| title | Project Guide & Reader Overview |
|---|
Constitution for a Humane Civilization
A Charter of Human Dignity, Stewardship, and Non-Coercive Order
A public design workbook for separating basic needs, markets, and public power so wealth cannot quietly become control over other people.
Start with a life, not a mechanism: a person may lose work, status, health, documents, popularity, or money and still remain a person whose hunger, shelter, medicine, and basic dignity matter. This project asks whether a society can protect that truth without crushing markets, local freedom, enterprise, dissent, or responsibility.
That is a serious claim, and this draft does not ask to be trusted because the aim sounds humane. It is a human attempt to design rules that serve people rather than dominate them. It must be judged by whether it protects the vulnerable, preserves dignity, tells the truth about failure, and remains open to correction.
- What this is
- If you're new
- If you're skeptical
- Reader app β open in browser Β· download desktop app Β· run from source
- Current status
- Plain-language rule
- The core separation
- The current architecture
- Architecture flow
- Document set
- Technical specifications
- Hardening history
- Major risks
- What this system is not
- What will go wrong
- Scale readiness checklist
- How to engage
- Fork, remix, or adapt this
- License
The Humane Constitution is a design for a society where everyone has a basic needs floor, markets still work, and public power cannot be bought.
The core problem is simple: when food, housing, medicine, business, and political influence all depend on the same money, wealth becomes power over other people's safety.
This is not a live government. It is not a finished rollout plan. It is a public working draft with stress tests, known failure paths, proposed fixes, and validation checks.
Start with the human case before the technical machinery:
- One-Page Overview for the shortest public introduction
- Life Under The System for one-year pressure stories about ordinary people
- Rights Layer for the plain-language rights summary
- How Big Companies Work Here for how profit can remain without hostage power
- FAQ for common objections in plain language
- White Paper for the fuller public explanation
- Public Readiness Guide for status, skeptic, and audit paths
Start with the Public Readiness Guide. It states what the project claims, what is only designed, what still needs evidence, and which objections deserve the most pressure.
If the design feels too abstract, read Life Under The System first. The stories are not promises. They are concrete pressure cases for asking whether the rules would protect dignity under stress.
For deeper critique:
- Claims & Evidence Register for claim status and proof gaps
- Evidence Ladder for what counts as stronger proof
- Abuse Case Library for bad-actor patterns
- Pilot Evidence Roadmap for what must be tested before scale-up
The repository ships with a reader app: a clean, searchable way to read the whole project. It includes the main text, public explainers, annexes, threat register, patch log, and evidence documents.
This is the recommended path for most readers.
A hosted version of the reader is available at:
β humane-constitution.vercel.app
Click the link. That's it. Nothing to install.
If you prefer a desktop window (works offline, no browser needed):
- Go to the Releases page of this repository on GitHub.
- Under the most recent release, find the file for your computer:
- Mac: download the
.dmgfile - Windows: download the
.msior.exefile - Linux: download the
.AppImageor.debfile
- Mac: download the
- Open the downloaded file and follow the normal install steps for your system (same as installing any app).
If you're on a Mac and see a warning that the app is from an "unidentified developer," right-click the app and choose Open β this bypasses the warning for apps that haven't been submitted to Apple's store.
If you want to run the app from source β for example, to propose edits or work on the codebase β you'll need a few tools installed first. This path assumes familiarity with a terminal.
Prerequisites: Node.js 18+, Python 3.10+, and (for the desktop wrapper) Rust + Tauri prerequisites.
cd app
npm install
npm run dev # opens in browser at http://localhost:5173
npm run tauri dev # opens as a desktop windownpm run dev and npm run build both regenerate the corpus first via python3 ../scripts/export_corpus.py, so the reader always reflects the live markdown on disk. To regenerate manually: npm run generate:corpus. To verify the generated corpus matches what's checked in: npm run check:corpus.
