Restarting from scratch the whole computer stack is not possible in a foreseeable future. The thing is even if at the processor level things are broken (heartbleed, et al) not all processors are broken (RISC-V?).

I can not imagine things to change overnight, even if **some** people size the means of production. Like you wrote the whole (software) system is built around domination. Sizing production facilities will, in my opinion, change the people in power, not the system. In particular, it will not change people's minds Earth-wide.

FOSS was a step in a good direction. Because the system is the way it is. FOSS has put another oligarchy in power and created new monsters, but those kind of monsters existed before FOSS. The good thing about FOSS is that it exhibits, once more, that **together we are stronger**.

One can swap a processor with another, given enough work.

One needs to give some existence to an alternative system, and that should be done at every level of the stack.

edit: that should be done at *every* level of the stack


@zig @emsenn @theruran I disagree with him about the impossibility of restarting the whole computer stack.

The lowest and medium layers must be fully re-engineered, let's say up to kernel level, and eventually we can easily adapt existing OS on top of this.

You know why I think like this. Hope you did not changed your mind.

@zig @emsenn @theruran why.

This is why I have asked you to participate to the definition of crypto-anarchism & demilitarized technologies. It's a way to adjust goals and clearly remember them, allowing several strategies to reach them to naturaly emerge. Theruran, we've both done a lot of good work toguether with our informal chat on several matters.

We should deepen all this.

Kind regards,


@stman I understand. I was boosting @zig post for visibility since I think it's important to hear different angles on the topic.

yes, we need a decentralized economic system to support the decentralized information system development and stewardship. to the extent possible, these should be designed together.

I sent you a DM earlier about definitions. Lemme know and we can iterate on some things.


/cc @emsenn

@theruran @zig

can testify that we did a nice work, a conceptual and theorical one, leading to what we can call crypto-anarchism situationism, that diffetenciate itself from classical crypto-anarchism, by the enphasis put both on architectures of all known technological layers and time.

Kind regards,




@stman @theruran @emsenn


I introduce to you @mouloud who he is more aware of philosophical implication and sometime technical details of the actual the (sort of) system we have been working on.

I forward a very **serious** question from him, since the convo was not federated on his instance yet:

What is the point of money or crypto-money?

@zig @stman @theruran @emsenn

My question is indeed what is the point of money whether it is crypto or not. I know a little about bitcoin (proof-of-work: evil for climate so far) and Ethereum (algorithmic contracts, good idea as far as I understand, but still PoW).

The idea of a single source of thruth is neat, and would be useful to avoid lies or fakes in a distributed system.

@zig @stman @theruran @emsenn

Money used to be used a means of exchange something of value for the rich that is gold. That by itself shows how dubious money seems, because gold is almost useless in practice. Nowadays, money has mostly only virtual value, because people trust the system, and the people in power somewhat trust each other and they agree through the market on exchange rates.

@zig @stman @theruran @emsenn

Anyway, take of instance "carbon budget" of countries, it can be exchanged for money. And they that "carbon budget" can be used to produce new products.

With the money, a low carbon footprint country can bargain to buy some products.

During this exchange the low carbon footprint might have lost value because conditions of the exchanges and the dubbed added value to the products.

@zig @stman @theruran @emsenn

It is far fetched, but to me their should be no money, hence probably no crypto-money.

A single-source of truth is helpful, but I am not convinced it is necessary, and is certainly not necessary in a fully cooperative system with no evil.

Thanks including me in the convo.

@mouloud (Preparing and structuring my answers, please give me a few minutes, will be back in a few minutes...)

@zig @theruran @emsenn


Had to type the begining of my answer on a pad due to post size ugly limitations on my mastodon instance. See the picture attached to this post.

@zig @theruran @emsenn


They have locked down our ability to change most of the architectures because they know that cyber-powers and cyber-rights models are exclusively the consequence of those architectures, and they want to impose us their own models, by forcing us to play with their architectures, protecting their models, and therefore, their political and failing economical system, in essence, capitalism. Doing so, they are preventing a crypto-anarcho-communist revolution.

@zig @theruran @emsenn


Here it is.

But in order to implement this at world scale, we obviously need alternative cyberspace architecture that offer the equivalent of blockchain functionnalities in its core, as a service, scalable to billions transactions per second.

And this cannot be clearly achieved with the current cyberspace architecture design and paradigm, not with current digital system architectural paradigm.

@zig @theruran @emsenn


In such paradigm, every citizen would have a kind of multi-wallet attached to him, beside standard wallet and bank accounts, to count those credit left for him on those hundreds of "criterias", and he would not have the possibility to "recharge" a specific line with monay. In order to buy a good or service, citizen would be obliged to have credit left on all fields, beside having the money to buy the good or service. This incentively would force citizen to @zig @theruran @emsenn

@mouloud choose carefully what they buy or consume.

Every month, those credit lines on all those criterias would be reset to the initial value.

This is just an example, but I hope you understand the logic and how it can help transitionning to a money less society in middle term.

@zig @theruran @emsenn


By the way, homomorphic cryptography would be very usefull to help create a cyberspace architecture allowing to easily handle for each citizen the multi-wallet holding those hundred "credit lines".

It's typically a functionnality that would require to be provided at cyberspace architecture level in order to be scalable. And this is not possible with the current cyberspace architecture paradigm.

Cybernetics of trust cannot be achieved with current cyberspace.

@zig @theruran @emsenn

@mouloud This kind of logic I presented you here is anarcho-communist compatible. It would lead to a money less and class less society, without fascism, just with incentive logic, but it can work only if it is incorruptible.

This is because such functionnalities, scalable, real time, can only be achieved with revolutionnary alternative cyberspace architectures, enabling such cybernetics of trust, that we advocate, as crypto-anarchist situationist, to change of

@zig @theruran @emsenn

@mouloud cyberspace architecture, and have all our digital system designed to be resilient over time, thanks to these new conception paradigm, that embrace agility and dynamism, necessary to maintain them operationnal over time, and keep them demilitarized over time too.

@zig @theruran @emsenn

@stman @zig @theruran

I agree with what you write.

Where does the code happen?


What is hard, and Theruran knows it, is how to ensure those fundamental blocks cannot be "hacked", and how to garantee they will really work as expected with no treachery possible. This is indeed what we are working on. Globaly, this is called cybernetics of trust, but it is also fulyl demilitarized as it is not hackable, there are no backdoors possible of any kind.

@zig @theruran


@stman @mouloud @zig Thanks for the discussion. I enjoyed reading so far!

Yes, and about code - that is the kind of knee-jerk reaction that people have nowadays and it prevents everyone else from understanding what they are doing. Documentation of every kind is key, unlike the prevailing software engineering practices that lack rigorous conceptual design development phase. Visual documentation is also of course important, and to maximize the utility it must also be an executable architecture model.

Well - if we can theorize another way of achieving an equivalent security model and utility to Bitcoin without the energy consumption, that would be incredible. As far as I know, there is no alternative yet conceived and the energy consumption keeps the system honest. And unfortunately, no one I have met in the fediverse thus far is qualified to theorize such an alternative. There are real engineering constraints and trade-offs that are glossed over in these kinds of discussion, and I doubt that billions of transactions per second is achievable due to laws of physics. It is my expectation that such a decentralized and trustworthy cybersystem will be slower in many ways but is nevertheless fast enough for us to get real work done and not just mindlessly consume Big Media.

P.S. come to hackers.town - we got 10,000-character toots!

@stman @mouloud Another thing about code is that I am having a helluva time finding the right tools to do the work. Most of the advanced tools are either theoretical or incomplete. The best tool right now seems to be free-form writing. @alcinnz @zig

@theruran Yes. gonna move to your instance.

Back to what you said before, I never said PoW was to trash completely. I am just criticizing the way PoW, mining, is being used in lost crypto-currencies : To me, every node should mine. Then, regarding billions of transactions per second issue, I think nobody found yet how to achieve it mostly because they stayed encaged in the current cyberspace architecture paradigm. I still think such goal

@mouloud @zig

@theruran can be achieved when integrating this natively inti the cyberspace architecture itself. Time will tell. I'm still thinking about this and working on it, exploring possible native implementations a lot. I tend to mix DHT concept with PoW in a native mesh cyberspace architecture to do it for the moment, but I am exploring other possibilities too. Will tell if I find something promizing. @mouloud @zig

@theruran But to be honnest, the most promizing path I have been following to reach equivalent goals and functionnalities offered by blockchains in the current cyberspace architecture paradigm is definitely the custom designed TSN alternative cyberspaces architectures I have been exploring. @mouloud @zig

