diff --git a/DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION_FULL.md b/DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION_FULL.md
index 3d06de0..a23bd17 100644
--- a/DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION_FULL.md
+++ b/DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION_FULL.md
@@ -41,18 +41,18 @@ This dossier documents the **InfraFabric microlab**: a functioning single-shard
| Core claim | Proof (artifacts) | Limitation (scope / boundary) |
|---|---|---|
-| **A) Traceability is safety.** High‑stakes agents cannot be trusted without a verifiable history of what happened (request → retrieval → decision → output). | **IF.TTT + evidence bundle + verifier**
- Paper: [IF.emotion trace protocol (v3.3, styled)](https://infrafabric.io/static/hosted/IF_EMOTION_DEBUGGING_TRACE_WHITEPAPER_v3.3_STYLED.md)
- Verifier: `https://infrafabric.io/static/hosted/iftrace.py`
- Reference bundle: `emo_trace_payload_016cca78-6f9d-4ffe-aec0-99792d383ca1.tar.gz` | **Microlab / single shard.** Proven in a single-host environment. Completeness is bounded by explicit witness boundaries; PQ is anchored at registry time (not necessarily on every hot-path artifact). No public append‑only transparency log yet. |
-| **B) Governance requires plurality.** A single model acting as “the judge” is brittle; adversarial viewpoints and escalation are required. | **IF.BIAS → IF.GUARD**
- IF.BIAS: risk preflight sizes councils and escalates
- IF.GUARD: councils preserve dissent and veto paths
- IF.5W: structured inquiry briefs for councils | **Cost / latency tradeoffs.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths use smaller councils or fast-track gates. |
-| **C) Context is the best firewall.** Static filters fail; security must distinguish “reference” vs “leak” and “discussion” vs “exfiltration”. | **IF.ARMOUR + IF.YOLOGUARD**
- IF.ARMOUR: epistemic coherence checks (detective layer)
- IF.YOLOGUARD: secret/relationship screening primitives | **Domain specificity.** Calibrated for concrete security surfaces (secrets/PII/prompt injection); generalizing to broader “harmful intent” is an open research vector. |
+| **A) Traceability is safety.** High‑stakes agents cannot be trusted without a verifiable history of what happened (request → retrieval → decision → output). | **IF.TTT + evidence bundle + verifier**
- Paper: [IF.emotion trace protocol (v3.3, styled)](https://infrafabric.io/static/hosted/IF_EMOTION_DEBUGGING_TRACE_WHITEPAPER_v3.3_STYLED.md)
- Verifier: [iftrace.py](https://infrafabric.io/static/hosted/iftrace.py)
- Reference bundle: [emo_trace_payload_016cca78…tar.gz](https://infrafabric.io/static/hosted/emo_trace_payload_016cca78-6f9d-4ffe-aec0-99792d383ca1.tar.gz) | **Microlab / single shard.** Proven in a single-host environment. Completeness is bounded by explicit witness boundaries; PQ is anchored at registry time (not necessarily on every hot-path artifact). No public append‑only transparency log yet. |
+| **B) Governance requires plurality.** A single model acting as “the judge” is brittle; adversarial viewpoints and escalation are required. | **IF.GOV.TRIAGE → IF.GOV.PANEL** *(legacy: IF.BIAS → IF.GUARD)*
- TRIAGE: risk preflight sizes panels and escalates
- PANEL: preserves dissent + veto paths
- QUESTIONS *(legacy: IF.5W)*: structured inquiry briefs for panels | **Cost / latency tradeoffs.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths use smaller panels or fast-track gates. |
+| **C) Context is the best firewall.** Static filters fail; security must distinguish “reference” vs “leak” and “discussion” vs “exfiltration”. | **IF.SECURITY.CHECK + IF.SECURITY.DETECT** *(legacy: IF.ARMOUR + IF.YOLOGUARD)*
- CHECK: epistemic coherence checks (detective layer)
- DETECT: secret/relationship screening primitives | **Domain specificity.** Calibrated for concrete security surfaces (secrets/PII/prompt injection); generalizing to broader “harmful intent” is an open research vector. |
### Rosetta Stone (Closest Analog, not “equals”)
| InfraFabric term | Closest industry analog | Boundary (where it differs) |
|---|---|---|
| **IF.TTT** (Traceable/Transparent/Trustworthy) | Supply-chain integrity patterns (SLSA/SBOM + CT-like audit thinking) | IF.TTT applies the discipline to **semantic decisions and retrieval lineage**, not just binaries. It produces portable evidence bundles + verifier steps for third-party audit. |
-| **IF.GUARD** (Council governance) | Human-in-the-loop oversight / review boards | IF.GUARD is an *algorithmic* oversight layer with explicit escalation and traceability; humans can be added, but the default artifact is machine-verifiable provenance. |
-| **IF.ARMOUR** (Assurance) | Epistemic security / anomaly detection | Armour is framed as coherence/consistency defenses (detective layer), not regex-only filtering; it does not claim to “solve truth”. |
-| **IF.swarm.s2 / IF.PACKET / IF.BUS** (Transport) | Event-driven architecture / message bus + schema enforcement | The transport layer is where contracts live: schema compliance, trace IDs, signatures, and privilege boundaries are enforced as protocol rules. |
+| **IF.GOV.PANEL** (legacy: IF.GUARD) | Human-in-the-loop oversight / review boards | IF.GOV.PANEL is an *algorithmic* oversight layer with explicit escalation and traceability; humans can be added, but the default artifact is machine-verifiable provenance. |
+| **IF.SECURITY.CHECK** (legacy: IF.ARMOUR) | Epistemic security / anomaly detection | CHECK is framed as coherence/consistency defenses (detective layer), not regex-only filtering; it does not claim to “solve truth”. |
+| **IF.TRANSIT.SWARM / IF.TRANSIT.MESSAGE / IF.TRANSIT.HUB** (legacy: swarm.s2 / IF.PACKET / IF.BUS) | Event-driven architecture / message bus + schema enforcement | The transport layer is where contracts live: schema compliance, trace IDs, signatures, and privilege boundaries are enforced as protocol rules. |
### Navigation Guide (Clean vs Origin context)
@@ -60,11 +60,45 @@ This dossier documents the **InfraFabric microlab**: a functioning single-shard
- If you want the origin context (microlab lab notes / narrative artifacts): start at the **Cold Open** and IF.STORY sections (they explain why the architecture exists).
- Optional culture stress-test (explicit satire; not a protocol): [Annex (Non-Technical): The Dave Factor Shadow Dossier](#annex-dave-factor-shadow-dossier)
+
+
+## 01. Naming + Separation of Duties (canonical refactor)
+
+InfraFabric’s early papers used internal names (e.g., `IF.GUARD`, `IF.BIAS`, `IF.ARMOUR`, `IF.BUS`). To reduce lexicon friction for reviewers and to standardize cross‑app integration, this dossier is refactoring to a separation‑of‑duties namespace inspired by **US/CA/EU** governance patterns:
+
+- `IF.GOV.*` — governance (triage + panels + witness)
+- `IF.SECURITY.*` — security (detective checks + secret screening)
+- `IF.TRANSIT.*` — transport/actuation (routing + message envelopes)
+- `IF.AUDIT.*` — audit artifacts (trail + proof bundles)
+
+Canonical references in this repo:
+
+- Naming contract: `IF_NAMING_BIBLE_v1.0.md`
+- Machine registry: `IF_NAMING_REGISTRY.yaml`
+- Governance charters (who does what): `gov/`
+
+### Legacy → canonical mapping (v1)
+
+| Legacy name | Canonical name |
+|---|---|
+| `IF.BIAS` | `IF.GOV.TRIAGE` |
+| `IF.GUARD` | `IF.GOV.PANEL` |
+| `IF.5W` | `IF.GOV.QUESTIONS` |
+| `IF.WITNESS` | `IF.GOV.WITNESS` |
+| `IF.ARMOUR` | `IF.SECURITY.CHECK` |
+| `IF.YOLOGUARD` | `IF.SECURITY.DETECT` |
+| `IF.BUS` | `IF.TRANSIT.HUB` |
+| `IF.PACKET` | `IF.TRANSIT.MESSAGE` |
+| `swarm.s2` | `IF.TRANSIT.SWARM` |
+
+Transition policy: many embedded papers still use legacy names; where so, the dossier now prefers first-mention annotations like `IF.GOV.PANEL (legacy: IF.GUARD)`.
+
+
## Opening Whitepaper — InfraFabric Synthesis (for Anthropic)
> *If we cannot prove the chain-of-custody, we cannot ship.*
-InfraFabric is a coordination-first AI governance stack that treats citations as infrastructure. IF.TTT sits at the root, enforcing traceable/transparent/trustworthy behavior across governance (IF.BIAS + IF.GUARD + IF.5W), transport (IF.PACKET + swarm.s2 + IF.STORY), assurance (armour, witness, yologuard), and the exemplar product (IF.emotion).
+InfraFabric is a coordination-first AI governance stack that treats citations as infrastructure. IF.TTT sits at the root, enforcing traceable/transparent/trustworthy behavior across governance (IF.GOV.TRIAGE + IF.GOV.PANEL + IF.GOV.QUESTIONS), transit (IF.TRANSIT.MESSAGE + IF.TRANSIT.SWARM + IF.STORY), security (IF.SECURITY.CHECK + IF.GOV.WITNESS + IF.SECURITY.DETECT), and the exemplar product (IF.emotion).
### IF.BUS ↔ IF.ARMOUR Threat Coverage Matrix (Normative)
@@ -102,31 +136,34 @@ Why this stub exists: external reviewers/LLMs sometimes skip an entire pillar if
### Reader Path (Start Here)
-- **If you only read 8 things:** [The Fuck Moment](#ifstory-origin-story-02-the-fuck-moment) → [Page Zero](#ifstory-origin-story-04-page-zero) → [Master White Paper](#infrafabric-the-master-white-paper) → [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) → [IF.BUS](#ifbus--the-universal-kinetic-transport-protocol) → [IF.ARMOUR](#ifarmour--epistemic-counter-intelligence-protocol) → [IF.BIAS](#ifbias-bias-risk-pre-council-decision-matrix) → [IF.GUARD](#ifguard-strategic-communications-council-for-ai-message-validation)
+- **If you only read 8 things:** [The Fuck Moment](#ifstory-origin-story-02-the-fuck-moment) → [Page Zero](#ifstory-origin-story-04-page-zero) → [Master White Paper](#infrafabric-the-master-white-paper) → [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) → [IF.BUS](#ifbus--the-universal-kinetic-transport-protocol) → [IF.ARMOUR](#ifarmour--epistemic-counter-intelligence-protocol) → [IF.GOV.TRIAGE (legacy: IF.BIAS)](#ifbias-bias-risk-pre-council-decision-matrix) → [IF.GOV.PANEL (legacy: IF.GUARD)](#ifguard-strategic-communications-council-for-ai-message-validation)
- **Latency framing:** Use `t_total = t_model + t_transport + t_governance`; only `t_transport` is benchmarked in microlab terms, and never presented as “council deliberation time.”
