Living Documents
Protocols for Cognitive Sovereignty
Not theory. Practice. Each protocol includes Seed (no hardware), Sprout (consumer), and Altar (server) pathways. Start where you are.
The Silicon Altar
Building a local-first AI workstation. Dual Tesla P40s, driver wars, thermal rites, and a box fan.
Read Protocol 000 →The 5-Minute Cognitive Audit
Write 100 words. Feed to AI. Compare. Notice what changed. The first step of sovereignty is noticing the translation.
Try the Interactive Audit →The Mycelial Query
Routing meaning without leaking identity. GPU 0 listens. GPU 1 translates. The cloud only polishes anonymized patterns.
Read Protocol 007 →The Self-Stitch
Using the Altar to read your own work recursively. What does the mycelium find when it turns back on the gardener?
Read Protocol 008 →The Sovereignty Audit
Long-term tracking of cognitive outsourcing. Weekly check-ins. Not zero AI — aware AI.
Read Protocol 012 →What is a Protocol?
A protocol is a living document — not a fixed tutorial. It evolves as hardware changes, software improves, and the community contributes.
Every protocol includes:
- The Stitch — raw transcript of the actual interaction
- The Counter-Stitch — human reflection on what the model found
- The Thermal Note — physical cost of the computation
- Seed, Sprout, and Altar pathways for every skill level
Protocols are meant to be used, not just read.