Version 0.1-preview
A Living Document for Freedom Technology Gatherings
Summary
Unfork is a community-driven conference model for bringing together principled users and developers committed to individual sovereignty, privacy, and decentralization. This gathering explores the technical, philosophical, and practical foundations for building autonomous systems outside centralized control.
1. Pillars
(1) Sovereign Infrastructure
Mesh networks, self-hosting, Tor/I2P/mixnets, DNS alternatives, 3D printing, off-grid power, censorship-resistant routing, convivial tools
Building the foundational layer for autonomy and resilience—technology that operates without dependence on centralized providers or institutional infrastructure.
(2) Sovereign Economics
Bitcoin, privacy currencies, mutual aid networks, cooperative economics, prediction markets, self-custody, agorism, solidarity economies, gift networks
Censorship-resistant economic systems and financial autonomy that enable exchange and value creation outside traditional financial institutions.
(3) Sovereign Communication & Identity
Nostr, ActivityPub, AT Protocol, E2E encrypted messaging, P2P architectures, DIDs, pseudonymity strategies, federated systems
Decentralized social networks and self-sovereign identity systems that allow communication and coordination without intermediaries.
(4) Sovereign Knowledge
Censorship-resistant publishing, shadow libraries, decentralized search, information preservation, community knowledge, alternative education
Preserving and sharing information without centralized gatekeepers—ensuring knowledge remains accessible regardless of institutional approval.
(5) Anti-Institutional Principles
Cypherpunk manifesto, crypto-anarchism, anarcho-capitalism, agorism, autonomism, left-libertarianism, do-ocracy, forkability, creative deviance
The ideological foundations driving sovereign technology—diverse philosophical traditions united by commitment to individual autonomy and resistance to centralized control.
(6) Security & Privacy
Threat modeling, opsec practices, cryptographic tools, surveillance resistance, privacy-enhancing technologies
Operational security and cryptographic techniques for protection against surveillance, coercion, and control.
(7) Coordination Without Hierarchy
DAOs, do-ocracy, consensus mechanisms, community organizing, fluid organization, peer coordination, collective intelligence, temporary structures, exit over voice
Organizing without centralized authority—demonstrating that coordination doesn’t require hierarchy or permanent institutions.
(8) Parallel Structures & Creative Practice
Hackerspaces, maker culture, DIY ethics, experimental art, community workshops, autonomous zones, creative deviance, strange projects
Building parallel institutions and fostering sovereign communities through hands-on creation, experimentation, and cultural practice.
2. The Essence of Unfork
2.1 The Problem
Contemporary tech conferences have become exercises in corporate theater:
- Pay-to-play dynamics where companies buy stages for product pitches
- Sponsorship capture that dictates content and constrains conversation
- Artificial hierarchies that contradict principles of decentralization
- Sterile convention centers isolated from actual communities
- Surveillance as default with photography, tracking, and data harvesting normalized
- Credentialism over merit where “known names” circulate while new builders struggle for attention
- Theory over practice with endless panels about “the future” but little working code
For those building freedom technology—tools for sovereignty, privacy, and resistance to control—these conferences fail to embody the values they claim to represent.
2.2 Core Principle: Embody Your Values
Unfork conferences don’t just talk about decentralization, privacy, and sovereignty—they demonstrate these principles through every organizational choice:
- If we value decentralization, we organize through do-ocracy, not hierarchical committees
- If we value privacy, we protect attendees through radical privacy measures, not surveillance
- If we value sovereignty, we reject corporate sponsorship and financial gatekeeping
- If we value open source, we make all conference infrastructure forkable and transparent
- If we value community, we create spaces for spontaneous collaboration, not scheduled networking sessions
- If we value merit, we evaluate ideas and code, not credentials and marketing budgets
The conference itself is a demonstration—proof that alternative models work.
2.3 Anti-Institutional Architecture
Unfork operates outside traditional institutional frameworks:
No Corporate Sponsors - Independence from companies that might compromise principles or steer conversation toward commercial interests.
No Commercial Activity - No vendor booths, no sales pitches, no exhibition halls. This is a space for knowledge sharing, not customer acquisition.
No Artificial Hierarchy - No VIP tickets, no exclusive areas, no special access. Everyone participates as equals.
No Centralized Control - Do-ocratic organization where contributors earn decision-making authority through actual work.
No Privacy Theater - Radical privacy protections that actually work, not policies that exist on paper while surveillance happens in practice.
This isn’t about purity—it’s about alignment. When organizing structures match stated values, different outcomes become possible.
2.4 Practical Sovereignty Focus
Every pillar, every session, every workshop demonstrates working implementations of sovereign technology:
- Infrastructure you can run yourself - Mesh networks, self-hosting, anonymity networks
- Economics you control - Bitcoin, privacy currencies, mutual aid, cooperative models
- Communication without intermediaries - Nostr, Matrix, federated systems, encrypted messaging
- Knowledge without gatekeepers - Censorship-resistant publishing, shadow libraries, decentralized search
- Philosophy that informs practice - Cypherpunk principles, crypto-anarchism, individual sovereignty, creative deviance
- Security you can implement - Threat modeling, opsec, cryptographic tools
- Coordination without rulers - DAOs, consensus mechanisms, alternative organization
- Parallel structures as practice - Hackerspaces, mutual aid, autonomous zones, experimental culture
The focus is always: Does it work? Can you deploy it? Will it resist capture?
