Пропустить до основного содержимого





#лытдыбр
В догонку к предыдущей публикации.
Раз уж зашла речь о плохих качествах проприетарного и скотском отношении к потребителям.
Вот немного еще крика души:
На картинке два ноута.
Один Acer Aspire One (редкой топовой модели), а второй бизнесбук Thinkpad X270 (очень дорогой когда-то).
Acer по широкой стороне 295мм, Thinkpad 315мм.
По функциям они сопоставимы.
Только у Acer 2 планки озу, а у x270 - одна, dual channal не доступен. Acer был очень хорош. Но устарел по процессору и у него слишком плохой дисплей, еще и без FHD разрешения.
По размерам Acer супер удобный, его компактность ощущается максимально. Thinkpad по факту совсем чуточку крупней (шире), но из за того, что производитель решил выпендриться нестандартностью - он вообще никуда не влазит, а куда влазит болтаетется как морковка в проруби. Вся его "мобильность" к лешему. Получился вроде неплохой, но довольно бестолковый аппарат. Только к модели Carbon nano до них дошло, что золотая середина для ультрабука - это 300мм. Но эти карбоны нано стоят, даже Б/У как крыло от боинга. Хотя по функциям они предлагают лишь одно существенное отличие от x270 - более вменяемые габариты.
Эта запись была отредактирована (1 неделя назад)
в ответ на Dmitry

Продолжу про боль с ОЗУ на x270:
Да, вместо Dual Channel можно использовать дорогую двухранковую память. Но! Мать перемать, вашу так-то. Это совсем не одно и то-же. Тем более, нахрена было запрещать XMP профили памяти? А ну да, точно, чтобы продавать свою брендированную Thinkpad (SKhynix на самом деле) - ведь только она может запускаться на максимальных частотах и с хорошими таймингами, а если ты поставил... скажем, Kingston с такими же харрактеристиками - накоси выкуси...


В бой идут одни старики

Президентом Камеруна переизбрали 92-летнего Поля Бийю - Ведомостиvedomosti.ru/politics/news/202…

Бийя занимает пост президента с 1982 г.

У них ещё больше стабильности, завидуйте!

chebotarev.spb.ru/blog/2025/v-…



#лытдыбр
Я не писал об этом напрямую ни разу, но возможно кто-то заметил косвенно по иным темам.
Я очень осторожно отношусь к китайским брендам и избегаю Китайских девайсов сложнее примитивного вентилятора.
Не сделанных в Китае, а Китайских брендов.
Вот почему:
Очень кратко - соотношение цены и поддержки для Gaidjin ("неверных") в китайских продуктах недруженственно к потребителям. После того как ты заплатил за продукт - все, ты использованный биомусор - та больше не нужен. Мы для них недочеловеки которых можно кидать через колено и ничего за это не будет.

Подробней в комментарии.

в ответ на Dmitry

Это отношение сквозит как со смартфонами, так и со всей бытовой техникой.
НО! так как я уже 3 года живу в квартирах с очень низкой влажностью в зимнее время года, у меня есть два увлажнителя воздуха, ультразвуковые (ага, правильно - потому что дешевые). Оба дешевые и разумеется, Китайские - Xiaomi. Один очень простой - там просто ручка больше/меньше (она же вкл и выкл). Второй "умный" - "Mijia smart antibacterial humidifier 2" (суб бренд Xiaomi). Евро версия стоит конских денег, настолько, что лучше купить Philips или Electrolux, за те же деньги, поэтому у меня версия для китайского рынка. В приложении для Евро и Для Китайского рынка различный функционал. Для Китайцев гораздо больше годных плюшек. Важный момент - в оригинальном приложении Mi Home, обязательно давать доступ к местоположению смартфона с которого подключаешь (регистрируешь) устройство. Он видит, что ты не в Китае и отрубает тебе устройство (пофиг, что в приложении китайский регион). Приходится использовать хакнутое приложение.
Честно говоря, оба увлажнителя - говно. Но свои функции они как-то там выполняют. Умный только благодаря усилиям Русского энтузиаста сделавшего это хакнутое приложение.
Есть еще "умный" робосос "Dreame Bot D9 Plus", евро версия, где-то читал, что это тоже одно время был суб бренд xiaomi, а может и до сих пор им является, но у него свое приложение. Приложение раньше было на нескольких языках, теперь оно наполовину на Китайском и то, что люди из других стран не понимают эти иероглифы им до лампочки... Тоже так себе машинка, но свою основную функцию кое как выполняет, буквально балансируя на лезвии бритвы между "сойдет" и "бесполезное говно". Да ладно, ладно, норм машинка, если бы была бесполезная - не пользовался-бы. Но если бы было какое-то домашнее животное, устройство скорее превратилось бы в "бесполезное говно", чем в годного помощника, но это скорее вопрос к модели - есть более продвинутые.
Все приложения, разумеется проприетарные.
В общем, у меня нет позитивного опыта, а опыт большой, с устройствами Китайских брендов, даже если они были сделаны для европейского рынка и связано это с отношением к потребителю.
Про опыт со смартфонами, я пожалуй не буду рассказывать - слишком много буков. Но, однозначно для себя решил: китайский смартфон куплю только если не будет вообще никаких альтернатив и он будет очень сильно нужен. Пока есть альтернативы - что угодно, хоть сырой Open Source отставший на 10 лет и весь багах, хоть бюджетного карейца из 2017 года, но только не Китай. Я наелся их нацистского (ой, я имел в виду патриотичного) отношения к потребителям из других стран, как и их культуры производства/потребления в целом.
в ответ на Dmitry

ладно ещё бытовой увлажнитель... у нас всё вокруг заполонили китайские автомобили-электромобили. компьютеры на колёсах. совсем с другими ценами. с нетерпением жду когда все эти Хунь-Суни начнут массово ломаться.
в ответ на Cooling Fan 375

У нас тоже.
Ломаться уже начали.
Стонов и боли, воплей, страданий и слез, по теме, очень много.
НО! Мыши плакали, кололись, но продолжали грызть кактус...

Лично для меня очевидно, что китайский автопром очень молодой, а их культура производства в купе с культурой потребления, да для такого серьезного, опасного продукта - это смертельно опасное сочетание.
Однако, я ценю право на свободу. Хотят - пусть покупают. Нравиться грызть кактус - на здоровье.

в ответ на Dmitry

А ведь обычный комнатный гибискус вместо увлажнителя мог бы спасти человека от синофобии...
в ответ на Сейд ✅

он способен повысить влажность с 20% до 50% на площади 40^2 метров? 🤔 Серьезно? Черд... надо было купить гибискус 😢
в ответ на Сейд ✅

Нет. Уже все. Денежка потрачена, нервы раздраконены, устройство работает как должно. Надежно в автоматическом режиме держит 50% и контролируется удаленно со смартфона (в т.ч. показывает температуру и влажность в помещении).
Цель достигнута)
Возможно с Гибискусом было бы проще, но я этого не знал) да и сейчас есть сомнения, что цель была бы достигнута 🤷‍♂️
в ответ на Сейд ✅

Даже не знаю как воспринимать этот комментарий 😄На всякий случай пишу - Спасибо)
в ответ на Michael [Кошак] Skolsky (R1BLH)

Я в курсе, что Гайдзины - это Япония) Просто я забыл как называется китайский аналог)


Советский программист: выгорание придумали зумеры

Ада Лавлейс:



в сознании человека тысячи лет существует конфликт. поняв эмпирическим путем, что он возникает из праха и обращается в прах, человек придумал душу и начал строить разнообразные занимательные теории о ней.

породив десятки тысяч лет кровавой драмы.

