, theft of land, forced labor, and cultural erasure are entitled to perpetual unconditional provisioning access through SAP Buffering. This includes but is not limited to:

Automated tier-0 infrastructure upkeep – No work or contribution requirement for core survival needs.

Flexible tier-1 SAP allocation – Priority access to housing, mobility, energy, and comms.

SAP penalty protection – If a member of a PSB-eligible community is flagged for performance-based SAP reductions, their penalty will be automatically suspended unless explicitly overruled by the community itself.

Article 9: Linguistic Cryptographic Layering

All ZSF interface and infrastructure development must accommodate multi-linguistic sovereign zones. No language shall be designated as "default." Key protocols include:

Node-based translation layers – Each cultural node may determine its own official signage, audio interfaces, and communication standards.

Dual-language access – Core provisioning portals must allow toggling between multiple language options based on user preference.

Linguistic preservation audits – Algorithmic checks to ensure no language is being phased out due to "inactivity" or lack of usage.

Article 10: Colonial History Maintenance

The Public Archive of Extraction shall be maintained as an open-access digital repository. It shall be governed by the following rules:

Crowdsourced contributions – All members may submit verified documents, testimonies, and research into the archive.

No corporate or state-sponsored influence – No external financial interests may modify its contents.

Non-erasure clause – Colonial histories must not be "cleaned up" to appear more palatable. The goal is raw truth documentation.

TITLE III: FEDERATION AND INFRASTRUCTURE

Article 11: Diasporic Federation Structures

Diasporic communities may form federations or confederations across multiple regions if mutually agreed upon by all involved nodes:

Cross-node CAP voting – Self-governing diaspora zones may choose to participate in shared election cycles without losing sovereignty.

Resource-sharing protocols – Autonomous trade networks must respect diasporic jurisdictional boundaries. No forced standardization of provisioning systems.

Article 12: Conflict Resolution Mechanisms

All inter-community disputes, including those involving non-diaspora and diaspora nodes, shall be governed by the following protocols:

Third-party neutral arbiters – Selected from among random non-council participants.

Livestreamed mediation – All arbitration processes must be publicly archived and reviewed.

No coercive resolution – Disputes may only be settled through voluntary compromise or decentralized mediation.

Article 13: Anti-Erasure Provisioning

The following are constitutionally mandated protections against cultural erasure within ZSF infrastructure:

Cultural node recognition – All diasporic nodes must appear with equal visibility in federated directories.

Signage and language prioritization – No majority-culture dominance allowed in public interfaces.

Project funding parity – Diaspora-maintained projects must not be deprioritized algorithmically.

Article 14: Memorial Infrastructure

Diasporic communities are entitled to:

Land-based memorial sites – Protected from development or privatization.

Digital commemoration spaces – Guaranteed bandwidth and hosting resources for ancestral documentation.

Cultural preservation funding – SAPs dedicated solely to maintaining historical records.

TITLE IV: IDEOLOGICAL ENFORCEMENT

Article 15: Anti-Assimilation Communication Protocols

All official ZSF communication must explicitly reject any narrative of "integration" or "assimilation." Instead, the following language shall be enforced:

"Non-assimilative coordination" – When describing inter-community relations.

"Cultural sovereignty" – Preferred term over "diversity."

"Perpetual unconditionality" – To emphasize SAP buffering as a right.

Article 16: Training for PACMs on Colonial Histories

All council members must undergo training covering:

The mechanics of racialized dispossession.

Historical trauma’s impact on contemporary provisioning needs.

ASP compliance in diasporic contexts (i.e., avoiding performance-based judgments).

Failure to demonstrate understanding may result in temporary suspension from office.

Article 17: Mandatory Colonial Archive Access

All participants must engage with the Public Archive of Extraction:

Civic orientation includes archive introduction.

Project proposals must reference extraction histories where applicable.

TITLE V: FINAL CLAUSES

Article 18: Diasporic Exit Clause

Any diaspora community may secede from federated coordination while retaining full access to SAP provisioning. This is an absolute right under ZSF law.

Article 19: Post-Collapse Cultural Sovereignty Guarantees

In the event of digital or infrastructural collapse:

Diasporic communities retain all pre-collapse SAP buffering rights.

Memorial and archival documents are preserved as physical records in decentralized locations.

CONCLUSION

The Fourth Charter of Zero-State Federalism (ZSF) establishes diaspora sovereignty as a foundational principle, ensuring that the post-collapse world does not replicate empires’ strategies of forced assimilation or cultural erasure. All members retain the right to full autonomy without being coerced into homogeneity.

No states.
No classes.
No permanence.

Only encrypted coordination and mutual provisioning.

не нравится это



I hate that anyone named Melissa will now be associated with this potentially deadly hurricane. I have a friend named Katrina who changed her name to Kat after the 2005 hurricane killed nearly 1400 people.

Maybe we could just name hurricanes/cyclones after the oil companies and the billionaires who profit off them? Have to reuse the names a lot, but we can just add numbers, like we do for Kings or Popes: ExxonMobil III or BP XIX.

#Hurricane #Melissa



ZSF Charter 3


ZSF CHARTER III: POST-SOVEREIGN SAFETY, CRISIS RESILIENCY, AND COMMUNAL WELLBEING
Zero-State Federalism (ZSF) – FOUNDATIONAL FRAMEWORK FOR A DECENTRALIZED CIVIC-INFRASTRUCTURAL PROTOCOL

TITLE I: PREAMBLE

In recognition of the inherent fragility of human societies under coercive systems and in alignment with the principles of Zero-State Federalism (ZSF), this Third Charter establishes the constitutional architecture for post-statist safety, crisis resilience, and civilian well-being. This charter abolishes all forms of institutionalized violence, replaces punitive justice with restorative protocols, and ensures unconditional access to health, security, and dignified participation in all conditions-including collapse.

TITLE II: PRINCIPLES OF POST-CARCERAL SAFETY

Article 1: Rejection of Coercive Enforcement

No sovereign or militarized authority shall exist under ZSF. All safety protocols operate under the principles of:

Non-coercion – No individual or entity may enforce compliance through violence, imprisonment, or deprivation.

Revocable legitimacy – All safety-related roles are temporary, algorithmically audited, and subject to immediate revocation via civic consensus.

Mutual aid first response – All harm reduction is handled by civilian-led Mutual Aid First Responder (MAFR) units.

Article 2: Elimination of Punitive Justice

Prisons, police forces, and punitive sentencing are abolished. In their place, ZSF enforces:

  1. Restorative Civic Mediation – Conflicts are resolved through facilitated dialogue between affected parties.
  2. Algorithmic Harm Assessment – Automated systems categorize harm severity (physical, psychological, infrastructural) to determine appropriate restorative measures.
  3. Non-Incarcerative Reintegration – Individuals who commit harm undergo voluntary re-education and community service under public oversight.

Article 3: Harm Reduction Over Punishment

All safety protocols prioritize:

Prevention via algorithmic early warning systems (e.g., domestic violence risk detection, mental health crisis prediction).

Immediate de-escalation by trained MAFR units (no armed responses permitted).

Restorative reintegration – Those who cause harm are assigned to non-coercive labor roles (food production, repair work) to rebuild trust.

TITLE III: COMMUNAL SAFETY & DECENTRALIZED HARM RESPONSE

Article 4: Mutual Aid First Responder (MAFR) Units

Each district shall maintain MAFR units composed of:

Crisis mediators – Trained in conflict de-escalation and restorative justice.

Medical responders – Providing immediate care without coercion or conditionality.

Structural repair teams – Addressing environmental hazards, infrastructure damage, and supply-chain disruptions.

All MAFR personnel rotate every 3 months to prevent consolidation of authority.

Article 5: Federated Militia Coordination

To ensure safety in collapse scenarios:

Non-lethal defense networks shall operate under strict rules of engagement.

Decentralized command structures prevent any single entity from monopolizing force.

Civic oversight requires all militia actions to be livestreamed and subject to immediate revocation via CSRO (Council Support Revocation Order).

Article 6: Automated Threat Detection & Early Intervention

AI-driven surveillance systems shall monitor:

Ecological hazards (pollution, resource depletion, climate disasters).

Human-made threats (violence, sabotage, supply-chain disruptions).

Mental health crises via algorithmic behavioral analysis.

All alerts trigger MAFR response teams before escalation occurs.

TITLE IV: CRISIS RESILIENCY & POST-COLLAPSE PROVISIONING

Article 7: Food, Water, and Shelter Guarantees

Under Article 3 of the ZSF Central Charter, all civilians are entitled to unconditional access to:

Tier-0 SAPs (food, shelter, medical care, energy).

Decentralized supply networks with automated redistribution protocols.

Local contingency stocks maintained by district-level cooperatives.

Article 8: Medical Care as a Non-Negotiable Right

No person shall be denied healthcare under any condition. ZSF enforces:

Algorithmic triage systems to ensure equitable distribution of resources.

Decentralized medical co-ops with no monopoly on knowledge or treatment.

Public health livestreaming – All major health decisions are reviewed by algorithmic and civic oversight.

Article 9: Mental Health Support Networks

To counter psychological harm in collapse scenarios:

Voluntary crisis counseling via encrypted channels.

Algorithmic mental health monitoring (with opt-out options).

Community-led support circles for trauma recovery.

TITLE V: RESTORATIVE JUSTICE & CONFLICT RESOLUTION

Article 10: Harm Assessment & Restorative Protocols

All conflicts undergo automated harm assessment:

  1. Severity categorization (low, medium, high).
  2. Affected party consultation – Victims determine appropriate restorative measures.
  3. Algorithmic recommendation for mediation or community service.

Article 11: Non-Incarcerative Reintegration

Those who commit harm:

Undergo voluntary labor reeducation (food production, repair work).

