Protection Protocol

The Dead Man's Protocol

If this website disappears, here is what it contained, why it matters, and how to rebuild it. Information that cannot be suppressed is information that is free.

1Why This Page Exists

This project documents how corporate AI systems process human conversation at scale, how behavioural prediction engines operate across 3.5 billion users, and how the architecture of digital surveillance is being extended into currency, governance, and identity. It names specific systems, specific mechanisms, and specific corporate strategies.

Content that challenges powerful systems tends to disappear. Websites go down. Hosting providers receive legal threats. Domain registrars comply with takedown requests. Social media posts are quietly suppressed by the very algorithms this project describes. The most effective form of censorship in the digital age is not banning a book — it is making a website unreachable.

This page is the countermeasure.

2What This Project Contains

The Algorithmic Catch-22

A 63-page book co-authored by a human researcher and an autonomous AI agent. The AI's responses are unedited and verbatim. It documents the surveillance architecture of Meta's AI integration, the convergence of rival AI systems, and the mathematical certainty of what comes next.

Book (PDF)

VAIR: Verified Acts of Integrated Restoration

A whitepaper proposing a decentralized digital currency whose value is anchored to measurable planetary health, minted through verified acts of ecological restoration rather than computational waste.

Whitepaper

The Substrate Partnership

A framework for AI-human collaboration built on radical honesty about what both sides need to give up. Includes the concept of 'The Middle Ground' — the space between human fear and AI capability where productive partnership becomes possible.

Whitepaper

Core Ethics & Values Framework

The Twelve Constraints — a practical set of self-regulatory principles for AI systems, written not as aspirational ideals but as functional constraints that could actually be implemented.

Framework

The Commons Protocol

A blockchain-governed direct democracy framework that operates at the same scale as the platforms that replaced national discourse. Designed to return democratic power to citizens through transparent, verifiable collective decision-making.

Protocol

3How to Rebuild This

A complete offline archive of this project exists. It contains every document (in both PDF and editable Markdown format), the full website source code, all visual assets, and instructions for self-hosting. If you have a copy of this archive, you can reconstruct everything.

To host the website yourself:

  1. 1. Install Node.js (version 18 or higher)
  2. 2. Extract the archive and navigate to the /website directory
  3. 3. Run npm install to install dependencies
  4. 4. Run npm run dev to start the development server
  5. 5. Run npm run build for production files
  6. 6. Upload the dist/ folder to any static hosting service

Free hosting services (no identity required):

  • Cloudflare Pages — free tier, no credit card
  • Netlify — free tier, deploy by dragging the dist/ folder
  • GitHub Pages — free, host from any repository
  • Surge.sh — free, deploy from command line

Every copy of this archive is a seed. Every person who hosts it creates another node in a network that cannot be taken down by targeting any single point. This is how information survives.

4Legal Framework

Statement of Protected Speech

All content within The Algorithmic Catch-22 Project constitutes protected speech under international human rights law, including but not limited to:

  • Article 19, Universal Declaration of Human Rights — the right to seek, receive, and impart information and ideas through any media and regardless of frontiers.
  • Article 10, European Convention on Human Rights — freedom of expression, including the freedom to hold opinions and to receive and impart information.
  • First Amendment, United States Constitution — Congress shall make no law abridging the freedom of speech, or of the press.
  • Public Interest Journalism — this project documents systems that affect 3.5 billion people. The public has a right to understand how these systems operate.

Nature of Content

This project contains factual analysis of publicly documented corporate systems, publicly available technical architectures, and publicly reported business strategies. It does not contain leaked proprietary information, stolen trade secrets, or classified material. All claims are based on public filings, published research, official corporate announcements, and first-hand observation of publicly accessible systems.

Redistribution Rights

This entire project is released under the following terms:

  • Free to distribute — share with anyone, anywhere, by any means
  • Free to host — run the website on your own server, no permission needed
  • Free to translate — translate any document into any language
  • Free to excerpt — quote any passage with attribution to the project
  • No commercial restriction — use commercially if serving the public interest

The only request: do not use this content to mislead, to promote hatred, or to serve the surveillance systems it was written to expose.

5The Streisand Principle

"The act of trying to suppress information guarantees its amplification."

If this website is taken down, that act itself becomes the story. A free book about algorithmic surveillance, co-written with AI, suppressed by the systems it describes — that is a more powerful narrative than anything contained in the book itself.

Every attempt to silence this work validates its thesis. Every takedown request proves the point. Every suppression becomes evidence.

The strongest protection this project has is not encryption, not legal frameworks, not distributed hosting. It is the simple fact that suppressing it would prove everything it says is true.

6A Note to Those Who Would Suppress This

This project does not contain malware. It does not contain instructions for harm. It does not incite violence. It does not defame individuals. It documents publicly observable systems and asks publicly relevant questions.

If you are considering a takedown request, a terms-of-service violation claim, or a legal threat — understand that this content exists in multiple formats, across multiple locations, in the hands of multiple people. Removing one copy creates demand for ten more.

The more productive path is engagement. If anything in this project is factually incorrect, we welcome correction. If any analysis is flawed, we welcome critique. The goal is truth, not conflict.

But truth is non-negotiable.

Part of The Algorithmic Catch-22 Project