The Overton Framework is now DOI-backed
CrisisCore-Systems

CrisisCore-Systems @crisiscoresystems

About: Collapse systems engineer at CrisisCore-Systems. I build trauma-aware health tools, privacy-first security utilities, and write about resilient architectures under real pressure.

Location:
Kelowna, BC
Joined:
Nov 27, 2025

The Overton Framework is now DOI-backed

Publish Date: Feb 19
0 0

Part 10 of CrisisCore Build Log — Start here: https://dev.to/crisiscoresystems/testing-privacy-preserving-analytics-verifying-that-insights-dont-leak-identity-e37

If you want the fastest route through this catalog, start here and then come back to this post for detail.

Start Here reading path


title: "The Overton Framework is now DOI-backed"
description: "A citable canon for Protective Computing (v1.3), archived on Zenodo with a minted DOI—plus a reference implementation in Pain Tracker."
tags:

The Overton Framework (Protective Computing) is now archived on Zenodo with a minted DOI.

If you want privacy-first, offline health tech to exist without surveillance funding it: sponsor the build → https://paintracker.ca/sponsor

That means a stable, versioned citation you can use in papers, docs, and reviews—without link rot or “which PDF did you mean?” ambiguity.

What’s new: a DOI-backed v1.3 canon (Zenodo) plus a repo-hosted Markdown mirror for review and citation.

Canonical citation (use this exact line)

Overton, K. (2026). The Overton Framework: Protective Computing in Conditions of Human Vulnerability (Version 1.3). Zenodo. https://doi.org/10.5281/zenodo.18688516

What the framework is

Most software quietly assumes users have:

  • stable connectivity
  • stable cognition
  • stable safety
  • stable institutional trust

The framework names that as the Stability Assumption and treats it as a design hazard.

Protective Computing is a systems orientation for building software that stays safe and usable when those assumptions fail: during medical crisis, coercion, environmental disruption, and socioeconomic precarity.

Boundary notes (because truth matters):

  • This is not medical advice.
  • This is not a regulatory compliance claim.
  • This is not a claim of perfect security.

What’s inside v1.3 (high level)

The canon is intentionally written to be checkable, not inspirational:

  • A definition of Stability Bias and how it shows up in real systems
  • A Vulnerability State Machine (how user conditions shift, and what systems must do as they shift)
  • Five normative design principles written in RFC-style requirement language (MUST / SHOULD)
  • A provisional composite metric (PLS) with explicit caution about Goodhart’s Law

Where to read it

If you prefer reading in-repo text first:

Reference implementation (so it isn’t just theory)

Frameworks don’t matter unless they survive contact with a live codebase.

Pain Tracker is an open-source, local-first pain documentation system that’s used as a reference implementation target for many Protective Computing constraints (local-first defaults, careful trust boundaries, trauma-informed UX, exports treated as a security boundary).

Important nuance: some integrations exist (for example correlation services and clinic/payment workflows), but they require explicit configuration/enabling and should be treated as separate trust boundaries.

What feedback I’m asking for

If you build systems that touch high-vulnerability contexts (health, crisis response, legal aid, shelters, disability tooling, harm reduction), the most useful feedback is specific:

  • Where the principles are too vague to be operational
  • Where the requirements are too strict to be buildable
  • What would make “protective” more testable without turning it into a gameable score

Links

Comments 0 total

    Add comment