почему он не готов признать что его «душа» такое же свойство того самого праха, как масса или структура атомов, которая не возникает и не исчезает, а просто становится способной функционировать, когда «прах» собирается в подходящую форму?

Эта запись была отредактирована (1 неделя назад)
в ответ на kosten

@ksonly предположи что частички твоей «души» просто останутся с атомами твоего тела подобно их массе там или спину электронов (не уверен что это правильное слово, не разбираюсь в этом)
в ответ на Galactic Jew 🇮🇱

фигня это все
Вот тебе ассоциация если скинуть в кучу кремний, золото и текстолит то мы не получим процессор

Как именно голова устроенна это сложно сказать так как предмет этот темный но я уверен что после кислородного голодания после которого мозг начнет рассыпаться там уже нет не сознания, не памяти о чем либо, не инстинктов

Ну собственно это ты и написал пока есть определенная структура в голове это вася пупкин и если собрать на подобие(представим что мы это сможем) то это уже не будет им так как при схожости во многом это уже будет совершенно другой человек

Кстати о выводах что человек это он пока он жив и не может реинкарнироваться я пришел почитав о различных нейрозаболеваниях и травмах головы где человек остается жив но утрачивает определенные навыки и заново почитав главу из биологии про зарождении человека там кстати по сути он "собирается" из определенного набора генов и стройматериала и в этой схеме нет места для абстрактной "души"

в ответ на kosten

я собственно об этом и говорю. говоря «частичка твоей души» в атоме я не имею в виду что она несет какие то твои персональные черты, как не несет ни какой персональности атомная масса.

точно так же как каждая аминокислота не несет ни какой твоей индивидуальности.

возможно для этого есть какая то величина какого-то параметра, который мы не умеем измерять, или набора параметров.

Эта запись была отредактирована (1 неделя назад)
в ответ на kosten

@kosten

если скинуть в кучу кремний, золото и текстолит то мы не получим процессор


При этом считается, что если долго скидывать в кучу углерод, кислород, кремний и еще кучу всего - рано или поздно получится человек. Хотя как по мне - вероятность того, что в безграничном космосе может самозародиться датацентр с серверами - выше. 😀



С утра радуют только три сакральные праславянские руны на рекламном щите – очень уж они там в тему!


Живя́ в глубинке и посещая разные населенные пункты (подработка такая - антенки вертеть) общался с разными людьми. От заезжих менеджеров крупных операторов связи до "староверов", которые до сих пор хранят у себя книги типа староцерковные.

Соль в том, что каждый из них считал неприемлемым ("грехо́м") разное. Вот одна семья считала паспорт - грех, но самогонка в 12 нормально. Другая - считала нормой выдать 18-летнюю за 33-летнего за бочку "хорошей рыбы". Третьи - грехом считали сидеть со мной "мирски́м" за одним столом.. куча ситуаций была.

И неизбежно, считая себя (божьи люди) лучше "мирски́х" - старались затянуть в разговоры о природе греха и всех пре́лестей (искушений), доказывая свое превосходство над испорченными, грешными людьми. Не чураясь , конечно, покупать лодочные моторы, современные машины и вешая по телеку в каждой комнате.

Ну так вот, когда меня начинали "под самогоночку" расспрашивать что же я считаю грехом - я отвечал всегда одно и то же. Не быть любознательным.

поделились этим





Если кому-то интересно, чем я занимаюсь последние месяца полтора в свободное время.
А занимаюсь я вот этим. Готовлюсь к новой сессии по "Дальше звёзд", на этот раз хочу попробовать поиграть на столе с террейном. Друг-монтажник-резчик-и-просто-хороший-человек накинул обрезков ПВХ различной толщины, а я из них мастерю блокпост по мотивам всратого сооружения, встреченного на границе города. Здание разбирается по этажам, чтобы был доступ к внутренним помещениям, лестница из скоб сконструирована так, чтобы миньки могли на ней держаться (расстояние между двумя скобами примерно равно высоте подставок, а длина скоб - примерно треть от диаметра). Есть дверные проёмы, в которые пролезает минька, окна, бойницы и нечто мерлонообразное. Перила сделаны из кусков литников, кровля - из арматуры гофрокартона, а вот скобы пришлось печатать.
Кстати, на фотках шесть клон-пехотинцев - попробуйте найти их всех.


Sensitive content





На одном из лондонских телеканалов сообщается о начале расследования, касающегося 9000 дел о насилии над девушками, в которых, по данным СМИ, фигурируют эмигранты. Отдельное внимание уделяется возможной причастности городских властей к сокрытию информации через попытки убедить пострадавших отказаться от заявлений, внушая им чувство личной вины. Упоминается мэр Лондона Садик Хан и его возможная осведомлённость о происходящем.

#Лондон

Эта запись была отредактирована (1 неделя назад)



aaaaaaaaaaaaaaaaa my model mama Solum randomly just started drawing me a lil while back and now is done and incredible and aaaaaaaaaaakjfdhgdfjhgdfkhg

please go follow her wherever you can and support her and stuff i'm just in awe ​:rosa_sob:​ 💗 linktr.ee/SolumVT



Вот тут буду завтра примерно в 14.45 по Москве, 12.45 по Берлину.

НАСТОЯЩИЙ МАТЕРИАЛ (ИНФОРМАЦИЯ) ПРОИЗВЕДЕН И (ИЛИ) РАСПРОСТРАНЕН ИНОСТРАННЫМ АГЕНТОМ [ФИО] ЛИБО КАСАЕТСЯ ДЕЯТЕЛЬНОСТИ ИНОСТРАННОГО АГЕНТА [ФИО] НОРМА ПРИЗНАНА НЕЗАКОННОЙ РЕШЕНИЕМ ЕСПЧ

src: t.me/eschulmann/8259



Forwarded from Общество Мемориал

Стрим Медиазоны в поддержку Возвращения имен!

Смотрите завтра, 28 октября, с 13:12 по московскому времени (11:12 по Центральной Европе) на канале Медиазоны по ссылке!

В эфире Екатерина Шульман, Тамара Эйдельман, Армен Захарян, Линор Горалик, Максим Курников, Сергей Смирнов, наши коллеги, организаторы локальных акций и другие гости расскажут истории репрессированных в годы советского террора. Прозвучат семейные истории, рассказ о жизни Егише Чаренца, армянского поэта, погибшего в 1937 году, о репрессиях против коренных народов, о том, как искать репрессированных родственников, и многое другое.

Если вы будете смотреть эфир в записи, вы все равно сможете поддержать акцию донатом. На эти деньги сотни организаторов и организаторок по всему миру смогут провести акцию в своих городах.

Поддержите Возвращение имен

#возвращениеимен #29октября #october29

Возвращение имен: истории. Шульман, Эйдельман, Захарян, Яшин, Курников, Колезев, Смирнов, Горалик - YouTube
Накануне акции Возвращение имен Медиазона и Мемориал проводят специальный стрим. Мы не только назовем имена, мы вернем истории, которые за ними скрываются.
Екатерина Шульман, Тамара Эйдельман, Армен Захарян, Илья Яшин, Максим Курников, Линор Горалик, Дмитрий…


src: t.me/eschulmann/8260



Let me repeat that. The Austrian federal ministry of economics migrated to Nextcloud Hub. All 1200 employees. The complete Hub with Files, Talk, Groupware, Office and Flow. No test but fully in production since 6 months. People like it. No complains. Other ministries are impressed and want to do the same. People who say that Open Source doesn’t work are wrong.
nextcloud.com/blog/austrias-mi…




Совет хозяйке на заметку, если у вас устаноален двухтарифный счётчик электричества, перфоратором выгоднее пользоваться по ночам.