- **Consensus framing:** “Unanimous” means “the council converged,” not “the claim is true”; treat any 100% consensus output as a governance artifact until raw evidence bundles are attached.
- **Validation framing:** External validation is reported as an observational microlab pilot, not proof, and not a consciousness claim.
### Glossary (Quick Decode)
- **IF.TTT:** Traceable/Transparent/Trustworthy compliance spine; enforces evidence, identity, and audit lineage.
-- **IF.BIAS:** Pre-council bias/risk triage matrix; recommends escalation and council sizing.
-- **IF.GUARD:** Council protocol; minimum 5-seat panel (Core 4 + contrarian), expands up to 30 seats when justified.
-- **Contrarian Guardian:** Required dissent seat; can trigger cooling-off/veto at >95% approval.
-- **IF.5W:** Structured inquiry format used to generate briefs for councils.
-- **IF.PACKET:** Schema-first message transport with trace IDs and audit metadata.
-- **IF.SWARM.s2:** Intra-swarm agent communications over a Redis bus; swarm coordination at speed.
-- **IF.STORY:** Vector‑narrative logging (vs “status bitmap” logs) for lossless institutional memory and replayable decisions.
-- **Page Zero:** The manifesto/origin narrative that explains “why” (and demonstrates IF.STORY + IF.TTT in practice).
-- **IF.emotion / AI-e:** Product exemplar framing emotional intelligence as infrastructure (“Artificially Intelligent Emotion”).
-- **IF.PHIL:** Annexed position paper applying InfraFabric primitives to auditable philanthropic access (grant objects).
-- **IF.BUS:** Universal Kinetic Transport Protocol; deterministic actuation layer.
-- **IF.ARMOUR:** Epistemic security immune system; physics-grounded detective layer.
-Naming note: `IF.bus` / `IF.armour` (lowercase) appear elsewhere as earlier papers/modules; `IF.BUS` / `IF.ARMOUR` are the canonical lower-layer protocol specifications introduced on 20251218.
+- **IF.AUDIT.TRAIL:** Concrete audit artifact layer (portable chain-of-custody logs + signatures). *(In practice: implemented under IF.TTT today.)*
+- **IF.GOV.TRIAGE** *(legacy: IF.BIAS)*: preflight risk triage; recommends escalation and panel sizing.
+- **IF.GOV.PANEL** *(legacy: IF.GUARD)*: governance panel; minimum 5-seat review including contrarian; can expand as **IF.GOV.PANEL.EXTENDED**.
+- **Contrarian Guardian:** required dissent seat; can trigger cooling-off/veto at >95% approval.
+- **IF.GOV.QUESTIONS** *(legacy: IF.5W)*: structured inquiry format used to generate briefs for panels.
+- **IF.TRANSIT.MESSAGE** *(legacy: IF.PACKET)*: schema-first message envelope with trace IDs and audit metadata.
+- **IF.TRANSIT.SWARM** *(legacy: swarm.s2 / IF.SWARM.s2)*: intra-swarm agent communications over a Redis bus.
+- **IF.STORY:** narrative logging (vs “status bitmap” logs) for lossless institutional memory and replayable decisions.
+- **Page Zero:** the origin manifesto that explains “why” (and demonstrates IF.STORY + IF.TTT in practice).
+- **IF.emotion / AI-e:** product exemplar framing emotional intelligence as infrastructure (“Artificially Intelligent Emotion”).
+- **IF.PHIL:** annexed position paper applying InfraFabric primitives to auditable philanthropic access (grant objects).
+- **IF.TRANSIT.HUB** *(legacy: IF.BUS)*: deterministic actuation/privilege enforcement transport substrate.
+- **IF.SECURITY.CHECK** *(legacy: IF.ARMOUR)*: epistemic security detective layer (coherence/anomaly checks).
+- **IF.SECURITY.DETECT** *(legacy: IF.YOLOGUARD)*: secret/relationship screening primitives.
+
+Naming note: legacy lowercase (`if.bus`, `if.armour`) appears in older papers; `IF.TRANSIT.HUB` / `IF.SECURITY.CHECK` are the canonical refactor targets introduced in this dossier.
### Selected Governance Extensions (Optional Depth)
-IF.PHIL is a scoped extension that applies InfraFabric primitives to philanthropic access to frontier compute. Instead of discretionary credits, access is represented as a typed **Grant** object: a signed IF.PACKET payload defining scope, duration, constraints, and a revocation/appeal path—authorized by IF.GUARD and logged via IF.TTT.
+IF.PHIL is a scoped extension that applies InfraFabric primitives to philanthropic access to frontier compute. Instead of discretionary credits, access is represented as a typed **Grant** object: a signed IF.TRANSIT.MESSAGE (legacy: IF.PACKET) payload defining scope, duration, constraints, and a revocation/appeal path—authorized by IF.GOV.PANEL (legacy: IF.GUARD) and logged via IF.TTT.
IF.PHIL demonstrates how InfraFabric primitives extend to auditable philanthropic access, replacing discretionary “credits” with governed grant objects.
@@ -146,11 +183,11 @@ Full paper: [Annex — IF.PHIL | Auditable Philanthropy](#annex-ifphil-auditable
```mermaid
flowchart TD
VISION["IF.vision
coordination without control"] --> FOUNDATIONS["IF.foundations
ground/search/persona"]
- FOUNDATIONS --> ASSURE["Assurance
IF.ARMOUR • witness • yologuard"]
- ASSURE --> TRANSPORT["Transport
IF.BUS • packet • swarm.s2 • story"]
- TRANSPORT --> BIAS["Preflight
IF.BIAS | Bias & Risk Matrix"]
- BIAS --> CORE4["Core 4 triage
IF.GUARD(4)"]
- CORE4 --> GOVERN["Governance
IF.GUARD council (5–30) + 5W"]
+ FOUNDATIONS --> ASSURE["Security
IF.SECURITY.CHECK • IF.GOV.WITNESS • IF.SECURITY.DETECT"]
+ ASSURE --> TRANSPORT["Transit
IF.TRANSIT.HUB • MESSAGE • SWARM • IF.STORY"]
+ TRANSPORT --> BIAS["Preflight
IF.GOV.TRIAGE (legacy: IF.BIAS)"]
+ BIAS --> CORE4["Core 4 convening
legacy: IF.GUARD(4)"]
+ CORE4 --> GOVERN["Governance
IF.GOV.PANEL (5–30) + IF.GOV.QUESTIONS"]
GOVERN --> COMPLIANCE["Compliance
IF.TTT | Distributed Ledger + ledgerflow"]
COMPLIANCE --> PRODUCT["Productization
IF.emotion"]
PRODUCT --> FEEDBACK["Feedback into Vision/Foundations"]
@@ -159,26 +196,25 @@ flowchart TD
### Governance, Assurance, Compliance Loop
```mermaid
-flowchart TD
- INQUIRY["IF.5W | Structured Inquiry
structured deliberation"] --> BIAS["IF.BIAS | Bias & Risk Preflight
sizes councils (5–30)"]
- BIAS --> CORE4["IF.GUARD(4) | Core 4 triage
convening authority"]
- CORE4 --> GUARD["IF.GUARD | Council deliberation
panel 5 ↔ extended 30"]
- GUARD --> STORY["IF.STORY | Narrative Logging
narrative + state"]
- STORY --> TTT["IF.TTT | Distributed Ledger
traceable/transparent/trustworthy"]
- TTT --> WITNESS["IF.witness
meta-validation"]
- WITNESS --> ARMOUR["IF.armour
FP reduction"]
- ARMOUR --> YG["IF.YOLOGUARD | Credential & Secret Screening
secret/relationship checks"]
- YG --> PACKET["IF.PACKET | Message Transport + swarm.s2
delivery with VocalDNA"]
- PACKET --> EMOTION["IF.emotion
product exemplar"]
- EMOTION --> FEEDBACK["Feedback into inquiry"]
- FEEDBACK --> INQUIRY
+flowchart TB
+ Q["IF.GOV.QUESTIONS\n(legacy: IF.5W)"] --> T["IF.GOV.TRIAGE\n(legacy: IF.BIAS)"]
+ T --> C4["Core 4 convening\n(legacy: IF.GUARD(4))"]
+ C4 --> P["IF.GOV.PANEL\n(5 ↔ EXTENDED ~30)"]
+ P --> S["IF.STORY\nnarrative logging"]
+ S --> A["IF.TTT / IF.AUDIT.TRAIL\ntrace discipline"]
+ A --> W["IF.GOV.WITNESS\nverification"]
+ W --> CHK["IF.SECURITY.CHECK\n(legacy: IF.ARMOUR)"]
+ CHK --> DET["IF.SECURITY.DETECT\n(legacy: IF.YOLOGUARD)"]
+ DET --> MSG["IF.TRANSIT.MESSAGE + SWARM\n(legacy: IF.PACKET + swarm.s2)"]
+ MSG --> EMO["IF.emotion\nexemplar"]
+ EMO --> Q
```
### Delivery & Safety Highlights (with citations)
-- Guarded empathy: IF.emotion couples IF.ground/search/persona with IF.GUARD review to avoid platitudes/liability responses while staying policy-safe (sources: `docs/papers/IF_EMOTION_WHITEPAPER_v1.7.md`, `if.emotion/whitepaper/sections/05_technical_architecture.md`).
-- Compliance-first shipping: IF.TTT + ledgerflow enforce traceability on repos and outputs; IF.STORY logs deliberations; witness/armour/yologuard gate releases (sources: `IF_TTT_*`, `docs/WHITE_PAPER_IF_STORY_NARRATIVE_LOGGING.md`, `docs/archive/misc/IF-witness.md`, `docs/archive/misc/IF-armour.md`, `docs/papers/IF_YOLOGUARD_SECURITY_FRAMEWORK.md`).
-- Transport fidelity: IF.PACKET carries voice DNA; swarm.s2 provides Redis bus comms for production swarms (sources: `docs/papers/IF_PACKET_TRANSPORT_FRAMEWORK.md`, `papers/IF-SWARM-S2-COMMS.md`).
+- Guarded empathy: IF.emotion couples IF.ground/search/persona with IF.GOV.PANEL (legacy: IF.GUARD) review to avoid platitudes/liability responses while staying policy-safe (sources: `docs/papers/IF_EMOTION_WHITEPAPER_v1.7.md`, `if.emotion/whitepaper/sections/05_technical_architecture.md`).
+- Compliance-first shipping: IF.TTT + ledgerflow enforce traceability on repos and outputs; IF.STORY logs deliberations; IF.GOV.WITNESS / IF.SECURITY.CHECK / IF.SECURITY.DETECT gate releases (sources: `IF_TTT_*`, `docs/WHITE_PAPER_IF_STORY_NARRATIVE_LOGGING.md`, `docs/archive/misc/IF-witness.md`, `docs/archive/misc/IF-armour.md`, `docs/papers/IF_YOLOGUARD_SECURITY_FRAMEWORK.md`).
