The Permacomputer
Community-owned infrastructure that persists
A permacomputer is not a machine. It is a distributed execution mesh built on trust, owned by its partners, & designed to outlast any single point of failure. It rewards geographic spread over clustering, old proven silicon over new consumer chips, & efficiency over raw power.
Partners are invited, not applied. Trust is earned through relationship, not advertising. Every node is scored & compensated fairly, forever. The mesh grows through human bonds & hardened infrastructure, resisting centralization & capture at every layer.
Permacomputer Game Rules
The rules all teams play by when simulating & strategizing
The Objective
Build a resilient, distributed execution mesh that:
- Survives any single point of failure
- Rewards geographic distribution over clustering
- Compensates partners fairly & forever
- Resists centralization & capture
Core Constraints
1. One Node Minimum, Two Nodes Paid Per Location
- One node = allowed, paid
- Two nodes = maximum paid per location
- Three+ nodes = will receive work if configured, but NOT paid
The 3rd+ node at a location is a donation. You're giving electricity & network to a permacomputer. Thank you. But no payout.
Want to get paid for more nodes? Spread them to different locations.
2. Separate ISPs Are Gold
Same location + different ISPs = resilience multiplier.
3. Neighbors Are Allies, Not Competitors
Two houses on the same block with separate ISPs: Power outage risk SHARED (same grid). Network risk SEPARATE (different providers). Physical security MUTUAL (friends watch friends). This is a GOOD pattern.
4. Geographic Distance Scores Positive
Nodes far apart earn more. The algorithm rewards:
distance_km * link_speed_mbps * WEIGHT
5. Colocation Is Penalized
Same datacenter = negative score modifier. Same rack = heavy penalty. Same physical machine (VMs) = severe penalty. The mesh WANTS to spread.
6. Older Silicon Scores Higher
10-year-old server > 1-year-old server (all else equal). Proven reliability > theoretical specs.
7. Efficiency Matters
Lower watts = higher score. Idle & loaded power consumption both count.
8. Trusted Partners Only
This is not permissionless. Partners are invited, not applied. Trust is earned through relationship. Betrayal results in permanent exclusion.
Scoring Formula
node_score = (
silicon_age_years * AGE_WEIGHT +
cpu_mhz * SPEED_WEIGHT +
(1 / (idle_watts + loaded_watts)) * EFFICIENCY_WEIGHT +
sum(
for each peer:
if same_location(node, peer):
-COLOCATION_PENALTY
else:
distance_km(node, peer) * link_speed_mbps * DISTANCE_LINK_WEIGHT
)
)
Failure Modes To Simulate
- Power outage — Affects all nodes on same grid
- ISP outage — Affects all nodes on same provider
- Hardware failure — Affects single node
- Network partition — Splits mesh into islands
- DDoS attack — Targets specific IPs/ranges
- Physical intrusion — Compromises location
- Software bug — Affects all nodes running same version
- Economic attack — Attempts to buy out partners
- Regulatory attack — Legal pressure on specific jurisdictions
- Social engineering — Attempts to compromise trust relationships
Win Conditions
The mesh wins when no single failure takes down more than N% of capacity, recovery happens in < T seconds, geographic coverage spans M+ distinct power grids, partner compensation flows consistently, & new attack vectors get converted to resilience improvements.
Loss Conditions
The mesh loses when single point of failure exists, centralization creeps in, partners stop getting paid, trust relationships fracture, or the algorithm rewards clustering.
These rules bind all simulations. RED, BLUE, & PURPLE teams operate within this reality.
RED TEAM: Adversarial Strategies
How to break, undermine, & exploit a permacomputer mesh
Mission
Find every weakness. Exploit every assumption. Break what seems unbreakable. The mesh only gets stronger through adversarial pressure.
Attack Categories
1. Geographic Concentration
Cluster Incentive Manipulation: Fake GPS, VPN masquerading, colocation arbitrage. Countermeasure: latency triangulation can't be faked. Physics wins.
2. Economic Attacks
Partner Acquisition: Hostile takeover, infrastructure monopoly, regulatory capture. Race to Bottom: Subsidy dumping, free tier trap.
3. Trust Network Attacks
Sybil Infiltration: Long con, compromise real partners. Trust Fragmentation: False flag operations, selective outage blame, compensation disputes.
