Censorship Resistance

Free Speech - Expression - Assembly - Association

Most large organizations (e.g. tech giants, large corporations, banks, governments) track, persist, and use our behavior patterns for their gains without our consent and censor our communications for their benefit, sometimes in the name of the 'public good'.

Decentralized applications (dapps) like 'public' blockchains and cryptocurrencies like Bitcoin are helping to wrestle some control from these large heavily centralized censoring organizations although many do not ensure privacy to/from their dapps.

Smart phones, our primary means of global communication and collaboration, are weak in maintaining our anonymity and privacy - critical to ensuring individual freedom.

What's needed is a decentralized application platform that ensures all communications can be maintained private, are ensured of getting to their destination regardless of who is attempting censorship, identities are under our own control, and we can share only what we specifically allow maintaining our privacy while supporting the ability to be transparent in our relationships.

1M5 is a secure open-source decentralized peer-to-peer application platform with end-to-end encryption and anonymity as a base layer for creating easy to build and use secure decentralized peer-to-peer applications requiring no server connections that can be used around the world by any person looking to protect their communications and personal data from unjust intrusion, interception, monitoring, and censorship to ensure our natural rights to freedom of speech, expression, assembly, and association are never compromised.


Censorship

Maneuvering Conditions

The primary threats to freedom of speech/expression/assembly/association are governments but other entities commonly engage in it such as corporate based media. 1M5 dynamically works to maintain uncensored communications for applications using it by maneuvering against blocks and attacks on the internet and direct mesh networks. This maneuvering experiences varying levels of situational conditions called MANCON.

MANCON is similar to the United States Armed Force's DEFCON. It is an alert state signalling the maneuvering required to achieve the mission. It can change at any time in response to new conditions arising. The base MANCON for a claimed jurisdiction is largely based on the Press Freedom Index.

  • 5 = Good Situation
  • 4 = Satisfactory Situation
  • 3 = Noticeable Problems
  • 2 = Difficult Situation
  • 1 = Very Serious Situation

The following MANCONs provide a description, 1M5's default response, and a list of lower to greater threats within that MANCON.

MANCON 5

Little Extra Security Needed - standard use of HTTPS based browsers is supported with strong privacy laws enforced and little to no control over nor monitoring of the internet.

Communications to web services using Tor/HTTPS and to individuals using I2P

Norway, Switzerland, Jamaica, Costa Rica, Austria, Iceland, Portugal, Germany, Ireland, Greenland

MANCON 4

Low Security - normal censorship attempts by states on reading news with public web sites getting blocked and/or government shutdown of cloud cdn content. Freedom of expression laws could be limited or partially enforced / corrupted by corporations. Tor hidden services should be offered so that people can still read news using Tor Browser when necessary.

1M5 Nodes running as Tor Hidden Services

New Zealand, Canada, Australia, South Africa, Spain, France, England, South Korea, United States, Italy, Belize

MANCON 3

Medium Security - Tor network being attacked. Likely no Freedom of Expression laws or not enforced. I2P hidden services should be offered.

1M5 Nodes running as I2P EEP Sites

Nicaragua, Panama, Guatemala, Afghanistan, United Arab Emirates, Palestine, India, Pakistan, Thailand, Venezuela, Russia

MANCON 2

Medium-High Security - I2P hidden services getting attacked/targeted. Actual threats and prison time for speaking out. Pure decentralized news over I2P is required.

All communications including news over I2P purely P2P with random delays for highly sensitive information. Purism hardware recommended.

Turkey, Iraq, Iran, Saudi Arabia, Cuba

MANCON 1

Highest of Security - Internet access getting shutdown in areas. Strong censorship attempts with massive number of nodes blocked, deep packet inspections across internet, and/or I2P timing/DDOS attacks. People getting murdered for speaking out. Absolutely no freedom of expression protections.

Neo routing using Direct Wireless mesh and I2P with high delays running on Purism Libre Mobile and Laptops.

