page: offerings
sovereign system design
cowboy bill
bitcoin · complex systems · citadels · mythic law

offerings

sovereign exit architecture for people who actually intend to walk

deployment layer triage → dossier → blueprint deployment → immune system real exit capacity

This is the deployment layer of Sov Stack Architecture.

Where the Kernel defines the standards, the Atlas maps what currently looks buildable, and the Manuals turn that map into self-serve methods, this page is about direct application: taking the same law-core, threat model, and architectural logic and applying it to a specific person, family, organization, or local cell with real exposure.

Not coaching. Not branding. Not generic Bitcoin consulting. Not a wallet setup service dressed up as strategy.

The objective is not fantasy autonomy. The objective is real exit capacity under real constraints.

how the offerings are structured

Most people do not need private architecture. They need better judgment, better tools, cleaner habits, and a more honest self-audit.

This page is for the narrower set of cases where the stakes are high enough, the structure is complex enough, or the downside is asymmetric enough that private architecture makes sense.

Most engagements begin with Triage or the Dossier. Everything else builds on that. Pricing is anchored in sats. Exact exchange rules and milestone logic live in the Medium of Exchange Spec and Returns Guide.

0) sovereign triage brief

fast entry point
please enter BTC/USD at bottom of page to see prices founding pricing

A written first pass across your exposure profile and a minimum viable exit sequence.

deliverables
  • short capture snapshot across money, custody, infra, comms, jurisdiction, and obvious single points of failure
  • 30 / 60 / 90-day MVSS sequence showing what to change first and why
  • go / no-go clarity on whether full architecture work is justified
read full product spec

Purpose

Determine whether there is enough real structural problem here to justify a full Dossier or whether the weak points can be addressed through public materials and lighter intervention.

You receive

  • Short written capture snapshot — money, custody, infrastructure, communications, jurisdiction, workflows, and visible single points of failure.
  • 30 / 60 / 90-day Minimum Viable Sovereign Shift sequence — what should change first, in what order, with what expected effect.
  • Go / no-go decision for Dossier-level work — whether the problem is real enough, broad enough, and consequential enough to justify deeper architecture.

The Triage exists to prevent wasted motion. It is a gate, not a substitute for the Dossier.

  • Sovereign Triage Briefplease enter BTC/USD at bottom of page to see prices

1) sovereign intelligence dossier (sid)

full capture map
from please enter BTC/USD at bottom of page to see prices

Full exposure map for a real node, household, or small organization.

deliverables
  • sovereign intelligence dossier across money, governance, infra, succession, care, and symbolic drift
  • dependency graph
  • top-10 risk ranking
  • 30 / 60 / 90-day MVSS plan
read full product spec

Purpose

Expose where the stack is fragile, dependent, incoherent, or falsely sovereign — structurally, not rhetorically.

You receive

Sovereign Intelligence Dossier (written)

  • Money and custody capture — broker and exchange dependence, KYC trail, concentration risk, jurisdictional choke points.
  • Infrastructure and communications dependence — cloud, SaaS, hosting, payments, vendor lock-in, communications bottlenecks.
  • Legal and governance weakness — ownership gaps, entities, role ambiguity, survivorship and continuity failure paths.
  • Family, care, and capacity constraints — where illness, fatigue, caregiving, or one irreplaceable operator can collapse the system.
  • False coherence and symbolic drift — where the self-story of sovereignty is stronger than the actual structure.

Dependency Graph

Visual map of how money, custody, communications, legal structure, care obligations, local conditions, and key people interact under strain.

Top-10 Risk Ranking

Ordered by catastrophic downside × probability.

30 / 60 / 90-day MVSS Plan

What to shut off, move, rewrite, re-paper, or stop pretending is good enough.

  • Individualplease enter BTC/USD at bottom of page to see prices
  • Familyplease enter BTC/USD at bottom of page to see prices
  • Small orgplease enter BTC/USD at bottom of page to see prices

2) sov stack blueprint (ssb)

operating-system design
from please enter BTC/USD at bottom of page to see prices

Turn the Dossier into a coherent operating system for a real life, household, or org.

deliverables
  • blueprint document
  • architecture diagrams (1–2)
  • implementation checklist
read full product spec

Purpose

Turn the capture map into a coherent structure: treasury, governance, optionality, continuity, and failure logic that can actually be lived inside.

