# Radicle Principles
[TOC]
## Requirements
- Principles should be more oriented around technology/technical, as opposed to "soft" cultural principles
- Principles should be generic enough that it allows Radicle as a protocol to expand beyond being a code collab protocol
- They should be principles (vs values), but we dont have to be pedantic about it
- Wants something playful like [Yearn](https://yearn.love) - they have single word, plus a short phrase, then longer description.
- Look at the following source materials in developing the principles:
- https://radicle.blog/towards-decentralized-code-collaboration.html
- https://app.radicle.xyz/nodes/seed.radworks.org/rad:zPUsinVa3gP71g6Dt47LP76phAWd/tree/purpose.md
- https://hackmd.io/ie38RcSOR0yakmJMuAZt3g
## Updates
# Dec 15 - v2
**Foundational Principle: Collaborative Liberty**
* **Tagline**: BE FREE TO CREATE AND SHARE.
* **Description**: We believe freedom drives creativity and access to source code is critical for advancing collaboration technologies. You have the right to study, run, modify, and distribute software - on your terms.
**Foundational Principle: Sovereign Data**
- **Tagline**: OWN YOUR DIGITAL WORLD.
- **Description**: You maintain complete control over your data, having the ability to choose precisely what to share and with whom it is shared. Your data is yours, and is governed by your rules.
**Foundational Principle: Local-first**
- **Tagline**: LOCAL COMES FIRST.
- **Tagline2**: COMMAND THE LOCAL.
- **Description**: We prioritize the local, so everything just works, regardless of your internet connectivity. You're always in command, with consistent access to your data.
**Foundational Principle: Trust**
- **Tagline**: TRUST, BUT VERIFY.
- **Description**: With cryptographic signatures on every system element, the origin and integrity of each action can be independently verified. You have the keys in your hand to foster trust without the reliance on intermediaries.
**Foundational Principle: Selective Disclosure**
- **Tagline**: REVEAL ON YOUR TERMS.
- **Description**: The *power to selectively reveal oneself to the world* is fundamental, not an afterthought. You decide what is publicly shared and what remains private. Your digital presence reflects your preferences as they change over time.
**Foundational Principle: Censorship Resistance**
- **Tagline**: BUILD FOR RESILIENCE.
- **Description**: Resilience isn't just about strength; it's about collaborating free from constraints. Your data flows freely, so creativity flourishes, unstifled by censorship or surveillance.
# Dec 15 - v2 (CHATGPT edit)
prompt: Can you keep the general style but edit the descriptions so they are communicated in a consitent, strong, authorative manner.
**Foundational Principle: Collaborative Liberty**
- **Tagline**: BE FREE TO CREATE AND SHARE.
- **Description**: Creativity flourishes in freedom. With unfettered access to source code, your right to study, run, modify, and distribute software empowers collaborative innovation.
**Foundational Principle: Sovereign Data**
- **Tagline**: OWN YOUR DIGITAL WORLD.
- **Description**: Sovereignty over your data is paramount. You dictate the terms of its sharing and storage, ensuring your data remains under your control, governed by your own rules.
**Foundational Principle: Censorship Resistance**
- **Tagline**: BUILD FOR RESILIENCE.
- **Description**: Cultivating resilience means enabling unbridled collaboration. We ensure data flows without censorship, fostering an environment where creativity and freedom coexist.
**Foundational Principle: Selective Disclosure**
- **Tagline**: REVEAL ON YOUR TERMS.
- **Description**: The autonomy to control your digital footprint is essential. You hold the reins on what's public and what's private, shaping your digital identity as you see fit.
**Foundational Principle: Local-first**
- **Tagline**: COMMAND THE LOCAL.
- **Description**: Local-first is our mantra, ensuring everything operates seamlessly, online or offline. Your control is uninterrupted, maintaining consistent data access no matter where you are.
**Foundational Principle: Trust**
- **Tagline**: TRUST, BUT VERIFY.
- **Description**: Empowering you with cryptographic verification of every system element, fostering a direct and secure trust mechanism. Here, you verify and validate, ensuring trust without intermediary reliance.
# Dec 15th - v1
**Foundational Principle: Collaborative Liberty**
* **Tagline**: BE FREE TO CREATE AND SHARE.
