Secure Communication Constraints

Purpose

This document defines non-negotiable constraints governing communication systems operating under the Humanity Framework.

Its purpose is to preserve:

Communication safety is a prerequisite for democratic participation, collective coordination, and resistance to tyranny.


Core Principle

If a system claims privacy, confidentiality, or end-to-end encryption, those claims must be materially true.

False or misleading security claims constitute harm.


Freedom of Expression Constraints

1. No Coercive Suppression

No authority may suppress expression solely due to:

Restrictions on expression must be:

Silent suppression is forbidden.


2. Transparency of Moderation

If communication is moderated:

Algorithmic moderation must not operate invisibly.


Privacy and Confidentiality Constraints

3. Truthful End-to-End Encryption (E2EE)

A system may claim end-to-end encryption only if:

If any exception exists, the system must not claim E2EE.


4. No Deceptive Privacy Claims

Systems must not:

If backups, metadata, or recovery mechanisms weaken confidentiality, those limitations must be disclosed continuously and prominently.


5. Key Ownership and Control

Cryptographic keys must:

Server-managed keys invalidate E2EE claims.


Metadata and Surveillance Constraints

6. Metadata Minimization

Systems must minimize collection of:

Metadata that enables coercion or targeting is treated as sensitive as content.


7. No Undeclared Surveillance

Surveillance capabilities must:

Undeclared surveillance is a severe safety violation.


Resilience and Censorship Resistance

8. Resistance to Centralized Control

Communication systems must not rely on:

Decentralization is preferred where feasible.


9. Degradation Without Silence

When communication systems degrade:

Silent failure is equivalent to suppression.


Accountability and Auditability

10. Verifiable Claims

Security and privacy claims must be:

Marketing language does not substitute for proof.


Enforcement

Any system that violates these constraints:

Claims of E2EE or privacy that are untrue constitute deception and harm.


Relationship to Other Documents


Summary

Freedom of expression requires privacy. Privacy requires truthful encryption. Truth requires transparency.

Communication systems that lie about security undermine democracy by design.