Protective Computing Specification v1.0

Version 1.0 | Published February 25, 2026 | Status: Stable

Formal specification defining principles, threat model, and compliance criteria for systems serving users under conditions of human vulnerability and institutional threat.

ABSTRACT

Protective Computing is a discipline for designing systems that serve users reliably under conditions of human vulnerability, institutional threat, and resource scarcity.

This specification defines:

Conformance to this specification certifies that a system prioritizes user autonomy, resilience, and welfare over competing objectives (profit, engagement, efficiency).

TABLE OF CONTENTS
  1. Definitions & Keywords
  2. Threat Model
  3. Stability Assumption
  4. Core Principles (Normative)
  5. Principle Interdependency
  6. Compliance Levels
  7. Versioning Policy
  8. Non-Scope

1. Definitions & Keywords

Key Terms

User: An individual utilizing a system to accomplish an essential purpose, potentially under threat from institutional or adversarial actors.

Threat: Institutional coercion (legal compulsion, arrest, torture), mass surveillance (data collection without consent), censorship (access denial), or device seizure.

Resilience: Continued system functionality under degraded conditions—limited bandwidth, power, compute, or when administrators are compromised.

Stability Assumption: Infrastructure is unreliable; users have scarce cognitive, temporal, and computational resources; adversaries are sophisticated and persistent.

Attestation: Third-party verification that a system meets specified Protective Computing compliance level.

Normative Language: Conformance keywords from RFC 2119:

2. Threat Model

BASELINE ADVERSARIES

Protective Computing covers threats from:

Out of Scope

Conservative Design Assumption

Systems MUST assume:

3. Stability Assumption

This specification is stable for all v1.x releases (v1.0, v1.1, v1.2, etc.). A system claiming Protective Computing v1.0 compliance will remain compliant through v1.9, with no breaking changes.

Stability Guarantees

Systems claiming v1.0 compliance MUST:

Version Stability Mechanics

Release Type Example Breaking Changes? Backward Compatible?
Patch v1.0.1 → v1.0.2 No Yes (exact)
Minor v1.0 → v1.1 No Yes (v1.0 systems remain compliant)
Major v1.9 → v2.0 Possible No (v1.x and v2.0 coexist; migration window provided)

4. Core Principles (Normative)

All six principles are mandatory for Protective Computing compliance. Systems claiming compliance must implement all six at their declared level.

4.1 Reversibility

Principle: User actions and system changes MUST be undoable within documented recovery windows. Failures MUST NOT become irreversible harm.

Normative Requirements
Compliance Level Requirement
Level 1 Soft deletion: recovered data visible for 7+ days before permanent erasure
Level 2 Undo/redo stack: user can reverse actions within session
Level 3 Complete version history with point-in-time restore; 90+ day retention
Level 4 ACID transaction semantics; atomic operation guarantees across all data stores

4.2 Exposure Minimization

Principle: Data MUST be collected only when essential. What is collected MUST be defended with cryptography. Data retention MUST be minimal and automatic.

Normative Requirements
Compliance Level Requirement
Level 1 Data minimization audit completed; AES-256 at rest; TLS 1.3+ in transit
Level 2 Level 1 + auto-deletion policies for all fields; no ad networks or trackers
Level 3 Level 2 + zero-knowledge for sensitive data; user holds encryption keys; regular key rotation
Level 4 Level 3 + provable data minimization via differential privacy; formal verification of encryption implementation

4.3 Local Authority

Principle: Users MUST retain control and function locally. Systems MUST NOT require internet for essential operations.

Normative Requirements
Compliance Level Requirement
Level 1 Offline read capability; cached data available without network
Level 2 Full offline operation: read + write; changes sync when connectivity returns
Level 3 Multi-device sync with automatic conflict resolution (CRDT or operational transforms)
Level 4 Peer-to-peer sync capability; no central server required; direct device-to-device replication

4.4 Coercion Resistance

Principle: Users MUST be able to maintain confidentiality and integrity even under physical or legal coercion.

Normative Requirements
Compliance Level Requirement
Level 1 Strong encryption; user-held keys; no master backdoors
Level 2 Level 1 + passphrase-based encryption (Argon2+); slow key derivation
Level 3 Level 2 + plausible deniability (decoy accounts or hidden containers); formal threat model documentation
Level 4 Level 3 + threshold key splitting (Shamir's Secret Sharing); distributed key reconstruction

4.5 Degraded Functionality

Principle: Systems MUST remain usable when bandwidth, power, compute, or cognition are severely constrained.

Normative Requirements
Compliance Level Requirement
Level 1 Mobile responsive; plaintext/minimal CSS fallback on JS failure
Level 2 Level 1 + tested on 2G networks; works with <512MB RAM; no large media autoload
Level 3 Level 2 + progressive enhancement (HTML baseline works without JS); keyboard-only navigation; WCAG AA
Level 4 Level 3 + measurable performance targets (<3s load on 2G); documented accessibility audit

4.6 Essential Utility

Principle: Systems MUST optimize for user survival and autonomy. Features MUST serve essential needs, not engagement metrics or extraction.

Normative Requirements
Compliance Level Requirement
Level 1 No engagement metrics; no dark patterns; transparent funding model
Level 2 Level 1 + minimal cognitive load; success measured by user goal completion
Level 3 Level 2 + independent audit for dark patterns; user satisfaction metrics
Level 4 Level 3 + user-controlled feature set (customizable UI/UX); annual compliance audit

5. Principle Interdependency

The six principles are mutually reinforcing. Weakness in one undermines others. This section formalizes the relationships.

Reinforcement Matrix

Principle A Principle B Relationship
Reversibility Exposure Minimization Synergistic: Less data kept = recovery windows are simpler. Undo/redo prevent data harm.
Local Authority All Principles Foundational: Offline operation enables resilience across all principles. Systems that replicate locally can enforce all others.
Coercion Resistance Exposure Minimization + Local Authority Required: User-held keys require local data. Minimal data collection reduces extraction targets.
Degraded Functionality Essential Utility Aligned: Prioritizing essential features directly maps to graceful degradation under scarcity.
Essential Utility All Principles Overriding: User welfare is the master constraint. All principles serve it.

Known Tensions

6. Compliance Levels

All systems claiming Protective Computing compliance MUST declare a compliance level (1–4) for each principle. A system's overall compliance is determined by its weakest principle.

Example claim: "Signal Messenger is Protective Computing v1.0 Level 3: Reversibility (L3), Exposure Minimization (L4), Local Authority (L2), Coercion Resistance (L4), Degraded Functionality (L2), Essential Utility (L4)"

Level 1: Foundation

Self-Attested Compliance

System implements all six principles at basic level. No independent audit required.

Level 2: Standard

Production Compliance

System implements all six principles with documented depth. Minimal external review recommended.

Level 3: Verified

Third-Party Audited

Independent security audit verifies compliance. Threat model formally documented.

Level 4: Certified

Formal Certification Program

Formal certification by Protective Computing Foundation (TBD). Continuous compliance monitoring. Annual recertification.

7. Versioning Policy

Protective Computing uses Semantic Versioning: v[Major].[Minor].[Patch]

Release Tiers

Patch Releases (v1.0.0 → v1.0.1)

Minor Releases (v1.0 → v1.1)

Major Releases (v1.x → v2.0)

Example Timeline

8. Non-Scope

Protective Computing does not address:

Protective Computing is ORTHOGONAL to (not instead of):

Systems may (and should):


FORMAL SPECIFICATION ENDS HERE

For further reading, see: