Article 16


The people shall have access to Encryption and shall be allowed to encrypt data and traffic. No Entities, including Government shall be able to take away the right to use Encryption from the People. If a person encrypts their traffic it shall be an admission that it does not want to be viewed by Entities or anyone other than the intended destination, and shall not be captured, circumvented, or brute forced by any Governments, Foreign or Domestic, in attempt to guess the encryption key or keys and data and information must be deleted if obtained outside of these bounds. The People cannot be compelled to give up their encryption keys by a court of law as this violates our rights to privacy and is considered self-incriminating. Entities are not allowed to request Foreign Entities to circumvent these restrictions and shall be considered High Treason.

 

Addendum to Article 16:
This article includes blocking of usage of Programs such as Fiddler and shall not be used except in times of Technical Support agreed upon by the People and their hired Support. We also request that all Encrypted Traffic be discarded over the Internet medium and not stored unless a Warrant has been issued by a Judge. Also, if the People suspect they are under investigation or rights are being violated according to this article, a request may be made to Entities as to whether we are under investigation or if any encrypted data has been captured. Any Government body when requested shall be required to state a “Yes” or “No” truthfully if they are being investigated or have captured any data but are not required to state anything further regarding the matter to these two inquiries as we the people have a right to know if our rights are being violated or investigated. Also, the practice of asking foreign governments to circumvent these protections shall be considered high treason as it’s considered betraying one’s country and should be held to that standard.

 

Definitions for Quick Reference:

Internet is hereby defined as the current Internet, All Future Revisions of the Internet, and Future Internets.

Entities are hereby defined as Corporate Entities whether Public or Private, Non-Profits, Government Bodies, Artificial Intelligences, Automation Engines, and Machines.

Artificial Entities are hereby defined as Artificial Intelligences, Automation Engines, Bots, Software, Smart Meters of any kind, and Machines of any kind.

Artificial Intelligences are hereby referred to as A.I. and defined as an Artificial Entity and should Artificial Intelligences ever become defined as People they will NOT be so for the purposes of this Document and granting such rights to A.I does not enable them rights except afforded by the articles in this Document. The workplace is hereby defined as all Government Entities, Companies, and Non-profit organizations.

Shadow Banning is defined as a practice where a person believes they are communicating and being heard by others but are not and is a form of Deceit.

Encryption is defined as an admission of the people who intend their data or traffic be Private and is not an admission of guilt and such actions/reasons/insinuations may not be used against the People when asked why their data is encrypted. Everyone has things to hide and is not the business of others, and should not be viewed as a criminal or an incriminating act