← Back to Getting Started

Principle Deep-Dives

Direct links to full reference pages for all six core principles.

Reversibility

Undoability, bounded destructive operations, and recovery under stress.

Exposure Minimization

Essential-only data collection, cryptographic defense, and retention bounds.

Local Authority

User agency under disconnection, sync instability, and hostile infrastructure.

Coercion Resistance

Operating boundaries and disclosure minimization under forced access pressure.

Degraded Functionality

Essential-path usability under low bandwidth, weak devices, and partial failure.

Essential Utility

Keep essential capabilities primary; prevent extractive drift and coercive gating.