4. Infrastructure Attacks
Correlated Failure: Power grid targeting, BGP hijacking, DNS poisoning. Slow Degradation: Latency injection, packet loss, resource exhaustion.
5. Gamification Exploits
Score Farming: Ghost nodes, age fraud, efficiency lies. Grief Play: Target new partners, reputation bombing, resource hoarding.
6. Software & Protocol
Version Fragmentation: Fork protocol, dependency poisoning. Consensus Disruption: Byzantine nodes, clock skew, state divergence.
The mesh that survives RED team is the mesh that survives reality.
BLUE TEAM: Defensive Strategies
How to protect, verify, & strengthen a permacomputer mesh
Mission
Defend against every RED team attack. Verify every claim. Build systems that fail gracefully & recover automatically.
1. Geographic Verification
Latency Triangulation: Physics can't be faked. Measure round-trip time from multiple known locations. Peer Attestation: Neighbors verify neighbors.
2. Economic Resilience
Distributed Treasury: No single point of economic control. Anti-Dumping Thresholds: Minimum compensation enforced by protocol. Vesting & Reputation: Value builds over time.
3. Trust Network Hardening
Web of Trust: N independent vouches required. Behavioral Anomaly Detection: Monitor for sudden changes. Transparency Logs: All accusations logged with evidence.
4. Infrastructure Redundancy
Multi-Path Connectivity: Backup connectivity required. Power Diversity Mapping: Score negatively for concentration. Degradation Monitoring: Baseline all performance.
5. Gamification Integrity
Proof of Work: Periodic challenge/response. Stake-Based Reputation: False claims = stake slashing. Cohort Analysis: Identify correlated behavior.
6. Software Security
Gradual Rollouts: Percentage-based updates. Dependency Verification: Hash verification, reproducible builds. Byzantine Fault Tolerance: Consensus mechanisms.
The Neighbor Strategy (Defensive View)
Separate ISPs + Same Block = Good Pattern
| Risk | House A (ISP 1) | House B (ISP 2) | Outcome |
|---|---|---|---|
| Power outage | DOWN | DOWN | Both fail (known risk) |
| ISP A outage | DOWN | UP | 50% survival |
| ISP B outage | UP | DOWN | 50% survival |
| Physical attack | Needs two targets | Harder than one | Resilience |
Defense in depth. Verify everything. Trust but verify. Then verify again.
PURPLE TEAM: Adversarial Improvement
How to turn RED team attacks into system improvements
The Core Insight
RED team attacks ARE chaos engineering. The difference between an attacker & a chaos engineer is consent & intent. But the technical patterns are identical.
| Attacker Does | Chaos Engineer Does | System Learns |
|---|---|---|
| Kill random nodes | Kill random nodes | Graceful degradation |
| Inject latency | Inject latency | Timeout tuning |
| Corrupt state | Corrupt state | Consistency verification |
| Exhaust resources | Exhaust resources | Rate limiting |
| Partition network | Partition network | Split-brain handling |
Conversion Patterns
Bounty Programs
Pay for exploits before malicious use. Responsible disclosure required. Bounty paid on verification.
Chaos Engineering Roles
Sanctioned "chaos agents" who stress test continuously. Scheduled windows. Nodes that survive earn bonus points.
Block Party Protocol
Gamified neighborhood deployment. "First Neighbor" 100pts, "Block Captain" 500pts, "Grid Guardian" 1000pts, "Power Independent" 2000pts.
Outage Drills as Game Events
Monthly disaster games: Power Out, ISP Down, Chaos Day, Recovery Race. Outages become expected learning events.
Sybil Games
Monthly identity verification challenges. RED creates fakes, BLUE detects them. Arms race improves both sides.
Economic War Games
Quarterly drills: hostile takeover simulation, race to bottom. Economic attacks become design input.
The Virtuous Cycle
RED TEAM ---- finds weakness ----> PURPLE TEAM
| |
attempts converts to
attack improvement
| |
v |
BLUE TEAM <-- implements defense --------+
|
defends successfully OR learns from failure
|
SYSTEM STRONGER -> new attack surface -> (back to RED)
The mesh that embraces its attackers is the mesh that cannot be destroyed.
PARTNERS: Trusted Network
Who joins, how they join, what they commit to
The Invitation Model
A permacomputer is not open enrollment. Partners are invited, not applied. Trust is the currency. Quality over quantity. Accountability matters. Skin in the game.
