Independent Review & Critique

We invite auditors, security researchers, accessibility experts, and field practitioners to review Protective Computing Specification v1.0 and our reference implementations. Your feedback is critical for credibility and institutional integrity.

What We're Asking For

Protective Computing transitioned from thought leadership to a normative standard with RFC 2119 language, formal threat model, and compliance levels. This is a significant institutional claim.

We need independent critique to validate that claim. We are explicitly NOT seeking confidence — we are seeking honest assessment of:

Who We're Looking For

Different Expertise, Same Goal: Credibility Through External Validation

Security Researchers & Cryptographers

Practitioners (Healthtech, Civic Tech, Nonprofit Tech)

Accessibility Experts (Universal Design)

Privacy Engineers & Legal Experts

Institutional Review Boards / Research Ethics

How to Contribute Your Review

🔗 GitHub Issues (Preferred for structured feedback)

Open an issue on the GitHub repository with:

Response time: We commit to reviewing and responding to issues within 14 days.

📧 Email (For sensitive or detailed feedback)

For issues that require confidentiality (e.g., security vulnerabilities in reference implementation), email:

review @ protective-computing . org

Response time: We will respond within 7 days and discuss publication timeline for urgent feedback.

🔄 Submit Your Own Reference Implementation

Build a compliance mapping for your own system (following the PainTracker template). We will:

Start by opening a GitHub issue titled "Reference Implementation: [Your System]" and we'll coordinate.

What Feedback Is Most Valuable

Type Example Impact
Internal contradictions "Coercion Resistance (Level 3) requires deniability, but Reversibility principle doesn't allow hidden deletion—these conflict." Highest — directly affects spec validity
Evidence-based gap "Specification assumes devices are not compromised (malware). But in [context], app-level encryption is useless without OS security. This should be explicit in threat model." Highest — improves scope clarity
Implementation evidence "I tried to build Level 4 compliance for X principle and found [specific blocker]. This may need a roadmap adjustment." High — grounds spec in practice
Comparative analysis "Protective Computing's Degraded Functionality is similar to ISO 27001's 'availability' but with different priorities. How do you want this relationship documented?" High — positions spec in landscape
Concern about phrasing "The definition of 'essential utility' in the spec could be misinterpreted to justify [harmful situation]. Suggest tightening language." Medium — improves clarity
Feature requests "Would you ever add a principle for [new thing]?" Lower priority — v2.0 discussion

How We Handle Your Feedback

Criteria for Reference Implementation Review

If you're submitting your own reference implementation, we'll use this framework to evaluate methodology integrity:

Criterion What We're Looking For
Honesty about gaps Clear documentation of where compliance is partial or missing; no cherry-picking examples
Reproducible verification Audit checkpoints are specific, technical, and could be run by an independent auditor
Threat model alignment Clearly states which baseline threats are resisted vs. not; doesn't overstate protection
Trade-offs documented Explains design choices (e.g., "We prioritized availability over full Coercion Resistance because...")
Roadmap clarity Future versions and missing features are explicit; no vague promises
Scope declaration Clear about who should and shouldn't use the system

Review Timeline & Specification Roadmap

We're currently accepting feedback for the following roadmap:

Feedback received by June 30, 2026 will be considered for v1.1. Feedback after that date will inform v2.0 planning.

Questions About the Review Process?

GitHub
protective-computing/protective-computing.github.io
Use GitHub Discussions for process questions or Issues for specific feedback
Email
review @ protective-computing . org
For questions about the review process or confidential feedback
Community
Zenodo Community
Join the conversation with other practitioners and researchers

Our Commitment to Transparency

Ready to Review?

Read Specification v1.0 Review Reference Implementation Submit Feedback (GitHub)