We cannot trust our computers because they have been corrupted to the core. Our mission is to rebuild.
This page describes a new system concept that emphasizes sovereignty and user control; trustless interaction, security, privacy and verifiability; and carefully-minified system complexity for a lean and stable personal computing platform (that doesn't suck).
Table of Contents
- Scope
- Identification
- Document overview
- System overview
- Referenced Documents
- Current system or situation
- Background, objectives, and scope
- Operational policies and constraints
- Description of the current system of situation
- Modes of operation for the current system or situation
- User classes and other involved personnel
- Support environment
- Justification for and nature of changes
- Justification of changes
- Description of desired changes
- Priorities among changes
- Changes considered but not included
- Concepts for the proposed system
- Background, objectives, and scope
- Operational policies and constraints
- Description of the proposed system
- Modes of operation for the proposed system or situation
- User classes and other involved personnel
- Support environment
- Operational scenarios
- Summary of impacts
- Operational impacts
- Organizational impacts
- Impacts during development
- Analysis of the proposed system
- Summary of improvements
- Disadvantages and limitations
- Alternatives and trade-offs considered
- Notes
- Appendices
- Glossary
Watch this page!
(under construction)
You can get on this "internet" and talk to people all over the place...
— Angelina Jolie (Acid Burn), ca. 1994