I have built networks under conditions that made failure fatal. Not metaphorically fatal. My network’s failure – the discovery of a contact, the interception of a message, the compromise of a safe house – meant execution. Mine, and the people connected to me.

Under these conditions, you learn to build differently. You learn to build for the failure you have not yet imagined, because the failures you can imagine are the ones your adversary can imagine too.

Here are three rules. They are simple. They are not easy.

Rule One: No Single Point of Failure

If the removal of any single person, tool, or channel would collapse your network, your network is already dead. It is just waiting for the event.

This is the most basic principle of resilient network design, and it is the one most frequently violated. The activist group that depends on one leader. The communication chain that runs through one encrypted platform. The organizing effort that stores all its information in one location.

Each of these is a network with a single point of failure, and the adversary – whether government, corporate, or otherwise – does not need to understand your entire network. They only need to find the single point.

Build with redundancy. Every critical function should be performable by at least two independent paths. Every key contact should have a backup who can assume their role without additional information. Every communication channel should have an alternative that can be activated without advance coordination.

This is expensive. It requires more people, more infrastructure, more planning. It is also the difference between a network that survives pressure and one that does not.

Rule Two: Trust Is the Foundational Layer

No technology replaces trust. I state this flatly because the temptation to believe otherwise is strong and persistent.

An encrypted communication channel between two people who do not trust each other is not secure. It is a technically sophisticated vulnerability. The person at the other end of the encrypted message is either trustworthy or they are not, and no amount of cryptographic strength changes that fundamental variable.

How do you build trust in an environment where trust is dangerous? Slowly. Through small, verifiable acts. Through demonstrated reliability over time. Through the establishment of shared risk – because trust is deepest when both parties have something to lose.

I built my network person by person, crossing physical borders to meet people face to face, establishing relationships before establishing channels. This was slow. It was the only approach that worked.

The digital equivalent is not different in principle. Before you trust someone with sensitive information, you need a basis for that trust that exists outside the digital channel. An in-person meeting if possible. A verified introduction from a trusted mutual contact if not. The gradual escalation of shared information, with each stage serving as a test of the other party’s reliability.

Encrypted messaging is the infrastructure. Trust is the network.

Rule Three: Assume Compromise

This is the rule that distinguishes survival-grade network design from everything else: assume that your network has already been compromised, and build accordingly.

This does not mean paranoia. It means architecture. If you assume that any single node in your network could be compromised – observed, turned, or infiltrated – then you design the network so that the compromise of any single node does not expose the rest.

In practice, this means compartmentalization. Each node knows only what it needs to know. The person who carries a message does not know the full contents. The person who hosts a meeting does not know the identity of every participant. The person who maintains a communication channel does not have access to the others.

This is operationally demanding. It requires discipline, planning, and the willingness to accept inconvenience in exchange for security. It also requires trust – because compartmentalization means that every member of the network is trusting the others to maintain the boundaries, even when curiosity or convenience would make it easier to break them.

Application

These rules were developed under conditions of extreme hostility. Most people reading this will never face those conditions. But the principles apply at every level of network resilience.

The community organization that stores all its membership data with a single cloud provider is vulnerable to a single subpoena. The journalism collective that communicates exclusively through one platform is vulnerable to a single shutdown. The activist network that depends on one charismatic leader is vulnerable to a single arrest.

Build for the failure. The failure that you prevent through design is the one that never becomes a crisis.

The Cost

I will not pretend these rules are free. They cost time, convenience, and the comfortable assumption that your environment is safe.

They also cost relationships. Compartmentalization means that people who work together closely cannot share everything. Trust-building takes time that urgency makes feel unavailable. Redundancy means maintaining resources that appear, until the day they are needed, to be wasteful.

These costs are real. But they are less than the cost of a network that fails when it is needed most.

Build the network. Build it to survive. Build it before you need it, because by the time you need it, the time for building has passed.