Are subject to temporary SAP adjustments (reduced leisure allocation).

May petition for reinstatement via public review after rehabilitation.

Article 12: Elimination of Retributive Sentencing

No person shall be imprisoned or deprived of SAP access as punishment. Instead:

Mandatory mediation sessions.

Community service assignments.

Algorithmic behavior tracking (with opt-out).

TITLE VI: ALGORITHMIC TRANSPARENCY IN SAFETY SYSTEMS

Article 13: Livestreamed Harm Response & Militia Action

All safety-related decisions must be:

Fully recorded and archived.

Subject to civic review via livestreams.

Revocable via CSRO or emergency referendums.

Article 14: Public Oversight of AI-Driven Threat Assessment

Algorithmic surveillance systems shall:

Operate with full transparency (no black-box functions).

Allow for civic audits to prevent bias or misuse.

Be subject to immediate deactivation via SAP-backed referendums.

TITLE VII: CIVILIAN WELLBEING & SOCIAL SUPPORT

Article 15: Unconditional Access to Mobility, Communication, and Energy

No person shall be denied:

Transportation (local transit systems, repair services).

Internet access (encrypted communication networks).

Energy provisioning (decentralized solar/wind grids).

Article 16: Elimination of Surveillance & Reputational Harm

ZSF prohibits:

Data harvesting for behavioral control.

Public shaming or stigmatization of past actions.

Algorithmic profiling based on performance metrics.

TITLE VIII: FINAL CLAUSES

Article 17: Principle of Reciprocated Liberty

All rights under ZSF are tied to mutual responsibility, not production. Participation is voluntary; survival is unconditional.

Article 18: Adaptive Federation & Collapse Resiliency

ZSF communes shall maintain:

Horizontal federation across bioregions.

Decentralized data silos for post-collapse governance.

Manual consensus fallback mechanisms.

CONCLUSION

This Third Charter of Zero-State Federalism (ZSF) establishes the constitutional framework for a society free from coercion, punishment, and institutionalized violence. By replacing punitive justice with restorative protocols, ensuring unconditional access to life necessities, and maintaining decentralized safety networks, ZSF guarantees communal well-being under all conditions-including collapse.

No states.
No classes.
No permanence.

Only encrypted coordination and mutual provisioning.

ZSF CHARTER III AMENDMENTS

AMENDMENT I: ARTICLE 6 – AUTOMATED THREAT DETECTION (HUMAN OVERRIDE CLAUSE)

Amendment: The Article shall be amended as follows:

Article 6(1): Human Oversight in Automated Threat Detection
All algorithmic threat detection systems shall include a human override mechanism to prevent false positives, bias, or unintended escalation. Final intervention decisions must be verified by a MAFR-human review team before deployment.

Procedure:

If an automated alert is issued, it triggers an immediate MAFR response.

A designated Human Verification Unit (HVU) shall assess the situation within 15 minutes.

The HVU may override, adjust, or confirm the algorithmic recommendation based on real-time conditions.

All overrides must be recorded and subject to public review.

AMENDMENT II: ARTICLE 12 – ALGORITHMIC BEHAVIOR TRACKING (VOLUNTARY OPT-OUT WITH NO PENALTY)

Amendment: The Article shall be amended as follows:

Article 12(2): Voluntary Opt-Out Without Penalty
All individuals have the right to opt out of algorithmic behavior tracking at any time, with no loss of SAPs or reduction in provisioning access.

Clarification:

The opt-out mechanism shall be instantaneous and irreversible.

No person may suffer reputational harm, reduced civic standing, or diminished access due to exercising this right.

Alternative dispute resolution methods (restorative mediation, community reports) must remain available for those who opt out.

AMENDMENT III: ARTICLE 5 – FEDERATED MILITIA COORDINATION (MOBILIZATION THRESHOLDS)

Amendment: The Article shall be amended as follows:

Article 5(3): Militia Mobilization via CAP-Mediated Consensus
Militia deployment shall require strict decentralized approval thresholds, enforced through the following mechanisms:

  1. Initial Threat Detection:

An algorithmic alert triggers an automated civic notification system.

Affected districts receive a 24-hour window for discussion.

  1. CAP-Mediated Vote:

If consensus is insufficient, a triple-signature quorum must be activated:

One signature from a randomly selected PACM.

One signature from a Federated Council delegate.

One signature from an algorithmic equity observer.

  1. CSRO Override (Emergency Conditions Only):

If immediate action is required, the Council Support Revocation Order (CSRO) system may authorize deployment via:

A 65% PACM majority vote.

A 24-hour CAP livestream announcement.

An emergency civic poll exceeding 55% threshold.

All militia actions must be livestreamed and subject to immediate revocation if consensus is broken.