@theruran Double spending prevention functionnality offered by Blockchains can also been seen as a lack of accurate secured reliable synchronous timestamps within the current cyberspace architecture paradigm, and this critic can also be extended to current microprocessor based architectures, mostly astnchronous, and were accurate perfect timestamping mecanisms concepts and functionnalities are simply completely missing. @zig @mouloud

@tomosaigon Either I misdescribed or you misunderstood me, but in truly fully synchronous and truly tile sensitive alternative cyberspace architecture the way I am designing them, those propagation delais are perfectly known, controled, and quantized to the global system synchronous speed. That's the advantage of such network. Then, if end-points design does the same, entirely, @theruran @zig @mouloud

@tomosaigon from the motherboard architecture up to the internal microprocessor design, and up to the kernel and OS and top level applications that would be aware of the time sensitive hardware and microprocessor it runs onto, and of the same characteristic for the alternative synchronous and time sensitive cyberspace architecture, the whole fucking meta-system being globally clocked and synchronized with a global clock @theruran @zig @mouloud

@tomosaigon and with all the propagation delays within this alternative cyberspace architecture being known and quantized synchronously to this clock, then, in such fully synchrounous global meta-system paradigm, what I say is truly relevant. I find more intrtesting to design and sexy and usefull to design such thing, than to try ugly ducktape fixes the way blockchains are currently implemented, with other complex @theruran @zig @mouloud

@tomosaigon layers on top of it like lighting network protocol to try to ducktape fix issue from the underlying ducktape issues (Bitcoin blockchain) that was itself at attempt at ducktaping the whole shit that is the current asynchronous shitty and not time sensitive cyberspace architecture, where accurate time and timestamp management are simply missing, same for all the microprocessor based systems (end-points) that @theruran @zig @mouloud

@tomosaigon connect to the current shitty and outdated cyberspace architecture paradigm we (me and theruran) have CLEARLY in mind of replacing completely because we know it is old, poor, backdoored from everywhere, generator of cyber-chaos, and globaly consists of a paradigm where we, the people, have absolutely no control over its applicable cyber-powers and cyber-rights models, and no way to enforce them if we could. @theruran @zig @mouloud

@tomosaigon We are definitely in the mindset and paradigm of designing alternative cyberspace architectures and digital computer systems to allow things that can only be dreamed with today's current digital technologies and cyberspace architecture : Cybernetics of trust.

Bitcoin as you know it being a very smart exeption that was very lucky to be able to exploit blockchains the way it did. But it's still a ducktape fix.

@theruran @zig @mouloud

@tomosaigon There are two ways to timestamp : absolute timestamps (asynchronous), which always, by nature, depend on the clock precision, and always carry an error. But there are also quantized synchronous timestamps in fully synchronous systems : In the later, timestamps are quantized, but they carry no error with this quantization of clock, and this is the implementation I prefer.

@theruran @zig @mouloud

@tomosaigon Solving double spending issue in a fully synchronous quantized time sensitive alterntive cyberspace architecture and computer systems paradigm is very easy, and can be done efficiently with many different simple algorithms.

Another reason to re-engineer everything from scratch, instead of hitting our heads on impossible to solve with ducktape fix problems because of the current shitty cyberspace architecture and computer systems paradigms.

It worth it !

@theruran @zig @mouloud

@theruran This is also a radical critic of current microprocessors inner architectures (mostly internaly synchronous, but externaly seen as mostly asynchronous), and even the current microprocessor concept, that was never designed to be able to securely timestamp in a reliable synchronous way each instruction it was executing, and bringing proofs of such internal timestamping, synchronized with external synchronous TSN cyberspace architecture. @mouloud @zig

@theruran In my prefered meta-cyberspace implementation paradigm, I am sokving such issue, and everything is perfectly synchronous, and accurately tilestampable, proovenly, with inalterability of timestamps stored or exploited. With such angle view, billions transactions per second is achievable :-) @zig @mouloud

@theruran But everything is completely redesigned by me, from microprocessors internal architecture, to such microprocessor based motherboard architectures, and up to the cyberspace architecture connecting such computers toguether, fully synchronous. Accurate synchronous Time and timestamps are the forgotten and missing thing in our computer systems design, same issue for cyberspaces architectures : It's currently imposible to accurately @mouloud @zig

