The Permacomputer

Community-owned infrastructure that persists

A permacomputer is not a machine. It is a distributed execution mesh built on trust, owned by its partners, & designed to outlast any single point of failure. It rewards geographic spread over clustering, old proven silicon over new consumer chips, & efficiency over raw power.

Partners are invited, not applied. Trust is earned through relationship, not advertising. Every node is scored & compensated fairly, forever. The mesh grows through human bonds & hardened infrastructure, resisting centralization & capture at every layer.

Truth
Boolean logic, formal verification, cryptographic proofs. Truth is the foundation of all computation.
Freedom
Open source, no gatekeepers, public domain. Knowledge unbound & released freely to all.
Harmony
Hexagons tessellate. Nodes cooperate. The mesh distributes load & rewards cooperation.
Love
Partners know each other. Trust is staked on reputation. The mesh grows through care, not capital.

Permacomputer Game Rules

The rules all teams play by when simulating & strategizing

The Objective

Build a resilient, distributed execution mesh that:

  • Survives any single point of failure
  • Rewards geographic distribution over clustering
  • Compensates partners fairly & forever
  • Resists centralization & capture

Core Constraints

1. One Node Minimum, Two Nodes Paid Per Location

  • One node = allowed, paid
  • Two nodes = maximum paid per location
  • Three+ nodes = will receive work if configured, but NOT paid

The 3rd+ node at a location is a donation. You're giving electricity & network to a permacomputer. Thank you. But no payout.

Want to get paid for more nodes? Spread them to different locations.

2. Separate ISPs Are Gold

Same location + different ISPs = resilience multiplier.

3. Neighbors Are Allies, Not Competitors

Two houses on the same block with separate ISPs: Power outage risk SHARED (same grid). Network risk SEPARATE (different providers). Physical security MUTUAL (friends watch friends). This is a GOOD pattern.

4. Geographic Distance Scores Positive

Nodes far apart earn more. The algorithm rewards:

distance_km * link_speed_mbps * WEIGHT

5. Colocation Is Penalized

Same datacenter = negative score modifier. Same rack = heavy penalty. Same physical machine (VMs) = severe penalty. The mesh WANTS to spread.

6. Older Silicon Scores Higher

10-year-old server > 1-year-old server (all else equal). Proven reliability > theoretical specs.

7. Efficiency Matters

Lower watts = higher score. Idle & loaded power consumption both count.

8. Trusted Partners Only

This is not permissionless. Partners are invited, not applied. Trust is earned through relationship. Betrayal results in permanent exclusion.

Scoring Formula

node_score = (
    silicon_age_years * AGE_WEIGHT +
    cpu_mhz * SPEED_WEIGHT +
    (1 / (idle_watts + loaded_watts)) * EFFICIENCY_WEIGHT +
    sum(
        for each peer:
            if same_location(node, peer):
                -COLOCATION_PENALTY
            else:
                distance_km(node, peer) * link_speed_mbps * DISTANCE_LINK_WEIGHT
    )
)

Failure Modes To Simulate

  1. Power outage — Affects all nodes on same grid
  2. ISP outage — Affects all nodes on same provider
  3. Hardware failure — Affects single node
  4. Network partition — Splits mesh into islands
  5. DDoS attack — Targets specific IPs/ranges
  6. Physical intrusion — Compromises location
  7. Software bug — Affects all nodes running same version
  8. Economic attack — Attempts to buy out partners
  9. Regulatory attack — Legal pressure on specific jurisdictions
  10. Social engineering — Attempts to compromise trust relationships

Win Conditions

The mesh wins when no single failure takes down more than N% of capacity, recovery happens in < T seconds, geographic coverage spans M+ distinct power grids, partner compensation flows consistently, & new attack vectors get converted to resilience improvements.

Loss Conditions

The mesh loses when single point of failure exists, centralization creeps in, partners stop getting paid, trust relationships fracture, or the algorithm rewards clustering.

These rules bind all simulations. RED, BLUE, & PURPLE teams operate within this reality.

RED TEAM: Adversarial Strategies

How to break, undermine, & exploit a permacomputer mesh

Mission

Find every weakness. Exploit every assumption. Break what seems unbreakable. The mesh only gets stronger through adversarial pressure.

Attack Categories

1. Geographic Concentration

Cluster Incentive Manipulation: Fake GPS, VPN masquerading, colocation arbitrage. Countermeasure: latency triangulation can't be faked. Physics wins.

2. Economic Attacks

Partner Acquisition: Hostile takeover, infrastructure monopoly, regulatory capture. Race to Bottom: Subsidy dumping, free tier trap.

3. Trust Network Attacks

Sybil Infiltration: Long con, compromise real partners. Trust Fragmentation: False flag operations, selective outage blame, compensation disputes.

4. Infrastructure Attacks

Correlated Failure: Power grid targeting, BGP hijacking, DNS poisoning. Slow Degradation: Latency injection, packet loss, resource exhaustion.

5. Gamification Exploits

Score Farming: Ghost nodes, age fraud, efficiency lies. Grief Play: Target new partners, reputation bombing, resource hoarding.

6. Software & Protocol

Version Fragmentation: Fork protocol, dependency poisoning. Consensus Disruption: Byzantine nodes, clock skew, state divergence.

The mesh that survives RED team is the mesh that survives reality.

BLUE TEAM: Defensive Strategies

How to protect, verify, & strengthen a permacomputer mesh

Mission

Defend against every RED team attack. Verify every claim. Build systems that fail gracefully & recover automatically.

1. Geographic Verification

Latency Triangulation: Physics can't be faked. Measure round-trip time from multiple known locations. Peer Attestation: Neighbors verify neighbors.

2. Economic Resilience

Distributed Treasury: No single point of economic control. Anti-Dumping Thresholds: Minimum compensation enforced by protocol. Vesting & Reputation: Value builds over time.

3. Trust Network Hardening

Web of Trust: N independent vouches required. Behavioral Anomaly Detection: Monitor for sudden changes. Transparency Logs: All accusations logged with evidence.

4. Infrastructure Redundancy

Multi-Path Connectivity: Backup connectivity required. Power Diversity Mapping: Score negatively for concentration. Degradation Monitoring: Baseline all performance.

5. Gamification Integrity

Proof of Work: Periodic challenge/response. Stake-Based Reputation: False claims = stake slashing. Cohort Analysis: Identify correlated behavior.

6. Software Security

Gradual Rollouts: Percentage-based updates. Dependency Verification: Hash verification, reproducible builds. Byzantine Fault Tolerance: Consensus mechanisms.

The Neighbor Strategy (Defensive View)

Separate ISPs + Same Block = Good Pattern

RiskHouse A (ISP 1)House B (ISP 2)Outcome
Power outageDOWNDOWNBoth fail (known risk)
ISP A outageDOWNUP50% survival
ISP B outageUPDOWN50% survival
Physical attackNeeds two targetsHarder than oneResilience

Defense in depth. Verify everything. Trust but verify. Then verify again.

PURPLE TEAM: Adversarial Improvement

How to turn RED team attacks into system improvements

The Core Insight

RED team attacks ARE chaos engineering. The difference between an attacker & a chaos engineer is consent & intent. But the technical patterns are identical.

Attacker DoesChaos Engineer DoesSystem Learns
Kill random nodesKill random nodesGraceful degradation
Inject latencyInject latencyTimeout tuning
Corrupt stateCorrupt stateConsistency verification
Exhaust resourcesExhaust resourcesRate limiting
Partition networkPartition networkSplit-brain handling

Conversion Patterns

Bounty Programs

Pay for exploits before malicious use. Responsible disclosure required. Bounty paid on verification.

Chaos Engineering Roles

Sanctioned "chaos agents" who stress test continuously. Scheduled windows. Nodes that survive earn bonus points.

Block Party Protocol

Gamified neighborhood deployment. "First Neighbor" 100pts, "Block Captain" 500pts, "Grid Guardian" 1000pts, "Power Independent" 2000pts.

Outage Drills as Game Events

Monthly disaster games: Power Out, ISP Down, Chaos Day, Recovery Race. Outages become expected learning events.

Sybil Games

Monthly identity verification challenges. RED creates fakes, BLUE detects them. Arms race improves both sides.

Economic War Games

Quarterly drills: hostile takeover simulation, race to bottom. Economic attacks become design input.

The Virtuous Cycle

RED TEAM ---- finds weakness ----> PURPLE TEAM
    |                                    |
attempts                            converts to
attack                              improvement
    |                                    |
    v                                    |
BLUE TEAM <-- implements defense --------+
    |
defends successfully OR learns from failure
    |
SYSTEM STRONGER -> new attack surface -> (back to RED)

The mesh that embraces its attackers is the mesh that cannot be destroyed.

PARTNERS: Trusted Network

Who joins, how they join, what they commit to

The Invitation Model

A permacomputer is not open enrollment. Partners are invited, not applied. Trust is the currency. Quality over quantity. Accountability matters. Skin in the game.

Partner Requirements

One node minimum. Two nodes paid per location.

RequirementMinimumRecommended
Nodes per location12
RAM per node8GB32GB+
Storage100GB (ZFS pool)Scales with RAM
Network per node100Mbps1Gbps+
Uptime commitment95%99%+

The Appliance Model

You install our ISO. That's it. We ship a GNU/Linux ISO you install on your server (or laptop). It's an appliance: hardened hypervisor base, ZFS pool for LXC containers, auto-updates, & configured to join the cluster automatically.

Laptops Are Valid Nodes

Laptops have built-in battery backup. Power outage? Laptop keeps running. A laptop in your backpack connected via phone hotspot is a valid node. Weird, but valid.

Partner Tiers

Tier 1: Seedling
New partners, proving themselves
  • Invited by Tier 2+ partner
  • 90-day trial period
  • Standard compensation rate
  • Cannot vouch for others yet
Tier 2: Sprout
Established partners, growing
  • 90+ days continuous service
  • 99%+ uptime demonstrated
  • Can vouch for Tier 1 partners
  • Enhanced compensation rate
Tier 3: Trunk
Core partners, load-bearing
  • 1+ year continuous service
  • 99.9%+ uptime
  • Geographic diversity achieved
  • Governance participation
Tier 4: Root
Founding partners, infrastructure
  • Original network builders
  • 10+ nodes running
  • Multiple locations
  • Protocol development input

Compensation

Partners get paid forever for running a permacomputer.

monthly_payment = (
    base_rate * node_count +
    uptime_bonus * uptime_percentage +
    distance_bonus * avg_peer_distance +
    efficiency_bonus * watts_per_execution +
    age_bonus * avg_silicon_age
)

MODIFIERS:
- Geographic diversity: +20% for nodes on different continents
- ISP diversity: +10% per unique ISP at same location
- Power independence: +15% for verified backup power
- Chaos participation: +5% for opt-in to chaos engineering

All partner nodes get free health checks. Included. Continuous uptime monitoring, latency measurement, resource utilization tracking, container health status, network connectivity verification, & anomaly detection alerts. This is baseline. Every partner. Every node. Always.

Getting Started

If You've Been Invited: Confirm with your voucher, review these documents, set up minimum 2 nodes, complete verification, begin 90-day trial.

If You Want An Invitation: Find an existing partner you know personally, demonstrate your infrastructure capability, ask for a vouch.

There is no application form. There is no waiting list. There is only trust.

The mesh grows through trust, not advertising. Through invitation, not application. Through proven silicon, not promised capacity. You bring your best. You run two. You get paid forever.

MEMBRANE PROFILE: Dynamic Resource Requirements

The membrane evolves. Hardware requirements evolve with it.

The Core Insight

There is no fixed hardware spec. The membrane profile changes as software evolves, new APIs emerge, user desires demand new capabilities, & container orchestration improves. Today's requirements are not tomorrow's requirements.

The Scaling Properties Matrix

                    HIGH MEMORY              LOW MEMORY
                    -----------              ----------
FAST CPU      |  Luxury config          |  Ideal efficiency
              |  Max containers         |  Fast respawn covers
              |  Max burst capacity     |  memory constraints
--------------+-------------------------+--------------------
SLOW CPU      |  Cammy-style            |  Danger zone
              |  Burst absorption       |  Respawn tax + memory
              |  Compensates for slow   |  pressure = trouble
              |  respawn with headroom  |  Admin headaches

Minimum Viable Specs (Current Membrane)

TierRAMCPUContainersNotes
Minimum32GBFast64-96Tight, requires tuning
Comfortable64GBModerate128+Room to breathe
Generous128GB+Any256+Burst absorption
Cammy-class256GB+Any500+Long burst handling

The Upgrade Philosophy

Upgrades are carrot, not stick. Always. We ship properly tested software. We don't push broken code to production. Partners WANT to upgrade, never FORCED to upgrade.

Future-Proofing

  • Buy more RAM than you think you need. Membrane efficiency will improve, but new features will consume gains.
  • Fast CPU ages better. Respawn tax is real. Memory can be added. CPU replacement = new machine.
  • NVMe matters. Container images on disk. Slow disk = slow spawn = more memory needed.

Your hardware is your stake in the mesh. Tune it well. The membrane profile is a living document.