Partner Requirements
One node minimum. Two nodes paid per location.
| Requirement | Minimum | Recommended |
|---|---|---|
| Nodes per location | 1 | 2 |
| RAM per node | 8GB | 32GB+ |
| Storage | 100GB (ZFS pool) | Scales with RAM |
| Network per node | 100Mbps | 1Gbps+ |
| Uptime commitment | 95% | 99%+ |
The Appliance Model
You install our ISO. That's it. We ship a GNU/Linux ISO you install on your server (or laptop). It's an appliance: hardened hypervisor base, ZFS pool for LXC containers, auto-updates, & configured to join the cluster automatically.
Laptops Are Valid Nodes
Laptops have built-in battery backup. Power outage? Laptop keeps running. A laptop in your backpack connected via phone hotspot is a valid node. Weird, but valid.
Partner Tiers
- Invited by Tier 2+ partner
- 90-day trial period
- Standard compensation rate
- Cannot vouch for others yet
- 90+ days continuous service
- 99%+ uptime demonstrated
- Can vouch for Tier 1 partners
- Enhanced compensation rate
- 1+ year continuous service
- 99.9%+ uptime
- Geographic diversity achieved
- Governance participation
- Original network builders
- 10+ nodes running
- Multiple locations
- Protocol development input
Compensation
Partners get paid forever for running a permacomputer.
monthly_payment = (
base_rate * node_count +
uptime_bonus * uptime_percentage +
distance_bonus * avg_peer_distance +
efficiency_bonus * watts_per_execution +
age_bonus * avg_silicon_age
)
MODIFIERS:
- Geographic diversity: +20% for nodes on different continents
- ISP diversity: +10% per unique ISP at same location
- Power independence: +15% for verified backup power
- Chaos participation: +5% for opt-in to chaos engineering
All partner nodes get free health checks. Included. Continuous uptime monitoring, latency measurement, resource utilization tracking, container health status, network connectivity verification, & anomaly detection alerts. This is baseline. Every partner. Every node. Always.
Getting Started
If You've Been Invited: Confirm with your voucher, review these documents, set up minimum 2 nodes, complete verification, begin 90-day trial.
If You Want An Invitation: Find an existing partner you know personally, demonstrate your infrastructure capability, ask for a vouch.
There is no application form. There is no waiting list. There is only trust.
The mesh grows through trust, not advertising. Through invitation, not application. Through proven silicon, not promised capacity. You bring your best. You run two. You get paid forever.
MEMBRANE PROFILE: Dynamic Resource Requirements
The membrane evolves. Hardware requirements evolve with it.
The Core Insight
There is no fixed hardware spec. The membrane profile changes as software evolves, new APIs emerge, user desires demand new capabilities, & container orchestration improves. Today's requirements are not tomorrow's requirements.
The Scaling Properties Matrix
HIGH MEMORY LOW MEMORY
----------- ----------
FAST CPU | Luxury config | Ideal efficiency
| Max containers | Fast respawn covers
| Max burst capacity | memory constraints
--------------+-------------------------+--------------------
SLOW CPU | Cammy-style | Danger zone
| Burst absorption | Respawn tax + memory
| Compensates for slow | pressure = trouble
| respawn with headroom | Admin headaches
Minimum Viable Specs (Current Membrane)
| Tier | RAM | CPU | Containers | Notes |
|---|---|---|---|---|
| Minimum | 32GB | Fast | 64-96 | Tight, requires tuning |
| Comfortable | 64GB | Moderate | 128+ | Room to breathe |
| Generous | 128GB+ | Any | 256+ | Burst absorption |
| Cammy-class | 256GB+ | Any | 500+ | Long burst handling |
The Upgrade Philosophy
Upgrades are carrot, not stick. Always. We ship properly tested software. We don't push broken code to production. Partners WANT to upgrade, never FORCED to upgrade.
Future-Proofing
- Buy more RAM than you think you need. Membrane efficiency will improve, but new features will consume gains.
- Fast CPU ages better. Respawn tax is real. Memory can be added. CPU replacement = new machine.
- NVMe matters. Container images on disk. Slow disk = slow spawn = more memory needed.
Your hardware is your stake in the mesh. Tune it well. The membrane profile is a living document.