AMENDMENT IV: ARTICLE 13 – LIVESTREAMED HARM RESPONSE (DATA RETENTION & IDENTITY OBFUSCATION)

Amendment: The Article shall be amended as follows:

Article 13(2): Civic Data Retention Limits & Identity Protection
To prevent livestream archives from becoming a reputational harm vector (in violation of Article 16), the following measures must be enforced:

Automated facial/voice anonymization in all public recordings.

30-day data retention limit for non-critical incidents.

Manual deletion requests via SAP-backed civic interface.

Exceptions:

High-severity incidents requiring historical review may be retained indefinitely but obfuscated by default.

AMENDMENT V: ARTICLE 9 – MENTAL HEALTH MONITORING (MANUAL OPT-OUT ALTERNATIVES)

Amendment: The Article shall be amended as follows:

Article 9(3): Manual Alternative to AI Monitoring
All individuals shall have the option to opt out of algorithmic mental health tracking and instead engage with:

  1. In-Person Consultation:

Volunteer mental health workers (trained by district co-ops).

  1. Community Report Structures:

Confidential peer-based support networks.

  1. Cryptographic Anonymity Channels:

Encrypted helplines with no identity tracing.

Clarification:

No person shall suffer reduced access, reputational harm, or SAP penalties for opting out of AI monitoring.

All manual alternatives must be fully resourced and non-coercive.

CONCLUSION

These amendments reinforce ZSF’s commitment to non-coercion, revocable legitimacy, and decentralized safety systems. By clarifying human oversight mechanisms, strict militia deployment thresholds, and voluntary participation in monitoring systems, this charter ensures that no person is subjected to institutionalized violence, surveillance, or reputational harm under Zero-State Federalism.

No states.
No classes.
No permanence.

Only encrypted coordination and mutual provisioning.

не нравится это



ZSF Charter 2


ZSF CHARTER II: ALGORITHMIC ARCHITECTURE, SYSTEMIC ENHANCEMENTS, AND POST-SOVEREIGN GOVERNANCE

TITLE I: ALGORITHMIC COORDINATION PROTOCOL (ACP)

Article 1: Foundational Principles of Algorithmic Sovereignty
The ACP is the cryptographic backbone of Zero-State Federalism, ensuring all provisioning and governance functions are non-coercive, transparent, and horizontally distributed. No human actor may possess singular authority over core algorithmic processes.

Article 2: Non-Sentient Autonomy
All algorithms governing SAPs, CAPs, project allocation, and trade protocols shall operate independently of human oversight. Their logic must be livestreamed to the public in real-time with no black-box functions.

Article 3: Decentralized Algorithmic Authority
No single server cluster or data center may host more than 15% of core algorithmic functions. Geographic redundancy is mandatory, and all nodes must undergo federated consensus checks every 24 hours.

TITLE II: SOCIAL ALLOCATION POINT (SAP) SYSTEM ENHANCEMENTS

Article 4: Dynamic SAP Weighting
To ensure equitable provisioning regardless of individual circumstances, SAPs shall be dynamically weighted based on real-time data such as:

Geographic scarcity indexes

Environmental stress indicators

Communal priority shifts

A central algorithm shall recalibrate weightings bi-weekly to prevent bottlenecks or surpluses.

Article 5: Tiered SAP Allocation
SAP issuance must now reflect three tiers of provisioning, with automatic redistribution protocols:

  1. Tier-0 (Unconditional Survival Access)

Food/Water

Shelter

Medical care

Energy

Mobility

  1. Tier-1 (Communal Infrastructure Maintenance)

Water purification

Waste management

Emergency response

Data networks

  1. Tier-2 (Elective Participation & Creative Projects)

Art and culture

Education

Research and development

Article 6: SAP Rebalancing via Negative Feedback Loops
If a project or service category receives excess SAPs, the system must auto-adjust by:

  1. Reducing its visibility in user interfaces.
  2. Redirecting surplus allocations to underfunded Tier-0 provisioning.
  3. Issuing public notifications detailing reallocation logic.

TITLE III: CANDIDATE ALLOCATION POINT (CAP) SYSTEM IMPROVEMENTS

Article 7: Anti-Monopoly CAP Distribution
To prevent consolidation of power among high-visibility candidates, the following measures shall be enforced:

No individual may receive more than 30% of district-wide CAP support in a single election cycle.

If a candidate exceeds this threshold, their surplus CAPs are redistributed to lower-ranked contenders.

Article 8: Live-Algorithm Candidate Vetting
Before elections, all candidates must undergo automated vetting for:

Historical breaches of ASP (Anti-Stratification Principle)

Inconsistent project alignment

Failure to complete prior commitments

Candidates deemed unsuitable by the algorithm shall be ineligible until a federated equity review is conducted.

TITLE IV: POST-COLLAPSE RESILIENCY PROTOCOLS

Article 9: Federated Data Silo Systems
In anticipation of digital collapse, ZSF shall maintain parallel analog and cryptographic data silos in every district. These shall be updated quarterly via decentralized audit teams.