@theruran timestamp any datagram transmission in the current cyberspace architecture paradigm. Attempts that were done with the documents you shown me about TSN over TCP/IP is bullshit. It's complex, and it does not do the job universaly, accurately, and perfectly. Even if it was possible, and I seriously doubt it is, when data reach (enters, as input on the data bus) @mouloud @zig

@theruran current microprocessors, the benefits of such timestamping of every byte is lost. Current mucroprocessors were not design to be TSM - Time sensitive microprocessors - allowing to keep track of each byte timestamp stored in its internal working register. Timestamp chain of data is clearly lost at entering them, even for DSP's even if the situation is a bit better.

But once you have a global digital meta system that is fully TS,

@mouloud @zig

@theruran things become fun.... And new possibilities for simpler algorithms, and with less energy consumption than classical PoW become possible, to enable many of the current blockchains functionnalities, at rate reaching billions of operations per second. But the technological digital paradigm is radicaly different, we're talking about fully synchronous time sensitive digital systems and cyberspace architectures. So you see, I'm confident. @mouloud @zig

@stman Time Sensitive Networks with timestamped everything sounds like great way to approach this problem :blob_gnikniht: @mouloud @zig

@theruran Yes it is. And designing these synchronous systems is not a complex task. It's a KISS approach that don't require so much use of complex crypto, indeed it makes everything much more simple, and would consume much less energy. This is why I always remind everybody that blockchains are not the nirvana, it may be the best implementation possible in the current cyberspace and computer systems architectures paradigm, but we can do much better. :-) With infinite scalabily. @mouloud @zig

@theruran There is an anachist saying that also do apply to crypto-anarchism that says "If it (technology) is not accessible to the poors (masses), it's neither social nor revolutionnary". Accessibility here must be understood both financialy to gain access to a technology, but also to understand how it works... You know, this "Horizontalization of the trust model in the development of free technologies"... This famous complexity overdose that ruins most FOSS benefits... @mouloud @zig

@theruran Architectural efforts to build end-to-end time sensitive digital systems and meta-systems (cyberspaces architectures) are not complex. They can be understood easily by many. This is why I like this approach too, it is KISS. @mouloud @zig

@theruran In such paradigm, simpler protocols, with fully distributed small mining capabilities in each node of a truly mesh cyberspace architecture, and within each microprocessor, can bring the time sensitive trust chain needed to replace the current blockchain implementation, with its energyvore mining. That's what I curently think.
@mouloud @zig

@stman @mouloud @zig a trustworthy distributed time server will be important when solar storm activity picks up and our GPS goes out for extended periods; and in scenarios when that GPS infrastructure rots due to lack of funding and the satellites fall out of the sky.

@theruran How shall I understand time-server here ?

We are in a truly serverless paradigm. I prefer you to talk about a fully distributed way to create a global synchronous clock. I know it is hard, so much we have been druged and brainwashed with the client-server paradigm elevated to the rank of religion by cyber-creationists, but wipe it from your head, at least when reasonning in those alternative cyberspaces architectures paradigms.

@mouloud @zig

@stman yes you are right! I guess I meant server generally as in an entity that serves something. "global synchronous clock" maybe more accurate. in blockchain-speak it's a kind of oracle. @mouloud @zig

@stman The closest thing to this that I know of is Google Spanner which uses GPS and atomic (hardware) clocks to ensure global synchronicity. Its FOSS equivalent is CockroachDB which only emulates this functionality through the system clock synchronized by NTP. @mouloud @zig

@mouloud @theruran @zig Being able to finaly manage perfectly time is an easy consensus we should be able to easily reach when it is to debate of what kind of new "functionnalities or services" to implement natively in an alternative synchronous cyberspace architecture. But in such paradigm, the whole technological stack and mesh cyberspace chain must be design oriented toward perfect synchronous time management, microprocessors and microprocessors based systems too.

@mouloud @theruran @zig Even for example, crime investigations, having a cyberspace that allow to backward events or transactions precilsely is something that is missing currently. Too many folks really misunderstood me about what I was meaning by crypto-anarchism (cybernetics of trust, enabling true anarcho-communist like societal alternatives), they thought it was crypto-libertarianism, that favor mafia and corruption, and don't favor or incite solidarity, social justice and peace.