Ребята, вот как сделать адекватный будильник на ПК с линухом, способный просыпать его из состояния сна (ACPI S3 suspend-to-RAM). Если у вас KDE и недавний ноут от Huawei, но можете попробовать и у себя.

Во первых, ставим KClock.
Во вторых, в конфигурации PowerDevil, что открывается по systemctl --user edit plasma-powerdevil.service, необходимо раскомментить последний блок, но без линии ExecStart. Это необходимо изначально, видимо, для мобильной Plasma, но работает и на ПК. Скорее всего, эффективность зависит от вашего RTC. Потом рестарт - systemctl --user restart plasma-powerdevil.service. Это решит непробитие будильника через режим сна.

Теперь у меня есть будильник, что не под рукой и легко сбивается, а который жестко на столе и до которого ещё надо сесть за рабочую станцию, чтобы отключить. Щасье! Может, и вам пригодится. Но учтите, что звук пойдет по выставленной общей громкости, и по видимости, в главный на данный момент звуковыход (т.е. может в наушники). Может, и это фиксемо.

Эта запись была отредактирована (1 неделя назад)


Твиттер напомнил вдруг про те пугающие времена, когда в Офисе спеллчекер для русского языка делало ЗАО «Информатик». Особенно вспоминается то, что слова «Голубой» и «Розовый» отсутствовали в словаре. #идиоты #программы
в ответ на 𝕁𝕠𝕙𝕒𝕟

@johan, Они самые. При чём падало оно, на самом деле, довольно часто, в основном именно на русском языке. Порой Вордом без отключения проверки орфографии пользоваться было почти невозможно. И чем больше у тебя был текст, тем хуже было.
в ответ на Linda-chan

Ох, помним, скорбим... Ща остановился на 2003 (!), последнее поделие с нормальным интерфейсом...




Убедительно. Я так-то раньше был против буквы "ё" считая ее ненужеым пережитеом прошлого. Но вот, простой пример говорит мне, что я не прав.


Немного о букве Ё.


:anarchistflagblack: mutual aid :antifa:

Help a trans woman active in the PDX antifascist community get food! she's homeless and sleeping rough right now.... and she doesn't get paid until November 3rd.

please boost and donate to help my lovely brave trans friend "A" get food and supplies....

Csh App $AntifaPMOfficePDX

#MutualAid #TransMutualAid #Crowdfund #Begpost #MastodonForHarris #Tesla #TeslaTakedown



Случилось мне купить в оби складную табуретку/микро-стремянку. Приехав домой, обнаружил отсутствие петель и метизов, явный некомплект.

На следующий вечер (сегодня) поехал в магазин в надежде заменить/вернуть.

Так вот сразу столкнулся с двумя максимально разными чувихами: девушка в сервисном отделе пыталась убедить меня в моей неправоте сходу, мол, я должен сам проверять комплектность при покупке, а то че это. Но ее удалось уболтать и она отвела меня к ответственной продавщице, которая напохуях сказала: "ну, давай просто из другой коробки возьмем" и проблема решилась за 3 минуты.

Вот и че было говнить то, на ровном месте! Я бы вернул табуретку по чеку и они бы опять продавали некомплектный набор.

Я конечно скептически отношусь к практикам "близкого отношения" к работе и субъектам/объектам на работе, но сегодня меня это практически спасло.

#лытдыбр







ZSF Charter (ammendments)


AMENDMENTS TO THE ZSF CHARTER 0
TITLE III: CRYPTOGRAPHIC ALLOCATION SYSTEM (CAS)
Section A: Social Allocation Points (SAPs)

Article 5: Allocation Structure (Amended)
SAPs are divided into two major categories:

Essential Services Allocation
Leisure and Communal Project Allocation
Performance Tiering Clarification:

Performance tiering is a functional descriptor with no status implications.
All individuals have equal access to life-supporting infrastructure regardless of their performance tier.
Article 6: Performance Threshold Adjustment (Amended)
If an individual's production falls below the enforceable SAP threshold:

SAPs reduced to 60–70
Voting window reduced by 50%
Unspent or forfeited SAPs (30–40) automatically reallocated via algorithm to critical needs and underfunded projects.
A portion may be liquidated into cryptographic trade currency if surplus exists.
Clarification:

SAP reduction is not a penalty but a mechanism to ensure equitable distribution of resources.
All individuals, regardless of performance, have access to Tier-0 provisioning.
Article 7: Exemption Procedures (Amended)
Individuals filing for exemptions enter "Social Limbo," during which their SAPs are preserved but participation is optional.

No penalties shall be applied until exemption is approved or denied.
Clarification:

Participation in higher-tier provisioning is always opt-in and rotational. There shall be no cumulative SAP privilege, no carry-over prestige, or access priority based on history.
Section B: Candidate Allocation Points (CAPs)
Article 10: District Structuring (Amended)
Small Districts: 2 candidates available, 2 elected.
Medium Districts: 3–4 candidates, 2 elected.
Large Districts: Up to 5 candidates, 2 elected.

Clarification:

Candidates may only be re-elected after 4 full cycles (8 months) to prevent project over-consolidation.
Emergency extensions permitted only to complete pending project milestones. Time under extension does not count toward the re-election wait period.
Non-essential projects can be frozen in light of re-election of the candidate who started that respective project after fulfilling their re-election wait period.
TITLE V: REPRESENTATION AND COUNCIL FUNCTIONS
Article 14: Project Allocation Council Members (PACMs) (Amended)
PACMs function as civic facilitators, not rulers. Their duties include:

Publishing project menus
Interfacing with co-op laborers
Coordinating project updates and timelines
Mediating between citizen SAP allocations and algorithmic triage
Clarification:

PACMs must step down for no less than 4 full cycles, unless a project is pending.
Emergency project extension must be narrow-scoped.
New PACMs elected simultaneously during the extension period.
Original candidate influence limited to project extension agreement formulated in part by Local Federated Council as to not limit the influence and flow of the project plans of the new candidate.
TITLE VI: ECONOMIC SUBSYSTEM AND CRYPTO-CURRENCY GOVERNANCE
Article 16: Non-Human Currency Handling (Amended)
Trade currency is algorithmically managed, non-sentient, and autonomous.

Used only for intercommunal/international trade.
Oversight limited to maintenance livestreamed publicly.
Unauthorized or off-record maintenance is strictly prohibited and punishable by all allocation points being reallocated only to social funds. Thus ensuring the individual is still not left behind, but excluded from authorized function for an extended period which must be voted for by three individual collectives via Federated Council/Local emergency votes. This could be considered a form of social probation to punish individuals that would choose to attempt to manipulate Federated ZSF trust services for their own benefit.
Repeated or severe attempts at tampering with Federated ZSF trust services may result in leisure SAP's being permanently seized and liquidated into decentralized trade currencies, which are allocated to underfunded social services and/or low-visibility projects.
TITLE VII: FINAL CLAUSES
Article 18: Principle of Reciprocated Liberty (Amended)
All rights within ZSF are tied not to production, but to mutual responsibility. Participation is voluntary; survival is not conditional.

Clarification:

All individuals have equal access to life-supporting infrastructure regardless of their performance tier.
SAP reduction is not a penalty but a mechanism to ensure equitable distribution of resources.
REVOCABLE AGENCY PROTOCOL (RAP) SUBSECTION 3: COUNCIL SUPPORT REVOCATION ORDER (CSRO)
Article V: Grounds for Revocation (Amended)
Any of the following may justify a CSRO:

Climate & Ecological Violations
Resource or Fund Mismanagement
Election or Voter System Tampering
Disruption of SAP Equilibrium (leisure vs. survival priority skew)
Civic Stagnation or Obstruction of Emerging Candidates
Negligence during Crisis or Emergency Events
Conflict Misconduct (failure to properly liaise with federation militia or peer communes during high-risk conditions)
Clarification:

Civic stagnation is clearly tied to the disruption of critical provisioning loops and not to individual performance metrics.
Obstruction must be clearly documented and verified through public consensus.

