Skip to content
View CrisisCore-Systems's full-sized avatar
🙃
🙃

Block or report CrisisCore-Systems

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
CrisisCore-Systems/README.md

CrisisCore-Systems

Canon DOI Overton Framework DOI Field Guide DOI PLS DOI

Protective Computing — systems design under human vulnerability.

Canonical archive for the Protective Computing Zenodo corpus, specifications, and reference implementations.

CrisisCore-Systems is the engineering and publication surface for Protective Computing: software designed to remain safe, usable, and ethically constrained under crisis, illness, coercion, displacement, degraded infrastructure, and institutional instability.

We publish:

  • canonical papers
  • engineering doctrine
  • normative specifications
  • evaluation tooling
  • reference implementations

Start here


Published release stack

Canonical Paper

Protective Computing Canon v1.0
The structural overview of the discipline across theory, engineering practice, evaluation, and reference implementation.
DOI: https://doi.org/10.5281/zenodo.18887610

Foundation

The Overton Framework v1.3
Formal theory and architectural framing for software built under conditions of human vulnerability.
DOI: https://doi.org/10.5281/zenodo.18688516

Practice

Protective Computing Field Guide v0.1
Operational companion for engineers implementing protective systems in real environments.
DOI: https://doi.org/10.5281/zenodo.18782339

Specification

Protective Computing Specification v1.0
Normative requirements with verification procedures for implementation, design review, and audit.
Spec: https://protective-computing.github.io/docs/spec/v1.0.html

Tooling

Protective Legitimacy Score (PLS) v1.0-rc1
Operational rubric for evaluating whether systems remain structurally protective under degraded conditions.
DOI: https://doi.org/10.5281/zenodo.18783432

Reference Implementation

PainTracker
A privacy-first, local-first, offline-capable chronic pain documentation system used as a live Protective Computing reference implementation.
Repo: https://github.com/CrisisCore-Systems/pain-tracker


Core constraints

Protective Computing rejects the Stability Assumption and replaces it with enforceable constraints:

  • Reversibility
  • Exposure Minimization
  • Local Authority
  • Coercion Resistance
  • Degraded Functionality
  • Essential Utility

These are engineering constraints, not branding language.


Why this exists

Most software assumes persistent connectivity, cognitive surplus, environmental stability, and institutional trust.

Protective Computing starts from the opposite condition:

  • crisis
  • illness
  • pain
  • coercion
  • displacement
  • infrastructure instability

When those conditions are present, software failure is not a minor inconvenience. It can become disclosure, lockout, pressure, or irreversible harm.


Audit and verification surface

Protective Computing includes a live specification and verification surface:


What this organization builds

This organization houses work related to:

  • Protective Computing theory and doctrine
  • reference implementations
  • privacy-first and local-first systems
  • audit and verification tooling
  • crisis-aware software architecture
  • degraded-state UX
  • coercion-resistant patterns

Citation rule

  • Cite the Canon DOI for the discipline as a whole.
  • Cite the artifact DOI for a specific layer document.
  • Cite the reference implementation repo when discussing implementation details in PainTracker.

Preferred citations

Canon
Overton, K. (2026). Protective Computing Canon v1.0: A Structural Map of the Discipline. Zenodo. https://doi.org/10.5281/zenodo.18887610

Foundation
Overton, K. (2026). The Overton Framework: Protective Computing in Conditions of Human Vulnerability (v1.3). Zenodo. https://doi.org/10.5281/zenodo.18688516


Contributing

Contributions are welcome when they strengthen protective outcomes.

Priority areas:

  • verification hardening
  • degraded-state interaction design
  • coercion resistance
  • threat modeling
  • exposure minimization
  • local-first reliability
  • auditability under stress

Issues / PRs: https://github.com/CrisisCore-Systems/pain-tracker/issues


Licensing

  • Docs: CC-BY-4.0 where stated
  • Code: project-dependent

Protective Computing is software for the moment stability fails.

Popular repositories Loading

  1. pain-tracker pain-tracker Public

    Bridge the gap between patient experience and clinical understanding through comprehensive, secure, and accessible pain tracking technology. A privacy-first, offline-capable PWA for chronic pain ma…

    TypeScript 3

  2. neural-entrainment-system neural-entrainment-system Public

    TypeScript 1

  3. CompressKit CompressKit Public

    Advanced PDF compression toolkit for Termux environments

    Shell

  4. template-store-pro template-store-pro Public

    Python

  5. Image-processor Image-processor Public

    Python

  6. temporal-photo-organizer temporal-photo-organizer Public