| 1 |
Core Cryptography & Protocol Soundness |
18% |
Primitive choices, composition, identity model, key lifecycle, and whether the protocol’s trust assumptions are structurally sane. |
| 2 |
Default Privacy & Metadata Posture |
16% |
Out-of-box leakage: default keys/channels, header visibility, default telemetry/location behavior, and practical anonymity posture. |
| 3 |
Decentralisation & Topology Antifragility |
14% |
Ability to operate without central points, resilience under partition, heterogeneous carrier support, and choke-point minimization. |
| 4 |
FOSS / Auditability |
10% |
Whether protocol + core implementation + critical clients are inspectable, buildable, and forkable; audit friction is penalized. |
| 5 |
Anti-Capture & Anti-Synthetic-Stack Stance |
12% |
Legal/cultural resistance to AI training extraction, cloud assimilation, surveillance packaging, and weaponization pathways. |
| 6 |
Operational Maturity & Ecosystem |
10% |
Real deployments, docs, tooling breadth, integration surface, responsiveness to issues, and survivability beyond any single maintainer. |
| 7 |
Hardware Flexibility & Supply Independence |
8% |
Device diversity, vendor lock-in risk, ability to operate on commodity hardware, and survivability under supply constraints. |
| 8 |
Deep Telos Fit |
12% |
Alignment with a sovereign, anti-simulation, anti-Synthetic-Stack orientation beyond marketing: defaults, architecture, and encoded intent. |