Build a release binary:
cd app
npm run tauri build # produces a platform-native installer in src-tauri/target/release| Section | What's there |
|---|---|
| Home | Featured documents and the recommended reading path. Start here on your first visit. |
| Constitution | The charter text, white paper, public-facing explainers, and Founding Order. |
| Annexes | All operational annexes (A through AV). Search and filter by topic. |
| Threats & Patches | Threat Register, Patch Log, Founding Commitments, Claims & Evidence, Pilot Roadmap. |
| Validation | Activation gates, integrity status, and structural-check output. |
| Settings | Font size, column width, and dark mode. The reader remembers your last view between sessions. |
Keyboard shortcuts: press ? inside the reader to see all shortcuts. Press Cmd K (Mac) or Ctrl K (Windows/Linux) to search across the full document set.
This project is strongest today as a design, critique target, and public working draft. It is not scale-ready.
What exists now:
- constitutional text and public explanations
- a threat register and patch log
- adversarial simulations and stress-test documents
- evidence registers and dedicated test packages for unresolved load-bearing claims
- a validation pipeline and reader app
What must still be proven:
- pilot evidence at real scale
- a non-coercive identity and recovery stack
- reliable measurement of essential capacity
- a legitimate founding coalition
- essential-sector refusal survivability for oil, energy, medicine, logistics, and PBM-style intermediaries
The right response is neither blind belief nor dismissal. The useful response is specific critique, hard testing, and evidence.
This project should be understandable to people who never went to college. Legal, policy, and software terms should be avoided unless they are truly needed. When a formal term is needed, explain it in plain English first.
The project-wide writing rule is in Plain-Language Standard. Future edits should follow it, especially in public pages, the reader app, the constitution overview, and threat summaries.
The system separates three things that most societies mix together:
- basic needs
- markets
- public power
It does this with five tools:
| Tool | Purpose | What it cannot do |
|---|---|---|
| Flow | Markets, wages, contracts, savings, investment | Buy survival access or civic power |
| Essential Access | Survival floor and baseline essentials: food, water, shelter, healthcare, essential medicines, and basic transit | Become cash, collateral, or a status marker |
| Voice | Bounded agenda-setting and budget prioritization | Buy rights, goods, or survival access |
| Service Record | Eligibility for rotating public-service roles and stewardship history | Measure human worth or accumulate permanent rank |
| Shared Storehouse | Emergency rationing during verified shortage | Become permanent or a hidden market |
The walls between these tools are the system.
Those walls are meant to prevent three collapse states: survival becoming dependent on trade, wealth becoming public power, and temporary advantage becoming permanent dominance. See the Architecture Source Map for the source-backed version of that framing.
Essential Access protects the survival floor. Voice shapes bounded civic priorities. Service Record governs readiness for rotating public roles. Shared Storehouse appears only during verified shortage.
Flow is public money rather than privately created bank money. It is primarily digital, secured with cryptographic methods, and paired with physical cash or equivalent offline instruments for resilience and privacy.
The current main text uses one Founding Order and seven articles.
- Founding Order β Local Choice, Consent & Exit β who joins, how decisions stay local when possible, and how a place can leave.
- Article I β Rights & Rules β the rules that cannot be quietly changed.
- Article II β Personhood, Identity & Continuity β One-person continuity, recovery, guardianship, and dependent protection without surveillance scoring.
- Article III β Real Capacity & Reserves β how the system measures food, water, energy, shelter, care, medicine, and reserves.
- Article IV β Survival β how Essential Access becomes real access to basics.
- Article V β Markets, Commons & Public Finance β Flow, housing, land, business, public banking, and public funding.
- Article VI β Voice, Service Record & Public Decisions β how people help set priorities without creating social credit.
- Article VII β Public Records & Warning Systems β dashboards, audits, and early warnings.
