The security model is not a constraint on the product —
it is the product.
Public infrastructure for anyone serious about their data and users.
Principles, tooling, and operating models. Open. No gate. Anyone can use it.
SMS and authenticator apps are not acceptable for any account that matters. Hardware keys only. No exceptions negotiated at onboarding.
Email is not a recovery path. If a service requires it, find an alternative or build around it. The chain is only as strong as its weakest link.
Don't just ask "is this credential safe?" Ask "is this credential still justified?" One-time tokens die when their purpose is fulfilled.
Profile segmentation, policy enforcement, and audit trails exist so the rules don't depend on anyone remembering to follow them.
Public only when explicitly decided. Not the other way around. Default posture is closed — opening is a deliberate act.
Every security event maps to a tag. Every tag maps to handlers. The system observes its own state and responds — no human memory required.