Skip to content
@z-base

z-base

Open-source, self-deployable coordination layer for sovereign frontends.

Core Value Propositions

For service providers

z-base is being designed to reduce legal and operational risk by eliminating the need to process, inspect, or store user data.
You will be able to operate infrastructure without handling user content.

For end users

z-base will provide communication and data features without surveillance, profiling, or hidden extraction.
User data will remain private, local-first, and cryptographically controlled by the user.

For platform builders

z-base is being built to remove the requirement to act as a data custodian.
You will provide coordination and services, not user dossiers.

For developers

The system will map cleanly to real-time object synchronization and evented state patterns.
The API will be intentionally small, semantically strict, and deterministic.

For vibe coders

With the z-base, you will not need to design or maintain a backend application database.
The infrastructure will store and relay only encrypted envelopes, while logic and authority live in the client.
This is intended to remove backend surprise work and keep cost and liability predictable during fast iteration.


Where z-base Will Be Used

z-base is being built to function as the user or organization state layer of an application.

It will be well suited for:

  • user-generated or organization-generated data
  • collaborative or personal state
  • data that should be owned by its creator
  • systems requiring privacy, offline access, and peer verification

In short: z-base is intended for systems where the user remains the authority.


Where z-base Will Not Be Suitable

z-base is not intended for cases where:

  • unattended automation must modify state
  • third parties require plaintext access
  • public indexing or content discovery is a core requirement

In those cases, separate, purpose-built databases will still be required for automation, analytics, or public content.

If automation is required, design it ethically:
• request explicit, verifiable permission from the user,
• limit access to a narrow data scope,
• enforce a bounded time window,
• state a specific purpose aligned with your service terms,
• make all data exposure visible and measurable in the UI.

Philosophy

z-base exists to make it easy to build ethical services.

If your primary goal is maximizing profit through surveillance, data brokerage, or opaque advertising ecosystems, z-base is probably not a fit.

If you still want to monetize data, consider doing so transparently and consensually—by offering to
purchase clearly defined data sets directly from users, under terms they understand and control.

This is architecture for a web that serves people first.

Popular repositories Loading

  1. anonymous-web-authentication anonymous-web-authentication Public

    Open specification for Anonymous Web Authentication (AWA) — a privacy-preserving, deterministic identity protocol built on WebCrypto and national eID systems. AWA provides proof of humanity without…

    1

  2. dacument dacument Public

    Schema-driven CRDT document with signed ops, role-based ACLs, and per-actor auditability.

    TypeScript 1

  3. html-lang-primary-subtags html-lang-primary-subtags Public

    This package provides a strictly typed union of all registered primary language subtags, without regions, scripts, variants, or extensions.

    TypeScript

  4. offdex offdex Public

    IndexedDB-backed envelope storage for AES-GCM payloads in browsers and workers.

    TypeScript

  5. bytecodec bytecodec Public

    JS/TS byte toolkit for base64url, UTF-8 strings, JSON, normalization, compression, concatenation, and comparison in browser and Node runtimes.

    JavaScript

  6. cryptosuite cryptosuite Public

    Client-side WebCrypto helpers for AES-GCM encryption, ECDSA signatures, RSA-OAEP key wrapping, HMAC, and key generation, with byte-oriented cluster helpers.

    TypeScript

Repositories

Showing 10 of 13 repositories

Most used topics

Loading…