@mouloud @theruran @zig Mastering cyber-powers and cyber-rights models, in a garanteed way, enforcing them, through well designed architectures, allows us to choose and fine tune our models, to in the end reach a peacefull crypto-anarco-communist society, without destroying individual liberties, or human rights. I have always been talking about sustainable and efficient global ballance of powers and cyber-powers. Contrarily to crypto-libertarians.

@stman @theruran @zig

I agree that CPUs (about which I am clueless so far) might and certainly are geared toward some particular use, that do not always intersect the interests of the commons. And more generally, available tools are nurturing a particular social system of domination.

@stman @theruran @zig

What I want to write has two sides a) I believe there is a slow, smooth path toward libertarian socialism. Stronger claim, it is the only viable path. I believe a brutal change is not possible. Feeding the "revolution" meme as in the french revolution of 1789 is counter productive. If anything like that would happen, that is again the people sitting at the first row that will be taking advantage of it like bourgeoisie has taken advantage of french revolution.

@stman @theruran @zig

b) I agree there is a need to THINK about the new system but also the think about path toward that system. It is necessary to DOCUMENT and prove, if not necessary, at least that there is sufficient alternatives. And toward that goal, I am confident that one can not just reboot the system with a new operating system. That is, one need an upgrade path, and step by step hotfix, and swap existing cyber infrastructures with better ones.

@stman @theruran @zig

The upgrade path I am thinking about is similar to the one that happened with Linux: at the beginning is was toy, then it was sufficient, now it necessary.

@stman @theruran @zig

I might be wrong, but I consider code to be XXI literacy. We can live without code and go back to caves or something. But if we want to human science, say medicine, to progress with need computers and code.

In other words, yes you can try to convince people with free-form text, and think about new socioeconomical systems. But eventually, people will go back to their usual routine business as usual privative tools.

@stman @theruran @zig

I think one need to both document and code alternatives software that gives a cyber body to alternatives socioeconomic systems.

There was much work that has been done, but there is more that remains to be done.

@stman @theruran @zig

Toward that goal I have been working on alternative "operating system" that is supported by a DHT.

It will allow to not only copy but also improve the user experience of the www.

So far my work has been concerned about offering better alternatives to mastodon, mediawiki and to some extent google search engine.

I have not touched yet, other aspects like factories, production chains, logistic and many others...

@mouloud amazing! please share

and yes, I like this diagram. it's important to have an upgrade path or else the new system will be too great of a leap to adopt.

@stman @zig


I already tried to share my work and I had little or no feedback.

I am working on new stuff (based on previous work) but it is not ready yet, like not ready at all.

@stman @zig

@mouloud @stman @theruran @zig

what's with this meme of calling things operating systems when they're really application runtimes? if you aren't the interface to the metal, you aren't an OS.

i'm interested in making a p2p native microkernel operating system, but I don't have any illusions that the tracker runtime itself is an OS. its a set of portable libraries that run on top of an operating system.
@xj9 @mouloud @stman @theruran @zig
I suspect it started with GNU trying to demand recognition as an OS, and claiming the kernel/drivers are just a component thereof
I'm not sure what it was like historically though (i.e whether there was a clear separation between userland and os/kernelland)
Show more
@mouloud @stman @theruran @zig

a capability based operating system is good for extending the capability model from the runtime down through the userspace servers to the metal. conceptually integrating the entire stack's security design. you could go further and build some capability support into the metal, but I still don't see the point of wasting all of the existing silicon. we should probably work with what we have for now and build a global meshnet of Wii's.
Show more
Show more


My use of the words "operating system" may be misguided, even if in the grand scheme of things I would like to get rid of the linux kernel or bsd. I do not have a completely clear idea of that yet.

> Plans are only good intentions unless they immediately degenerate into hard work.
> Peter Drucker

@zig @theruran @stman

@mouloud @theruran @zig But cyber-chaos will strike them all like the coronavirus.

Everybody on earth is ready to contribute to save the earth and ecology, but the accounts must be right, trusted. Without recreating trust between everybody, novody will cooperate, but instead, fight to death to survive.

Demilitarized Cybernetics of Trust is not an option, it's vital for collective survival and global true & fair cooperation.

