Direct links to full reference pages for all six core principles.
Undoability, bounded destructive operations, and recovery under stress.
Essential-only data collection, cryptographic defense, and retention bounds.
User agency under disconnection, sync instability, and hostile infrastructure.
Operating boundaries and disclosure minimization under forced access pressure.
Essential-path usability under low bandwidth, weak devices, and partial failure.
Keep essential capabilities primary; prevent extractive drift and coercive gating.