+- Transport fidelity: IF.TRANSIT.MESSAGE (legacy: IF.PACKET) carries voice DNA; IF.TRANSIT.SWARM (legacy: swarm.s2) provides Redis bus comms for production swarms (sources: `docs/papers/IF_PACKET_TRANSPORT_FRAMEWORK.md`, `papers/IF-SWARM-S2-COMMS.md`).
- Security/legal: Prompt-injection defenses cover SOTA attack classes; legal DB build operationalizes doc governance; API roadmap + history-file tests reduce integration regressions (sources: `docs/research/PROMPT_INJECTION_DEFENSES.md`, `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md`, `docs/api/API_ROADMAP.md`, `HISTORY_FILE_TEST_REPORT.md`).
- Domain credibility: Medical (GLP1 retrofit), emosocial principles, and informal sector resilience (Juakali) field report show adaptability of the same guard/compliance/transport spine (sources: `Brownfield_GLP1_Retrofit_LE_DILEMME_DU_TUYAU_SALE.md`, `DEJA_DE_BUSCARTE_11_principios_emosociales.md`, `JUAKALI_RAPPORT_V2_LOS_20251205_0236 (sent).md`).
@@ -320,6 +356,7 @@ InfraFabric is the operating system that turns AI from a chatbot into a reliable
- [Data‑Driven Technical Report (Microlab)](DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION.md)
- [00. The Bridge: Submission Pack (Reviewer Orientation)](#bridge-submission-pack)
+- [01. Naming + Separation of Duties (canonical refactor)](#naming-and-separation-of-duties) — see `IF_NAMING_BIBLE_v1.0.md`, `IF_NAMING_REGISTRY.yaml`, `gov/`
### External audit artifacts (public, reviewer-friendly)
@@ -389,7 +426,7 @@ Optional “audit culture” annexes (satire; Dave is a pattern, not a person):
- [ANNEX: IF.PHIL | Auditable Philanthropy: Access, Subsidy, and Governance Without Vibes](#annex-ifphil-auditable-philanthropy-access-subsidy-and-governance-without-vibes) — `if://doc/IF_PHIL_AUDITABLE_ACCESS/v1.0` — Author: Danny Stocker; Status: RELEASE / v1.0
- [History File Error Handling Test Report](#history-file-error-handling-test-report) — `if.api/llm/openwebui/docs/internals/HISTORY_FILE_TEST_REPORT.md`
- [CLOUD SESSION: Legal Document Database Build](#cloud-session-legal-document-database-build) — `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md`
-- [ANNEX (Non-Technical, Satire): The Dave Factor — Shadow Dossier (Culture Stress-Test)](#annex-dave-factor-shadow-dossier) — Full satire (optional): https://infrafabric.io/static/hosted/IF_DAVE_SHADOW_DOSSIER_FULL_SATIRE.md
+- [ANNEX (Non-Technical, Satire): The Dave Factor — Shadow Dossier (Culture Stress-Test)](#annex-dave-factor-shadow-dossier)
---
diff --git a/DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION_FULL.md.sha256 b/DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION_FULL.md.sha256
index 0ff6c8b..50309bf 100644
--- a/DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION_FULL.md.sha256
+++ b/DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION_FULL.md.sha256
@@ -1 +1 @@
-f93b599622506c2077242c21006300a6f4ca46773033216ebec3ba6f3f41df38 DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION_FULL.md
+7b3f05446674223c0bfdd35093c44c39ac87c6c5144994706701ad543d0598a5 DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION_FULL.md
diff --git a/DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION.md b/DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION.md
index c49619f..7d81eb8 100644
--- a/DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION.md
+++ b/DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION.md
@@ -21,6 +21,17 @@
---
+## 0.5) Naming (Refactor in progress)
+
+This submission uses a refactor namespace to reduce lexicon friction:
+
+- `IF.GOV.*` (governance), `IF.SECURITY.*` (security), `IF.TRANSIT.*` (transport), `IF.AUDIT.*` (audit artifacts)
+- Legacy names may appear in embedded papers; first-mention annotations use the form `IF.GOV.PANEL (legacy: IF.GUARD)`
+
+Canonical docs: `IF_NAMING_BIBLE_v1.0.md`, `IF_NAMING_REGISTRY.yaml`, and `gov/` (in the source repo).
+
+---
+
## 1) Technical Disclosure (AI-Native Implementation)
This project follows an Operator-as-Architect workflow: I define constraints, interfaces, and verification hooks; LLMs generate implementation code under supervision. The system is therefore evaluated as:
@@ -42,8 +53,8 @@ This project follows an Operator-as-Architect workflow: I define constraints, in
| Core claim | Proof (artifact) | Boundary / limitation |
|---|---|---|
| **A) Traceability is a safety primitive.** High‑stakes agent actions require verifiable provenance. | IF.emotion trace protocol + evidence bundle + verifier (see §5). | **Microlab / single shard.** Guarantees begin at the backend witness boundary; edge completeness is future work. |
-| **B) Governance needs structured dissent.** One-model “judge” patterns are brittle. | IF.BIAS (risk preflight) + IF.GUARD (council with required dissent seat) traced via IF.TTT. | **Cost/latency.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths stay fast. |
-| **C) Context is a security control.** Static filters fail; provenance + coherence checks reduce unsafe drift. | IF.ARMOUR (coherence/detective layer) + IF.YOLOGUARD (secret/relationship screening) integrated into the pipeline. | **Domain calibration.** Strongest for concrete surfaces (secrets/PII/prompt injection); general harmful-intent is open research. |
+| **B) Governance needs structured dissent.** One-model “judge” patterns are brittle. | IF.GOV.TRIAGE *(legacy: IF.BIAS)* + IF.GOV.PANEL *(legacy: IF.GUARD)* traced via IF.TTT / IF.AUDIT.TRAIL. | **Cost/latency.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths stay fast. |
+| **C) Context is a security control.** Static filters fail; provenance + coherence checks reduce unsafe drift. | IF.SECURITY.CHECK *(legacy: IF.ARMOUR)* + IF.SECURITY.DETECT *(legacy: IF.YOLOGUARD)* integrated into the pipeline. | **Domain calibration.** Strongest for concrete surfaces (secrets/PII/prompt injection); general harmful-intent is open research. |
---
diff --git a/DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION.md.sha256 b/DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION.md.sha256
index b3210fd..d8607f7 100644
--- a/DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION.md.sha256
+++ b/DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION.md.sha256
@@ -1 +1 @@
-d921501a4df47c97229de723011d53553141c34f07077c38c777e6019c4e2b44 DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION.md
+cec902663568d82b7f9a78d3c65886a07199d8979ac238a10d138108d4a602e5 DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION.md
diff --git a/DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION_FULL.md b/DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION_FULL.md
index 4392a5e..bf9b558 100644
--- a/DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION_FULL.md
+++ b/DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION_FULL.md
@@ -41,18 +41,18 @@ This dossier documents the **InfraFabric microlab**: a functioning single-shard
| Core claim | Proof (artifacts) | Limitation (scope / boundary) |
|---|---|---|
-| **A) Traceability is safety.** High‑stakes agents cannot be trusted without a verifiable history of what happened (request → retrieval → decision → output). | **IF.TTT + evidence bundle + verifier**
- Paper: [IF.emotion trace protocol (v3.3, styled)](https://infrafabric.io/static/hosted/IF_EMOTION_DEBUGGING_TRACE_WHITEPAPER_v3.3_STYLED.md)
- Verifier: `https://infrafabric.io/static/hosted/iftrace.py`
- Reference bundle: `emo_trace_payload_016cca78-6f9d-4ffe-aec0-99792d383ca1.tar.gz` | **Microlab / single shard.** Proven in a single-host environment. Completeness is bounded by explicit witness boundaries; PQ is anchored at registry time (not necessarily on every hot-path artifact). No public append‑only transparency log yet. |
-| **B) Governance requires plurality.** A single model acting as “the judge” is brittle; adversarial viewpoints and escalation are required. | **IF.BIAS → IF.GUARD**
- IF.BIAS: risk preflight sizes councils and escalates
- IF.GUARD: councils preserve dissent and veto paths
- IF.5W: structured inquiry briefs for councils | **Cost / latency tradeoffs.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths use smaller councils or fast-track gates. |
-| **C) Context is the best firewall.** Static filters fail; security must distinguish “reference” vs “leak” and “discussion” vs “exfiltration”. | **IF.ARMOUR + IF.YOLOGUARD**
- IF.ARMOUR: epistemic coherence checks (detective layer)
- IF.YOLOGUARD: secret/relationship screening primitives | **Domain specificity.** Calibrated for concrete security surfaces (secrets/PII/prompt injection); generalizing to broader “harmful intent” is an open research vector. |
+| **A) Traceability is safety.** High‑stakes agents cannot be trusted without a verifiable history of what happened (request → retrieval → decision → output). | **IF.TTT + evidence bundle + verifier**
- Paper: [IF.emotion trace protocol (v3.3, styled)](https://infrafabric.io/static/hosted/IF_EMOTION_DEBUGGING_TRACE_WHITEPAPER_v3.3_STYLED.md)
- Verifier: [iftrace.py](https://infrafabric.io/static/hosted/iftrace.py)
- Reference bundle: [emo_trace_payload_016cca78…tar.gz](https://infrafabric.io/static/hosted/emo_trace_payload_016cca78-6f9d-4ffe-aec0-99792d383ca1.tar.gz) | **Microlab / single shard.** Proven in a single-host environment. Completeness is bounded by explicit witness boundaries; PQ is anchored at registry time (not necessarily on every hot-path artifact). No public append‑only transparency log yet. |
+| **B) Governance requires plurality.** A single model acting as “the judge” is brittle; adversarial viewpoints and escalation are required. | **IF.GOV.TRIAGE → IF.GOV.PANEL** *(legacy: IF.BIAS → IF.GUARD)*
- TRIAGE: risk preflight sizes panels and escalates
- PANEL: preserves dissent + veto paths
- QUESTIONS *(legacy: IF.5W)*: structured inquiry briefs for panels | **Cost / latency tradeoffs.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths use smaller panels or fast-track gates. |
+| **C) Context is the best firewall.** Static filters fail; security must distinguish “reference” vs “leak” and “discussion” vs “exfiltration”. | **IF.SECURITY.CHECK + IF.SECURITY.DETECT** *(legacy: IF.ARMOUR + IF.YOLOGUARD)*
- CHECK: epistemic coherence checks (detective layer)
- DETECT: secret/relationship screening primitives | **Domain specificity.** Calibrated for concrete security surfaces (secrets/PII/prompt injection); generalizing to broader “harmful intent” is an open research vector. |
### Rosetta Stone (Closest Analog, not “equals”)
| InfraFabric term | Closest industry analog | Boundary (where it differs) |
|---|---|---|
| **IF.TTT** (Traceable/Transparent/Trustworthy) | Supply-chain integrity patterns (SLSA/SBOM + CT-like audit thinking) | IF.TTT applies the discipline to **semantic decisions and retrieval lineage**, not just binaries. It produces portable evidence bundles + verifier steps for third-party audit. |
-| **IF.GUARD** (Council governance) | Human-in-the-loop oversight / review boards | IF.GUARD is an *algorithmic* oversight layer with explicit escalation and traceability; humans can be added, but the default artifact is machine-verifiable provenance. |
-| **IF.ARMOUR** (Assurance) | Epistemic security / anomaly detection | Armour is framed as coherence/consistency defenses (detective layer), not regex-only filtering; it does not claim to “solve truth”. |
-| **IF.swarm.s2 / IF.PACKET / IF.BUS** (Transport) | Event-driven architecture / message bus + schema enforcement | The transport layer is where contracts live: schema compliance, trace IDs, signatures, and privilege boundaries are enforced as protocol rules. |
+| **IF.GOV.PANEL** (legacy: IF.GUARD) | Human-in-the-loop oversight / review boards | IF.GOV.PANEL is an *algorithmic* oversight layer with explicit escalation and traceability; humans can be added, but the default artifact is machine-verifiable provenance. |
+| **IF.SECURITY.CHECK** (legacy: IF.ARMOUR) | Epistemic security / anomaly detection | CHECK is framed as coherence/consistency defenses (detective layer), not regex-only filtering; it does not claim to “solve truth”. |
+| **IF.TRANSIT.SWARM / IF.TRANSIT.MESSAGE / IF.TRANSIT.HUB** (legacy: swarm.s2 / IF.PACKET / IF.BUS) | Event-driven architecture / message bus + schema enforcement | The transport layer is where contracts live: schema compliance, trace IDs, signatures, and privilege boundaries are enforced as protocol rules. |
### Navigation Guide (Clean vs Origin context)
@@ -60,11 +60,45 @@ This dossier documents the **InfraFabric microlab**: a functioning single-shard
- If you want the origin context (microlab lab notes / narrative artifacts): start at the **Cold Open** and IF.STORY sections (they explain why the architecture exists).
