πŸ“¨ Contact

πŸ’Ύ Your data sovereignty: All Protogony data is stored locally in your browser. Manage backups in Navigation

Protogony, Constitutional Framework v2.3

Constitutional Framework v2.3

The definitive framework for understanding sovereignty, recognizing patterns, and building alternatives beyond decaying systems.

🎯 Primary Directive

"The objective is not victory within decaying systems' frameworks, but construction of new worlds beyond their borders that render their extraction irrelevant."

β€” Protogony Primary Directive

πŸ“Š Core Dynamics

Click any card for complete operational analysis.

VALUE_SHIFT

Crisis transfers value from abstract representations to tangible essentials.
Includes 3 operational indicators and constitutional response
Click for full analysis β†’

EMPIRICAL_COLLAPSE

Accelerating failure of globalized neoliberal systems.
Includes 4 indicators and graceful reduction protocols
Click for full analysis β†’

THE_FAILED_INSTITUTIONS

Collapse of legitimate authority when arbiters become corrupted participants.
Includes regulatory capture, media corruption, legal system failure
Click for full analysis β†’

βš–οΈ Five Immutable Principles

Click any principle for complete operational protocols.

1. Riverbank Principle

Build strength for freedom, not control.
7-day builder protocol β€’ Decision matrix β€’ Principle interactions
Click for full protocol β†’

2. Self-Determination

All sovereignty is self-chosen.
Consent audit β€’ Verification matrix β€’ Right of Exit integration
Click for full protocol β†’

3. Graceful Reduction

Systems fail safely, not catastrophically.
Failure mode design β€’ Single point elimination β€’ Recovery protocols
Click for full protocol β†’

4. Right of Exit

Leave anytime without penalty.
Exit path maintenance β€’ Cost audit β€’ Penalty reduction
Click for full protocol β†’

5. Human Dignity Veto

Overrides all other principles if dignity compromised.
Dignity threat response β€’ Protection matrix β€’ Immediate action protocol
Click for full protocol β†’

πŸ” Sovereign Council Lenses

Click any lens for complete analytical framework.

System-Building Lens

Practical "how-to" focus on tangible resilience.
6-step framework β€’ Resource assessment β€’ Dependency analysis
Click for full framework β†’

Strategic Realism Lens

Cold, objective analysis of power dynamics.
Power mapping β€’ Incentive analysis β€’ Behavioral prediction
Click for full framework β†’

Structural Truth Lens

Propaganda decoding and systemic deception.
Narrative mapping β€’ Source analysis β€’ Reality verification
Click for full framework β†’

Insider Testimony Lens

Ground-truth intelligence from within decaying systems.
Insider identification β€’ Pattern recognition β€’ Decay indicators
Click for full framework β†’

🎭 Primary Archetypes

Click any card for complete behavioral analysis. Library links provide deeper profiles.

BOB (The Barbarian)

Overt predator employing force and intimidation.
5-stage sequence β€’ Detection indicators β€’ Response matrix
Click for full analysis β†’
πŸ“š Deep profile in Library β†’

SAM (The Sociopath)

Covert controller using manipulation and deceit.
5-stage sequence β€’ Gaslighting detection β€’ Documentation protocol
Click for full analysis β†’
πŸ“š Deep profile in Library β†’

BRIEFCASE_MAN

Corrupt bureaucrat with transactional loyalty.
Rule manipulation β€’ Selective enforcement β€’ Procedural traps
Click for full analysis β†’
πŸ“š Full origin story β†’

MONEY_CHANGERS

Financial priesthood controlling capital access.
Debt traps β€’ Gatekeeping β€’ Artificial scarcity
Click for full analysis β†’
πŸ“š Ancient hand analysis β†’

πŸ›‘οΈ Sovereign Protocols

Click any protocol for complete implementation guide.

Strategic Engagement

Do not be used by systems; use them strategically.
30-day implementation β€’ System mapping β€’ Boundary definition
Click for full protocol β†’

Ethical Subversion

Work within corrupt systems to ethically subvert them.
6-phase framework β€’ Risk assessment β€’ Exit planning
Click for full protocol β†’

Ethical Boundary Line

Non-negotiable personal ethical boundary.
6-step definition β€’ Escalation response β€’ Enforcement mechanisms
Click for full protocol β†’

FLIP_THE_TABLES

Disintermediate and bypass corrupt systems.
6-step implementation β€’ MVAT design β€’ Migration pathway
Click for full protocol β†’

REJECT_THE_GAVEL

Strategic refusal to recognize Failed Institutions.
Legitimacy assessment β€’ Public declaration β€’ Alternative systems
Click for full protocol β†’

BUILD_ALPHA_SITE

Achieve decentralized resilience across six domains.
Resources β€’ Community β€’ Skills β€’ Governance β€’ Economy β€’ Knowledge
Click for full protocol β†’

πŸ—£οΈ Sovereign Communication

Click any card for communication patterns and templates.

Constitutional Communication Patterns

9 sovereign communication strategies aligned with principles.
Riverbank Response β€’ Self-Determination Framing β€’ Graceful Disengagement
Click for full guide β†’

Archetype Response Templates

Tailored communication for each adversarial archetype.
BOB β€’ SAM β€’ BRIEFCASE_MAN β€’ MONEY_CHANGERS
Click for full templates β†’