page: resources
links · tools · field docs
cowboy bill
bitcoin · complex systems · citadels · mythic law

resources

kernel / manuals / field specs / self-audits

kernel manuals field specs self-audits
what this page is

This is the kernel + manuals layer of Sov Stack Architecture.

Where the Sov Stack Atlas maps tools, environments, and ecosystems, this page gathers the texts, maps, surveys, and field manuals that define the practice itself—and let people run serious sovereignty work on their own stack without ever commissioning architecture.

Roughly:

Kernel → Atlas → Manuals → Client deployments

This page lives in the Kernel + Manuals band:

  • Kernel: primary texts, declarations, whitepapers, philosophical and legal cores
  • Manuals: design specs, playbooks, self-audits, and schematics for citadels, nodes, aid cells, and narrative work
  • Maps: reading maps, curriculum, jurisdictional maps, and threat framings

Some core resources appear in multiple sections because they cut across domains—architecture, health, narrative, education. Duplicates are intentional.

Use this page to study the underlying law-core and threat model, run self-audits before or instead of working with me, borrow specs and patterns for enclaves or projects, and treat Sov Stack Architecture as a discipline rather than a brand.

If you want to know which tools to use, start with the Sov Stack Atlas. If you want to know how to think and build like an architect, start here.

kernel & primary texts

Core texts that define the ontology, threat model, and philosophical substrate.

maps, indexes & stacks

Higher-level maps, indexes, and schematics for stacks and standards.

resource index

The link index below is the working library for this page. Some texts cut across multiple domains. The list remains intentionally broad and uneven; it records the current public corpus rather than a final canon.

operational policy specs

Practice-level specs governing how work, money, and data are handled.

These documents sit at the intersection of kernel, law, and operations: how the practice treats money, risk, and data in line with its own standards.

how to use this page

Suggested entry paths:

adversarial review & patching

Everything here is treated as field code, not scripture.

If serious flaws or blind spots are found in any of these specs, guides, maps, threat models, or legal- and health-adjacent documents, the default stance is:

  • patch the design
  • note the change and deprecate the old version
  • credit the critique
  • where appropriate, tip sats

Adversarial review is part of the operating model, not an exception.