The constitution is built in five layers. Each layer depends on the one above it and feeds signals back up.
| Layer | Article(s) | What it does | What it sends down |
|---|---|---|---|
| Foundation | Founding Order | Sets subsidiarity, consent, and exit rules that apply to every article | Scale and participation constraints |
| Rights | I β Rights & Rule of Law | Constitutional limits that bind every operational article below | Rights constraints on all |
| Inputs | II β Personhood & Identity Β· III β Physics & Reserves | Establishes who is eligible (identity) and what exists to deliver (measured capacity) | Eligibility signals; capacity limits and scarcity signals |
| Operations | IV β Survival & Essential Access Β· V β Markets, Commons & Public Finance | Delivers survival goods; manages markets, housing, public banking, and commons revenue | Delivery outcomes; production and finance flows |
| Accountability | VI β Voice & Deliberation Β· VII β Transparency & Scanning | Voice shapes priorities; Transparency audits the whole system | β Priorities back to V; audit signals back to I and V |
Feedback loops: Article VII (Transparency) sends audit visibility back up to Article I (Rights) and public accountability signals back to Article V (Markets). Article VI (Voice) sends priorities and legitimacy inputs back to Article V. Article V sends production and housing flows back down to Article III for physical constraint updates. The system is designed to self-correct β failures surface at the accountability layer and travel back up to the rights and constraints layers rather than accumulating silently.
| Document | Purpose |
|---|---|
| One-Page Overview | One-page introduction for first-time readers. |
| Life Under The System | Concrete one-year pressure stories for ordinary life under the proposed system. |
| Rights Layer | Plain-language summary of rights and protections. |
| How Big Companies Work Here | Plain-language explanation of profit, compliance, and anti-hostage rules for large firms. |
| FAQ | Public-facing answers to the most common objections and questions. |
| White Paper | Plain-language public explanation. |
| Public Readiness Guide | Skeptic reading path, claims audit, readiness dashboard, and evidence map. |
| Document | Purpose |
|---|---|
| Architecture Source Map | First-principles collapse-state framing and source boundaries. |
| Collapse-State Crosswalk | Threat-by-threat map to Survival-Trade Bind, Power-Wealth Convergence, Static-Advantage Loop, and control-plane failure. |
| Fairness Vignette Library | Realistic life scenarios and fairness pressure tests across different patterns of work, care, status, and need. |
| Claims & Evidence Register | Public claim status, evidence needs, and proof gaps. |
| Corpus Refinement Roadmap | Rewrite priorities for making the corpus more legible, curious, rigorous, and less skepticism-triggering. |
| Evidence Ladder | Upgrade and downgrade rules for claim strength. |
| Abuse Case Library | Reusable adversarial patterns used to pressure-test patches and public claims. |
| Founding Legitimacy Dossier | Evidence burden for any founding coalition before activation claims. |
| Implementation Drift Audit Package | Tests for hash reproducibility, startup refusal, key custody, timelocks, and deployment drift. |
| Parameter Calibration Register | High-risk parameter values, evidence needs, capture routes, and revision triggers. |
| Capture Dashboard Specification | Public metrics for elite formation, institutional self-protection, and control-plane capture. |
| Conglomerate Transition Dossier | How essential-sector conglomerates can keep doing business without holding survival goods hostage. |
| Essential-Sector Refusal Test Package | Practical drills for supplier exit, medicine/PBM refusal, grid/logistics delay, reserves, fallback capacity, and capture exposure. |
| Pilot Evidence Roadmap | Pilot sequence, metrics, failure criteria, and scale-up gates. |
| Document | Purpose |
|---|---|
| Humane Constitution | Primary rule text, with links into the standalone annex corpus. |
| Threat Register | Known attack paths, design-state counts, mitigation posture, and residual-risk notes. |
| Patch Log | Change history and current patch inventory, including ACTIVE and PROPOSED status. |
| Hardening Queue | Red-team hardening queue β session history, closed items, open items, and standing simulation requirements. |
| Acceptance Protocol | Process for moving patches from design to operation. |
| Document | Purpose |
|---|---|
| Constitutional Invariants | Seven constitutional invariants (INV-001 through INV-007). Tier 1 protected. Any patch that violates these is rejected at intake. |
| Formal Specifications | Formal state machine definitions for Flow, Essential Access, Voice, Service Record, and Shared Storehouse. Demurrage function, issuance constraints, oracle consensus rules, and parameter tables. |
| Adversarial Narrative Simulation | 10 simulated narrative attacks with structural responses and residual risks. |
| Annual Compound Simulation | Month-by-month operational year stress-test across the constitutional architecture. |
| Founding Pre-Activation Disclosure | Founding instrument pre-activation disclosure. |
| Simulation Model Outline | Agent-based simulation scaffold (Mesa framework). Models Essential Access and Flow interactions across citizen and adversarial agents. Four scenario runners: baseline, oracle stress, high demurrage, adversarial density. |
The annex corpus now lives entirely as standalone documents. Use the Annex Directory as the entry point for constitutional annexes, hardening clauses, and detailed specifications.