- Optional culture stress-test (explicit satire; not a protocol): [Annex (Non-Technical): The Dave Factor Shadow Dossier](#annex-dave-factor-shadow-dossier)
+
+
+## 01. Naming + Separation of Duties (canonical refactor)
+
+InfraFabric’s early papers used internal names (e.g., `IF.GUARD`, `IF.BIAS`, `IF.ARMOUR`, `IF.BUS`). To reduce lexicon friction for reviewers and to standardize cross‑app integration, this dossier is refactoring to a separation‑of‑duties namespace inspired by **US/CA/EU** governance patterns:
+
+- `IF.GOV.*` — governance (triage + panels + witness)
+- `IF.SECURITY.*` — security (detective checks + secret screening)
+- `IF.TRANSIT.*` — transport/actuation (routing + message envelopes)
+- `IF.AUDIT.*` — audit artifacts (trail + proof bundles)
+
+Canonical references in this repo:
+
+- Naming contract: `IF_NAMING_BIBLE_v1.0.md`
+- Machine registry: `IF_NAMING_REGISTRY.yaml`
+- Governance charters (who does what): `gov/`
+
+### Legacy → canonical mapping (v1)
+
+| Legacy name | Canonical name |
+|---|---|
+| `IF.BIAS` | `IF.GOV.TRIAGE` |
+| `IF.GUARD` | `IF.GOV.PANEL` |
+| `IF.5W` | `IF.GOV.QUESTIONS` |
+| `IF.WITNESS` | `IF.GOV.WITNESS` |
+| `IF.ARMOUR` | `IF.SECURITY.CHECK` |
+| `IF.YOLOGUARD` | `IF.SECURITY.DETECT` |
+| `IF.BUS` | `IF.TRANSIT.HUB` |
+| `IF.PACKET` | `IF.TRANSIT.MESSAGE` |
+| `swarm.s2` | `IF.TRANSIT.SWARM` |
+
+Transition policy: many embedded papers still use legacy names; where so, the dossier now prefers first-mention annotations like `IF.GOV.PANEL (legacy: IF.GUARD)`.
+
+
## Opening Whitepaper — InfraFabric Synthesis (for Anthropic)
> *If we cannot prove the chain-of-custody, we cannot ship.*
-InfraFabric is a coordination-first AI governance stack that treats citations as infrastructure. IF.TTT sits at the root, enforcing traceable/transparent/trustworthy behavior across governance (IF.BIAS + IF.GUARD + IF.5W), transport (IF.PACKET + swarm.s2 + IF.STORY), assurance (armour, witness, yologuard), and the exemplar product (IF.emotion).
+InfraFabric is a coordination-first AI governance stack that treats citations as infrastructure. IF.TTT sits at the root, enforcing traceable/transparent/trustworthy behavior across governance (IF.GOV.TRIAGE + IF.GOV.PANEL + IF.GOV.QUESTIONS), transit (IF.TRANSIT.MESSAGE + IF.TRANSIT.SWARM + IF.STORY), security (IF.SECURITY.CHECK + IF.GOV.WITNESS + IF.SECURITY.DETECT), and the exemplar product (IF.emotion).
### IF.BUS ↔ IF.ARMOUR Threat Coverage Matrix (Normative)
@@ -102,31 +136,34 @@ Why this stub exists: external reviewers/LLMs sometimes skip an entire pillar if
### Reader Path (Start Here)
-- **If you only read 8 things:** [The Fuck Moment](#ifstory-origin-story-02-the-fuck-moment) → [Page Zero](#ifstory-origin-story-04-page-zero) → [Master White Paper](#infrafabric-the-master-white-paper) → [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) → [IF.BUS](#ifbus--the-universal-kinetic-transport-protocol) → [IF.ARMOUR](#ifarmour--epistemic-counter-intelligence-protocol) → [IF.BIAS](#ifbias-bias-risk-pre-council-decision-matrix) → [IF.GUARD](#ifguard-strategic-communications-council-for-ai-message-validation)
+- **If you only read 8 things:** [The Fuck Moment](#ifstory-origin-story-02-the-fuck-moment) → [Page Zero](#ifstory-origin-story-04-page-zero) → [Master White Paper](#infrafabric-the-master-white-paper) → [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) → [IF.BUS](#ifbus--the-universal-kinetic-transport-protocol) → [IF.ARMOUR](#ifarmour--epistemic-counter-intelligence-protocol) → [IF.GOV.TRIAGE (legacy: IF.BIAS)](#ifbias-bias-risk-pre-council-decision-matrix) → [IF.GOV.PANEL (legacy: IF.GUARD)](#ifguard-strategic-communications-council-for-ai-message-validation)
- **Latency framing:** Use `t_total = t_model + t_transport + t_governance`; only `t_transport` is benchmarked in microlab terms, and never presented as “council deliberation time.”
- **Consensus framing:** “Unanimous” means “the council converged,” not “the claim is true”; treat any 100% consensus output as a governance artifact until raw evidence bundles are attached.
- **Validation framing:** External validation is reported as an observational microlab pilot, not proof, and not a consciousness claim.
### Glossary (Quick Decode)
- **IF.TTT:** Traceable/Transparent/Trustworthy compliance spine; enforces evidence, identity, and audit lineage.
-- **IF.BIAS:** Pre-council bias/risk triage matrix; recommends escalation and council sizing.
-- **IF.GUARD:** Council protocol; minimum 5-seat panel (Core 4 + contrarian), expands up to 30 seats when justified.
-- **Contrarian Guardian:** Required dissent seat; can trigger cooling-off/veto at >95% approval.
-- **IF.5W:** Structured inquiry format used to generate briefs for councils.
-- **IF.PACKET:** Schema-first message transport with trace IDs and audit metadata.
-- **IF.SWARM.s2:** Intra-swarm agent communications over a Redis bus; swarm coordination at speed.
-- **IF.STORY:** Vector‑narrative logging (vs “status bitmap” logs) for lossless institutional memory and replayable decisions.
-- **Page Zero:** The manifesto/origin narrative that explains “why” (and demonstrates IF.STORY + IF.TTT in practice).
-- **IF.emotion / AI-e:** Product exemplar framing emotional intelligence as infrastructure (“Artificially Intelligent Emotion”).
-- **IF.PHIL:** Annexed position paper applying InfraFabric primitives to auditable philanthropic access (grant objects).
-- **IF.BUS:** Universal Kinetic Transport Protocol; deterministic actuation layer.
-- **IF.ARMOUR:** Epistemic security immune system; physics-grounded detective layer.
-Naming note: `IF.bus` / `IF.armour` (lowercase) appear elsewhere as earlier papers/modules; `IF.BUS` / `IF.ARMOUR` are the canonical lower-layer protocol specifications introduced on 20251218.
+- **IF.AUDIT.TRAIL:** Concrete audit artifact layer (portable chain-of-custody logs + signatures). *(In practice: implemented under IF.TTT today.)*
+- **IF.GOV.TRIAGE** *(legacy: IF.BIAS)*: preflight risk triage; recommends escalation and panel sizing.
+- **IF.GOV.PANEL** *(legacy: IF.GUARD)*: governance panel; minimum 5-seat review including contrarian; can expand as **IF.GOV.PANEL.EXTENDED**.
+- **Contrarian Guardian:** required dissent seat; can trigger cooling-off/veto at >95% approval.
+- **IF.GOV.QUESTIONS** *(legacy: IF.5W)*: structured inquiry format used to generate briefs for panels.
+- **IF.TRANSIT.MESSAGE** *(legacy: IF.PACKET)*: schema-first message envelope with trace IDs and audit metadata.
+- **IF.TRANSIT.SWARM** *(legacy: swarm.s2 / IF.SWARM.s2)*: intra-swarm agent communications over a Redis bus.
+- **IF.STORY:** narrative logging (vs “status bitmap” logs) for lossless institutional memory and replayable decisions.
+- **Page Zero:** the origin manifesto that explains “why” (and demonstrates IF.STORY + IF.TTT in practice).
+- **IF.emotion / AI-e:** product exemplar framing emotional intelligence as infrastructure (“Artificially Intelligent Emotion”).
+- **IF.PHIL:** annexed position paper applying InfraFabric primitives to auditable philanthropic access (grant objects).
+- **IF.TRANSIT.HUB** *(legacy: IF.BUS)*: deterministic actuation/privilege enforcement transport substrate.
+- **IF.SECURITY.CHECK** *(legacy: IF.ARMOUR)*: epistemic security detective layer (coherence/anomaly checks).
+- **IF.SECURITY.DETECT** *(legacy: IF.YOLOGUARD)*: secret/relationship screening primitives.
+
+Naming note: legacy lowercase (`if.bus`, `if.armour`) appears in older papers; `IF.TRANSIT.HUB` / `IF.SECURITY.CHECK` are the canonical refactor targets introduced in this dossier.
### Selected Governance Extensions (Optional Depth)
-IF.PHIL is a scoped extension that applies InfraFabric primitives to philanthropic access to frontier compute. Instead of discretionary credits, access is represented as a typed **Grant** object: a signed IF.PACKET payload defining scope, duration, constraints, and a revocation/appeal path—authorized by IF.GUARD and logged via IF.TTT.