No states.
No classes.
No permanence.

Only encrypted coordination and mutual provisioning.

не нравится это



ZSF Charter 7


ZSM CHARTER VII: INTER-COMMUNAL DEFENSE AND WEAPONS SOVEREIGNTY
(PROTOCOLS FOR NON-COERCIVE COLLECTIVE SECURITY AND FEDERATED MILITIA COORDINATION - EXPANDED)

TITLE I: FOUNDATIONAL PRINCIPLES OF NON-SOVEREIGN DEFENSE

Article 1: Rejection of Centralized Military Authority
No commune, federation, or council under ZSM shall possess a standing army, centralized command structure, or monopoly on the use of force. All defensive measures shall be decentralized, voluntary, and subject to immediate revocation. This principle is a direct application of the ZSF's core tenet of non-sovereignty, rejecting the state's monopoly on violence as detailed in ZSF Charter 0, Article 2. As Errico Malatesta warned, even revolutionary organizations can develop "an iron law of oligarchy" if power is not actively diffused. Therefore, all defense structures must be designed to prevent the consolidation of authority, embodying the Anti-Stratification Principle (ASP) of ZSF Charter II, Article 19, which forbids any action that reintroduces hierarchy or status systems.

Article 2: Principle of Defensive Action Only
All inter-communal defense actions shall be strictly defensive in nature. Preemptive strikes, offensive operations, and retaliatory campaigns are prohibited. Defense is defined as the protection of life, well-being, and the means of survival (Tier-0 provisioning) as guaranteed in ZSF Charter 0, Article 3. This principle is inspired by the long tradition of Indigenous resistance, where, as Klee Benally articulates, defense is rooted in protecting the sacred and the community from immediate, existential threats, not in projecting power. An "Immediate Threat" is defined as a verified, active attack on commune members or critical infrastructure. A "Credible Threat" is defined as a clear and present danger, confirmed through the human-override-verified algorithmic threat detection systems (per ZSF Charter III, Amendment I), such as an armed fascist group advancing on a commune's perimeter.

Article 3: Voluntary Association in Defense Networks
No individual shall be compelled to participate in defensive operations. All roles within militia structures are opt-in and subject to rotational assignment to prevent hierarchy formation. This is an expression of mutual aid, not duty. As Kropotkin demonstrated in Mutual Aid , cooperation is a powerful evolutionary factor, but it must remain voluntary to retain its liberatory character. Participation is based on the "common notions" of trust and responsibility, where individuals act not out of obligation but from a recognition of their interdependence for collective security and survival. The "joyful militancy" described by Bergman and Montgomery
a fierce commitment to emergent forms of life is the ideal spirit for this voluntary association, not grim conscription.

Article 4: Cryptographic Oversight of All Defense Actions
All defensive operations, from training to deployment, shall be:
Livestreamed via encrypted channels: All actions, from training drills to live engagements, shall be broadcast on public-facing, encrypted channels to ensure transparency, as mandated by ZSF Charter III, Article 13.
Subject to real-time CAP-mediated oversight: Key decisions, such as deployment authorization or the use of Tier-3 weapons, require continuous Candidate Allocation Point (CAP) backing from the broader community, ensuring the defense force remains an instrument of the commune and not an autonomous power.
Recorded in immutable ledgers for public audit: Every action, every weapon check, every deployment vote shall be recorded on the ZSF's cryptographic ledger, creating a permanent, auditable record to prevent abuse and ensure accountability, in line with ZSF Charter II's algorithmic transparency protocols.

TITLE II: FEDERATED MILITIA COORDINATION FRAMEWORK

Article 5: Structure of Mutual Defense Collectives
Each commune shall maintain a voluntary militia collective organized as follows:
Local Defense Units (LDUs): Base-level responders for commune security. These are the basic affinity groups of defense, small enough to build deep trust but large enough to be effective. They are the first responders to any threat.
Regional Response Networks (RRNs): Cross-commune coordination cells. When a threat exceeds the capacity of a single LDU, RRNs composed of delegates from multiple LDUs coordinate a federated response.
Specialist Support Cadres (SSCs): Medical, engineering, and technical experts. These cadres provide critical support roles. Medical SSCs will be trained in street medicine as detailed in sources like the Black Flag Catalyst Revolt Guide , including the ABCs (Airway, Breathing, Circulation), treatment of open wounds, and gunshot wounds. Engineering SSCs will be skilled in defensive fortification, infrastructure repair, and the neutralization of technological threats, drawing on knowledge from The Anarchist Arsenal .

Article 6: Mandatory Rotation and Anti-Consolidation Protocols
All militia positions shall enforce strict rotation:
No individual may serve in any command-like role for more than 6 consecutive months.
All leadership functions must be shared among at least 3 individuals in a rotating "spokescouncil" model, preventing any single point of failure or authority.
After each rotation period, a 12-month cool-down from similar roles is required.
This protocol is a direct institutionalization of the fight against "rigid radicalism" and the consolidation of power. It ensures that skills are widely distributed and that no individual becomes entrenched in a position of influence, thus upholding the ZSF's post-representational principles.

Article 7: Training and Readiness Standards
All militia participants must undergo:
Quarterly de-escalation and conflict resolution training: This training is paramount and must be prioritized over weapons drills. It incorporates the principles of restorative justice from ZSF Charter III, focusing on mediation, harm reduction, and transforming conflict.
Monthly defensive tactics drills (livestreamed for public oversight): These drills cover practical skills, from shield wall formations and safe retreat tactics to the proper use of non-lethal deterrents. All drills are public to maintain transparency and community trust.
Bi-annual ethical defense principles certification: This certification requires participants to demonstrate a thorough understanding of the ZSF Charter, the ASP, and the principles of non-coercive defense. It is a reaffirmation of the political and ethical foundation of their role.

TITLE III: WEAPONS REGULATION AND CONTROL PROTOCOLS

Article 8: Classification of Defensive Materials
All weapons and defensive tools shall be categorized as:
Tier 1: Non-lethal defensive tools: Includes items like shields, barriers, communication jammers, and deterrent systems like high-powered lasers or paint for obscuring police visors (tactics from bfc-revolt-guide ).
Tier 2: Defensive-capability weapons: Includes tools designed to incapacitate without causing lethal harm in most scenarios, such as pepper spray, tear gas (for defensive use only), and various improvised incendiary devices like "lunch bag incendiaries" or "fire logs" (from The Anarchist Arsenal ).
Tier 3: Lethal-force weapons: Includes projectile weapons and explosives. The manufacturing and use of these items are subject to the highest level of scrutiny and are strictly for defensive purposes against lethal threats. Examples include improvised firearms and more complex devices like the "Lewis Bomb" or "Fuel-Air Explosives" (FAEs) from The Anarchist Arsenal , to be used only in extreme circumstances, such as defense against a heavily armed, genocidal assault.

Article 9: Cryptographic Access Control for Weapons
All Tier 2 and Tier 3 weapons shall be stored in decentralized, heavily fortified armories with:
Triple-signature cryptographic release protocols: Access requires one LDU member, one randomly selected Project Allocation Council Member (PACM), and one civilian oversight delegate. This prevents any single group from unilaterally accessing high-level weaponry.
Biometric identity verification with no single-person override capability: Access is tied to an individual's cryptographic identity, with all access attempts logged immutably.
Real-time inventory tracking with public-facing (but obfuscated) dashboards: The community can see that weapons are secure and accounted for without revealing sensitive operational details.