The repository includes a corpus validator for the live constitutional document set:
python3 -m pip install -e .[test]installs the reproducible simulation and test dependencies.python3 scripts/validate_corpus.pychecks local markdown links, annex-index coverage, FC/T/P identifier integrity, and deprecated live terminology.python3 -m pytest -qruns the simulation test suite from the packaged environment.npm run check:corpusfromapp/regenerates the reader corpus and fails if generated files are not committed.- GitHub Actions runs the same validator on every push and pull request, alongside frontend build, generated-corpus drift, and reader regression checks.
The project names its biggest failure paths instead of hiding them.
Essential Access depends on knowing what society can actually provide.
If the system measures food, housing, medicine, water, or energy badly, people can be harmed. A captured measurement system could make shortages look fake or make capacity look larger than it is.
The defense is to use several different measurement sources, public methods, direct physical checks, and review when sources start copying the same assumptions.
Remaining risk: the people who define "good measurement" still hold power.
Essential Access is not supposed to become money. But people may try to trade around the rules.
Example: a broker pays someone in Flow to use their Essential Access for someone else. Or a business prices services in "Essential Access equivalents" without touching the official system.
The defense is to make Essential Access personal, limit delegation, watch for broker patterns, and focus enforcement on scalable abuse rather than ordinary help between people.
Remaining risk: small hidden exchanges will still happen. The goal is to stop them from becoming a power structure.
A later government could try to hollow the system out while keeping the words on paper.
It could defund delivery, appoint hostile officials, weaken measurement, or stop publishing records.
The defense is a protected basic floor, transition audits, public triggers when institutions are left empty, and exit rights for places that no longer consent.
Remaining risk: no document can fully stop a determined political movement with enough power. The design can buy time, raise the cost, and make the attack visible.
The design assumes some large firms will not cooperate voluntarily.
Oil, energy, medicine, logistics, PBM-style intermediaries, and other essential-sector actors may leave, litigate, lobby, delay, route control through affiliates, or demand special exemptions.
The defense is not moral persuasion. The defense is a profitable compliant path, refusal drills, reserve drawdown models, public/cooperative fallback capacity, compliant-bidder independence checks, beneficial-owner tracing, and temporary receiver authority when a survival chokepoint is at risk.
Remaining risk: the legal authority to intervene may exist before the physical capacity to replace the refusing actor exists. That gap must be tested before any scale-up claim.