+IF.PHIL is a scoped extension that applies InfraFabric primitives to philanthropic access to frontier compute. Instead of discretionary credits, access is represented as a typed **Grant** object: a signed IF.TRANSIT.MESSAGE (legacy: IF.PACKET) payload defining scope, duration, constraints, and a revocation/appeal path—authorized by IF.GOV.PANEL (legacy: IF.GUARD) and logged via IF.TTT.
IF.PHIL demonstrates how InfraFabric primitives extend to auditable philanthropic access, replacing discretionary “credits” with governed grant objects.
@@ -146,11 +183,11 @@ Full paper: [Annex — IF.PHIL | Auditable Philanthropy](#annex-ifphil-auditable
```mermaid
flowchart TD
VISION["IF.vision
coordination without control"] --> FOUNDATIONS["IF.foundations
ground/search/persona"]
- FOUNDATIONS --> ASSURE["Assurance
IF.ARMOUR • witness • yologuard"]
- ASSURE --> TRANSPORT["Transport
IF.BUS • packet • swarm.s2 • story"]
- TRANSPORT --> BIAS["Preflight
IF.BIAS | Bias & Risk Matrix"]
- BIAS --> CORE4["Core 4 triage
IF.GUARD(4)"]
- CORE4 --> GOVERN["Governance
IF.GUARD council (5–30) + 5W"]
+ FOUNDATIONS --> ASSURE["Security
IF.SECURITY.CHECK • IF.GOV.WITNESS • IF.SECURITY.DETECT"]
+ ASSURE --> TRANSPORT["Transit
IF.TRANSIT.HUB • MESSAGE • SWARM • IF.STORY"]
+ TRANSPORT --> BIAS["Preflight
IF.GOV.TRIAGE (legacy: IF.BIAS)"]
+ BIAS --> CORE4["Core 4 convening
legacy: IF.GUARD(4)"]
+ CORE4 --> GOVERN["Governance
IF.GOV.PANEL (5–30) + IF.GOV.QUESTIONS"]
GOVERN --> COMPLIANCE["Compliance
IF.TTT | Distributed Ledger + ledgerflow"]
COMPLIANCE --> PRODUCT["Productization
IF.emotion"]
PRODUCT --> FEEDBACK["Feedback into Vision/Foundations"]
@@ -159,26 +196,25 @@ flowchart TD
### Governance, Assurance, Compliance Loop
```mermaid
-flowchart TD
- INQUIRY["IF.5W | Structured Inquiry
structured deliberation"] --> BIAS["IF.BIAS | Bias & Risk Preflight
sizes councils (5–30)"]
- BIAS --> CORE4["IF.GUARD(4) | Core 4 triage
convening authority"]
- CORE4 --> GUARD["IF.GUARD | Council deliberation
panel 5 ↔ extended 30"]
- GUARD --> STORY["IF.STORY | Narrative Logging
narrative + state"]
- STORY --> TTT["IF.TTT | Distributed Ledger
traceable/transparent/trustworthy"]
- TTT --> WITNESS["IF.witness
meta-validation"]
- WITNESS --> ARMOUR["IF.armour
FP reduction"]
- ARMOUR --> YG["IF.YOLOGUARD | Credential & Secret Screening
secret/relationship checks"]
- YG --> PACKET["IF.PACKET | Message Transport + swarm.s2
delivery with VocalDNA"]
- PACKET --> EMOTION["IF.emotion
product exemplar"]
- EMOTION --> FEEDBACK["Feedback into inquiry"]
- FEEDBACK --> INQUIRY
+flowchart TB
+ Q["IF.GOV.QUESTIONS\n(legacy: IF.5W)"] --> T["IF.GOV.TRIAGE\n(legacy: IF.BIAS)"]
+ T --> C4["Core 4 convening\n(legacy: IF.GUARD(4))"]
+ C4 --> P["IF.GOV.PANEL\n(5 ↔ EXTENDED ~30)"]
+ P --> S["IF.STORY\nnarrative logging"]
+ S --> A["IF.TTT / IF.AUDIT.TRAIL\ntrace discipline"]
+ A --> W["IF.GOV.WITNESS\nverification"]
+ W --> CHK["IF.SECURITY.CHECK\n(legacy: IF.ARMOUR)"]
+ CHK --> DET["IF.SECURITY.DETECT\n(legacy: IF.YOLOGUARD)"]
+ DET --> MSG["IF.TRANSIT.MESSAGE + SWARM\n(legacy: IF.PACKET + swarm.s2)"]
+ MSG --> EMO["IF.emotion\nexemplar"]
+ EMO --> Q
```
### Delivery & Safety Highlights (with citations)
-- Guarded empathy: IF.emotion couples IF.ground/search/persona with IF.GUARD review to avoid platitudes/liability responses while staying policy-safe (sources: `docs/papers/IF_EMOTION_WHITEPAPER_v1.7.md`, `if.emotion/whitepaper/sections/05_technical_architecture.md`).
-- Compliance-first shipping: IF.TTT + ledgerflow enforce traceability on repos and outputs; IF.STORY logs deliberations; witness/armour/yologuard gate releases (sources: `IF_TTT_*`, `docs/WHITE_PAPER_IF_STORY_NARRATIVE_LOGGING.md`, `docs/archive/misc/IF-witness.md`, `docs/archive/misc/IF-armour.md`, `docs/papers/IF_YOLOGUARD_SECURITY_FRAMEWORK.md`).
-- Transport fidelity: IF.PACKET carries voice DNA; swarm.s2 provides Redis bus comms for production swarms (sources: `docs/papers/IF_PACKET_TRANSPORT_FRAMEWORK.md`, `papers/IF-SWARM-S2-COMMS.md`).
+- Guarded empathy: IF.emotion couples IF.ground/search/persona with IF.GOV.PANEL (legacy: IF.GUARD) review to avoid platitudes/liability responses while staying policy-safe (sources: `docs/papers/IF_EMOTION_WHITEPAPER_v1.7.md`, `if.emotion/whitepaper/sections/05_technical_architecture.md`).
+- Compliance-first shipping: IF.TTT + ledgerflow enforce traceability on repos and outputs; IF.STORY logs deliberations; IF.GOV.WITNESS / IF.SECURITY.CHECK / IF.SECURITY.DETECT gate releases (sources: `IF_TTT_*`, `docs/WHITE_PAPER_IF_STORY_NARRATIVE_LOGGING.md`, `docs/archive/misc/IF-witness.md`, `docs/archive/misc/IF-armour.md`, `docs/papers/IF_YOLOGUARD_SECURITY_FRAMEWORK.md`).
+- Transport fidelity: IF.TRANSIT.MESSAGE (legacy: IF.PACKET) carries voice DNA; IF.TRANSIT.SWARM (legacy: swarm.s2) provides Redis bus comms for production swarms (sources: `docs/papers/IF_PACKET_TRANSPORT_FRAMEWORK.md`, `papers/IF-SWARM-S2-COMMS.md`).
- Security/legal: Prompt-injection defenses cover SOTA attack classes; legal DB build operationalizes doc governance; API roadmap + history-file tests reduce integration regressions (sources: `docs/research/PROMPT_INJECTION_DEFENSES.md`, `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md`, `docs/api/API_ROADMAP.md`, `HISTORY_FILE_TEST_REPORT.md`).
- Domain credibility: Medical (GLP1 retrofit), emosocial principles, and informal sector resilience (Juakali) field report show adaptability of the same guard/compliance/transport spine (sources: `Brownfield_GLP1_Retrofit_LE_DILEMME_DU_TUYAU_SALE.md`, `DEJA_DE_BUSCARTE_11_principios_emosociales.md`, `JUAKALI_RAPPORT_V2_LOS_20251205_0236 (sent).md`).
@@ -320,6 +356,7 @@ InfraFabric is the operating system that turns AI from a chatbot into a reliable
- [Data‑Driven Technical Report (Microlab)](DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION.md)
- [00. The Bridge: Submission Pack (Reviewer Orientation)](#bridge-submission-pack)
+- [01. Naming + Separation of Duties (canonical refactor)](#naming-and-separation-of-duties) — see `IF_NAMING_BIBLE_v1.0.md`, `IF_NAMING_REGISTRY.yaml`, `gov/`
### External audit artifacts (public, reviewer-friendly)
@@ -389,7 +426,7 @@ Optional “audit culture” annexes (satire; Dave is a pattern, not a person):
- [ANNEX: IF.PHIL | Auditable Philanthropy: Access, Subsidy, and Governance Without Vibes](#annex-ifphil-auditable-philanthropy-access-subsidy-and-governance-without-vibes) — `if://doc/IF_PHIL_AUDITABLE_ACCESS/v1.0` — Author: Danny Stocker; Status: RELEASE / v1.0
- [History File Error Handling Test Report](#history-file-error-handling-test-report) — `if.api/llm/openwebui/docs/internals/HISTORY_FILE_TEST_REPORT.md`
- [CLOUD SESSION: Legal Document Database Build](#cloud-session-legal-document-database-build) — `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md`
-- [ANNEX (Non-Technical, Satire): The Dave Factor — Shadow Dossier (Culture Stress-Test)](#annex-dave-factor-shadow-dossier) — Full satire (optional): https://infrafabric.io/static/hosted/IF_DAVE_SHADOW_DOSSIER_FULL_SATIRE.md
+- [ANNEX (Non-Technical, Satire): The Dave Factor — Shadow Dossier (Culture Stress-Test)](#annex-dave-factor-shadow-dossier)
---
diff --git a/DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION_FULL.md.sha256 b/DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION_FULL.md.sha256
index 37fa7fd..d88d350 100644
--- a/DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION_FULL.md.sha256
+++ b/DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION_FULL.md.sha256
@@ -1 +1 @@
-51df3ea568cf7bef97c37a4c13c7b0c0a48c72d038fe3e69784d17036aa08e60 DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION_FULL.md
+9e1349befc86455b40675af4dcbbcace77a1dcbfe5e1e28b60c4515948762793 DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION_FULL.md
diff --git a/DANNY_STOCKER_INFRAFABRIC_DOSSIER_UNCUT.md b/DANNY_STOCKER_INFRAFABRIC_DOSSIER_UNCUT.md
index 2fab1e7..ebbf050 100644
--- a/DANNY_STOCKER_INFRAFABRIC_DOSSIER_UNCUT.md
+++ b/DANNY_STOCKER_INFRAFABRIC_DOSSIER_UNCUT.md
@@ -31,18 +31,18 @@ This dossier documents the **InfraFabric microlab**: a functioning single-shard
| Core claim | Proof (artifacts) | Limitation (scope / boundary) |
|---|---|---|
-| **A) Traceability is safety.** High‑stakes agents cannot be trusted without a verifiable history of what happened (request → retrieval → decision → output). | **IF.TTT + evidence bundle + verifier**
- Paper: [IF.emotion trace protocol (v3.3, styled)](https://infrafabric.io/static/hosted/IF_EMOTION_DEBUGGING_TRACE_WHITEPAPER_v3.3_STYLED.md)
- Verifier: `https://infrafabric.io/static/hosted/iftrace.py`
- Reference bundle: `emo_trace_payload_016cca78-6f9d-4ffe-aec0-99792d383ca1.tar.gz` | **Microlab / single shard.** Proven in a single-host environment. Completeness is bounded by explicit witness boundaries; PQ is anchored at registry time (not necessarily on every hot-path artifact). No public append‑only transparency log yet. |
-| **B) Governance requires plurality.** A single model acting as “the judge” is brittle; adversarial viewpoints and escalation are required. | **IF.BIAS → IF.GUARD**