Sudan, Vietnam, China, Syria, Turkmenistan, Eritrea, North Korea

Features

Application Features

Sensors

Peer-to-Peer (P2P), End-to-End Encrypted, Double Ratchet Key Management, Direct Mesh Network Capable, Anonymous, with Bad Actor Isolation. (I2P/Tor/1DM)

Info Vault

The platform allows for the user to grant access control to their personal information on their device if desired. Access can be revoked when its no longer desired for them to have it. Applications no longer need to know everything about you. This will end widespread data breaches. (Minimal)

Key Ring

Maintaining encryption and signing keys secure. (Minimal)

Decentralized IDentifier

Pluggable, decentralized, people and/or automation-controlled universal ID, called DID or Decentralized IDentifier. (Minimal) Its primary components are:
Crypto Authentication (CA)
Reputation Based Access Control (RepBAC)
Circles of Influence

Prana - User Utility Token

Tokens used in the platform as a method to manage resources (network, cpu, storage) to support it. (Future)

Aten - Developer Utility Token

Tokens used in the platform as a method to determine transaction fee distribution paid in Prana. (Future)

Contracts

Think Ethereum turing-complete platform on a mobile using OpenDocuments for the contract language and a Rete rules engine for execution. When combined with Synaptic Celerity, it truly makes electronic automated contracts 'smart'. (Future)

Content

Full-stack synched decentralized javascript web applications on device for decentralized dynamic content distribution including static resources. (Future)

Consensus

Unpermissioned blockchain on device providing decentralized anonymous automated consensus. Anyone can get on with a DID (public/private keys). (Future)

DEX

Trade tokens directly. (Future)

Solutions

Current / In Progress

An anonymous, decentralized content-hosting solution that provides censorship resistance.

Making journalism truly free.

Open Private Communications for Humanity

Censor Resistant Internet Project - Provides access to internet sites via the 1M5 network by accessing the internet through 1M5 nodes who have access to Tor using I2P and/or 1DM (direct mesh).

Near Future (5+ years)

Voluntary Markets

V4D

Voluntary Decentralized Delegative Direct Democracy

Distant Future (20+ years)

AI Assistance for Humanity

Roadmap

Priorities

1M5's roadmap is driven by the needs of global communities supporting it and thus the current solutions above which are in descending order of priority with Inkrypt's Decentralized Cloud the highest. The following are each solution's needs.

  1. Inkrypt: Decentralized Cloud
    • Core - DID, KeyRing: OpenPGP for self-sovereign identity with flash drives: Minimal
    • I2P: normal content distribution / dissemination: Done
    • Tor: RChain integration: 1st Qtr
    • Tor: Content dissemination to clearnet content providers: 2nd Qtr
    • 1DM: NEO routing under harshest conditions: Start 2021

    2019 Mid: Testnet launch
    2019 EOY: Mainnet launch

  2. Inkrypt: nLightn
    • Core - DID, KeyRing: OpenPGP for self-sovereign identity with flash drives: Minimal
    • I2P: P2P communications: Done
    • Tor: RChain integration: 1st Qtr
    • 1DM: NEO routing under harshest conditions: Start 2021

    2019 Mid: Field/Testnet Testing
    2019 EOY: Mainnet Testing

  3. Dgramz
    • Core - DID, KeyRing: OpenPGP for self-sovereign identity with flash drives: Minimal
    • I2P: P2P communications: Done
    • Tor: Bitcoin integration: 2nd Qtr
    • 1DM: NEO routing under harshest conditions: Start 2021

    2019 Mid: Dev Testing
    2019 EOY: Limited Release, Minimal Functionality
    2020 Mid: Full Release, MVP Functionality

  4. CRIP
    • Core - DID, KeyRing: OpenPGP for self-sovereign identity with flash drives: Minimal
    • I2P: P2P communications: Done
    • Tor: Clearnet integration: 1st Qtr
    • 1DM: NEO routing under harshest conditions: Start 2021

