fieldwitness/docs/planning/gtm-feasibility.md
Aaron D. Lee 490f9d4a1d Rebrand SooSeF to FieldWitness
Complete project rebrand for better positioning in the press freedom
and digital security space. FieldWitness communicates both field
deployment and evidence testimony — appropriate for the target audience
of journalists, NGOs, and human rights organizations.

Rename mapping:
- soosef → fieldwitness (package, CLI, all imports)
- soosef.stegasoo → fieldwitness.stego
- soosef.verisoo → fieldwitness.attest
- ~/.soosef/ → ~/.fwmetadata/ (innocuous data dir name)
- SOOSEF_DATA_DIR → FIELDWITNESS_DATA_DIR
- SoosefConfig → FieldWitnessConfig
- SoosefError → FieldWitnessError

Also includes:
- License switch from MIT to GPL-3.0
- C2PA bridge module (Phase 0-2 MVP): cert.py, export.py, vendor_assertions.py
- README repositioned to lead with provenance/federation, stego backgrounded
- Threat model skeleton at docs/security/threat-model.md
- Planning docs: docs/planning/c2pa-integration.md, docs/planning/gtm-feasibility.md

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-04-02 15:05:13 -04:00

7.9 KiB

Go-to-Market Feasibility Plan

Audience: Internal planning (solo developer) Status: Active planning document Last updated: 2026-04-01

Overview

Phased plan for building credibility and visibility for FieldWitness in the press freedom and digital security space. Constraints: solo developer, ~10-15 hrs/week, portfolio/learning project that should also produce real-world value.


Current Strengths

  • Federation layer is genuinely novel: gossip-based attestation sync across orgs with offline-first design and append-only hash chains
  • Three-tier deployment model maps to how press freedom orgs actually work
  • C2PA export is well-timed as CAI gains momentum
  • Working codebase with tests, deployment configs, documentation

Core Challenges

  • Trust deficit: "Some guy built a tool" is a warning sign in this space, not a selling point
  • Chicken-and-egg: Need audit for credibility, need credibility/money for audit, need adoption for money
  • Limited bandwidth: 10-15 hrs/week makes sequencing critical
  • Stego perception risk: Steganography angle can be a credibility liability if positioned as headline feature (perceived as "hacker toy")

Phase 1: Foundation (Months 1-6)

Goal: Make the project legible to the ecosystem.

Technical credibility (60% of time)

  • Ship C2PA export as v0.3.0 headline feature (target: 8 weeks)
  • Write formal threat model document at docs/security/threat-model.md
    • Model after Signal protocol docs or Tor design doc
  • De-emphasize steganography in public surfaces -- lead with "offline-first provenance attestation with gossip federation"
  • Set up reproducible builds with pinned dependencies
  • Get CI/CD visibly working with test/lint/type-check/coverage badges

Positioning and documentation (20% of time)

  • Write "Why FieldWitness Exists" document (~1500 words): the problem, why existing tools don't solve it, what FieldWitness does differently, who it's for, what it needs
  • Create 2-minute demo video: field attestation -> sneakernet sync -> federation -> verification

Community engagement (20% of time)

  • Lurk on liberationtech@lists.stanford.edu -- do NOT announce tool cold; wait for relevant threads
  • GitHub engagement with adjacent projects (real contributions, not performative):
    • guardian/proofmode-android
    • contentauth/c2pa-python
    • freedomofpress/securedrop
  • Post Show HN when C2PA export ships

Phase 2: Credibility Escalation (Months 7-12)

Goal: Get external validation from at least one recognized entity.

OTF (Open Technology Fund) -- https://www.opentech.fund/

Internet Freedom Fund: $50K-$900K over 12-36 months. Solo developers eligible. Rolling applications.

Red Team Lab: FREE security audits commissioned through partner firms (Cure53, Trail of Bits, Radically Open Security). This is the single highest-leverage action.

Usability Lab: Free UX review.

Application timeline: 2-4 months from submission to decision.

Strategy: Apply to Red Team Lab for audit FIRST (lower commitment for OTF, validates you as "OTF-vetted").

Compelling application elements

  1. Lead with problem: "Provenance attestation tools assume persistent internet. For journalists in [specific scenario], this fails."
  2. Lead with differentiator: "Gossip federation for cross-org attestation sync, offline-first, bridges to C2PA."
  3. Be honest about status: "Working prototype at v0.3.0, needs audit and field testing."
  4. Budget: stipend, audit (if Red Team Lab unavailable), 1-2 conferences, federation relay hosting.