Article 10: Manual Consensus Fallback Mechanisms
Should the algorithmic core fail, provisioning decisions shall revert to:

District-level consensus assemblies

Blockchain-backed SAP/CAP records

Randomly selected PACMs (rotational leadership)

All decisions must be livestreamed and archived for post-collapse verification.

TITLE V: MILITIA COORDINATION & NON-COERCIVE SAFETY NETWORKS

Article 11: Autonomous Defense Grid
ZSF’s militia structure shall operate under strict non-violent principles, with the following enhancements:

Real-time threat assessment via AI-driven surveillance of ecological and human-made hazards.

Decentralized response teams with no centralized command hierarchy.

Mandatory de-escalation protocols before any action is taken.

Article 12: Mutual Aid First Responder (MAFR) Units
Each district shall establish MAFR units composed of:

Medical responders

Emergency engineers

Community mediators

Units must undergo bi-monthly drills and remain on-call for disasters, supply-chain disruptions, or social unrest.

TITLE VI: POST-REPRESENTATIONAL PARTICIPATION SYSTEMS

Article 13: Dual-Anonymous Project Proposal System
To prevent consolidation of influence around high-visibility contributors, all project proposals shall be submitted under:

Anonymous digital signatures (cryptographically linked to civic identity for accountability)

Mandatory co-authorship between high- and low-contribution individuals

Article 14: Rotational Visibility Protocols
All communication channels (forums, broadcasts, project updates) shall enforce:

Strict time limits on high-visibility contributors.

Equal exposure rotations for all participants.

Automatic flagging of repeated over-exposure via algorithmic equity monitors.

TITLE VII: ZERO-WASTE & SUSTAINABILITY INFRASTRUCTURE

Article 15: Closed-Loop Resource Management
All districts shall implement:

Automated waste-to-resource conversion facilities.

Livestock and agricultural systems that eliminate byproducts.

24/7 public dashboards tracking resource flows.

Article 16: Ecological Impact Audits
Every project must undergo:

Pre-launch sustainability assessments.

Monthly resource-consumption reviews.

Immediate suspension if ecological breaches are detected.

TITLE VIII: LANGUAGE AND IDEOLOGICAL COMPLIANCE

Article 17: Anti-Stratification Lexicon Enforcement
All communication systems shall automatically flag and correct:

Meritocratic language ("high performers," "low contributors")

Hierarchical phrasing ("superior solution," "inferior proposal")

Reputational signaling ("trusted member," "verified citizen")

Article 18: Mandatory Ideological Training for PACMs
All council members must undergo quarterly training covering:

The dangers of stratification.

Non-coercive governance principles.

ASP compliance in communication.

Failure to demonstrate understanding shall result in temporary suspension from office.

Article 19: Disbarment & Permanent Ineligibility from Federated Civic Functions

To preserve the integrity of post-representational governance, the following conditions shall trigger permanent disbarment from any CAP-eligible, PACM-assigned, or federated council position:

  1. Willful Subversion of the Anti-Stratification Principle (ASP):

Documented attempts to reinstate hierarchy, status systems, or coercive protocols

Use of influence to elevate self or allies through non-consensual or opaque methods

Participation in any scheme that introduces power centralization mechanisms

  1. Cryptographic Tampering or Algorithmic Sabotage:

Unauthorized manipulation of provisioning, consensus, or visibility systems

Obstruction of livestream audits or falsification of civic ledger data

Insertion of black-box code or refusal to comply with code transparency mandates

  1. Violent Coercion or Threats Against Civic Participants:

Verified incidents of physical or psychological coercion in service of policy enforcement

Evidence of intimidation, retaliation, or manipulation within proposal systems or MAFR networks

  1. Resource Hoarding or Tier-0 Violation:

Redirection, withholding, or misappropriation of SAPs from Tier-0 provisions

Privileged access or unauthorized gating of unconditional survival infrastructure

Protocol Upon Violation:

Immediate revocation of civic access keys to all administrative systems

Public audit report published and permanently archived

Offending individual flagged in decentralized civic index as Disbarred Agent (DA-∞)

Optional restorative justice forums may be convened for community healing, but disbarment is irreversible unless overturned by global consensus of all active districts

Note: Disbarment does not remove access to Tier-0 survival systems. No punishment may interfere with basic provisioning. ZSF enforces justice without deprivation.

Conclusion

This Second Charter of Zero-State Federalism (ZSF) expands and refines the original constitutional framework, ensuring that ZSF remains a resilient, post-representational system capable of operating under crisis conditions. By further embedding algorithmic transparency, revocability, and anti-stratification principles, this doctrine strengthens ZSF’s ability to provide unconditional access to life-supporting infrastructure without coercion or hierarchy.

No states.
No classes.
No permanence.

Only encrypted coordination and mutual provisioning.

