Anonymity of Comind and protection
ComindOrganizeProtection

Anonymity of Comind and protection

Introduction

Comind seeks to advance in the least aggressive and most gradual manner possible, aiming to demonstrate its value without imposing itself. The goal is to progress through adoption due to the effectiveness of the developed tools. However, as Comind aims to replace authority-based powers with decentralized powers, it is possible that there may be a reaction from these authorities (financial, political, etc.). Numerous cases (For example, the case of the NSA's illicit behaviors and the manhunt for Edward Snowden, or the crimes against humanity perpetrated in the Gaza Strip supported by the West and accompanied by repression of whistleblowers) show that these people generally have a frankly low level of integrity, humanity, and respect for the law.

How to protect oneself

Like many things, anticipating helps avoid problems. An organization is not targeted if it is not worth the effort. The main initial techniques:

decentralization
By its nature, Comind tends towards increasing decentralization, making it less and less vulnerable.
knowledge
Comind is above all a set of reproducible knowledge, and it is very difficult to destroy knowledge.
organizational backup
This technique allows the non-knowledge (organizational) part of Comind to be preserved.
An anonymous center
The core of Comind is anonymous (users, money, etc.). This does not prevent the development of secondary non-anonymous organizations, as long as organizations adopt the decision-making techniques developed by Comind.