
1. Total transparency
All hardware, software and firmware , that are integrity or confidentiality critical, are publicly inspectable in their source designs without NDA, while maximizing free/open source licensing.

2. Extreme Levels of Security Review versus Complexity
Subject to extreme security-review relative to complexity, down to the CPU design, chip fabrication oversight, hosting rooms, and anonymization networks - by highly-proficient and “ethically-aligned” experts.

3. Citizens' Oversight
Subject to highly-resilient oversight, including offline citizen-witness for fabrication oversight, and citizen-jury for hosting room, to safeguard versus insider threats, data recovery and abuse of in-person lawful access.

4. Uniquely Trustwothy Certifications
Certified by a new highly accountable and expert Trustless Computing Certification Body, being established by the NGO from which we spun-off next June 24th in Geneva during its 8th Edition of our Free and Safe in Cyberspace. It will apply Trustless Computing Paradigms to ensure the above 3 principles and more