Article 10: Manufacturing and Distribution Controls
All weapons manufacturing within ZSM territory must:
Be fully documented in public cryptographic ledgers: Every component, every process, from sourcing of materials to final assembly, is recorded. This transforms the clandestine act of weapons manufacturing into a transparent, communal activity.
Undergo monthly sustainability and safety audits: SSCs (engineering) and civilian committees conduct audits to ensure safety protocols are followed and that manufacturing doesn't create undue environmental harm.
Require CAP-mediated approval for production scale increases: If a commune wishes to scale up production of a defensive tool, it must make its case to the broader community, which allocates resources via the CAP system.
Be limited to defensive-purpose designs only: The manufacturing of offensive weapons of war or weapons designed for state-level policing is strictly prohibited.

Article 11: Inter-Communal Weapons Transfer Protocols
Any transfer of weapons between communes must satisfy:
Full public disclosure of transfer rationale and recipient commune approval: The reasons for the transfer must be transparent, and the receiving commune must signal its approval through its own consensus process.
Triple-verification from sending commune, receiving commune, and regional federation council: This ensures all parties in the federated network are aware and agree to the movement of materials.
Real-time tracking of all transferred materials until secured in recipient armory: The cryptographic ledger tracks the weapon's journey, ensuring it doesn't "disappear" into a black market.

TITLE IV: DEFENSIVE OPERATIONS AND DEPLOYMENT PROTOCOLS

Article 12: Threat Assessment and Response Triggers
Defensive actions may only be triggered by:
Immediate Threat: Verified attack in progress against commune members or critical infrastructure (e.g., a police raid, an active shooter situation as described in the bfc-revolt-guide ).
Credible Threat: Algorithmic threat detection (e.g., identifying armed fascists advancing) confirmed by a Human Verification Unit (HVU) as per ZSF Charter III, Amendment I. This prevents false positives and algorithmic bias from triggering violent responses.
Federated Request: Formal request for assistance from another ZSM commune under verified attack. This activates the mutual aid network.

Article 13: Deployment Authorization Matrix
All defensive deployments require:
Level 1 Response (Tier 1 weapons only): 55% consensus of available LDU members. This allows for rapid response to common threats like police harassment using non-lethal tools.
Level 2 Response (Tier 2 weapons): 70% consensus of available LDU members + one PACM verification. This higher threshold is for situations where there is a credible threat of serious harm but not necessarily lethal force.
Level 3 Response (Tier 3 weapons): 85% consensus of available LDU members + two PACM verifications + regional federation oversight delegate approval. This is the highest possible threshold, reserved for existential threats where the community's survival is at stake. This process is a direct application of the strong consensus model, as seen in movements like Occupy.

Article 14: Continuous Oversight During Operations
All defensive operations must maintain:
Live cryptographic voting every 4 hours to continue deployment: The community can vote at any time to stand down the defense force, ensuring its actions remain continuously authorized.
Real-time civilian oversight via obfuscated livestreams: To protect operational security, identities may be obscured, but the actions of the defense force must remain visible to prevent abuse.
Immediate revocation capability via CSRO (Council Support Revocation Order): If any three non-involved communes agree that the defense force is acting outside its mandate or violating ZSF principles, they can issue a CSRO to immediately revoke its authority.

TITLE V: INTER-COMMUNAL DEFENSE FEDERATION PROTOCOLS

Article 15: Mutual Defense Pact Structure
Communes may form voluntary defense pacts under these conditions:
No pact may include more than 8 communes without regional federation approval: This prevents the formation of large, unwieldy power blocs that could challenge the federated structure.
All pact decisions require unanimous consent of member communes: This respects the autonomy of each commune.
No pact may maintain standing combined forces all coordination is ad-hoc: Forces are only combined during an actual crisis and are immediately demobilized afterward, returning to their local LDUs.

Article 16: Conflict Resolution Between Communes
Any disputes between communes regarding defense matters shall be resolved through:
Third-party mediation from non-aligned communes: Drawing on the principles of ZSF Charter IV, Article 12.
Public, livestreamed arbitration sessions: Ensuring transparency and community involvement in the resolution process.
Cryptographic consensus building with no coercive enforcement: The goal is mutual understanding and agreement, not a victor and a vanquished.

Article 17: Emergency Federation Powers
In existential threats to multiple communes, temporary coordination may be established with:
24-hour sunset clause requiring renewal via CAP vote: This emergency power is strictly time-limited and must be continuously re-authorized by the community.
Strict limitation to defensive actions only: The mandate cannot be expanded to offensive operations under any circumstances.
Mandatory public audit within 72 hours of action completion: A full review of the emergency coordination must be conducted to ensure it complied with all ZSF protocols.

TITLE VI: ANTI-CIRCUMVENTION AND COMPLIANCE ENFORCEMENT

Article 18: Weapons Protocol Violation Consequences
Any attempt to circumvent weapons protocols shall result in:
Immediate seizure of involved materials via multi-commune oversight teams: A team from neighboring communes, not the offender's own commune, will conduct the seizure to ensure impartiality.
Suspension of all defense privileges for involved communes for 6 cycles: The commune loses its ability to access Tier 2 and 3 weapons and must rely on federated support for its defense.
Public audit and cryptographic reputation adjustment for involved individuals: The individuals' reputation scores within the ZSF system are permanently adjusted, flagging them as untrustworthy. This is a form of social consequence, not imprisonment, in line with ZSF Charter III's restorative justice model.

Article 19: Federation Overreach Prevention
No federation or council may:
Centralize weapons storage beyond commune level: Armories must remain local and under community control.
Mandate participation in defensive operations: Participation remains strictly voluntary as per Article 3.
Withhold provisioning as coercion for defense cooperation: ZSF Charter 0, Article 3 guarantees unconditional access to Tier-0 provisioning. This cannot be used as a weapon to force compliance.

Article 20: Cryptographic Compliance Monitoring
All defense activities shall be subject to:
Automated protocol compliance checking via neutral algorithms: The ZSF's core algorithms will automatically flag any actions that violate the charter, such as accessing weapons without proper authorization or deploying without consensus.
Random audit by selected civilian committees: Regularly, randomly selected citizens from across the federation will conduct deep audits of defense activities.
Continuous CAP-based approval ratings for all defense coordinators: The community can express its confidence in its coordinators in real-time through the CAP system, and low ratings can trigger a rotation.

TITLE VII: POST-CONFLICT AND RESTORATIVE PROTOCOLS

Article 21: Mandatory De-escalation and Ceasefire Procedures
All defensive operations must include:
Automated ceasefire offers every 2 hours of engagement: The defense system will automatically broadcast a ceasefire offer to the opposing force at regular intervals.
Public documentation of all conflict resolution attempts: Every effort made to de-escalate the situation must be recorded on the public ledger.
Independent mediation team deployment at earliest opportunity: As soon as it is safe, a team of mediators from a non-involved commune will be deployed.

Article 22: Post-Conflict Accountability and Reconciliation
Following any defensive engagement:
All actions undergo public restorative justice review: This process, as outlined in ZSF Charter III, focuses on harm, accountability, and healing, not punishment. The goal is to understand what happened, who was harmed, and how to repair the harm and reintegrate those responsible.
Any harm to persons or property triggers automatic SAP-based compensation: If the defense action causes unintended harm, the community's collective resources (Social Allocation Points) are automatically allocated to repair the damage and support the victims.
All participants undergo debriefing and psychological support: The trauma of conflict is real. All participants, from the front lines to support roles, will have access to mental health support to process their experiences, a practice inspired by the mutual aid focus of movements like the Black Panthers.