* **Description**: We believe freedom drives creativity and access to source code is fundamental in liberating collaboration. You have the right to study, run, modify, and distribute software on your terms. You're not just a user but a creator, actively shaping the future with every contribution.
- last sentence a bit weird - not needed?
**Foundational Principle: Sovereign Data**
- **Tagline**: OWN YOUR DIGITAL WORLD.
- **Description**: In a world inundated with data, taking ownership of what's yours is a necessity. You maintain complete control over your data, having the ability to choose precisely what to share and with whom it is shared. Your data is yours, and is governed by your rules.
- first sentence - not needed?
- a bit repetitive?
**Foundational Principle: Censorship Resistance**
- **Tagline**: BUILD FOR RESILIENCE.
- **Description**: Resilience isn't just about strength; it's about collaborating free from constraints. Data should flow freely, so creativity isn't stifled by censorship or surveillance. Robust security is the guardian of your autonomy, ensuring you can create without interference.
(Harder to read)
robust security - too flowery
**Foundational Principle: Selective Disclosure**
- **Tagline**: REVEAL ON YOUR TERMS.
- **Description**: At the heart of collaboration is the visibility of your work – sharing as you please or maintaining privacy with a select few. We believe the *power to selectively reveal oneself to the world* is fundamental, not an afterthought. You decide what is publicly shared and what remains private. Your digital presence reflects your preferences as they change over time.
- libert of choice - make it simpler?
- stay away from the word "rights"
- doesnt want to go into ethics
**Foundational Principle: Local-first**
- **Tagline**: LOCAL COMES FIRST.
- **Tagline2**: MASTER YOUR FLOW.
- **Tagline3**: STAY IN FLOW.
- **Tagline4**: COMMAND YOUR FLOW.
- **Tagline5**: COMMAND ONLINE OR OFFLINE
- **Description**: Adaptability is key in an ever-changing world. We prioritize the local, embrace the offline. This means a seamless experience, regardless of your connectivity. Stay in control, and be ready for whatever comes your way.
- **Description**: Flexibility is key in an ever-changing world. We prioritize the local, so everything just works, regardless of your internet connectivity. You're always in command, smoothly shifting between online and offline modes, with consistent access to your data.
- tagline - prefers having local in there to be more specific
- description - needs more work to figure out what to say
- the last sentence
**Foundational Principle: Trust**
- **Tagline**: TRUST, BUT VERIFY.
- **Description**: In a network where trust stems from decentralized verification, collaboration evolves. With cryptographic signatures on every system element, you have the power to independently confirm the origin and integrity of each action, fostering trust without reliance on intermediaries.
## Radicle's Principles - more matter of fact + specific/technical (Dec 7th)
1. **Open Source Liberty**: Every individual should enjoy the freedom to collaborate and disseminate through software. Users are guaranteed the essential freedoms to run, study, modify, and distribute software, with access to the source code being a fundamental prerequisite.
2. **Data Sovereignty**: Users should have ultimate ownership over their data, with autonomy to decide what data they host and share. Reliance on third parties or intermediaries must not be required for usage.
3. **Local-First**: Software should prioritize local operations and offline functionality, where asynchronous operations can occur, independent of internet connectivty or DNS. The experience should be smooth and seamless during offline periods and subsequent reconnections, without requiring significant changes in user behavior.
4. **Permissionless Resilience**: Software systems should ensure the free flow of data and consistent availability, with resilience against censorship and surveillance. Transport-level encryption should safeguard all communication, and anonymity networks such as Tor should be harnessed to bolster privacy.
5. **Privacy by Selective Disclosure**: Users should have the right to selectively reveal themselves to the world - meaning they should be able to control what data remains private and what is made public, with the ability to tailor data visibility and access for designated parties.
6. **Trust through Verification**: Every element of the system is cryptographically signed, enabling users to independently verify actions and commitments for authenticity, fostering trust in the system without reliance on intermediaries.
# Dec 13th meeting/notes
1. **Open Source Liberty**: Every individual should enjoy the freedom to collaborate and disseminate through software. Users are guaranteed the essential freedoms to run, study, modify, and distribute software, with access to the source code being a fundamental prerequisite.
2. **Data Sovereignty**: Users should have ultimate ownership over their data, with autonomy to decide what data they host and share. Reliance on third parties or intermediaries must not be required for usage.
