website/docs/manifest_en.md

11 KiB
Raw Permalink Blame History

4NK: A third way for a sovereign, frugal, and verifiable web

4NK: a web that is simpler, cheaper, more reliable, and sovereign.

Summary Today, the internet faces a structural crisis. On one side, Web2 brought ease of use but rests on a centralized architecture that leaks data by default. Every interaction generates metadata captured and exploited by private platforms. This has led to an exploited internet, where users have lost control of their information. On the other side, States tried to react with fragmentation: sovereign clouds, national rules, national public blockchains. But that produces a balkanized network: closed, monitored, incompatible internets that do not restore trust.

Web3, supposed to be the alternative, failed. It tried to decentralize everything, creating new complexities: wallets, tokens, transaction fees, dependence on a few dominant blockchains. Web5, initiated by Jack Dorsey, had the right intuition: combine the simplicity of Web2 and the cryptographic resilience of Web3. But it remained limited by its reliance on Bitcoin as a forced, single monetary rail.

This is the context in which 4NK appears. 4NK is not a marketing layer nor yet another blockchain. It is a distributed, frugal, and verifiable infrastructure: a third way.

Our principles are clear:

  • Neutral mesh relays: they control nothing, store nothing, surveil nothing. They only synchronize and replicate cryptographic proofs.
  • User sovereignty: keys, data, identities remain exclusively under users control.
  • Universal verifiability: every action is anchored and cryptographically traceable, without relying on a third party.
  • Digital frugality: no heavy infrastructure, no foreign cloud, no extra CAPEX. Resilience comes from distribution, not energyhungry duplication.

Concretely, the experience stays identical to Web2: same simplicity, same fluidity. Under the hood, no structural leaks, no dependence on platforms or States. 4NK enables:

  • securing messaging, documents, and any digital flow,
  • immutable anchoring and timestamping of proofs,
  • sovereign and portable digital identity,
  • simpler payments and interactions,
  • regulatory compliance without massive data exposure.

In short, 4NK breaks the cybersecurity glass ceiling. Where centralized infrastructures inevitably leak despite audits and certifications, 4NK makes leakage impossible by design. It is an infrastructure of resilience, where the user is sovereign, where trust rests on proofs, and where the internet regains its universality without being exploited or fragmented.

4NK, the third way: a sovereign, simple, frugal, and verifiable web.

Rollout plan 4NK deploys its technology in stages: first to regulated professions and critical sectors (notaries, logistics, health), then through isolated modules distributed by integrators and operators to reach SMEs and municipalities. By 20272030, the ambition is a European expansion based on a “noinfrastructure” distributed model, combining sovereignty, frugality, and accessible regulatory compliance for all digital services, everywhere, in open source.

An exploited and fragmented internet: between economic asymmetry and political partition The original promise diverted The internet was born from a clear ambition: connect heterogeneous networks to enable free and universal circulation of information. It was meant to be a neutral, inherently distributed space that encouraged scientific cooperation, communication between individuals, and ultimately social and economic innovation.

Thirty years on, that original project has been deeply altered. The global network is trapped in a double deadend: on one side, exploitation by private infrastructures that turn it into a tool for capture and surveillance; on the other, its progressive partition by States trying to fragment it to regain control. This dual movement has transformed the web into a structurally insecure space where the user has neither real control of their data nor any guarantee of neutrality.

Structural exploitation of Web2 Web2 relies on a clientserver architecture that places user data at the heart of centralized platforms. This brought unprecedented ease of use and accessibility. However, this convenience is inseparable from a design flaw: Web2 was made to leak data by default. Each interaction generates flows of information that produce a mass of invisible metadata. These traces reveal behaviors, profiles, and preferences and are exploited to fuel business models based on targeted advertising, algorithmic recommendation, and data resale.

Economic and societal consequences

  • Company closures caused by massive leaks or cyberattacks
  • Visible degradation of trust: daily lists of massive breaches
  • Invisible industrial pillage of strategic data
  • User experience complexity: multiple logins, passwords, heavy 2FA
  • Revenue loss in payments: costly centralized rails
  • Digital identity crisis

State fragmentation: the other deadend Sovereign clouds, localization rules, “trusted” infrastructures produce a balkanized network: incompatible, closed, and surveilled internets that replace universality with archipelagos.

A structural double failure

  • Web2 yields an exploited internet where value is captured by private infrastructures
  • State attempts produce dystopian, fragmented internet

Identity as the keystone of sovereign uses Identity has become the keystone of all uses: login, sign, pay, access services, exchange data. Without robust, usercontrolled identity, no digital sovereignty is possible.