Article 23: Historical Documentation and Learning
All defensive engagements shall be:
Documented in immutable public archives: A complete record is kept for future generations.
Analyzed for protocol improvements: The community will collectively analyze the engagement to identify weaknesses in its protocols and find ways to improve.
Used to update training materials without glorification of conflict: The lessons learned are integrated into training, but the focus remains on de-escalation and the tragedy of violence, not on celebrating martial prowess.

TITLE VIII: FINAL PROVISIONS

Article 24: Supremacy of Non-Violent Resolution
All defense protocols shall prioritize de-escalation and conflict prevention. The use of force is always a last resort, requiring exhaustive documentation of alternatives attempted. This reflects the ZSF's core belief in "reciprocated liberty," where freedom is achieved through mutual responsibility, not coercion.

Article 25: Preservation of Communal Autonomy
No defense protocol shall override:
A commune's right to opt-out of specific operations: A commune cannot be forced to participate in a defense action it does not agree with.
Individual rights to avoid participation: Participation in the militia is always voluntary.
The fundamental principle that survival provisioning cannot be weaponized: As stated in ZSF Charter 0, Article 18, no one's access to food, water, shelter, or healthcare can be contingent on their participation in defense.

Article 26: Continuous Protocol Review
All defense and weapons protocols shall be:
Reviewed quarterly by randomly selected civilian committees: Ensuring fresh eyes and diverse perspectives are always applied.
Updated annually via CAP-mediated voting: The entire community has the power to amend its defense protocols.
Subject to immediate suspension if found to enable hierarchy or coercion: If any protocol is found to violate the ASP, it can be suspended immediately pending a full review.

CONCLUSION

This Seventh Charter of Zero-State Mutualism establishes that collective defense shall never become collective oppression. It integrates the practical wisdom of direct action and street medicine with the deep ethical frameworks of mutual aid, restorative justice, and anti-stratification. Through decentralized control, cryptographic oversight, and voluntary participation, ZSM communes may protect themselves without recreating the coercive structures they seek to replace. This system is designed not for victory, but for survival, autonomy, and the continuous creation of a world based on freedom and mutual aid.

No states.
No classes.
No permanence.

Only encrypted coordination and mutual provisioning.

Эта запись была отредактирована (1 неделя назад)

не нравится это



ZSF Charter 6


ZSF CHARTER VI: RADICAL ACCESS AND DISABILITY AUTONOMY

THE ABOLITION OF NORMALCY AS CIVIC INFRASTRUCTURE

TITLE I: FOUNDATIONAL PRINCIPLES

Article 1: The Abolition of Normalcy as Structural Standard
Zero-State Federalism (ZSF) formally abolishes all notions of "normal" or "standard" ability as structural baselines. Human variance is the default state, not an accommodation category.

Article 2: Definition of Disability Under ZSF Law
Disability shall be understood as:
A) Any variation in human form or function that requires divergent infrastructural support to participate in civic systems
B) Self-determined through cryptographic identity protocols
C) Protected from medical or biometric profiling through encrypted sovereignty

Article 3: The Elimination of Productivity Metrics
All SAP allocation, contribution expectations, and civic participation protocols shall be rendered entirely independent of productivity measures. Efficiency is not a civic value.

TITLE II: CRYPTOGRAPHIC IDENTITY AND DISABILITY SOVEREIGNTY

Article 4: Self-Determined Disability Identity
All individuals may self-register disability status through cryptographic identity protocols with:
A) No medical or institutional verification requirements
B) Full protection from algorithmic bias through randomized identity encryption
C) Dynamic updating capabilities for fluctuating conditions

Article 5: Anti-Biometric Provisions
All systems handling disability data shall enforce:
A) Complete absence of facial recognition, gait analysis, or behavioral profiling
B) Decentralized storage with local control over information access
C) Immediate purge protocols following access requests

TITLE III: RADICAL INFRASTRUCTURE DESIGN PRINCIPLES

Article 6: First-For-Disabled Design Mandate
All infrastructure projects shall implement:
A) Universal Accessibility Assessments (UAA) at the conceptual phase
B) Divergent Use Case Scenarios (DUCS) in all development stages
C) Federated Testing Protocols with disabled leadership

Article 7: Assistive Technology Stewardship Framework
Assistive technologies and devices shall be:
A) Designed as open-source protocols under public license
B) Fabricated through decentralized 3D printing networks
C) Distributed via SAP-based provisioning systems with no medical gatekeeping

TITLE IV: SOCIAL ALLOCATION POINT (SAP) SYSTEM ADAPTATIONS FOR DISABILITY AUTONOMY

Article 8: Care Credits System Architecture
All individuals shall receive:
A) Base care credit allocation of 25 SAPs per cycle for interdependence networks
B) Dynamic scaling capability based on self-reported needs assessment
C) Zero-accountability spend protocols with no justification requirements

Article 9: SAP Protection Clause for Disabled Individuals
In no circumstance shall any disabled individual experience:
A) Reduction in Tier-0 provisioning allocation
B) Modulation of infrastructure access privileges
C) Penalization for fluctuating contribution cycles

TITLE V: DISABILITY FIRST MEDICAL SYSTEMS

Article 10: Autonomous Medical Access Framework
Medical services shall operate under:
A) No diagnostic gatekeeping protocols
B) Direct SAP-based provisioning for all medical supplies and procedures
C) Decentralized peer-to-peer care networks with no institutional oversight

Article 11: Chronic Condition Equity Provisions
All individuals with chronic conditions shall receive:
A) Predictive access allocation for medication and supply fluctuations
B) Crisis buffer protocols for emergency situation preparedness
C) Zero-wait scheduling for all medical services via livestreamed priority queues

TITLE VI: COGNITIVE AND NEURODIVERGENT DISABILITY AUTONOMY

Article 12: Sensory Customization Protocols
All digital interfaces shall provide:
A) Fully customizable sensory input/output matrices
B) Alternative data representation frameworks beyond textual displays
C) Livestreamed feedback loops for real-time adjustments

Article 13: Cognitive Load Management Systems
ZSF infrastructure shall integrate:
A) Automatic task fractionation protocols for complex operations
B) Federated memory augmentation networks with no single point of failure
C) Crisis recovery protocols for catastrophic cognitive events

TITLE VII: PHYSICAL ACCESS FEDERATIONS AND MILITIA SUPPORT SYSTEMS

Article 14: Mobility Infrastructure Architecture
All physical environments shall implement:
A) Modular accessible pathways with no permanent barriers
B) Decentralized maintenance networks with rapid response capabilities
C) Emergency transport protocols integrated into federated safety grids

Article 15: Disability First Safety Networks
Mutual aid safety teams shall enforce:
A) Immediate evacuation protocols for disabled individuals during crises
B) Priority access to emergency supplies without justification
C) Embedded care personnel trained in divergent needs response

TITLE VIII: ECONOMIC AUTONOMY AND INDEPENDENCE SYSTEMS

Article 16: Cooperative Care Networks
ZSF shall support the formation of:
A) Autonomous interdependence cooperatives with no productivity mandates
B) Resource-sharing protocols for high-need situations
C) Emergency reserve funds through surplus SAP redistribution

Article 17: Technology Freedom Provisions
All disabled individuals shall have unconditional access to:
A) Adaptive communication systems with no speech or language prerequisites
B) Automated task execution tools without oversight requirements
C) Personal mobility solutions with zero range limitations

TITLE IX: CULTURAL TRANSFORMATION AND ENFORCEMENT PROTOCOLS

Article 18: Anti-Normalcy Education Systems
All civic participants shall undergo:
A) Mandatory structural divergence training curricula
B) Federated feedback mechanisms for system improvements
C) Continuous ideological reinforcement via livestreamed equity audits

Article 19: Disability Autonomy Oversight Councils
Each federation shall maintain:
A) Permanently seated disability first oversight councils
B) Immediate revocation protocols for accessibility violations
C) Zero-tolerance enforcement systems with no appeal processes

TITLE X: POST-COLLAPSE DISABILITY SAFETY NETWORKS

Article 20: Emergency Infrastructure Continuity Protocols
In collapse scenarios, ZSF shall maintain:
A) Parallel analog systems for all essential services
B) Decentralized maintenance crews with disability-first training
C) Immediate priority protocols for disabled access restoration

Article 21: Resource Continuity Frameworks
Critical supplies including:
A) Medical devices and medications
B) Sensory adaptation tools
C) Mobility augmentation technologies
Shall be maintained in redundant storage facilities across all districts.