3. **Local-First**: Software should prioritize local operations and offline functionality, where asynchronous operations can occur, independent of internet connectivty or DNS. The experience should be smooth and seamless during offline periods and subsequent reconnections, without requiring significant changes in user behavior.
4. **Permissionless Resilience**: Software systems should ensure the free flow of data and consistent availability, with resilience against censorship and surveillance. Transport-level encryption should safeguard all communication, and anonymity networks such as Tor should be harnessed to bolster privacy.
5. **Privacy by Selective Disclosure**: Users should have the right to selectively reveal themselves to the world - meaning they should be able to control what data remains private and what is made public, with the ability to tailor data visibility and access for designated parties.
6. **Trust through Verification**: Every element of the system is cryptographically signed, enabling users to independently verify actions and commitments for authenticity, fostering trust in the system without reliance on intermediaries.
can combine 3&4
can combine 2&5
evaluate if this works better and is easier to talk about
if we are speaking more abstractly - maybe "resilience" makes more sense
if they are weak on their own
==> keep all 6 of them
https://yearn.love/ inspired
Open Source Liberty
BE FREE TO CREATE AND SHARE.
Freedom fuels creativity, and at the heart of our ethos is the liberty to use, modify, and distribute software. It's not just about access to the source code; it's about empowering individuals to innovate, collaborate, and share. Here, you're not just a user but a creator, shaping the future with each line of code.
LIBERTY / AUTONOMOUSLY COLLABORATE
At Radicle, we believe freedom drives creativity. You have the right to use, modify, and distribute software on your terms. Our peer-to-peer protocol ensures that innovation and collaboration can flourish at scale, guided by the principles of free and open source software.
LIBERTY / AUTONOMOUSLY COLLABORATE
We believe freedom drives creativity. You have the right to use, modify, and distribute software on your terms. Our system design / "Our approach to technology" ensures that innovation and collaboration can flourish at scale, guided by the principles of free and open source software.
- no need to mention "At Radicle"
- Likes "we believe"
- Likes the way there is "You"
- "Our peer to peer protocol" - too specific - use more like "Our system design" or "Our approach to technology"
- But maybe not "our"
- maybe generalize to "collaboration technology should ensure that innovation"
- authoritarian voice
- Autonomously collaborate feels weak
------
3 primordial freedoms of graeber, :
- freedom to leave (data sovereignty)
- freedom to disobey arbitrary orders (liberty)
- freedom to re-imagine new political structures (liberty)
Data Sovereignty
OWN YOUR DIGITAL WORLD.
In a world inundated with data, taking control of what's yours is not just a right; it's a necessity. We champion the power to decide what you share and what you keep private. It's your data, your rules. Here, independence is not a luxury but a fundamental principle.
- keep headline
Privacy by Selective Disclosure
REVEAL ON YOUR TERMS.
True empowerment comes from choice - the choice to disclose or to conceal. We believe in building a space where privacy is a given, not a privilege. Your digital presence should reflect your preferences, whether in the spotlight or in the shadows.
- keep headline
Permissionless Resilience
BREAK BARRIERS, BUILD FREELY.
Resilience isn't just about strength; it's about breaking free from constraints. We're building a world where information flows unimpeded, where creativity isn't stifled by censorship or surveillance. Here, security meets freedom, ensuring your voice is always heard.
- headline "Build Freely" ... "Share Freely" ... "Create Freely"
- doesnt like "breaking"
- this is about defense, where as liberty is about offense
- BUILD FOR RESILIENCE
- need to work offline w poor or no connectivity
RESILIENCE
DATA FLOWS FREELY AND SECURELY
We are committed to providing a user-centric network that is resilient against censorship and surveillance. Our code infrastructure guarantees a functional, robust, and secure network, ensuring your data moves smoothly and reliably whenever needed.
(good, less good than the others)
- no "breaking" - what is the positive connotation?
Offline-First Flexibility
EMBRACE THE UNEXPECTED.
Adaptability is key in an ever-changing world. Our approach is simple - prioritize the local, embrace the offline. This means a seamless experience, regardless of your connection status. With us, you're always in control, ready for whatever comes your way.
- embrace - doesnt like so much
- "KEEP IT LOCAL"
- heading needs more work.
- how about - "Local comes first"
- doesnt like "with us"
- "Stay in control, and be ready for whatever comes your way"
- "connectivity" instead of "connection status"
- "We prioritize the local" instead of "our approach is simple" -
Verifiable Trust
TRUST, BUT VERIFY.
