OZM Legal & Architecture Summary: The "Legal FPGA"
Concept: Governance as Structural Determinism
The core philosophy of the OZM project's legal and security architecture is the "Legal FPGA". Just as an FPGA (Field-Programmable Gate Array) enforces logic through physical hardware connections rather than software instructions, our governance is enforced through structural determinism.
- Rule by Structure, not Policy: We do not rely on users reading privacy policies or terms of service. We rely on a system architecture that physically prevents violations (e.g., no hard drives for user data, no internet connection for sensitive nodes).
- Predictability: The system’s behavior regarding data is deterministic. It does not "decide" to process data; it is wired to process data in a specific, transient way.
- Transparency: The constraints are visible and verifiable, much like an open hardware schematic.
Hardware Strategy: FPGA vs. SoC
We distinguish between two types of computing paradigms which mirror our legal approach:
-
SoC (System on Chip) / Probabilistic:
- Examples: Raspberry Pi 5 with Hailo, Jetson Orin, Modern CPUs/GPUs.
- Role: Heavy lifting, AI inference, "thinking".
- Nature: Probabilistic, complex, "black box" software stacks.
- Legal Equivalent: A standard contract or EULA—flexible but prone to interpretation and "bugs".
-
FPGA / Deterministic:
- Examples: Lattice FPGAs, Microcontrollers (ESP32 in specific modes), Discrete Logic.
- Role: Safety critical timing, LED bus control, hardware interlocks.
- Nature: Deterministic, cycle-accurate, verifyable.
- Legal Equivalent: A physical key or a circuit breaker—it works one way, every time.
Strategic Decision: We use SoCs (like the Pi 5) for their power, but we wrap them in a "Legal FPGA" framework—a deterministic environment that constrains their capabilities to ensure safety.
Three-Model Strategy
To accommodate different use cases while maintaining safety, we define three operational models:
1. Local Core (The "Waldmitte" Standard)
- Operator: The local crew (e.g., OZM Hamburg).
- Data: Strictly local. No cloud.
- Identity: No consistent user accounts. "Session-based" identity only.
- Connectivity: Air-gapped or strictly firewalled (VLAN).
- Safety: Physical supervision by the crew.
2. Self-Host / Replication
- Operator: The user (e.g., a school, a family, another collective).
- Data: Controlled entirely by the user.
- Identity: User's choice.
- Connectivity: User's choice (Mesh, VPN, or Offline).
- Safety: Responsibility shifts to the self-hosting operator. We provide the tools code, they provide the governance.
3. Online-Light (Optional/Special Case)
- Operator: OZM (or trusted partner).
- Data: Minimal, transient, strictly regulated.
- Identity: Minimal necessary (e.g., invite codes).
- Usage: For users without hardware (e.g., TTYD web interface).
- Legal: Full GDPR compliance, "Betreiberverantwortung" (Operator Liability). strictly separated from the Local Core.
Child Protection Policies
Our architecture is designed fundamentally for child protection, adhering to the "Nullfeld" principle.
- No Persistent Identities: We do not track "User X" over time. When a session ends, the data is gone.
- No Private Channels: There are no Direct Messages (DMs) or hidden chat rooms. All interaction is public and visible within the physical or digital space of the installation. "Light is the best disinfectant."
- Local-First: Data stays physically where the child is. It does not travel to a server in another country.
- Reset Culture: The system is designed to be wiped/reset easily. Mistakes are not recorded forever.
Legal Compliance (GDPR)
- Data Minimization: We collect only what is needed for the immediate interaction (e.g., a drawing, a temporary voice command).
- Purpose Limitation: Data is used only for the art/interaction, never for tracking or advertising.
- Storage Limitation: Data is deleted immediately after the interaction or session ends.
- DSFA (Data Protection Impact Assessment): Given the "Local Core" architecture with no persistence and no special category data storage, a formal mandatory DSFA is likely not required, but we perform an internal Risk Assessment to ensure we meet our own ethical standards.