JournalNet: Privacy-first communications network from Journal Foundation. Meet the product → Start building with JournalNet →

PRIVACY SECURITY SOVEREIGNTY

We're building the infrastructure for a post-surveillance web.

Decentralization isn't enough. We have to anonymize, and encrypt

JournalNet is our flagship encrypted data layer—protocols and tooling so people and organizations can steward sensitive personal data without ceding custody. Learn about JournalNet →

Some data must remain more private than the rest; ISO 29100 calls it sensitive PII, and today it flows through brokers, platforms, and AI systems that shape us without consent.

Software is dissolving into intent. Bespoke, disposable apps will sit atop whatever data layer we tolerate. If we hand that layer to platforms, they control us. If we keep it encrypted and sovereign, we decide when and how intelligence meets our memories.

In a world where intent and data are scarce resources, we insist they stay with the individual and optionally trusted partners—friends, cooperatives, or the AI providers we authorize.

We're building protocols for people to “have” their data and “use” it too—local or mirrored vaults, selective accessibility, and frontier LLMs that never inherit surveillance.

Why This Matters

We're not building another app. We're hardening the data layer so intent and intelligence stay with the sovereign individual.

1

The Problem

Sensitive personal data leaks into attention markets faster than we can contest it:

  • Biometric, location, and relationship data get warehoused for resale
  • Data brokers transport our personal data to police, advertisers, and political actors
  • Platforms and AI systems remix our intent into behavioral nudges
  • Frontier models learn from the archives we can't retract
2

Decentralization and Openness Are Not Enough

Software is becoming disposable. Without encrypted custodianship, the data layer still betrays us:

  • Metadata still exposed: Who talks to whom is visible
  • Federation centralizes: Your instance admin sees everything
  • Correlation attacks: Traffic patterns reveal identity
  • LLMs read public data: bespoke agents can mirror and manipulate you
  • Post-Quantum decryption: Download now, decrypt with quantum later
3

The Stack Difference

Infrastructure for sovereignty, not another social network:

  • Encrypted by default—with local or mirrored custody
  • Selective accessibility for the people and AI partners you choose
  • Metadata minimization through blind relays
  • Self-hostable without compromise
  • Open-source data layer for bespoke, swappable apps

The Journal Protocol Stack

Three layers that enable apps without platforms

📦 Layer 1: Vault

Encrypted storage you control

🔒 Layer 2: Cipherlot

Capability-based sharing

📱 Layer 3: Apps

Swappable interfaces

How to Engage

Three ways to participate

🛠️ For Developers

Build intent-driven software atop encrypted personal vaults—no platform custody required.

  • Read the specifications
  • Try the quickstart guide
  • Join technical discussions

📚 For Privacy Advocates

Teach communities how to protect sensitive PII while still using AI and shared tools.

  • Learn privacy fundamentals
  • Explore the protocol stack
  • Share guides with your community

💰 For Funders & Advisors

Support open protocols that keep intent and data sovereign while enabling trusted collaboration.

  • Review financial dashboard
  • See governance model
  • Contact for partnerships