Article 12


The People have the right to maintain control of our external IP address by a router we control at the persons home and maintain control over which ports are opened by request on said IP address. Port availability shall not be only for Business Grade Service, but also for the lowest grade of service. I f the grade of Service is not of Business grade internet, and an attack is occurring over a certain port, Providers are allowed to block said port temporarily to thwart the attack but must inform the customer of the attack and then be reinstated. This includes port 25.

 

Addendum to Article 12:
This does not prevent Providers from blocking ports at default for protection reasons, but if requested by a user who is paying for Internet Service it shall be granted them. We want to ensure the People have the ability to have control of ports used on the external IP address assigned to them. This requires control of a router either you purchase, or they provide that can give you control over the ports that can be forwarded or provide IP Passthrough. We hereby define port availability and opening as part of Internet Service Provided to We the People and when requested should be opened and trust and responsibility given. People have the right to protect themselves from such attacks if requested. To be clear, NO port shall be blocked upon request. To give an example. A person wants to use their own Email Server to get off publicly hosted email services and take control of their own email. Email as you know contains much personal private data which is now being stored on a remote server without your full control. We retain the right to request ports be opened and the ability to facilitate such action, and including, but not limited to, port 25 to give example. Providers are no longer allowed to make this decision beyond the rules stated in this article.

 

Definitions for Quick Reference:

Internet is hereby defined as the current Internet, All Future Revisions of the Internet, and Future Internets.

Entities are hereby defined as Corporate Entities whether Public or Private, Non-Profits, Government Bodies, Artificial Intelligences, Automation Engines, and Machines.

Artificial Entities are hereby defined as Artificial Intelligences, Automation Engines, Bots, Software, Smart Meters of any kind, and Machines of any kind.

Artificial Intelligences are hereby referred to as A.I. and defined as an Artificial Entity and should Artificial Intelligences ever become defined as People they will NOT be so for the purposes of this Document and granting such rights to A.I does not enable them rights except afforded by the articles in this Document. The workplace is hereby defined as all Government Entities, Companies, and Non-profit organizations.

Shadow Banning is defined as a practice where a person believes they are communicating and being heard by others but are not and is a form of Deceit.

Encryption is defined as an admission of the people who intend their data or traffic be Private and is not an admission of guilt and such actions/reasons/insinuations may not be used against the People when asked why their data is encrypted. Everyone has things to hide and is not the business of others, and should not be viewed as a criminal or an incriminating act