You receive

Blueprint Document

  • Treasury and custody architecture — non-custodial posture where appropriate, multisig design logic, survivorship, inheritance pathways, emergency access assumptions, and what remains bounded-trust versus what must be de-risked.
  • Liquidity and commerce rails — earning, spending, conversion, peer-to-peer options, visibility versus opacity tradeoffs, and which rails should not collapse into one provider or jurisdiction.
  • Governance and decision structure — roles, authority boundaries, decision rights, dispute paths, and what happens when a key person leaves, dies, refuses, or turns adversarial.
  • Jurisdictional posture and optionality — where concentration currently exists, what mobility matters, and what “exit” really means under actual conditions rather than fantasy versions.
  • Stress, conflict, shutdown, and handoff logic — who does what under pressure, what gets preserved first, what gets shut down first, and how continuity survives disruption.
  • Rule memory and continuity — which rules are stable, which are revisable, who can revise them, and what must be documented versus embodied.
  • Health, care, and capacity baseline — the minimum bodily and continuity conditions required for the architecture to remain viable.

Architecture Diagrams

One or two maps showing how the structure actually fits together under your specific conditions.

Implementation Checklist

  • What to build, rewrite, retire, or hand off to specialists.
  • Which professionals are likely required (legal, tax, security, medical, technical, trades).
  • What to avoid because it recreates capture, tied back to Atlas classifications and known tradeoffs.
  • Individualplease enter BTC/USD at bottom of page to see prices
  • Familyplease enter BTC/USD at bottom of page to see prices
  • Small orgplease enter BTC/USD at bottom of page to see prices

3) cell / citadel deployment (ccd)

local instantiation
please enter BTC/USD at bottom of page to see prices small cell starter (remote-first)

Turn the Blueprint into lived protocol for a real household, team, enclave, or local cell.

deliverables
  • cell operating protocol pack
  • community treasury architecture
  • 3-month resilience skeleton
  • scenario drill script
read full product spec

Purpose

Translate the Blueprint into real protocols, treasury rules, continuity mechanisms, and resilience skeletons that a local group can actually run.

You receive

Cell Operating Protocol Pack

  • Membership boundaries, entry and exit criteria, roles, responsibilities, cadence, conflict handling, onboarding, offboarding, expulsion, shutdown clauses, and buy-in expectations.

Community Treasury Architecture

  • Multisig structure, quorum logic, jurisdictional spread where relevant, spending thresholds, emergency rules, role separation, and anti-coercion guardrails.

3-Month Resilience Skeleton

  • Minimum viable continuity across food, water, energy, communications, care for vulnerable members, and reduced-mode operation.

Scenario Drill Script

  • Structured drills for bank outage, communications disruption, logistics interruption, key-person disappearance, custody blockage, and role failure.

This layer exists to force reality into the design. It is for real local instantiation, not citadel aesthetics.

  • Small cell starter (remote-first)please enter BTC/USD at bottom of page to see prices

4) sovereign immune system

month-to-month anti-drift
from please enter BTC/USD at bottom of page to see prices/mo

Ongoing maintenance to keep the stack from sliding quietly back into dependency.

deliverables
  • sovereign immunity log
  • periodic risk refresh
  • narrative integrity checks
read full product spec

Purpose

Prevent quiet slide back into dependence through convenience, fatigue, status, neglect, or new dependencies that nobody properly mapped when they arrived.

You receive

  • Sovereign Immunity Log
    • What changed, what was added, what was retired, what new dependencies appeared, and what assumptions weakened.
  • Periodic Risk Refresh
    • Tool and vendor drift, governance stress, custody posture review, communications and hosting changes, and jurisdictional shifts where relevant.
  • Narrative integrity checks
    • Where “sovereignty” has become costume, where a transitional compromise is being treated as permanent, and what needs to be killed, simplified, rebuilt, or demoted.

This is maintenance of structural integrity, not an identity subscription.

  • Individual / familyplease enter BTC/USD at bottom of page to see prices/mo
  • Org / cellplease enter BTC/USD at bottom of page to see prices/mo
engagement notes

Private work exists for situations where the public material is no longer enough and the downside of getting the structure wrong is real.

what this page is for

Most people do not need private architecture. They need better judgment, better tools, cleaner habits, and a more honest self-audit.

This page is for the narrower set of cases where there are real assets, real dependents, real operational exposure, real family complexity, real jurisdictional pressure, real care burdens, or real downside if the wrong thing fails at the wrong time.

If that is not the situation, use the public material first.

how this fits into the larger work

Everything in Sov Stack Architecture runs on the same sequence:

Kernel → Atlas → Manuals → Deployments

The Kernel defines the law-core, threat model, and standards. The Atlas maps what currently looks buildable under that model. The Manuals turn that map into self-serve methods, audits, and playbooks. The Deployments apply the same logic directly to a specific person, family, organization, or local cell.

Private work does not sit outside the public work. It pressure-tests it. When a tool, workflow, or continuity assumption fails in real conditions, the architecture gets patched and the public work changes with it.

what private architecture is solving

Most structural failure comes from a small number of hidden choke points.

One bank. One exchange. One custody provider. One cloud stack. One fragile family process. One jurisdiction. One legal bottleneck. One person who knows how everything works. One health or care dependency that has never been integrated into the design. One convenient platform that quietly became a control surface.