3. Organizational Principles
3.1 Do-ocracy
Authority comes from contribution, not position:
- Those who do the work make decisions within their domain
- Initiative and execution earn decision-making power
- No central committee controlling everything
- Conflicts resolved through discussion among active contributors
- Transparent processes allow others to fork and do differently
This prevents bureaucratic capture while enabling rapid, effective action.
3.2 Fork-Friendly
Everything is designed to be copied, modified, and improved:
- All infrastructure code is open source
- Organizational documents are forkable
- No trademarks or legal barriers to running similar events
- Learnings shared publicly
- Explicit encouragement to take the model and build your own version
If you disagree with decisions, don’t argue endlessly—fork it and prove your approach works better.
3.3 Privacy by Default
Privacy is not optional or added later—it’s fundamental:
- Minimal identity requirements for participation
- Photography and recording restricted to protect attendees
- No surveillance systems or tracking infrastructure
- Encrypted communication channels
- Pseudonymity and anonymity explicitly supported
- Privacy measures explained transparently
This protects whistleblowers, activists, privacy advocates, and anyone who values pseudonymity.
3.4 Radical Transparency
Within the bounds of privacy protection, everything is open:
- Budgets published
- Decisions documented
- Conflicts discussed publicly
- Organizing conversations happen in public channels
- No backroom deals or hidden agendas
Transparency enables accountability and allows others to learn from both successes and failures.
4. Venue Philosophy
4.1 Urban, Accessible, Alive
No convention centers on city outskirts. Instead:
- Urban spaces with character and history
- Accessible via public transit
- Integrated into actual communities
- Multiple connected venues creating intimacy
- Spaces that feel human, not corporate
The venue choice itself makes a statement about values.
4.2 Hacker Infrastructure
The space is equipped for doing, not just listening:
- Hackerspaces throughout with tools for spontaneous building
- Fabrication equipment for physical sovereignty (3D printers, electronics workbenches)
- Network infrastructure demonstrating sovereign technology (mesh networks coordinating the venue)
- Quiet zones for focused work
- Collaboration areas for impromptu discussions
Attendees can start hacking immediately, test ideas in real-time, and build together.
4.3 Community as Infrastructure
Rather than hired services and commercial vendors:
- Self-organized food - Open community kitchens where people cook together
- Assembly spaces - Self-organized communities around projects and interests
- Tool libraries - Shared resources accessible to all
- Skill-sharing areas - Peer-to-peer teaching and learning
The venue facilitates community building, not passive consumption.
5. Content Principles
5.1 Bullshit-Free Zone
No tolerance for:
- Marketing speak disguised as technical content
- Vaporware presentations about future products
- Empty promises without working implementations
- Product pitches masquerading as knowledge sharing
- Credentialism that substitutes credentials for substance
Expectations:
- Show working code or acknowledge current limitations honestly
- Provide actionable knowledge that attendees can use
- Technical depth over simplified narratives
- Philosophical rigor over platitudes
- Practical focus over theoretical speculation
5.2 Merit Over Fame
The goal is learning and building, not celebrity worship:
- Ideas evaluated on their merits, not speaker reputation
- New builders given platforms alongside established projects
- Anonymous or pseudonymous contributions welcomed
- Focus on what works, not who built it
- Resistance to commercial gaming and “known name” circuits
5.3 Theory Meets Practice
Every philosophical discussion should connect to implementation:
- “Here’s the cypherpunk principle” → “Here’s how it works in this protocol”
- “Here’s the economic theory” → “Here’s how we tested it”
- “Here’s the governance model” → “Here’s what failed and why”
- “Here’s the vision” → “Here’s the code”
Attendees should leave with both deeper understanding AND practical capabilities.
6. Community Norms
6.1 Intellectual Honesty
We expect:
- Good faith engagement with ideas
- Willingness to acknowledge limitations and failures
- Honest disagreement over performative consensus
- Admitting “I don’t know” when appropriate
- Learning from criticism rather than deflecting
This creates space for actual progress rather than defensive posturing.
6.2 Nuance Over Purity
The world is complex:
- People work in institutions while maintaining personal principles
- Perfect solutions don’t exist, only tradeoffs
- Different approaches can coexist without one being “right”
- Implementation challenges are real and deserve respect
- Theory and practice both matter
Binary thinking and purity tests prevent the coalition-building necessary for meaningful change.
6.3 Respect for Autonomy
Every individual:
- Controls their own level of identity disclosure
- Makes their own security decisions
- Determines their own participation level
- Sets their own boundaries
- Takes responsibility for their choices
No one is forced to use real names, show their face, or participate in ways that compromise their security model.
6.4 Non-Violence
All interactions are:
- Peaceful and voluntary
- Based on mutual respect
- Free from coercion or intimidation
- Resolved through dialogue, not force
We reject violence and do not platform calls for aggression or coercion.