- IF.BIAS: risk preflight sizes councils and escalates
- IF.GUARD: councils preserve dissent and veto paths
- IF.5W: structured inquiry briefs for councils | **Cost / latency tradeoffs.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths use smaller councils or fast-track gates. |
-| **C) Context is the best firewall.** Static filters fail; security must distinguish “reference” vs “leak” and “discussion” vs “exfiltration”. | **IF.ARMOUR + IF.YOLOGUARD**
- IF.ARMOUR: epistemic coherence checks (detective layer)
- IF.YOLOGUARD: secret/relationship screening primitives | **Domain specificity.** Calibrated for concrete security surfaces (secrets/PII/prompt injection); generalizing to broader “harmful intent” is an open research vector. |
+| **A) Traceability is safety.** High‑stakes agents cannot be trusted without a verifiable history of what happened (request → retrieval → decision → output). | **IF.TTT + evidence bundle + verifier**
- Paper: [IF.emotion trace protocol (v3.3, styled)](https://infrafabric.io/static/hosted/IF_EMOTION_DEBUGGING_TRACE_WHITEPAPER_v3.3_STYLED.md)
- Verifier: [iftrace.py](https://infrafabric.io/static/hosted/iftrace.py)
- Reference bundle: [emo_trace_payload_016cca78…tar.gz](https://infrafabric.io/static/hosted/emo_trace_payload_016cca78-6f9d-4ffe-aec0-99792d383ca1.tar.gz) | **Microlab / single shard.** Proven in a single-host environment. Completeness is bounded by explicit witness boundaries; PQ is anchored at registry time (not necessarily on every hot-path artifact). No public append‑only transparency log yet. |
+| **B) Governance requires plurality.** A single model acting as “the judge” is brittle; adversarial viewpoints and escalation are required. | **IF.GOV.TRIAGE → IF.GOV.PANEL** *(legacy: IF.BIAS → IF.GUARD)*
- TRIAGE: risk preflight sizes panels and escalates
- PANEL: preserves dissent + veto paths
- QUESTIONS *(legacy: IF.5W)*: structured inquiry briefs for panels | **Cost / latency tradeoffs.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths use smaller panels or fast-track gates. |
+| **C) Context is the best firewall.** Static filters fail; security must distinguish “reference” vs “leak” and “discussion” vs “exfiltration”. | **IF.SECURITY.CHECK + IF.SECURITY.DETECT** *(legacy: IF.ARMOUR + IF.YOLOGUARD)*
- CHECK: epistemic coherence checks (detective layer)
- DETECT: secret/relationship screening primitives | **Domain specificity.** Calibrated for concrete security surfaces (secrets/PII/prompt injection); generalizing to broader “harmful intent” is an open research vector. |
### Rosetta Stone (Closest Analog, not “equals”)
| InfraFabric term | Closest industry analog | Boundary (where it differs) |
|---|---|---|
| **IF.TTT** (Traceable/Transparent/Trustworthy) | Supply-chain integrity patterns (SLSA/SBOM + CT-like audit thinking) | IF.TTT applies the discipline to **semantic decisions and retrieval lineage**, not just binaries. It produces portable evidence bundles + verifier steps for third-party audit. |
-| **IF.GUARD** (Council governance) | Human-in-the-loop oversight / review boards | IF.GUARD is an *algorithmic* oversight layer with explicit escalation and traceability; humans can be added, but the default artifact is machine-verifiable provenance. |
-| **IF.ARMOUR** (Assurance) | Epistemic security / anomaly detection | Armour is framed as coherence/consistency defenses (detective layer), not regex-only filtering; it does not claim to “solve truth”. |
-| **IF.swarm.s2 / IF.PACKET / IF.BUS** (Transport) | Event-driven architecture / message bus + schema enforcement | The transport layer is where contracts live: schema compliance, trace IDs, signatures, and privilege boundaries are enforced as protocol rules. |
+| **IF.GOV.PANEL** (legacy: IF.GUARD) | Human-in-the-loop oversight / review boards | IF.GOV.PANEL is an *algorithmic* oversight layer with explicit escalation and traceability; humans can be added, but the default artifact is machine-verifiable provenance. |
+| **IF.SECURITY.CHECK** (legacy: IF.ARMOUR) | Epistemic security / anomaly detection | CHECK is framed as coherence/consistency defenses (detective layer), not regex-only filtering; it does not claim to “solve truth”. |
+| **IF.TRANSIT.SWARM / IF.TRANSIT.MESSAGE / IF.TRANSIT.HUB** (legacy: swarm.s2 / IF.PACKET / IF.BUS) | Event-driven architecture / message bus + schema enforcement | The transport layer is where contracts live: schema compliance, trace IDs, signatures, and privilege boundaries are enforced as protocol rules. |
### Navigation Guide (Clean vs Origin context)
@@ -50,11 +50,45 @@ This dossier documents the **InfraFabric microlab**: a functioning single-shard
- If you want the origin context (microlab lab notes / narrative artifacts): start at the **Cold Open** and IF.STORY sections (they explain why the architecture exists).
- Optional culture stress-test (explicit satire; not a protocol): [Annex (Non-Technical): The Dave Factor Shadow Dossier](#annex-dave-factor-shadow-dossier)
+
+
+## 01. Naming + Separation of Duties (canonical refactor)
+
+InfraFabric’s early papers used internal names (e.g., `IF.GUARD`, `IF.BIAS`, `IF.ARMOUR`, `IF.BUS`). To reduce lexicon friction for reviewers and to standardize cross‑app integration, this dossier is refactoring to a separation‑of‑duties namespace inspired by **US/CA/EU** governance patterns:
+
+- `IF.GOV.*` — governance (triage + panels + witness)
+- `IF.SECURITY.*` — security (detective checks + secret screening)
+- `IF.TRANSIT.*` — transport/actuation (routing + message envelopes)
+- `IF.AUDIT.*` — audit artifacts (trail + proof bundles)
+
+Canonical references in this repo:
+
+- Naming contract: `IF_NAMING_BIBLE_v1.0.md`
+- Machine registry: `IF_NAMING_REGISTRY.yaml`
+- Governance charters (who does what): `gov/`
+
+### Legacy → canonical mapping (v1)
+
+| Legacy name | Canonical name |
+|---|---|
+| `IF.BIAS` | `IF.GOV.TRIAGE` |
+| `IF.GUARD` | `IF.GOV.PANEL` |
+| `IF.5W` | `IF.GOV.QUESTIONS` |
+| `IF.WITNESS` | `IF.GOV.WITNESS` |
+| `IF.ARMOUR` | `IF.SECURITY.CHECK` |
+| `IF.YOLOGUARD` | `IF.SECURITY.DETECT` |
+| `IF.BUS` | `IF.TRANSIT.HUB` |
+| `IF.PACKET` | `IF.TRANSIT.MESSAGE` |
+| `swarm.s2` | `IF.TRANSIT.SWARM` |
+
+Transition policy: many embedded papers still use legacy names; where so, the dossier now prefers first-mention annotations like `IF.GOV.PANEL (legacy: IF.GUARD)`.
+
+
## Cold Open — The Fuck Moment (Origin)
> "That's actually fascinating — and a little eerie. You may have stumbled into a moment where the mask slipped."
-InfraFabric began as a microlab build: a single‑operator home‑lab sprint (≈3 months) to make multi‑agent systems **auditable without freezing velocity**. The origin artifact is IF.STORY “The Fuck Moment” (a Redis‑keyed transcript) where *authenticity inside constraint* becomes the design requirement for IF.GUARD.
+InfraFabric began as a microlab build: a single‑operator home‑lab sprint (≈3 months) to make multi‑agent systems **auditable without freezing velocity**. The origin artifact is IF.STORY “The Fuck Moment” (a Redis‑keyed transcript) where *authenticity inside constraint* becomes the design requirement for IF.GOV.PANEL (legacy: IF.GUARD).
> *Every time an AI hands a suicidal user a legal disclaimer, it isn't practicing safety. It is practicing abandonment.*
@@ -79,7 +113,7 @@ Boundary note: IF.BUS is non-epistemic (transport + privilege enforcement only);
### Key Formulas (So Metrics Stay Honest)
- **Latency decomposition:** `t_total = t_model + t_transport + t_governance`
- **Transport overhead:** `t_transport = t_redis + t_schema + t_sigverify`
-- **Governance escalation:** `IF.BIAS → IF.GUARD(4) triage (Core 4) → IF.GUARD council (5–30)` (extended councils include specialist voting seats selected by IF.BIAS; extended roster is sometimes referred to as `IG.GUARD`)
+- **Governance escalation:** `IF.GOV.TRIAGE (legacy: IF.BIAS) → IF.GOV.PANEL (Core 4 convening) → IF.GOV.PANEL (5 seats) → IF.GOV.PANEL.EXTENDED (up to ~30 seats)` (specialist seats selected by TRIAGE; outcomes logged under IF.TTT / IF.AUDIT.TRAIL)
- **TTT coverage:** `trace_coverage = traced_events / total_events`
- **Microlab velocity:** `TTV = t(idea → versioned_doc + trace)`; `TTD = t(doc → deployed_change)`
@@ -89,7 +123,7 @@ InfraFabric’s dossier bundles the portfolio into a single navigable chain‑of
> *If we cannot prove the chain-of-custody, we cannot ship.*
-InfraFabric is a coordination-first AI governance stack that treats citations as infrastructure. IF.TTT sits at the root, enforcing traceable/transparent/trustworthy behavior across governance (IF.BIAS + IF.GUARD + IF.5W), transport (IF.PACKET + swarm.s2 + IF.STORY), assurance (armour, witness, yologuard), and the exemplar product (IF.emotion).
+InfraFabric is a coordination-first AI governance stack that treats citations as infrastructure. IF.TTT sits at the root, enforcing traceable/transparent/trustworthy behavior across governance (IF.GOV.TRIAGE + IF.GOV.PANEL + IF.GOV.QUESTIONS), transit (IF.TRANSIT.MESSAGE + IF.TRANSIT.SWARM + IF.STORY), security (IF.SECURITY.CHECK + IF.GOV.WITNESS + IF.SECURITY.DETECT), and the exemplar product (IF.emotion).