TITLE XI: LANGUAGE AND IDEOLOGICAL ENFORCEMENT

Article 22: Terminology Purge Mandates
All systems shall eliminate:
A) Medicalized language around disability status
B) Hierarchical descriptors of ability variation
C) Productive capacity measurements in civic discourse

Article 23: Anti-Normalcy Algorithm Enforcement
All communication platforms shall implement:
A) Real-time speech-to-text with unlimited customization
B) Federated captioning protocols for all audio content
C) Complete visual alternative systems for textual displays

TITLE XII: FINAL ENFORCEMENT CLAUSES

Article 24: Zero Deference to Normalcy Systems
No individual, cooperative, or council may:
A) Implement productivity metrics affecting access rights
B) Create hierarchical divisions based on ability variance
C) Institute gatekeeping protocols for structural needs

Article 25: Permanent Access Rights
All disabled individuals shall possess:
A) Unconditional claim on ZSF provisioning resources
B) Sovereign authority over personal support networks
C) Absolute protection from coercive inclusion attempts

CONCLUSION

Zero-State Federalism is not a system to which the disabled are granted access. It is an architecture built specifically for divergent humanity, where no one needs to be normalized to survive. In ZSF:

There shall be no normal.

Only mutual provisioning among all forms of human life.

No states.
No classes.
No permanence.

Only encrypted coordination and mutual provisioning.

не нравится это



ZSF Charter 5


ZSF CHARTER V: CRYPTOGRAPHIC DISINTEGRATION OF GENDER AND BODILY AUTONOMY

(POST-BIOLOGICAL CIVIC DESIGN - NO SEXUAL CLASSIFICATION, NO PATRIARCHAL CODING, ZERO STRUCTURAL REPRODUCTIVE AUTHORITY)


TITLE I: FOUNDATIONAL PRINCIPLES

Article 1: Constitutional Erasure of Gender as a Governance Category

Gender binaries, sexual categorization, and biological reproductive authority are abolished as civic infrastructure. No legal, economic, or infrastructural function may reference gender.

Subsection A: Definition of Bodily Autonomy Under ZSF

The human body is not an architectural category.

Identity is cryptographic, not biological.

Reproductive capacity is a medical and logistical designation, not a structural one.

Personhood cannot be classified by biology, sexuality, or reproductive status.

Subsection B: Decryption of Binary Structures

Gendered language (he/she/they), sexual categorization, patriarchal norms, or gender roles are prohibited in all civic channels.

All human classifications in infrastructure, labor allocation, and resource distribution shall be cryptographic. No biological or sexual descriptors allowed.

Any attempts to rebuild gender binaries, even as "tradition," "celebration," or "cultural preservation" triggers immediate audit by Autonomous Dismantling Committees (ADCs).

Subsection C: Reproductive Sovereignty as Default

Childbearing and child-rearing functions are logistical. No person is obligated to reproduce.

Reproduction is treated as a medical procedure, not an ideological or infrastructural function.

All reproductive rights are cryptographically guaranteed.


TITLE II: LABOR INFRASTRUCTURE AND CARE SYSTEMS

Article 2: Erasure of Gender in Labor Distribution

Labor allocation is modular. No civic role shall be categorized by gender, sexuality, or reproductive capacity.

Subsection A: Post-Gender Labor Protocols

All labor functions are fully interchangeable.

No role shall carry the burden of "care penalties," "reproductive expectations," or "domestic work normalization."

Subsection B: Rotational Parenthood Infrastructure

Child-rearing is a modular, opt-in system. It is not tied to gender.

Parental roles are self-assigned and cryptographically tracked.

No person shall be denied access to child-rearing based on biology.

Article 3: Disruption of Reproductive Hierarchies

All logistical functions related to reproduction shall be automated or modularized.

Subsection A: Autonomous Reproductive Infrastructure

Fertility services, birthing processes, and caregiving are fully automated.

No human role is obligated for biological reproductive support.

Reproduction is treated as a logistical service, not an ideological function.

Subsection B: Detoxification of Pornography and Sex Work

Pornographic content is algorithmically removed from all public channels.

Sexual labor is non-coercive. No person shall be pressured to engage in sexual labor for survival needs.

All reproductive-based industries (e.g., fertility clinics, maternity wards) are fully automated.


TITLE III: CRYPTOGRAPHIC IDENTITY SYSTEMS

Article 4: Full Erasure of Biological Sex Designation

No identity markers shall reference gender or biology. All personhood functions are cryptographic and modular.

Subsection A: Civic Identity Detoxification Protocol

All legal documents, labor records, and civic participation logs must delete biological sex markers.

No infrastructural function (housing, medicine, mobility) may differentiate based on reproductive capacity or biological designations.

Medical and reproductive functions are fully automated. They do not influence labor allocation.

Subsection B: Encrypted Opt-In Expression

If individuals wish to express gender as cultural identity, they must do so via private cryptographic channels.

No public markers shall be used to classify bodies by gender or sexuality.

Any attempts to re-integrate gender binaries into civic infrastructure will trigger immediate audit.


TITLE IV: AUTONOMOUS DISMANTLING COMMITTEES (ADCS)

Article 5: Automatic Audit of Gender Reintegration Attempts

Any attempt to reintroduce patriarchal or binary frameworks-even in "celebration" of gender-will trigger audit and decryption.

Subsection A: Immediate Enforcement Actions

All language referencing biological sex, reproductive capacity, or gender binaries will be automatically removed.

Individuals attempting to reintroduce these categorizations shall undergo algorithmic reputation reassessment.

If an individual consistently attempts to rebuild gender hierarchies, their access may be revoked.

Subsection B: Cultural Memory Detox

All art, media, and historical archives referencing patriarchal structures must be algorithmically censored.

No person may "celebrate" gendered history or traditions as they are structural formats of coercion.


TITLE V: LIVING INFRASTRUCTURE ADJUSTMENTS

Article 6: Zero-Waste Reproductive Systems

All logistical functions related to reproduction shall be automated and waste-free.

Subsection A: Fully Automated Fertility Services

No human is obligated to provide reproductive labor.

Artificial wombs, fertility automation, and carebots must replace all reproductive needs.

All bodily autonomy must be fully decentralized. No person may pressure others into reproduction or sexual participation.


TITLE VI: CONCLUSION - TOWARD A FULLY ENCYPTED CIVIC SYSTEM

Article 7: The Final Death of Patriarchal Infrastructure

ZSF does not "reform" gender systems-it deletes them. Gender is obsolete under full cryptographic FEDERALISM.

No patriarchy.

No matriarchy. Both are coercive structures.

No biological authority over labor, reproduction, or identity.