Backup audit and funding paths

Organization URL Notes
OSTIF https://ostif.org/ Funds audits for open-source projects; may be too early-stage
Radically Open Security https://www.radicallyopensecurity.com/ Nonprofit, reduced rates for internet freedom projects; focused audit ~$15-30K
NLnet Foundation https://nlnet.nl/ EUR 5-50K grants, lightweight process, solo devs welcome, includes audit funding
Filecoin Foundation for Decentralized Web https://fil.org/grants Relevant to federation/provenance angle

Community building

  • Submit talk to IFF 2027 (Internet Freedom Festival, Valencia, ~March)
    • Open sessions and tool showcases have low barriers
    • Talk title: "Federated Evidence Chains: Offline Provenance for Journalists in Hostile Environments"
  • Cold outreach to 3-5 specific people:
    • Access Now Digital Security Helpline trainers
    • Harlo Holmes (FPF Director of Digital Security)
    • Guardian Project developers (ProofMode team)
    • Position as complementary, not competitive
    • Lead with "I want honest feedback"
  • Conferences:

Phase 3: Traction or Pivot (Months 13-24)

Green lights (keep going)

  • OTF Red Team Lab acceptance or any grant funding
  • A digital security trainer says "I could see using this"
  • A journalist or NGO runs it in any scenario
  • Another developer contributes a meaningful PR
  • Conference talk accepted

Red lights (pivot positioning)

  • Zero response from outreach after 6+ months
  • Funders say problem is already solved
  • Security reviewers find fundamental design flaws

If green (months 13-24)

  • Execute audit, publish results publicly (radical transparency)
  • Build pilot deployment guide
  • Apply for Internet Freedom Fund
  • Present at RightsCon 2027/2028

If red (months 13-24)

  • Reposition as reference implementation / research project
  • Write federation protocol as academic paper
  • Lean into portfolio angle

Professional Portfolio Positioning

Framing

"I designed and implemented a gossip-based federation protocol for offline-first provenance attestation, targeting field deployment in resource-constrained environments. The system uses Ed25519 signing, Merkle trees with consistency proofs, append-only hash chains with CBOR serialization, and bridges to the C2PA industry standard."

Skills demonstrated

  • Cryptographic protocol design
  • Distributed systems (gossip, consistency proofs)
  • Security engineering (threat modeling, audit prep, key management)
  • Systems architecture (three-tier, offline-first)
  • Domain expertise (press freedom, evidence integrity)
  • Grant writing (if pursued)

Target roles

  • Security engineer (FPF, EFF, Access Now, Signal, Cloudflare)
  • Protocol engineer (decentralized systems)
  • Developer advocate (security companies)
  • Infrastructure engineer

Key portfolio artifacts

  • Threat model document (shows security thinking)
  • Audit report, even with findings (shows maturity)
  • C2PA bridge (shows standards interop, not just NIH)

Timeline (10-15 hrs/week)

Month Focus Deliverable Time split
1-2 C2PA export + threat model v0.3.0, threat-model.md 12 code, 3 docs
3-4 Demo video + "Why FieldWitness" + CI Video, doc, badges 8 code, 4 docs, 3 outreach
5-6 OTF Red Team Lab app + community Application submitted, Show HN 5 code, 5 grants, 5 outreach
7-9 Community + backup grants Outreach emails, NLnet/FFDW apps 8 code, 3 grants, 4 outreach
10-12 IFF submission + traction check Talk submitted, go/no-go decision 8 code, 2 grants, 5 outreach
13-18 (If green) Audit + pilot guide Published audit, pilot doc 10 code, 5 docs
19-24 (If green) Conference + IFF app Talk, major grant application 5 code, 5 grant, 5 outreach

What NOT to Bother With

  • Paid marketing, ads, PR
  • Product Hunt, startup directories, "launch" campaigns
  • Project website beyond clean README
  • Corporate partnerships
  • Whitepapers before audit
  • Mobile apps
  • Discord/Slack community (dead community is worse than none)
  • Press coverage (too early)
  • Competing with SecureDrop on source protection
  • General tech conference talks (domain-specific venues only)