Current limits and contradictions

  • Centralized identity registries inevitably leak
  • Surveillance mechanisms are invasive and inefficient
  • Expanding ageverification builds highly sensitive databases of childrens identities

A rising systemic cost: insecurity, dependence, fragile infrastructures

  • Business bankruptcies caused by compromise
  • Invisible pillage of intellectual property
  • Compliance and security cost inflation without added value
  • Citizens: distrust, cognitive overload, digital exclusion
  • States: balkanization and illusory sovereignty

The vicious circle: more leaks → less trust → more defensive layers → more complexity and costs → leaks continue

4NK as a way out: change the infrastructure itself

  • For businesses: make structural leakage impossible
  • For citizens: Web2like simplicity with sovereign identity and data
  • For States: an alternative to fragmentation with a neutral distributed infrastructure

Why Web3 failed (and what to keep)

  • You cannot put everything on a blockchain; not everything benefits from decentralization
  • Gas fees create economic friction; UX becomes complex
  • Recentralization around a few dominant chains and custodial intermediaries
  • Decentralization is a means, not an end. The end is resilience

Web5 and Solid taught valuable lessons but were constrained by governance, politics, or an overly narrow strategic alignment. 4NK learns from these paths while avoiding their limits.

4NK: sovereign, simple, verifiable infrastructure Architectural principles:

  • Neutral mesh relays that control nothing and only synchronize proofs
  • Sovereign users: keys remain exclusively with users
  • Universal verifiability: every action is anchored and traceable
  • Frugal by design: no extra CAPEX, no foreign clouds

User experience: continuity of Web2

  • Keep UX identical to Web2 while making the infrastructure invisible

Security and verifiability

  • Endtoend encryption, distributed anchoring, no metadata leakage by design, universal traceability

A resilience infrastructure

  • Remove single points of failure; services continue even as some nodes disappear

The “third way” in practice

  • Keep Web2 simplicity, remove data leakage
  • Keep Web3s cryptographic verifiability, reject “decentralize everything”
  • Mesh relay architecture without private capture or state control

Breaking the glass ceiling Centralization concentrates data, expands attack surface, and forces endless defensive layers. 4NK replaces declared trust with provable trust and eliminates structural leakage by design while maintaining simplicity and frugality.

Economy of verifiable trust

  • Web2: infrastructure turned into financial product (rents)
  • Web3: tokencentric, VCdominated blockchains
  • State projects: costly, controlled, weakly adopted
  • 4NK: neutral common infrastructure, no CAPEX clientside, no token rent, no state control, proofs by design

Energy sobriety

  • Reuse existing equipment; no industrial duplication
  • Use Bitcoin as a shared anchoring layer: one transaction can certify billions of anchors via Merkle aggregation; cost does not scale with usage

Operational implementation Zones:

  • User zone (browser/client)
  • Relay zone (mesh)
  • Distributed application zone
  • Bitcoin anchoring zone

Relays: synchronize anchors, provide redundancy, remain blind by design

Sovereign identities

  • Derivation peruse (inspired by silent payments) → unlinkability
  • Verifiable yet confidential credentials

Anchoring on Bitcoin

  • One Bitcoin transaction as cryptographic root for entire data trees → global security without peruse energy inflation

Security and isolation

  • Minimal exposure (reverse proxy), isolated critical services, systematic encryption

Distributed governance

  • Any organization/user can run nodes; no single actor can impose decisions

Deployment strategy (progressive migration)

  1. Sovereign document management (Docv)
  2. Encrypted messaging and sovereign communications
  3. Distributed, probative traceability across value chains
  4. Innovative identity and login methods (passwordless, derived addresses)
  5. Integrated, decentralized payments (micropayments, P2P, Bitcoinanchored)

Macroeconomic and societal impacts

  • Industrial competitiveness: end of data pillage, predictable security costs, local value capture
  • Jobs and ecosystem: local integration and support, diversified operators, European independence
  • Restoring trust: verifiable identity, no massive registries, proofs without overexposure
  • Ecological sobriety: minimal marginal energy through distribution and shared Bitcoin anchoring

Risks and limits

  • Maturity and adoption thresholds
  • Responsibility shift to users for key management (needs education)
  • Regulatory interoperability (dialogue to avoid forced centralization)
  • Indirect dependence on Bitcoins resilience
  • Resistance from entrenched actors

Conclusion Migrating to a distributed, neutral, and verifiable infrastructure is not a secondary technical option: it is a rational societal choice. 4NK offers an infrastructure where security is a property of the architecture itself—provable, sovereign, frugal—making the internet simpler, cheaper, and more trustworthy.