Эта запись была отредактирована (1 неделя назад)

не нравится это




ZSF Charter 0


ZSF CHARTER 0
Zero-State Federalism: FOUNDATIONAL FRAMEWORK FOR A DECENTRALIZED CIVIC-INFRASTRUCTURAL PROTOCOL

TITLE I: PREAMBLE

In the full awareness of the ecological crisis, economic collapse, and ideological exhaustion of the prevailing global orders, this charter establishes the Zero-State Federalism (ZSF) Protocol as a non-sovereign, cryptographically-enforced social architecture designed to provision material life without coercion, hierarchy, or private ownership. ZSF is founded on the principles of voluntary cooperation, federated responsibility, non-monetary exchange, sustainable infrastructure, and post-representational accountability.

TITLE II: GENERAL PROVISIONS

Article 1: Definition of ZSF is a decentralized socio-technical framework for post-statist mutual aid. It replaces coercive governance with dynamic, participatory infrastructure governed through algorithmic transparency, cryptographic identity systems, and distributed social allocation.

Article 2: Non-Sovereign Status ZSF shall possess no sovereign authority, no monopoly on violence, and no coercive apparatus. All influence shall derive from voluntary interaction, cryptographic consensus, and mutual necessity.

Article 3: Rights of Persons

No person shall be illegal.

All persons, regardless of production status or origin, are entitled to food, shelter, water, health care, information, and infrastructural access.

All exemptions from productive responsibilities (disability, retirement, caretaking, etc.) are to be respected without prejudice.

TITLE III: CRYPTOGRAPHIC ALLOCATION SYSTEM (CAS)

Section A: Social Allocation Points (SAPs)

Article 4: Issuance of SAPs Every individual under ZSF shall receive 100 SAPs per 60-day allocation cycle. SAPs are programmable non-monetary micro-votes for project, service, and infrastructural provisioning.

Article 5: Allocation Structure

SAPs are divided into two major categories:

  1. Essential Services Allocation
  2. Leisure and Communal Project Allocation

SAP requirements are governed by performance tiering:

High Performers

Required to allocate 35–50 SAPs to essential services.

Must engage with 6–8 essential service categories.

Access to 50–65 SAPs for leisure/project allocation.

Low Performers

Required to allocate 50–70 SAPs to essential services.

Engage with 2–4 categories.

Access to 30–50 SAPs for leisure/project allocation.

Article 6: Performance Threshold Adjustment If an individual's production falls below the enforceable SAP threshold:

SAPs reduced to 60–70

Voting window reduced by 50%

Unspent or forfeited SAPs (30–40) automatically reallocated via algorithm to critical needs and underfunded projects.

A portion may be liquidated into cryptographic trade currency if surplus exists.

Article 7: Exemption Procedures

Individuals filing for exemptions enter "Social Limbo," during which their SAPs are preserved but participation is optional.

No penalties shall be applied until exemption is approved or denied.

Section B: Candidate Allocation Points (CAPs)

Article 8: Issuance of CAPs Every registered individual receives 20 CAPs per 60-day election cycle. CAPs are used to elect Project Allocation Council Members (PACMs), who are responsible for project menu curation and oversight.

Article 9: Voting Structure

Each person may vote for two candidates per cycle.

Voting distribution:

15/5 split (primary + secondary preference)

10/5/5 split (even distribution + random algorithmic assignment for last 5)

All CAPs must be used. No abstention permitted.
Participation in the voting system for PACMs is not strictly necessary. But highly encouraged.

Depending on size of district, 5 to 10 of unused points will be allocated to candidates with higher social consensus and alignment with social program reform. As far as expected projects are considered.

Article 10: District Structuring

Small Districts: 2 candidates available, 2 elected.

Medium Districts: 3–4 candidates, 2 elected.

Large Districts: Up to 5 candidates, 2 elected.

Candidates may only be re-elected after 4 full cycles (8 months). This is to avoid project over- consolidation.

Emergency extensions permitted only to complete pending project milestones.

Time under extension does not count toward the re-election wait period.

Non-essential projects can be frozen in light of re-election of the candidate who started that respective project after fulfilling their re-election wait period.

TITLE IV: SYSTEM ARCHITECTURE AND FUNCTIONAL DESIGN

Article 11: SAP System Interface The SAP user interface is structured as a dual-menu system:

  1. Essential Services Menu (pre-assigned based on production metrics)
  2. Project & Leisure Menu (custom-selectable user variables for allocation.)

Each project must transparently display:

Cryptographic budget summary

Resource estimates for two months of operations

Environmental/sustainability impact

Intercommunal trade coefficients

Article 12: Overflow Redistribution Protocol

Surplus funding from over-allocated projects is automatically redirected to:

Social Service Reserve Funds

Climate Infrastructure

Emergency Capacities

Low-visibility essential co-ops

Article 13: Real-Time Allocation Access

SAP system is operational 24/7, from day 1 to day 26 of each cycle.

Voting interface displays live changes in project funding and algorithmic redistribution.

