← Back to Home Browse All Principle Deep-Dives →

Getting Started

A practical guide to adopting Protective Computing in your systems and organization.

What You're Adopting

Protective Computing is not a framework you impose. It's a discipline you practice. It asks: What changes when you design for human vulnerability instead of assuming stability?

This guide walks you through the mindset shift and gives you concrete steps to apply Protective Computing principles.

1. Understand the Core Assumption

Most software assumes infrastructure, connectivity, power, and cognitive bandwidth are abundant.

Protective Computing rejects this. It assumes:

Once you internalize this, the principles follow naturally.

2. Audit Your Current System

Before applying Protective Computing, understand where your system is vulnerable:

Questions to ask

3. Apply the Principles — In Order

✓ Start with Reversibility

Make destructive actions undo-able. This is the easiest win and has broad impact.

Deep-dive: Read the full Reversibility reference for implementation patterns, anti-patterns, and real-world examples.

✓ Add Exposure Minimization

Collect, store, and transmit only what is essential.

Deep-dive: Read the full Exposure Minimization reference for data audit patterns, zero-knowledge architecture, and privacy frameworks.

✓ Implement Local Authority

Users should retain control even when disconnected from your infrastructure.

Deep-dive: Read the full Local Authority reference for implementation patterns, anti-patterns, and real-world examples.

✓ Add Coercion Resistance

Make it hard for attackers (or authorities) to extract information forcibly.

Deep-dive: Read the full Coercion Resistance reference for implementation patterns, anti-patterns, and real-world examples.

✓ Design for Degraded-Infrastructure Functionality

The system must work when resources are scarce.

Deep-dive: Read the full Degraded Functionality reference for implementation patterns, anti-patterns, and real-world examples.

✓ Prioritize Essential Utility

When resources are limited, optimize for survival tasks — not engagement or monetization.

Deep-dive: Read the full Essential Utility reference for implementation patterns, anti-patterns, and real-world examples.


4. Adopt a Design Review Lens

For each new feature or system change, ask:

Pre-launch checklist

5. Engage with the Community

Protective Computing is a growing discipline. Share your work:

6. Measure Impact

Success in Protective Computing means:

These metrics matter more than performance benchmarks or feature count.


Common Patterns to Avoid


Formal Specification

This guide is practical. For formal requirements, threat model, and compliance criteria, see:

Protective Computing Specification v1.0 — Normative standard with RFC 2119 language, formal threat model, and compliance levels (Level 1–4).

Reference Implementation: PainTracker Compliance Mapping — Honest assessment of a real system's compliance against the specification. Use as a template for auditing your own implementations.

Spec Annex (for reviewers): MUST Justifications — Auditable ledger mapping each MUST to threat alignment, downgrade failure mode, and verification method.


Next Steps

1. Read the Canon: The Overton Framework (v1.3)
2. Review the Reference Implementation: See how PainTracker is audited against the specification
3. Audit one system: Apply the questions above to a project you own
4. Share your findings: Document what you learn and contribute to the community


Protective Computing — back to home