@mouloud @theruran @stman TrueTime requires special hardware it was (somewhat?) replicated by cockroachdb and TiKV without the specific hardware. Apparently, foundationdb bypass that requirements completely.

Speaking of hardware and OS, read rumpkernel.org/

@zig @mouloud @theruran Sincerely, very sincerely, the Kernel concept as we know it, fully dependent of microprocessor's programming model, is to me fully outdated. The OS concept is outdated too, and must be re-engineered. Both concepts, kernel and OS, suffer a centralized aspect that nobody ever managed to get rid of, because nobody ever asked himself if these centralized conceptions where necessary, and why we had better prefer decentralized approaches. To me, kernels will disappear, and OS

@zig @mouloud @theruran concept will be seriously re-engineered in a decentralized way.

Of course, the cyber-powers that be and rule, crypto and cyber creationists (It's another way to politely say cyber-imperialist hegemonist) will disagree, but I don't give a fuck.

May I ask all of you a question ?

What is the most important constraint to ensure an alternative cyberspace architectures belongs to, and servs, equaly, all the people on earth ? I will answer last.

@zig @mouloud @theruran Here I was meaning architectural constraint, in any technological field of your choice.

Another question : What is most dangerous centralized aspect in software kernels like Linux in terms of cyber-security model ?

The software memory management stack working with MMU/PMMU.

@zig @mouloud @theruran And what is responsible of such disaster ? The MMU/PMMU concept IMPOSED by microprocessors architects & vendors to software kernel designer, that have choice but to play and do what they can with this fully outdated concept that are MMU/PMMU as we know them. Even ARM TrustZone falls into this category. I'm saying this because ARM folks tend to pretend conceptual superiotity with TrustZone, which is completely false.


What is the most important constraint to ensure an alternative cyberspace architectures belongs to, and serves, equally, all the people on earth?

Thinking about this at first it seemed that decentralized governance of a copyleft architecture specification and implementation would be the deciding factor its sustainability. I don't think this is what you're asking though.

Even with a successful global multistakeholder cooperative that provides architecture governance, the architecture itself could still be shit. We see this today already and we should be aware that people like to pile on their CVs because they're careerists and don't care about doing great work. A co-op would look nothing like the Linux Foundation of today though, but that's a topic for another time.

The deciding factor in ensuring the alternative cyberspace architecture remains free to everyone forever -- I am convinced -- is that the architecture model is fully self-documenting. We don't see this anywhere except in aerospace / military industrial applications which are obviously classified and proprietary. Even there it is extremely expensive and not widely practiced. Fully model-driven engineering is extremely powerful but again, every model element needs to be richly documented so full documents and books can be generated from the model.

Part of the problem is the garbage tooling available. The rest is the capitalist culture of withholding information for profiteering. When only an elite cadre of engineers understand the system, everyone suffers. We see this today with our computing systems both proprietary and FOSS. Public domain or strong copyleft are of course important but useless without the effort spent documenting the architecture.

We may understand constraints differently, so I still don't know if I am answering your question as you intended. Constraints have a specific engineering definition and are dealt with differently by systems engineers - I am just learning they may be recast as optimization goals.

What is most dangerous centralized aspect in software kernels like Linux in terms of cyber-security model?

The MMU is provided by the microprocessor, so do you mean the virtual memory / page tables managed by the kernel? Linux' fault is that it's a monolithic kernel of C code. But even advanced separation kernels are not saved from the vulnerabilities of the microprocessor microarchitecture. Then the idea of an Abstract C Machine is all about sequential processing so that's why things like the MMU exist and there's your architectural bottleneck - Achilles' heel right there! So yeah - there is software maintaining security barriers around memory and that software sucks; and the microcode and hardware architecture of the microprocessor also tries to place security barriers but due its unmanaged complexity creates more side channels instead.

@zig @mouloud


I am impressed by your answers, not only because they are according to me fully true, but because I was desperate to find some people able to write such thing.

As promized, I am going to give mine, very close from yours, you will see, and another one I got from a sociologist that is also computer hacker & FOSS + Open hardware entousiast, as his answer was mainly driven by his sociological culture and he through a very interesting idea in how to answer the question.

@zig @mouloud

Sign in to participate in the conversation

A bunch of technomancers in the fediverse. Keep it fairly clean please. This arcology is for all who wash up upon it's digital shore.