A decentralized web is not achieved by changing how we store or move bytes.
It is achieved by standardizing semantics and changing where authority is allowed to exist.
DNS, HTTPS, CDNs, and transports are fine.
They move encrypted blobs and locate endpoints.
They do not define meaning, ownership, or truth.
Web2’s failure is that identity, data, validation, and policy are bound to the same service boundary.
Who you are, what exists, and what is true are decided by whoever runs the server.
z-base is an attempt to invert that.
Treat every user-agent as an Actor in a distributed system (a cryptographic authority over its own state), supported by servers as Base Stations (standardized resource support servers run by service providers, used for storage, relay, backup, and cross-origin coordination), and let state emerge from conflict-free replicated verifiable claims over interoperable resources—independent of network location or service operators.
PRIVACY NOTE: This architecture does not attempt to eliminate surveillance.
It limits the scope and value of surveillance.
Read more
- What Makes z-base Unique
- Digital-Sovereignty-Enabling Architecture Overview
- Rationalizing Why Digital-Sovereignty-Enabling Architecture Needs This Structure
- Long and Awkward Walkthrough on Digital-Sovereignty-Enabling System Architecture
SCALABILITY NOTE: The diagram scales both horizontally and vertically.
Horizontally: add as many Service Providers as needed.
Vertically: add as many Service Clients as needed.
z-base is about portable resources: media, documents, identities, credentials, objects—and anything else that can be expressed as a shared, verifiable model.
The point is not “a decentralized app”.
The point is a decentralized resource format + semantics, so many competing clients can render, edit, and verify the same thing.
Think:
- a video format + many players
- a document format + many editors
- a shared object model + many viewers
Clients compete on UX.
Formats guarantee portability and interoperability.
Resources should sync in real time, offline-first, peer-to-peer when possible, and service-assisted when needed.
The service layer is not “the truth”.
It’s routing, relays, indexing, hosting, availability, backups, and coordination.
Authority stays with the Actor.
z-base is designed to support both:
- private resources (E2EE, local-first, selective disclosure, peer verification)
- public resources (publishable, cacheable, replicable, indexable—without turning platforms into identity owners)
Automation is real. But “automation” must not imply “the platform owns your state”.
If automation needs access:
- it must be explicitly authorized by the Actor
- scoped to a narrow purpose and dataset
- time-bounded
- auditable and measurable in the UI
- revocable without collapsing your existence
Delegation without dependence.
z-base does not:
- own your identity
- define your reality
- grant authority for your intentions
- require that a provider is “trusted” to be correct
z-base does:
- host resources you control (as a service, not as a throne)
- store and relay encrypted envelopes without needing plaintext
- enable peers to verify claims locally
- keep resources portable so provider shutdown is a business event, not an existential event
A provider has no inherent right to own your data or identity.
A provider has no inherent obligation to host you forever.
Those statements do not conflict when the system is portable.
- privacy without surveillance economics
- local-first state
- real exit: migrate without begging
- lower liability: operate infrastructure without handling sensitive user data
- better competition: users can migrate from a competitor without normalization headaches
- predictable costs: store/relay envelopes, not dossiers
- build services, not prisons
- competition shifts to experience, not captivity
- no surprise backend database work
- small, deterministic APIs
- sync + events patterns that map to real apps
Fits:
- user/organization state layers
- collaborative and personal resources
- anything needing offline + sync + verification
- systems where the user must remain the authority
Doesn’t fit (by itself):
- unattended automation that must mutate state without user authorization
- systems that require third-party plaintext by default
- purely public discovery/search as the primary feature (use a purpose-built index)
z-base is a foundation. You can add specialized services without re-centralizing authority.
z-base is being built from the bottom up as two layers that evolve together:
We start by writing JS runtime-agnostic (but ESM-format-specific) JS/TS libraries alongside implementation-agnostic specifications.
The specs focus on execution-level structure:
- data ontologies and semantics
- topologies and coordination models
- object handling, processing, and verification rules
- deterministic behavior and portability constraints
The goal is that multiple independent implementations can exist without divergence in meaning.
For transport and storage we start with what is already widely deployable:
- Browser APIs
- Cloudflare (as an initial service substrate)
Then we expand to additional runtimes, environments, and platforms as the model stabilizes:
- wider JS runtime support
- native and Wasm support
- other providers and deployment targets
The priority is correctness of meaning and verification first; the hosting substrate is replaceable.
z-base is not trying to build the app.
It’s trying to make it obvious how to build many apps—viewers, editors, platforms, and services—around shared resources without reintroducing captivity.
If the web is going to serve people first, it needs to serve developers first: enabling competition on UX/UI without becoming data custodians, through simple, familiar APIs.
That’s the bet.
Early-stage, recursive specify<->implement iteration.
If you like CRDTs, portable formats, verifiable claims, E2EE, real-time coordination, and sovereignty-by-design... welcome!