In a world rife with uncertainty, trust is earned, not given. We're forging a path where every action, every commitment is verifiable. Here, transparency isn't just a buzzword; it's the foundation of how we build, interact, and grow together.
- likes this the least
- doesnt like "buzzword"
- gpt is using trust like friendship
- grow together doesnt make sense
- likes "We're forging a path where every action, every commitment is verifiable."
- #1 its a hostile environment #2 we cant trust 3rd parties
- by verifying you can interact w more people
- szabos concept of social scalability
- network scalability is enabled by this principle of verification
- more about authenticicty
# Dec 1 - 12th
1. **Open Source Liberty**: Every individual should enjoy the freedom to collaborate and disseminate through software. Users are guaranteed the essential freedoms to run, study, modify, and distribute software, with access to the source code being a fundamental prerequisite.
2. **Data Sovereignty**: Users should have ultimate ownership over their data, with autonomy to decide what data they host and share. Reliance on third parties or intermediaries must not be required for usage.
3. **Local-First**: Software should prioritize local operations and offline functionality, where asynchronous operations can occur, independent of internet connectivty or DNS. The experience should be smooth and seamless during offline periods and subsequent reconnections, without requiring significant changes in user behavior.
4. **Permissionless Resilience**: Software systems should ensure the free flow of data and consistent availability, with resilience against censorship and surveillance. Transport-level encryption should safeguard all communication, and anonymity networks such as Tor should be harnessed to bolster privacy.
5. **Privacy by Selective Disclosure**: Users should have the right to selectively reveal themselves to the world - meaning they should be able to control what data remains private and what is made public, with the ability to tailor data visibility and access for designated parties.
6. **Trust through Verification**: Every element of the system is cryptographically signed, enabling users to independently verify actions and commitments for authenticity, fostering trust in the system without reliance on intermediaries.
https://yearn.love/ inspired
Open Source Liberty
BE FREE TO CREATE AND SHARE.
Freedom fuels creativity, and at the heart of our ethos is the liberty to use, modify, and distribute software. It's not just about access to the source code; it's about empowering individuals to innovate, collaborate, and share. Here, you're not just a user but a creator, shaping the future with each line of code.
Data Sovereignty
OWN YOUR DIGITAL WORLD.
In a world inundated with data, taking control of what's yours is not just a right; it's a necessity. We champion the power to decide what you share and what you keep private. It's your data, your rules. Here, independence is not a luxury but a fundamental principle.
Privacy by Selective Disclosure
REVEAL ON YOUR TERMS.
True empowerment comes from choice - the choice to disclose or to conceal. We believe in building a space where privacy is a given, not a privilege. Your digital presence should reflect your preferences, whether in the spotlight or in the shadows.
Permissionless Resilience
BREAK BARRIERS, BUILD FREELY.
Resilience isn't just about strength; it's about breaking free from constraints. We're building a world where information flows unimpeded, where creativity isn't stifled by censorship or surveillance. Here, security meets freedom, ensuring your voice is always heard.
Offline-First Flexibility
EMBRACE THE UNEXPECTED.
Adaptability is key in an ever-changing world. Our approach is simple - prioritize the local, embrace the offline. This means a seamless experience, regardless of your connection status. With us, you're always in control, ready for whatever comes your way.
Verifiable Trust
TRUST, BUT VERIFY.
In a world rife with uncertainty, trust is earned, not given. We're forging a path where every action, every commitment is verifiable. Here, transparency isn't just a buzzword; it's the foundation of how we build, interact, and grow together.
### 25 October 2023 Update
I decided to prioritize a return to the original task of defining the principles, without being too specific on features yet. There are two versions below: v1 I crafted based on information from our last call. for v1, I fed this into chatgpt to refine the grammar and clarity.
Next steps is we get on a call and look at both versions together or you can leave comments asynchronously and let me know.
I am hoping that principles can be finalized after 1-2 more reviews maximum. I wanted to check in with you to see if you think this is going in a better direction, before churning too much more on perfecting it.
#### v1. Stellarmagnet draft - Radicle’s Principles
As we set out to build Radicle and the ecosystem surrounding it, we have established principles that guide how we develop software and how we think software should be developed.