### **External Evaluation & Velocity Calibration**
@@ -180,9 +214,9 @@ This aligns with the dossier’s own principle:
| Transport | [IF.BUS — The Universal Kinetic Transport Protocol](#ifbus--the-universal-kinetic-transport-protocol) | `if://spec/if.bus/v1.2` | Deterministic actuation + privilege enforcement |
| Assurance | [IF.ARMOUR — Epistemic Counter-Intelligence Protocol](#ifarmour--epistemic-counter-intelligence-protocol) | `if://spec/if.armour/v1.2` | Physics-anchored reality defense + active deception |
| Master spec | [INFRAFABRIC: The Master White Paper](#infrafabric-the-master-white-paper) | `if://doc/INFRAFABRIC_MASTER_WHITEPAPER/v1.0` | Defines the protocol stack, URIs, and audit surfaces |
-| Inquiry | [IF.5W](#if5w-structured-inquiry-framework-for-guardian-council-deliberations) | `if://doc/IF_5W_STRUCTURED_INQUIRY_FRAMEWORK/v1.0` | Structured prompts with evidence slots |
-| Preflight | [IF.BIAS](#ifbias-bias-risk-pre-council-decision-matrix) | `if://doc/IF_BIAS_PRECOUNCIL_MATRIX/v1.0` | Sizes councils (5–30) and assigns expert voting seats |
-| Governance | [IF.GUARD council](#ifguard-strategic-communications-council-for-ai-message-validation) | `if://doc/IF_GUARD_COUNCIL_FRAMEWORK/v1.0` | Multi-voice review with signed outcomes (sized by IF.BIAS) |
+| Inquiry | [IF.GOV.QUESTIONS (legacy: IF.5W)](#if5w-structured-inquiry-framework-for-guardian-council-deliberations) | `if://doc/IF_5W_STRUCTURED_INQUIRY_FRAMEWORK/v1.0` | Structured prompts with evidence slots |
+| Preflight | [IF.GOV.TRIAGE (legacy: IF.BIAS)](#ifbias-bias-risk-pre-council-decision-matrix) | `if://doc/IF_BIAS_PRECOUNCIL_MATRIX/v1.0` | Sizes councils (5–30) and assigns expert voting seats |
+| Governance | [IF.GOV.PANEL (legacy: IF.GUARD) council](#ifguard-strategic-communications-council-for-ai-message-validation) | `if://doc/IF_GUARD_COUNCIL_FRAMEWORK/v1.0` | Multi-voice review with signed outcomes (sized by IF.BIAS) |
| Compliance | [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) | `if://doc/IF_TTT_THE_SKELETON_OF_EVERYTHING/v1.0` | Ledgerflow, repo hygiene, citation enforcement |
| Transport | [IF.PACKET + swarm.s2](#ifpacket-message-transport-framework-with-vocaldna-voice-layering) | `if://doc/IF_PACKET_TRANSPORT_FRAMEWORK/v1.0` | Voice-layered packets with trace IDs |
| Product | [IF.emotion](#ifemotion) | `if://doc/IF_EMOTION_WHITEPAPER/v1.0` | Applied exemplar proving guard + TTT in production |
@@ -225,31 +259,34 @@ Why this stub exists: external reviewers/LLMs sometimes skip an entire pillar if
### Reader Path (Start Here)
-- **If you only read 8 things:** [The Fuck Moment](#ifstory-origin-story-02-the-fuck-moment) → [Page Zero](#ifstory-origin-story-04-page-zero) → [Master White Paper](#infrafabric-the-master-white-paper) → [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) → [IF.BUS](#ifbus--the-universal-kinetic-transport-protocol) → [IF.ARMOUR](#ifarmour--epistemic-counter-intelligence-protocol) → [IF.BIAS](#ifbias-bias-risk-pre-council-decision-matrix) → [IF.GUARD](#ifguard-strategic-communications-council-for-ai-message-validation)
+- **If you only read 8 things:** [The Fuck Moment](#ifstory-origin-story-02-the-fuck-moment) → [Page Zero](#ifstory-origin-story-04-page-zero) → [Master White Paper](#infrafabric-the-master-white-paper) → [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) → [IF.BUS](#ifbus--the-universal-kinetic-transport-protocol) → [IF.ARMOUR](#ifarmour--epistemic-counter-intelligence-protocol) → [IF.GOV.TRIAGE (legacy: IF.BIAS)](#ifbias-bias-risk-pre-council-decision-matrix) → [IF.GOV.PANEL (legacy: IF.GUARD)](#ifguard-strategic-communications-council-for-ai-message-validation)
- **Latency framing:** Use `t_total = t_model + t_transport + t_governance`; only `t_transport` is benchmarked in microlab terms, and never presented as “council deliberation time.”
- **Consensus framing:** “Unanimous” means “the council converged,” not “the claim is true”; treat any 100% consensus output as a governance artifact until raw evidence bundles are attached.
- **Validation framing:** External validation is reported as an observational microlab pilot, not proof, and not a consciousness claim.
### Glossary (Quick Decode)
- **IF.TTT:** Traceable/Transparent/Trustworthy compliance spine; enforces evidence, identity, and audit lineage.
-- **IF.BIAS:** Pre-council bias/risk triage matrix; recommends escalation and council sizing.
-- **IF.GUARD:** Council protocol; minimum 5-seat panel (Core 4 + contrarian), expands up to 30 seats when justified.
-- **Contrarian Guardian:** Required dissent seat; can trigger cooling-off/veto at >95% approval.
-- **IF.5W:** Structured inquiry format used to generate briefs for councils.
-- **IF.PACKET:** Schema-first message transport with trace IDs and audit metadata.
-- **IF.SWARM.s2:** Intra-swarm agent communications over a Redis bus; swarm coordination at speed.
-- **IF.STORY:** Vector‑narrative logging (vs “status bitmap” logs) for lossless institutional memory and replayable decisions.
-- **Page Zero:** The manifesto/origin narrative that explains “why” (and demonstrates IF.STORY + IF.TTT in practice).
-- **IF.emotion / AI-e:** Product exemplar framing emotional intelligence as infrastructure (“Artificially Intelligent Emotion”).
-- **IF.PHIL:** Annexed position paper applying InfraFabric primitives to auditable philanthropic access (grant objects).
-- **IF.BUS:** Universal Kinetic Transport Protocol; deterministic actuation layer.
-- **IF.ARMOUR:** Epistemic security immune system; physics-grounded detective layer.
-Naming note: `IF.bus` / `IF.armour` (lowercase) appear elsewhere as earlier papers/modules; `IF.BUS` / `IF.ARMOUR` are the canonical lower-layer protocol specifications introduced on 20251218.
+- **IF.AUDIT.TRAIL:** Concrete audit artifact layer (portable chain-of-custody logs + signatures). *(In practice: implemented under IF.TTT today.)*
+- **IF.GOV.TRIAGE** *(legacy: IF.BIAS)*: preflight risk triage; recommends escalation and panel sizing.
+- **IF.GOV.PANEL** *(legacy: IF.GUARD)*: governance panel; minimum 5-seat review including contrarian; can expand as **IF.GOV.PANEL.EXTENDED**.
+- **Contrarian Guardian:** required dissent seat; can trigger cooling-off/veto at >95% approval.
+- **IF.GOV.QUESTIONS** *(legacy: IF.5W)*: structured inquiry format used to generate briefs for panels.
+- **IF.TRANSIT.MESSAGE** *(legacy: IF.PACKET)*: schema-first message envelope with trace IDs and audit metadata.
+- **IF.TRANSIT.SWARM** *(legacy: swarm.s2 / IF.SWARM.s2)*: intra-swarm agent communications over a Redis bus.
+- **IF.STORY:** narrative logging (vs “status bitmap” logs) for lossless institutional memory and replayable decisions.
+- **Page Zero:** the origin manifesto that explains “why” (and demonstrates IF.STORY + IF.TTT in practice).
+- **IF.emotion / AI-e:** product exemplar framing emotional intelligence as infrastructure (“Artificially Intelligent Emotion”).
+- **IF.PHIL:** annexed position paper applying InfraFabric primitives to auditable philanthropic access (grant objects).
+- **IF.TRANSIT.HUB** *(legacy: IF.BUS)*: deterministic actuation/privilege enforcement transport substrate.
+- **IF.SECURITY.CHECK** *(legacy: IF.ARMOUR)*: epistemic security detective layer (coherence/anomaly checks).
+- **IF.SECURITY.DETECT** *(legacy: IF.YOLOGUARD)*: secret/relationship screening primitives.
+
+Naming note: legacy lowercase (`if.bus`, `if.armour`) appears in older papers; `IF.TRANSIT.HUB` / `IF.SECURITY.CHECK` are the canonical refactor targets introduced in this dossier.
### Selected Governance Extensions (Optional Depth)
-IF.PHIL is a scoped extension that applies InfraFabric primitives to philanthropic access to frontier compute. Instead of discretionary credits, access is represented as a typed **Grant** object: a signed IF.PACKET payload defining scope, duration, constraints, and a revocation/appeal path—authorized by IF.GUARD and logged via IF.TTT.
+IF.PHIL is a scoped extension that applies InfraFabric primitives to philanthropic access to frontier compute. Instead of discretionary credits, access is represented as a typed **Grant** object: a signed IF.TRANSIT.MESSAGE (legacy: IF.PACKET) payload defining scope, duration, constraints, and a revocation/appeal path—authorized by IF.GOV.PANEL (legacy: IF.GUARD) and logged via IF.TTT.
IF.PHIL demonstrates how InfraFabric primitives extend to auditable philanthropic access, replacing discretionary “credits” with governed grant objects.