The system has been adversarially stress-tested:
| Threats addressed | Key findings |
|---|---|
| T-001 Shadow Convertibility, T-002 Identity Exploits, T-004 Incentive Collapse, T-007 Definition Drift | Four patches now ACTIVE |
| T-005 Governance Throughput, T-006 Measurement Lag, T-008 Bureaucratic Elite Formation, T-011 Narrative Surface | Dual-queue CRP, PCRP first-responder authority, diversity controls, failure doctrine |
| T-012βT-015 (Interface threats) | Compound tests revealed triple-deadlock risk; oracle independence requirement; demand-context flag |
| T-009 Grace Exploitation Loop | Graduated renewal intensity; Service Record slow-decay; hardship attestation collusion detection |
| T-016 Formal Acceptance Process Capture | Evidence farming, sign-off deadlock, urgency exploit, audit capture all patched |
| T-017 Bootstrap Problem | One-time founding instrument (P-014) resolves P-013 circular dependency; founding window extended to 60 days |
| T-018βT-019 PCRP Attack Surface | False-trigger exhaustion and demand-context suppression attacks registered and patched (P-015) |
| T-020βT-021 Oracle Independence | Epistemological and algorithmic oracle capture registered; methodology-class diversity and AI supply-chain transparency required (P-017) |
| T-022 Electoral Cycle Capture | Hostile successor government routes identified; entrenchment ladder, Essential Access floor persistence, transition protocol designed (P-018) |
| T-023βT-025 Pilot validity, Shared Storehouse oracle failure, demurrage capture | External validity gate (P-019), Shared Storehouse oracle-failure fallback (P-022), demurrage sector-capture control designed through contract-commitment architecture and zero exemptions (P-023) |
Current status is tracked in the Patch Log inventory. The Threat Register currently has no fully open threat with no mitigation path, but many controls still need pilot evidence, activation, and outside review.
| Common fear | Plain response |
|---|---|
| A hidden social credit system | Voice and Service Record cannot buy rights, goods, immunity, or survival access. Human worth is never measured. |
| A command economy | Flow still runs markets, prices, contracts, business, and innovation. The system limits power, not all trade. |
| A welfare bureaucracy | Essential Access is grounded in measured physical capacity, clear basket rules, and reviewable scarcity procedures. |
| A surveillance state | Identity and dashboards use minimum necessary data, aggregation thresholds, and selective disclosure. |
| A rentier loophole | Land and housing are use-rights with anti-vacancy rules, not speculative ownership. |
The system acknowledges expected operational imperfections before they occur:
- PCRP false triggers β will happen; detection, termination, and public post-mortem within 7 days are the designed response
- Oracle disputes β will happen; conservative defaults protect access while disputes resolve
- Shared Storehouse scarcity activations β will happen during genuine shortage; managed rationing instead of price-spike exclusion
- Enforcement errors β will happen; partitioned wallets and due process are the correction mechanism
- Measurement uncertainty β is permanent; published confidence bands are the honest response
The system's commitment: every failure in these categories is published publicly, with a timeline and a correction path. Silence is the violation, not the failure.
Scale readiness requires:
- Public readiness guide β see Public Readiness Guide
- Claims and evidence register β see Claims & Evidence Register
- Pilot evidence roadmap β see Pilot Evidence Roadmap
- Formal acceptance of PROPOSED patches (pilot evidence required)
- CFRL one-page publication β see Rights Layer
- Adversarial narrative simulation β see Adversarial Narrative Simulation
- Annual compound simulation β see Annual Compound Simulation
- Essential-sector refusal drills β see Essential-Sector Refusal Test Package
- Legitimate founding coalition
The Formal Acceptance Protocol defines the pathway from design to operation.
If you want the shortest public intro: read the One-Page Overview first.
If you want the human path first: read Life Under The System, then the White Paper.
If you want the public case first: read the White Paper, then the Rights Layer and Public FAQ.
If you want to stress-test the design: read the Threat Register after the White Paper.
If you want the exact rule text: read the Humane Constitution after that.
To critique, challenge, or contribute: open an Issue with your specific objection, the section it applies to, and your proposed alternative. Vague objections will be asked to specify. Specific objections will be taken seriously.
This project is released so people can build from it.
You are welcome to:
- fork the repository
- copy individual sections
- adapt the structure for your own community or project
- translate it into plainer language
- make competing versions
- use the diagrams, threat model, or reading path as inspiration
- share it with people who might pressure-test it
You do not need permission to disagree, revise, or branch away from the main version.
The only request: preserve attribution where reasonable, and make clear what you changed so readers can compare versions honestly.
To cite this work: see CITATION.cff in this repository.
This work is released under Creative Commons Attribution 4.0 International (CC BY 4.0). You may share, adapt, and build on it for any purpose, including commercial, as long as you give appropriate credit.
This is not a claim of perfection. It is a rule design for keeping basic needs, markets, and public power from collapsing into one tool: money.