1. **Distributed Sovereignty**: Sovereignty is our north star. Individuals and organizations should have ultimate control over their interactions, the data they create, what data they want to distribute.
comments:
- "freedom to run the software"
- ownership. users own data. google "data sovereignty"
- "own your data"
- make it about ownership, instead of soveeirngty
- rename to "data sovereignty"
- is about data ownership & distribution
- there is no third party one needs to rely on for using the system
- control over *what data you distribute* vs. not the data itself
2. **Selective Distribution?? Privacy??**. Should have the power to select one wants to reveal, and keep private what is private. They should be able to customize whether data is public or private, define trusted parties that have privileged access to private data.
How status.im talks about privacy:
> Privacy is the power to selectively reveal oneself to the world. For us, it's essential to protect privacy in both communications and transactions, as well as being a pseudo-anonymous platform. Additionally, we strive to provide the right of total anonymity.
3. **Open Source Liberty**: Anyone should have the liberty to use software to collaborate and share with others. In the words of the free software movement “users have the freedom to run, copy, distribute, study, change and improve the software. Thus, “free software” is a matter of liberty, not price.”
comments:
- four essential freedoms: https://www.gnu.org/philosophy/free-sw.en.html
- in the age of services & networks, the definition of free software is lacking or missing something. just because you can distribute, read its source, doesn't mean you can fully interact with the software
- can we merge 1 & 3? "not only do we follow the 4 essential freedoms..."
- sovereignty requires open source liberty
- you cant be sovereign without open source/ free software
4. **Resilient Access**: Architectures should be diligently crafted to ensure the free flow of data and consistent availability, with resilience against censorship and surveillance. Transport-level encryption should safeguard all communication, and anonymity networks such as Tor should be harnessed to bolster privacy.
comments:
- this is about security, encryption
- censorship resistance
- being resilient against adversaries trying to take away your sovereignty
- it is what makes sovereignty robust
- you can build sovereign software, but it can be easily taken away
- armor that is added to the sovereignty
- protecting your right to use the sofware
- heading needs work
- doesnt like access - feels like there is a third party involved
- maybe "unrestricted availability" instead?
5. **Indistinguishable from Magic**: Software operations should be performed locally where possible, providing a considerable speed advantage over client-server architectures where constant communication with an internet-connected server is required. Instead, users should be able to operate offline and asynchronously, independent of internet connectivity or DNS, then everything just magically works when reconnecting to the internet or other peers. Software must be easy to use and not expect tremendous changes in behavior. Responsiveness and functionality must match, if not surpass, current platforms.
comments:
- "Indistinguishable from Magic" doesnt work well as principle description
- alternate heading: **offline, local-first**
Seamless Magic: Software should prioritize local operations, offering a significant speed edge over architectures reliant on continuous server communication. Users should enjoy offline and asynchronous operations, independent of internet or DNS—ensuring a seamless, almost magical experience upon reconnection. The software’s ease of use and functionality should meet or exceed established standards.
7. **Trust through Verification:**: Trust in a third party or intermediary must not be required for use. Software should have a free or open source license for the best security guarantees and auditability. (Every artifact of the system must be attested with cryptographic signatures, and verified.)--> perhaps more of a front page principle
comments
- maybe keep it, change the copy
- first sentence makes sense, but we should perhaps mention this in another earlier principle
- GPT: "Trust through Verification" is a principle that emphasizes the importance of verifying claims, actions, or commitments to ensure they are genuine, rather than simply accepting them at face value. By verifying, one can establish a basis for trust."
- likes this as a starting point
- maybe have it rewrite it a bit
notes:
- freedom
- protection of freedom
- verify,
- privacy - more of a side value
- its okay if there is overlap in the principles
- they all need to be
- true
- general enough
- well communicated
- can build off one another
**Summary of principles**
These are the principles of user sovereignty:
(what makes sovereignty possible - "foundational principles for sovereign software")
1. Freedom to use and modify (FOSS basic freedoms)
2. Data sovereignty (ownership and distribution)
3. Selective revelation (right to privacy)
4. Censorship resistance (permissionless access, encryption etc.)
- likes word persmissionless for this
6. Local-first (no ISP dependency)
7. Trust through verification
"The software we create is a public good. It is made available via a free and open source license, for anyone to share, modify and benefit from. We believe in permission-less participation."
efficient & economic solutions
Next steps:
- 1. check a few principles from other projects to see if we may be missing something
- is there something people may build that would violate some undefined principle that hasnt been thought of ...