    2019 EOY: Dev Testing
    2020 Mid: Limited Release
    2020 EOY: Full Release

Contributors
Decentralization Software Architect / Cypherpunk / Freedom Activist / Voluntaryist. Over 20 years developing software as a Software Architect, from bootstrapped startups to Fortune 100 enterprises, specializing in distributed computing, scalability, security, and real-time analytics, focusing on intelligence assistance, decentralization, personal privacy, code/governance transparency, and open sourcing all aspects of computing promoting voluntary transparent relationships and private personal lifestyles for all.
Privacy and Decentralisation advocate. Entrepreneur, Cypherpunk, Designer & Public Speaker. Specialised in Product Development & Innovation Pathway.
Birds of a Feather

With 1M5 integrated into your applications, your anonymity and privacy appear to be finally under your control, no longer being under mass unethical surveillance by unchecked governments and large corporations. Until you find out the operating system can bypass application security. Picking an Operating System for 1M5 and other applications to run in is crucial. Closed source operating systems like Windows and Macintosh just don't cut it. It's impossible to know what's in the source code as the code is maintained as a secret and legal non-disclosure agreements are used to enforce secrecy gagging those few with the knowledge. Linux is by far the winner here and there are many flavors. But when looking at a secure open source operating system, we want to know there is a group actively working to constantly combat attackers. So then you might wonder, 'does the rabbit hole go deeper'? Yes, the whole stack from physical metal up is under attack by governments, corporations, and thieves worldwide. And there's no one in our corner.

Until you meet Purism. Purism is working down the stack with hardware and driver manufacturers to claw back our right to privacy. We recommend buying all of your general-purpose laptops and phones from this organization.

Contribute

Contribute to 1M5

1M5 is an open source project powered by volunteers, bounties, and donations. In the spirit of open source and censorship resistance, we have opted to create 1M5 without the demands or influence of investors nor governments. Each of us is involved in the project because we personally believe in it! This is not just another decentralized startup, this is a project aiming to be driven by the global community and serving the global community.

There are a few ways you can help support 1M5’s development:

 

Contribute to Development

If you’re reading this then you probably have the skills that would really help 1M5 build and grow. We are constantly looking for skilled volunteers who can help us with the development of 1M5 and spread the word to the wider decentralization community. If you wish to communicate anonymously, we have a 1M5 channel on I2P's IRC. Leave a message and we will get back to you ASAP. As for as email goes, we prefer communications using I2P first and protonmail.com second.

We have two tracks: Administrative and Development. Administrative includes donation management, public relations, marketing, product management, blogging, graphic design, and web site development. Development includes architecture, technology research, integration, cryptology, software engineering, and programming. People usually belong to either group but may belong to both, especially when there are few people involved.

For development, 1M5 needs development leads for each component on GitHub. Current priorities are Tor and 1DM (direct mesh network). This can and will likely change with solution prioritization. Most components are in Java, so if you have experience with Java and interested in supporting the 1M5 mission, please contact us below and let us know!

 
 

Contribute to Bounties

We set up bounties for development tasks as funds come in. You can either support an existing bounty by donating to the bounty address or set up your own bounty for a feature you would love to see get implemented in 1M5.

Please check out our GitHub issues for more information.

 
 

Contribute to Donations

By donating Bitcoin to our donation wallet, you will be helping 1M5 pay for our direct costs like web hosting, domain names, outsourced work, bounties, and so on. So if you support this project and are in a position to help us out then that would be wonderful. If you wish to support us anonymously, we recommend using Bisq as it uses Tor and using a source of Bitcoin that doesn't have your identity attached to it.

Note: Donations to 1M5 are not tax deductible as we are not formally registered in any jurisdiction.

Please don’t hesitate to get in touch if you can think of other ways you can help with the 1M5 project.