On the surface, that can still look strong. Under pressure, it breaks.

The point of private architecture is to make those failure paths visible early enough to redesign them before they become irreversible.

flow: from first contact to deployment

Most engagements follow the same basic flow:

First contact → PETQ → Triage or Dossier → Blueprint → Deployment → Immune System

  1. First contact
    The first message should be minimal and high-level. No keys. No wallet data. No account details. No unnecessary legal specifics. The point is fit, not disclosure.
  2. PETQ — Pre-Engagement Threat Questionnaire
    If there appears to be a real architecture problem, the next step is a short PETQ to calibrate threat tier, exposure shape, scope fit, ethics fit, and whether private work is justified at all.
  3. Triage or Dossier
    We begin with the smallest diagnostic layer that makes sense for the situation. Triage is the usual paid entry point; the Dossier is the deeper core diagnostic.
  4. Blueprint → Deployment → Immune System
    For structures that justify deeper work, we move into design, local instantiation where relevant, and optionally ongoing anti-drift maintenance.

All intake and assessment runs under the Data Handling & Retention Policy so the process itself does not become a new attack surface.

Work defaults to remote-first. In-person components, if any, are handled case-by-case under separate threat and privacy constraints.

pricing, milestones, and exchange

Pricing is anchored in Bitcoin. USD may be shown for orientation, but the anchor is sats.

Larger engagements are usually milestone-based rather than paid as one undifferentiated lump sum. The logic is simple: small gate first, clear proof points, clear continuation decisions, and as little unnecessary trust as possible.

  • Triage is the small fixed gate.
  • Dossier, Blueprint, and Deployment usually run in milestone phases tied to artifact delivery and proof points.
  • Immune System maintenance is month-to-month with no long lock-ins.

Exchange rules live in the Medium of Exchange Spec. Milestone and refund logic live in the Returns Guide. If those terms do not make sense for the engagement, there should be no engagement.

capacity, scarcity, and fit

Private architecture is deliberately scarce. Only a small number of serious stacks run in parallel at any one time.

That scarcity is part of quality control, not posture. Threat profile, artifact load, family structure, downside, and ethics all matter.

If there is no real architecture problem, or if the fit is poor, the correct answer is no.

who this work is for

Private architecture is usually a fit for people carrying real structural exposure, including:

  • Bitcoiners and builders whose “sovereignty” still depends on one exchange, one custodian, one platform, one jurisdiction, one brittle workflow, or one irreplaceable operator.
  • Families with children, elders, inheritance complexity, land, care burdens, or local obligations that make shallow solutions dangerous.
  • Small organizations, cells, and local operators trying to build actual continuity rather than symbolic opposition.
  • High-vulnerability nodes carrying asymmetrical downside: disabled people, elders, veterans, caregivers, and communities defending land, water, or local continuity.

If the exposure is not real yet, the public resources are usually enough.

what this work is not

This work is not:

  • Coaching or mindset work.
  • Generic Bitcoin education or wallet setup.
  • Brand strategy, PR, or sovereign aesthetics.
  • Compliance cosmetics dressed up as exit planning.

I do not:

  • Custody keys.
  • Act as a fiduciary or portfolio manager.
  • Provide legal, tax, or investment advice.
  • Serve as a therapist, security contractor, or licensed professional substitute.
  • Provide “sovereignty” language as cover for actors whose real objective is exploitation, coercion, or reputational insulation.

I design architectures, threat models, decision sequences, and operating patterns. Implementation is carried by you and, where needed, by the professionals appropriate to your jurisdiction and situation.

ethics, threat, and refusal

Every engagement runs under an explicit threat model.

The work is primarily designed to reduce exposure to:

  • single-jurisdiction dependence,
  • bank and platform choke points,
  • vendor and SaaS lock-in,
  • governance and succession failure,
  • care-layer fragility,
  • and internal drift back into dependency.

It is not a magic shield against everything. Highly targeted operations, advanced hardware compromise, and deliberate self-sabotage cannot be engineered away remotely.

This work is for lawful self-defense, continuity, resilience, and voluntary coordination. It is not for initiating harm, surveillance, coercive extraction, or institutions seeking sovereignty language without structural change.

Engagement ends if the fit becomes false, the use case becomes unethical, or the structure is clearly being used as cover rather than real redesign.

three paths in

There are three sensible ways to approach this page:

  • Not ready for private architecture — start with the Resources, the Sov Stack Atlas, and the self-audits.
  • Need a serious first pass — start with the Sovereign Triage Brief.
  • Already know the exposure is real — start with the Sovereign Intelligence Dossier.
before first contact

Before sending the first message, read:

That sequence exists for a reason. The process itself should not become a new attack surface.

local price oracle

Enter current BTC/USD to display sats pricing. Using local-only JS on this page for pricing. No network calls. No external price feed tracking your IP.

prices update instantly. nothing is sent anywhere.