- 2. Improve the descriptions
- 3. Think of better headings
#### v2. ChatGPT COPYEDIT of above draft
prompt:
> "Please help improve the grammar and clarity. Make each principle similar length. Improve the headings."
As we chart the course for Radicle and its encompassing ecosystem, we uphold principles that shape our software development approach and reflect our vision for how software ought to be crafted.
1. **Sovereign Control**: Sovereignty is our guiding beacon. Individuals and organizations must possess unparalleled authority over their interactions and the data they generate or share. They should have the autonomy to determine data visibility, designate trusted entities with exclusive access to confidential data, and consciously choose which data to circulate.
2. **Open Source Freedom**: Every individual should enjoy the freedom to collaborate and disseminate through software. Echoing the ethos of the free software movement, "users are entitled to run, copy, distribute, study, modify, and enhance software." Thus, it's about liberty, not cost.
3. **Unyielding Access**: We champion designs that guarantee uninterrupted data flow and unwavering availability, fortified against censorship and surveillance. All communications should be shielded with transport-level encryption, and tools like Tor should be integrated to enhance privacy.
4. **Seamless Magic**: Software should prioritize local operations, offering a significant speed edge over architectures reliant on continuous server communication. Users should enjoy offline and asynchronous operations, independent of internet or DNS—ensuring a seamless, almost magical experience upon reconnection. The software's ease of use and functionality should meet or exceed established standards.
5. **Trust through Verification**: Reliance on third parties or intermediaries is a no-go. Software should be open source, ensuring maximum security and auditability. Every system component must come with cryptographic attestations and undergo rigorous verification.
### 6 October 2023 Update
I'm finding it challenging to write about protocol design principles in a more fun and playful way, but I made my best effort in capturing the principles in a more technically accurate capacity, first and foremost.
My suggestions on next steps:
- Review the principles below, and make sure they sound technically accurate or sensible. We can do some live edits together in our call today to fix any mistakes or inaccuracies.
- If you want them to be more "playful", I think it may be best to bring in another Black Sky contributor, Sundeep, for a final polish creative edit, who has better linguistic creativity skills than I do.
- But I think a pre-requisite before this edit happens is spending time on a more generic "Radicle Voice" branding/messaging document, so the essence of this playfulness you are seeking is better captured (as it does not seem to have clearly existed in Radicle's history of webpages, or blogs, from what I can tell).
- We can also try to workshop editing one of these principles together to sound more playful, to get a clearer idea of what your vision is.
#### Sovereignty
Radicle enables user autonomy in a unique peer-to-peer network, ensuring that everyone can host their own node and enjoy ultimate control over their data and interactions. Beyond this, Radicle allows for the creation of specialized private topologies, where only trusted peers have the privilege of data access.
alt -
- champion[] user? sovereignty
- Peer-to-peer Sovereignty
re: heading
- can use some more thought, but good enough for now
#### Unrestricted Availability
In Radicle, everyone is granted the inherent freedom to collaborate and share. The architecture is diligently crafted to ensure resilience against censorship and consistent availability. To fortify this commitment, transport-level encryption safeguards all communication, and anonymity networks such as Tor are harnessed to bolster privacy.
alt headings:
- Resilient, Unrestrained Access
- Permissionless, Unrestrained Access
- Permissionless Access
- Unrestricted Freedom to Collaborate
- Collaborate with Freedom
old text:
Anyone should have the freedom to use Radicle to collaborate and share with others. Radicle is designed to resist censorship and be always available. Transport-level encryption secures all communication, while anonymity networks such as Tor provide added privacy.
consider adding:
old:
- while Tor and Nym (?) maintain network privacy.
- TLS fortifies communication security while Tor and Nym (?) maintain network privacy.
- anonymity networking technologies provide added reslience.
-
No third-party should be able to inhibit users from accessing the network or obstruct the free flow of data.