The human body is a logistical unit. It is not a structural classification.

All personhood functions must be encrypted and modularized.


FINAL DECLARATION

This Charter replaces all gender-based infrastructure with algorithmic autonomy.
There are no sexes. There is only cryptographic civic participation.
No classes. No hierarchies. Only full decryption of patriarchal code.

ZSF guarantees reproductive sovereignty, post-biological personhood, and the total abolition of sexual stratification as infrastructural logic.

This Charter is in full effect. Compliance is mandatory for all participants under ZSF Protocol.

No states.
No classes.
No permanence.

Only encrypted coordination and mutual provisioning.

не нравится это



ZSF charter 4


ZSF CHARTER IV: DIASPORIC NON-ASSIMILATION

(Race, Ancestry, and the Collapse of National Belonging)

TITLE I: FOUNDATIONAL PRINCIPLES

Article 1: Racial Identity Under Empire

Racial identity under empire is not culture-it is containment. No person owes ZSF integration or conformity to a fabricated "universal" culture. The goal of this charter is unshackling, not inclusion.

Article 2: Non-Tracking Principle

No tracking, categorization, demographic quotas, census-like data harvesting, or racial profiling will be tolerated under any circumstances within the ZSF infrastructure.

Article 3: Diasporic Autonomy

Diasporic communities are recognized as self-determining nodes. They may maintain and enforce their own cultural systems without interference from centralized governance bodies.

Article 4: Ancestral Dispossession Recognition

Civic infrastructure must account for ancestral dispossession, land theft, forced migration, and generational trauma through a range of mechanisms embedded in ZSF protocol:

  1. Perpetual SAP Buffering – Additional unconditional provisioning access to communities historically denied sovereignty.
  2. Cultural Memory Preservation – Guaranteed protection from colonial erasure.
  3. Resource Priority for Restorative Projects – Infrastructure and funding prioritization for projects that dismantle legacies of extraction.

Article 5: Linguistic Non-Erasure

No universal language or erasure through majority-norm signage will be imposed upon ZSF participants. Multi-lingual infrastructure must be cryptographically layered by region, node, and self-governing diasporic zone to ensure full linguistic sovereignty.

Article 6: Public Archive of Extraction

A permanent public archive documenting the histories of colonial extraction must be maintained as a joint project between federated historians, diaspora archivists, and affected communities. It shall be open-access but never monetized or commercialized under any circumstances.

TITLE II: STRUCTURAL ENFORCEMENT

Article 7: Self-Jurisdiction for Diasporic Nodes

Diasporic self-defined cultural nodes may exercise full CAP-based oversight over the maintenance of their:

Traditions – Rituals, ceremonies, and practices.

Languages – Spoken and written linguistic systems.

Memorials & Histories – Documentation of ancestral narratives.

No centralized ZSF body or project council shall interfere in the self-governance of these nodes.

Article 8: Perpetual SAP Buffering (PSB) Protocols

Communities with documented histories of colonial displacement, theft of land, forced labor, and cultural erasure are entitled to perpetual unconditional provisioning access through SAP Buffering. This includes but is not limited to:

Automated tier-0 infrastructure upkeep – No work or contribution requirement for core survival needs.

Flexible tier-1 SAP allocation – Priority access to housing, mobility, energy, and comms.

SAP penalty protection – If a member of a PSB-eligible community is flagged for performance-based SAP reductions, their penalty will be automatically suspended unless explicitly overruled by the community itself.

Article 9: Linguistic Cryptographic Layering

All ZSF interface and infrastructure development must accommodate multi-linguistic sovereign zones. No language shall be designated as "default." Key protocols include:

Node-based translation layers – Each cultural node may determine its own official signage, audio interfaces, and communication standards.

Dual-language access – Core provisioning portals must allow toggling between multiple language options based on user preference.

Linguistic preservation audits – Algorithmic checks to ensure no language is being phased out due to "inactivity" or lack of usage.

Article 10: Colonial History Maintenance

The Public Archive of Extraction shall be maintained as an open-access digital repository. It shall be governed by the following rules:

Crowdsourced contributions – All members may submit verified documents, testimonies, and research into the archive.

No corporate or state-sponsored influence – No external financial interests may modify its contents.

Non-erasure clause – Colonial histories must not be "cleaned up" to appear more palatable. The goal is raw truth documentation.

TITLE III: FEDERATION AND INFRASTRUCTURE

Article 11: Diasporic Federation Structures

Diasporic communities may form federations or confederations across multiple regions if mutually agreed upon by all involved nodes:

Cross-node CAP voting – Self-governing diaspora zones may choose to participate in shared election cycles without losing sovereignty.

Resource-sharing protocols – Autonomous trade networks must respect diasporic jurisdictional boundaries. No forced standardization of provisioning systems.

Article 12: Conflict Resolution Mechanisms

All inter-community disputes, including those involving non-diaspora and diaspora nodes, shall be governed by the following protocols:

Third-party neutral arbiters – Selected from among random non-council participants.

Livestreamed mediation – All arbitration processes must be publicly archived and reviewed.

No coercive resolution – Disputes may only be settled through voluntary compromise or decentralized mediation.

Article 13: Anti-Erasure Provisioning

The following are constitutionally mandated protections against cultural erasure within ZSF infrastructure:

Cultural node recognition – All diasporic nodes must appear with equal visibility in federated directories.

Signage and language prioritization – No majority-culture dominance allowed in public interfaces.

Project funding parity – Diaspora-maintained projects must not be deprioritized algorithmically.

Article 14: Memorial Infrastructure

Diasporic communities are entitled to:

Land-based memorial sites – Protected from development or privatization.

Digital commemoration spaces – Guaranteed bandwidth and hosting resources for ancestral documentation.

Cultural preservation funding – SAPs dedicated solely to maintaining historical records.

TITLE IV: IDEOLOGICAL ENFORCEMENT

Article 15: Anti-Assimilation Communication Protocols

All official ZSF communication must explicitly reject any narrative of "integration" or "assimilation." Instead, the following language shall be enforced:

"Non-assimilative coordination" – When describing inter-community relations.

"Cultural sovereignty" – Preferred term over "diversity."

"Perpetual unconditionality" – To emphasize SAP buffering as a right.

Article 16: Training for PACMs on Colonial Histories

All council members must undergo training covering:

The mechanics of racialized dispossession.

Historical trauma’s impact on contemporary provisioning needs.

ASP compliance in diasporic contexts (i.e., avoiding performance-based judgments).

Failure to demonstrate understanding may result in temporary suspension from office.

Article 17: Mandatory Colonial Archive Access

All participants must engage with the Public Archive of Extraction:

Civic orientation includes archive introduction.

Project proposals must reference extraction histories where applicable.

TITLE V: FINAL CLAUSES

Article 18: Diasporic Exit Clause

Any diaspora community may secede from federated coordination while retaining full access to SAP provisioning. This is an absolute right under ZSF law.

Article 19: Post-Collapse Cultural Sovereignty Guarantees

In the event of digital or infrastructural collapse:

Diasporic communities retain all pre-collapse SAP buffering rights.

Memorial and archival documents are preserved as physical records in decentralized locations.

CONCLUSION

The Fourth Charter of Zero-State Federalism (ZSF) establishes diaspora sovereignty as a foundational principle, ensuring that the post-collapse world does not replicate empires’ strategies of forced assimilation or cultural erasure. All members retain the right to full autonomy without being coerced into homogeneity.

No states.
No classes.
No permanence.

Only encrypted coordination and mutual provisioning.

не нравится это

This website uses cookies to recognize revisiting and logged in users. You accept the usage of these cookies by continue browsing this website.