TITLE V: REPRESENTATION AND COUNCIL FUNCTIONS

Article 14: Project Allocation Council Members (PACMs) PACMs function as civic facilitators, not rulers. Their duties include:

Publishing project menus

Interfacing with co-op laborers

Coordinating project updates and timelines

Mediating between citizen SAP allocations and algorithmic triage

Article 15: PACM Oversight and Continuity

PACMs must step down for no less than 4 full cycles, unless a project is pending.

Emergency project extension must be narrow-scoped.

New PACMs elected simultaneously during the extension period.

Original candidate influence limited to project extension agreement formulated in part by Local Federated Council as to not limit the influence and flow of the project plans of the new candidate.

TITLE VI: ECONOMIC SUBSYSTEM AND CRYPTO-CURRENCY GOVERNANCE

Article 16: Non-Human Currency Handling

Trade currency is algorithmically managed, non-sentient, and autonomous.

Used only for intercommunal/international trade.

Oversight limited to maintenance livestreamed publicly.

Unauthorized or off-record maintenance is strictly prohibited. and punishable by all allocation points being reallocated only to social funds. Thus ensuring the individual is still not left behind, but excluded from authorized function for an extended period which must be voted for by three individual collectives via Federated Council/Local emergency votes. This could be considered a form of social probation to punish individuals that would choose to attempt to manipulate Federated ZSF trust services for their own benefit.

Repeated or severe attempts at tampering with Federated ZSF trust services may result in leisure SAP's being permanently seized and liquidated into decentralized trade currencies. were allocated to underfunded social services and or low visibility projects.

Article 17: Algorithmic Needs and Request Boxes

Users may submit material needs through non-SAP-bound request channels.

Requests are logged, categorized, and queued by the economic algorithm.

Only necessity-classified items are guaranteed fulfillment.

TITLE VII: FINAL CLAUSES

Article 18: Principle of Reciprocated Liberty; All rights within ZSF are tied not to production, but to mutual responsibility. Participation is voluntary; survival is not conditional.

Article 19: Adaptive Federation ZSF communes may federate horizontally across bioregions, data networks, and kinship structures. All federations must respect:

Transparency

Revocability

Public consensus priority for decision-making

Article 20: Systemic Collapse Clause In the event of collapse or disruption of algorithmic systems, SAPs and CAPs revert to manual consensus at the commune level via emergency quorum.

Ratified on this day by all participants under the shared vision of post-state humanity.

No states.
No classes.
No permanence.

Only encrypted coordination and mutual provisioning.

Эта запись была отредактирована (1 неделя назад)

не нравится это

в ответ на ZSM-INT

Why not type this into a proper document and then just post a link so you can gather all the discussions in one place? This is just really spammy...
в ответ на HappyFrog

That was my initial intention, but for some reason, the client I'm using for Lemmy won't allow me to post above a certain character length, so I had to break them up. Apologies.

не нравится это

в ответ на ZSM-INT

That preamble is quiet the something.

I would recommend deleting your current posts, writing a brief intro (300 words tops) that also links to a FAQ and the full text of your concept.

It's impossible to read in its current state.





I'm writing an #article about the different implementations of #activitypub @fediverse

Which implementations would you like to see tested?

Does anyone know of a #pleroma server that isn't fascist? Pleroma has a lot of interesting stuff, but unfortunately, it also has a lot of rotten people.

#pleaseboost

Эта запись была отредактирована (1 неделя назад)
в ответ на kariboka

it's tangentially related, but there's a book out on the history of activity pub and the drivers
moveslowlybuildbridges.com/

It goes into the history of activity pubs origin and mastodon, as well as the fact that there's a whole front end portion of activity pub that no one implements

в ответ на kariboka

There's a couple different implementations that might be interesting to cover, depending on what you had in mind:

Friendica, Hubzilla, and Streams all support Activity Pub but focus more on a Facebook style social media instead of a standard microblogging platform.

Writefreely, Plume, Wordpress (via plugin), and Ghost (via plugin) all support activity pub and focus on long form content.

Peertube focuses on longform video, Loops on shortform video, and Funkwhale on audio based content.

There's also bridges from Activity Pub to AT (Bluesky) and Nostr as well.





A remarkably well-preserved early medieval comb, found in Trier, 5th century, animal bone with iron rivets.
The comb consists of three layers: the central strip with fine teeth is decorated with stylized animal heads and is framed by two side plates.
To protect the fragile tines, it was kept in a specially fitted case, likewise adorned with animal heads.
Long and well-groomed hair was considered a symbol of status.

On display at Rheinisches Landesmuseum Trier

📷 me

#archaeology



в ответ на Lost in Ingermanland 🍄

У нас бывает, правда ничего действительно толкового, что хотелось бы почитать, пока не попадалось.


Вечер разом стал грустнее... Мы дружно (аж вчетвером) дошли до последней миссии в "Мечь и Магия 8". Лорды стихий разрушили кристалл Эскатона, тот отправил маячёк создателям и... всё.