'resilient at its core'
next steps:
- the last sentence a little clunky, give it a little more thought
- make the first two sentences flow better
- think about headings more
#### Indistinguishable from Magic
With an emphasis on user-centric design, Radicle ensures that its applications and utilities provide both speed and ease. Radicle operates even when offline, independent of internet connectivity or DNS. You can work asynchroously as fast as your computer works,
to edit/add:
- work offline, work asynchronously, then connect online and everything magically works
- work offline, have control over your data
- then connect with peers, synchronize all your changes
and it just works
header is good !!
alt:
- seamless as magic
- craft magic, not just code
#### Don’t Trust, Verify
Radicle's code is open source and auditable. Every artifact of the system is attested with cryptographic signatures and verifiable, meaning intermediary nodes in the peer-to-peer network do not need to be trusted.
authorship is verifiable
dont want to talk about specific features too much
this is the way it is vs. this is the way it should be
for basic principles - less feature specific, more "shoulds" - way to behave, way to build etc.
alt:
- freedom to verify
- trustless freedom
- audit, attest, authenticate
<!--
#### Permissionless, Unrestrained Access
Radicle operates even when offline, independent of internet connectivity or DNS. Additionally, with its commitment to open protocols and an open-source foundation, it strives to eliminate geographical and financial boundaries.
alt:
- unhindered permissionless access
By choosing a gossip protocol over the often cumbersome DHT tables of peer-to-peer systems,
-->
Radworks
1. Freedom - That technology should be developed to promote freedom and privacy, no matter where you are in the world.
2. Decentralization - That the internet should be decentralized and governed by its users, rather than controlled by governments or corporations.
3. Privacy - That technologies should be developed to protect individual privacy and prevent surveillance.
4. Accessibility - That technologies and information should be open and accessible to everyone, regardless of financial status or location.
5. Community - That technology should be developed to promote and harness community, collaboration, and peer-to-peer networks.
6. Resilience - That technology should be developed to be resistant to censorship, capture, and anti-competitive forces.
7. Sustainability - That technology should be developed with a long-term perspective, and should prioritize technical and financial sustainability.
### Notes & Next steps (From Sep 22 Update)
- Enhance the principle terminology
- Instead of "Inclusive" perhaps something more similar to "permissionless"
- Instead of "Local-first" perhaps something more related to magic / user experience qualities and aspirations (local-first is too specific related to implementation)
- Instead of secure, something related to "don't trust, verify"
- Soverign & Reslience are good
- Come up with short phrases & descriptions - human written
### September 22 Update
I looked through the above documents, in addition to what is currently on the radicle.xyz landing page, and through my synthesis, I identified the following as higher-level principles:
- Sovereign
- Local-First
- Secure
- Resilient
- Inclusive
#### Comments and Rationale:
- I think the prior term "Accessibility" that was being used in places can be confusing, as that typically is related to software being accessible to people with disabilities, and early stage technology projects usually aren't accessible in that realm, so I think we should avoid using that term. Instead, something like "Inclusive" makes more sense. I don't *fully love* this term, as it sounds a bit hippy-dippy, but it may convey open access and user-friendliness more accurately.
- I avoided the word "Freedom" in the principle names, as it's very abstract as far as principles go. I think something related to Sovereignty or Autonomy encapsulates the concept better.
- Since these are principles for a p2p code collab protocol, I thought that it's important that the principles referenced can be somewhat be tied to something technological - as opposed to cultural principles. Although the set of technologial principles will be enabling a specific culture.
#### GPT4 Principles Draft
I fed ChatGPT data from the above resources and references, and my 5 identified principles that I used my human brain to come up with, to generate an AI-assisted first draft on the principles. If you like this direction, I can spend more time giving it a human touch.
- **Sovereign**: Radicle empowers users with complete control over their data, actions, and code repositories through self-hosted nodes and end-to-end encryption, eliminating the need for reliance on centralized platforms and ensuring user freedom.
- **Local-First**: With its local-first architecture, Radicle provides always-available functionality without requiring internet access, empowering users to own, migrate, and back up their data both online and offline.
- **Secure**: Radicle upholds stringent security measures, including public-key cryptography and automatic data verification, to protect user data and ensure the integrity and confidentiality of all interactions on the platform.
- **Resilient**: Through its peer-to-peer networking and censorship-resistant nodes, Radicle creates a robust, decentralized platform that can withstand network failures and external interventions, ensuring uninterrupted and free code collaboration.
- **Inclusive**: Radicle is designed to be universally accessible, featuring open access protocols and an open-source codebase, aiming to break down geographical and financial barriers for a globally diverse community.