PRIVACY SECURITY SOVEREIGNTY
We're building the infrastructure for a post-surveillance web.
Decentralization isn't enough. We have to anonymize, and encrypt
JournalNet is our flagship encrypted data layer—protocols and tooling so people and organizations can steward sensitive personal data without ceding custody. Learn about JournalNet →
Some data must remain more private than the rest; ISO 29100 calls it sensitive PII, and today it flows through brokers, platforms, and AI systems that shape us without consent.
Software is dissolving into intent. Bespoke, disposable apps will sit atop whatever data layer we tolerate. If we hand that layer to platforms, they control us. If we keep it encrypted and sovereign, we decide when and how intelligence meets our memories.
In a world where intent and data are scarce resources, we insist they stay with the individual and optionally trusted partners—friends, cooperatives, or the AI providers we authorize.
We're building protocols for people to “have” their data and “use” it too—local or mirrored vaults, selective accessibility, and frontier LLMs that never inherit surveillance.
Why This Matters
We're not building another app. We're hardening the data layer so intent and intelligence stay with the sovereign individual.
The Problem
Sensitive personal data leaks into attention markets faster than we can contest it:
- Biometric, location, and relationship data get warehoused for resale
- Data brokers transport our personal data to police, advertisers, and political actors
- Platforms and AI systems remix our intent into behavioral nudges
- Frontier models learn from the archives we can't retract
Decentralization and Openness Are Not Enough
Software is becoming disposable. Without encrypted custodianship, the data layer still betrays us:
- Metadata still exposed: Who talks to whom is visible
- Federation centralizes: Your instance admin sees everything
- Correlation attacks: Traffic patterns reveal identity
- LLMs read public data: bespoke agents can mirror and manipulate you
- Post-Quantum decryption: Download now, decrypt with quantum later
The Stack Difference
Infrastructure for sovereignty, not another social network:
- Encrypted by default—with local or mirrored custody
- Selective accessibility for the people and AI partners you choose
- Metadata minimization through blind relays
- Self-hostable without compromise
- Open-source data layer for bespoke, swappable apps
The Journal Protocol Stack
Three layers that enable apps without platforms
📦 Layer 1: Vault
Encrypted storage you control
🔒 Layer 2: Cipherlot
Capability-based sharing
📱 Layer 3: Apps
Swappable interfaces
How to Engage
Three ways to participate
🛠️ For Developers
Build intent-driven software atop encrypted personal vaults—no platform custody required.
- Read the specifications
- Try the quickstart guide
- Join technical discussions
📚 For Privacy Advocates
Teach communities how to protect sensitive PII while still using AI and shared tools.
- Learn privacy fundamentals
- Explore the protocol stack
- Share guides with your community
💰 For Funders & Advisors
Support open protocols that keep intent and data sovereign while enabling trusted collaboration.
- Review financial dashboard
- See governance model
- Contact for partnerships