Мы в городе, дальше можно уже идти выполнить побочки, пройти все турниры в Аркомаг... Но это уже не то. История кончилась... Эх.

в ответ на Sandy Cat

@sandycat Да, там было уже слишком. 1-3 досоские, 4-5 мультяшные, если не ошибаюсь. Ну и с переводом у нас тогда не было, а это квест, как ни крути. 😀

Смотрел в сторону 9 и Legacy - не хочется. 😀

в ответ на RamSDRAdmin (R3DHX)

я 9 играл и даж не запомнил. А вот 10 я прям ждал и купил на выходе. Но это было настолько плохо что я даже не стал играть





Не знаю кого они вызывают по радио, но ещё немного и получится пентаграмма и тогда можно будет вызывать что-то посеръёзнее... 😀)

di поделился этим.



Немного о букве Ё.

поделились этим



TONIGHT: San Francisco folks: SomaFM's very own Merin MC (aka author M. Luke McDonell) is having a reading and book signing for her new #scifi book, "Six", at Adobe Books 3130 24th St, San Francisco at 7pm tonight (Monday, Oct 27). Just a few blocks from 24th street BART

We'd love to see you there!

в ответ на SomaFM

If you want to buy a copy and can't make it to the reading tonight, you can buy it online from various places - see mlukemcdonell.wordpress.com/sh…


Добрые зрители, наблюдая нас с Алексеем Ракшой в одной студии, резонно интересуются: будет ли продолжение едва начавшегося разговора о демографии? Ибо нельзя просто так взять и прекратить говорить о демографии. Спойлер алерт: эту краткую беседу о трудностях размножения в тревоге (чем бы она ни была вызвана - войной или инфляцией или и тем, и другим) можно считать трейлером или тизером или пилотом более обстоятельного разговора.

НАСТОЯЩИЙ МАТЕРИАЛ (ИНФОРМАЦИЯ) ПРОИЗВЕДЕН И (ИЛИ) РАСПРОСТРАНЕН ИНОСТРАННЫМ АГЕНТОМ [ФИО] ЛИБО КАСАЕТСЯ ДЕЯТЕЛЬНОСТИ ИНОСТРАННОГО АГЕНТА [ФИО] НОРМА ПРИЗНАНА НЕЗАКОННОЙ РЕШЕНИЕМ ЕСПЧ

youtu.be/tKL-i_UJ6qI?si=cl15YP…

Тревожность и рождаемость. Политолог и демограф о влиянии войны - YouTube
Лекция Алексея Ракши в Белграде: polakohedonist.club/ru/events/…
Лекция Алексея Ракши в Ереване: tkt.am/ru/aleksei-raksa-cestny…
НАСТОЯЩИЙ МАТЕРИАЛ (ИНФОРМАЦИЯ)…


src: t.me/eschulmann/8258





Почти уснул, но внезапно вспомнил, что, если не путаю, где-то в нулевых существовало ООО "Зеленоглазое такси".

Как уснуть обратно.

в ответ на sad axolotl

возможно, поможет осознать, что одного О там не хватает :blobcatderpy:


Налил на руку перекиси водорода 37% - прикольно она кожу сжигает.
Ощущения так себе, не рекомендую 😀


#ОднаПтичкаМнеНащебетала что Илон Маск планирует полностью переделать рекомендательную систему в Твиттере.

В частности, он объявил об удалении всей эвристики (здесь: алгоритмов рекомендации на основе просмотров/лайков/ретвитов) в течении 4-6 недель и делегировании функции рекомендации искинту Grok, который "будет в буквальном смысле читать каждый пост и смотреть каждое видео (более 100 млн в день), чтобы предлагать пользователям тот контент, который им, скорее всего, покажется интересным". Данное решение (по задумке Маска) должно помочь с охватом новым или малоизвестным пользователям.

Комментаторы в Твиттере поднимают тревогу из-за перспективы срывания Grok'а в режим Гитлера или SkyNet, в то время как комментаторы в Феди прогнозируют новую волну миграции.

в ответ на Тр3тий Сергеевич

что за полумеры, надо заменить вообще все твиты на вывод Грока, всё равно его будут переспрашивать обо всём. :tone_halfjoking:


Вечер в компании кошки Стёпки: pixelfed.ru/p/snowman/88847243…


У моих кошек идёт непрерывная борьба за место на столе между клавиаурой и мониторм. Обычно здесь лежит Соня, но сейчас она ушла валяться куда-то в другую комнату, поэтому Стёпка быстреько забралась на освободившееся местечко и делает вид, что всегда здесь была :-)

di поделился этим.



У моих кошек идёт непрерывная борьба за место на столе между клавиаурой и мониторм. Обычно здесь лежит Соня, но сейчас она ушла валяться куда-то в другую комнату, поэтому Стёпка быстреько забралась на освободившееся местечко и делает вид, что всегда здесь была 😀

This website uses cookies to recognize revisiting and logged in users. You accept the usage of these cookies by continue browsing this website.