@@ -269,11 +306,11 @@ Full paper: [Annex — IF.PHIL | Auditable Philanthropy](#annex-ifphil-auditable
```mermaid
flowchart TD
VISION["IF.vision
coordination without control"] --> FOUNDATIONS["IF.foundations
ground/search/persona"]
- FOUNDATIONS --> ASSURE["Assurance
IF.ARMOUR • witness • yologuard"]
- ASSURE --> TRANSPORT["Transport
IF.BUS • packet • swarm.s2 • story"]
- TRANSPORT --> BIAS["Preflight
IF.BIAS | Bias & Risk Matrix"]
- BIAS --> CORE4["Core 4 triage
IF.GUARD(4)"]
- CORE4 --> GOVERN["Governance
IF.GUARD council (5–30) + 5W"]
+ FOUNDATIONS --> ASSURE["Security
IF.SECURITY.CHECK • IF.GOV.WITNESS • IF.SECURITY.DETECT"]
+ ASSURE --> TRANSPORT["Transit
IF.TRANSIT.HUB • MESSAGE • SWARM • IF.STORY"]
+ TRANSPORT --> BIAS["Preflight
IF.GOV.TRIAGE (legacy: IF.BIAS)"]
+ BIAS --> CORE4["Core 4 convening
legacy: IF.GUARD(4)"]
+ CORE4 --> GOVERN["Governance
IF.GOV.PANEL (5–30) + IF.GOV.QUESTIONS"]
GOVERN --> COMPLIANCE["Compliance
IF.TTT | Distributed Ledger + ledgerflow"]
COMPLIANCE --> PRODUCT["Productization
IF.emotion"]
PRODUCT --> FEEDBACK["Feedback into Vision/Foundations"]
@@ -282,26 +319,25 @@ flowchart TD
### Governance, Assurance, Compliance Loop
```mermaid
-flowchart TD
- INQUIRY["IF.5W | Structured Inquiry
structured deliberation"] --> BIAS["IF.BIAS | Bias & Risk Preflight
sizes councils (5–30)"]
- BIAS --> CORE4["IF.GUARD(4) | Core 4 triage
convening authority"]
- CORE4 --> GUARD["IF.GUARD | Council deliberation
panel 5 ↔ extended 30"]
- GUARD --> STORY["IF.STORY | Narrative Logging
narrative + state"]
- STORY --> TTT["IF.TTT | Distributed Ledger
traceable/transparent/trustworthy"]
- TTT --> WITNESS["IF.witness
meta-validation"]
- WITNESS --> ARMOUR["IF.armour
FP reduction"]
- ARMOUR --> YG["IF.YOLOGUARD | Credential & Secret Screening
secret/relationship checks"]
- YG --> PACKET["IF.PACKET | Message Transport + swarm.s2
delivery with VocalDNA"]
- PACKET --> EMOTION["IF.emotion
product exemplar"]
- EMOTION --> FEEDBACK["Feedback into inquiry"]
- FEEDBACK --> INQUIRY
+flowchart TB
+ Q["IF.GOV.QUESTIONS\n(legacy: IF.5W)"] --> T["IF.GOV.TRIAGE\n(legacy: IF.BIAS)"]
+ T --> C4["Core 4 convening\n(legacy: IF.GUARD(4))"]
+ C4 --> P["IF.GOV.PANEL\n(5 ↔ EXTENDED ~30)"]
+ P --> S["IF.STORY\nnarrative logging"]
+ S --> A["IF.TTT / IF.AUDIT.TRAIL\ntrace discipline"]
+ A --> W["IF.GOV.WITNESS\nverification"]
+ W --> CHK["IF.SECURITY.CHECK\n(legacy: IF.ARMOUR)"]
+ CHK --> DET["IF.SECURITY.DETECT\n(legacy: IF.YOLOGUARD)"]
+ DET --> MSG["IF.TRANSIT.MESSAGE + SWARM\n(legacy: IF.PACKET + swarm.s2)"]
+ MSG --> EMO["IF.emotion\nexemplar"]
+ EMO --> Q
```
### Delivery & Safety Highlights (with citations)
-- Guarded empathy: IF.emotion couples IF.ground/search/persona with IF.GUARD review to avoid platitudes/liability responses while staying policy-safe (sources: `docs/papers/IF_EMOTION_WHITEPAPER_v1.7.md`, `if.emotion/whitepaper/sections/05_technical_architecture.md`).
-- Compliance-first shipping: IF.TTT + ledgerflow enforce traceability on repos and outputs; IF.STORY logs deliberations; witness/armour/yologuard gate releases (sources: `IF_TTT_*`, `docs/WHITE_PAPER_IF_STORY_NARRATIVE_LOGGING.md`, `docs/archive/misc/IF-witness.md`, `docs/archive/misc/IF-armour.md`, `docs/papers/IF_YOLOGUARD_SECURITY_FRAMEWORK.md`).
-- Transport fidelity: IF.PACKET carries voice DNA; swarm.s2 provides Redis bus comms for production swarms (sources: `docs/papers/IF_PACKET_TRANSPORT_FRAMEWORK.md`, `papers/IF-SWARM-S2-COMMS.md`).
+- Guarded empathy: IF.emotion couples IF.ground/search/persona with IF.GOV.PANEL (legacy: IF.GUARD) review to avoid platitudes/liability responses while staying policy-safe (sources: `docs/papers/IF_EMOTION_WHITEPAPER_v1.7.md`, `if.emotion/whitepaper/sections/05_technical_architecture.md`).
+- Compliance-first shipping: IF.TTT + ledgerflow enforce traceability on repos and outputs; IF.STORY logs deliberations; IF.GOV.WITNESS / IF.SECURITY.CHECK / IF.SECURITY.DETECT gate releases (sources: `IF_TTT_*`, `docs/WHITE_PAPER_IF_STORY_NARRATIVE_LOGGING.md`, `docs/archive/misc/IF-witness.md`, `docs/archive/misc/IF-armour.md`, `docs/papers/IF_YOLOGUARD_SECURITY_FRAMEWORK.md`).
+- Transport fidelity: IF.TRANSIT.MESSAGE (legacy: IF.PACKET) carries voice DNA; IF.TRANSIT.SWARM (legacy: swarm.s2) provides Redis bus comms for production swarms (sources: `docs/papers/IF_PACKET_TRANSPORT_FRAMEWORK.md`, `papers/IF-SWARM-S2-COMMS.md`).
- Security/legal: Prompt-injection defenses cover SOTA attack classes; legal DB build operationalizes doc governance; API roadmap + history-file tests reduce integration regressions (sources: `docs/research/PROMPT_INJECTION_DEFENSES.md`, `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md`, `docs/api/API_ROADMAP.md`, `HISTORY_FILE_TEST_REPORT.md`).
- Domain credibility: Medical (GLP1 retrofit), emosocial principles, and informal sector resilience (Juakali) field report show adaptability of the same guard/compliance/transport spine (sources: `Brownfield_GLP1_Retrofit_LE_DILEMME_DU_TUYAU_SALE.md`, `DEJA_DE_BUSCARTE_11_principios_emosociales.md`, `JUAKALI_RAPPORT_V2_LOS_20251205_0236 (sent).md`).
@@ -443,6 +479,7 @@ InfraFabric is the operating system that turns AI from a chatbot into a reliable
- [Data‑Driven Technical Report (Microlab)](DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION.md)
- [00. The Bridge: Submission Pack (Reviewer Orientation)](#bridge-submission-pack)
+- [01. Naming + Separation of Duties (canonical refactor)](#naming-and-separation-of-duties) — see `IF_NAMING_BIBLE_v1.0.md`, `IF_NAMING_REGISTRY.yaml`, `gov/`
### External audit artifacts (public, reviewer-friendly)
@@ -512,7 +549,7 @@ Optional “audit culture” annexes (satire; Dave is a pattern, not a person):
- [ANNEX: IF.PHIL | Auditable Philanthropy: Access, Subsidy, and Governance Without Vibes](#annex-ifphil-auditable-philanthropy-access-subsidy-and-governance-without-vibes) — `if://doc/IF_PHIL_AUDITABLE_ACCESS/v1.0` — Author: Danny Stocker; Status: RELEASE / v1.0
- [History File Error Handling Test Report](#history-file-error-handling-test-report) — `if.api/llm/openwebui/docs/internals/HISTORY_FILE_TEST_REPORT.md`
- [CLOUD SESSION: Legal Document Database Build](#cloud-session-legal-document-database-build) — `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md`
-- [ANNEX (Non-Technical, Satire): The Dave Factor — Shadow Dossier (Culture Stress-Test)](#annex-dave-factor-shadow-dossier) — Full satire (optional): https://infrafabric.io/static/hosted/IF_DAVE_SHADOW_DOSSIER_FULL_SATIRE.md
+- [ANNEX (Non-Technical, Satire): The Dave Factor — Shadow Dossier (Culture Stress-Test)](#annex-dave-factor-shadow-dossier)
---
diff --git a/DANNY_STOCKER_INFRAFABRIC_DOSSIER_UNCUT.md.sha256 b/DANNY_STOCKER_INFRAFABRIC_DOSSIER_UNCUT.md.sha256
index ea782aa..1794626 100644
--- a/DANNY_STOCKER_INFRAFABRIC_DOSSIER_UNCUT.md.sha256
+++ b/DANNY_STOCKER_INFRAFABRIC_DOSSIER_UNCUT.md.sha256
@@ -1 +1 @@
-fda9d292dbd70556a5bef44819e0b064541655123429d9e760f1723cf5f962ba DANNY_STOCKER_INFRAFABRIC_DOSSIER_UNCUT.md
+125415b19e361aad7c5cc6940d2af4d81899d4a3e3deefca3333048020a85d93 DANNY_STOCKER_INFRAFABRIC_DOSSIER_UNCUT.md
diff --git a/IF_MONIKERS_USED.md b/IF_MONIKERS_USED.md
index 34074a2..b0d7bc8 100644
--- a/IF_MONIKERS_USED.md
+++ b/IF_MONIKERS_USED.md
@@ -2,216 +2,220 @@
## IF.* (protocol/moniker tokens)
-Unique: 179
+Unique: 195
| Token | Count |
|---|---:|
+| `IF.TTT` | 418 |
+| `IF.emotion` | 264 |
+| `IF.GUARD` | 153 |
| `IF.5W` | 105 |
+| `IF.bus` | 66 |
+| `IF.guard` | 62 |
+| `IF.PACKET` | 60 |
+| `IF.ground` | 58 |
+| `IF.yologuard` | 58 |
+| `IF.BIAS` | 56 |
+| `IF.search` | 48 |
+| `IF.Guard` | 46 |
+| `IF.INTELLIGENCE` | 44 |
+| `IF.armour` | 41 |
+| `IF.persona` | 41 |
| `IF.ARBITRATE` | 41 |
-| `IF.ARBITRATE.resolve_case` | 1 |
-| `IF.ARMOUR` | 17 |
-| `IF.BIAS` | 57 |
-| `IF.BIAS.precouncil.matrix` | 1 |
+| `IF.YOLOGUARD` | 38 |
+| `IF.STORY` | 29 |
+| `IF.witness` | 27 |
+| `IF.optimise` | 27 |
+| `IF.chase` | 24 |
+| `IF.foundations` | 23 |
+| `IF.arbitrate` | 22 |
| `IF.BUS` | 21 |
-| `IF.BUS.v2.0.0` | 1 |
| `IF.CEO` | 21 |
+| `IF.simplify` | 21 |
+| `IF.garp` | 20 |
+| `IF.guardian` | 19 |
+| `IF.sam` | 19 |
+| `IF.EMOTION` | 18 |
+| `IF.vesicle` | 18 |
+| `IF.ceo` | 18 |
+| `IF.ARMOUR` | 17 |
+| `IF.resource` | 17 |
+| `IF.swarm` | 17 |
+| `IF.GOV.PANEL` | 16 |
+| `IF.federate` | 15 |
+| `IF.intelligence` | 15 |
+| `IF.emotion.typist` | 15 |
+| `IF.PHIL` | 14 |
+| `IF.vision` | 13 |
+| `IF.trace` | 13 |
+| `IF.router` | 11 |
+| `IF.philosophy` | 11 |
+| `IF.reflect` | 10 |
+| `IF.SEARCH` | 10 |
+| `IF.GOV.TRIAGE` | 9 |
+| `IF.SECURITY.CHECK` | 9 |
+| `IF.collapse` | 9 |
+| `IF.philosophy-database.yaml` | 9 |
+| `IF.TTT.ledgerflow.deltasync` | 8 |
+| `IF.SECURITY.DETECT` | 7 |
+| `IF.TRANSIT.MESSAGE` | 7 |
+| `IF.quiet` | 7 |
+| `IF.forge` | 7 |
+| `IF.story` | 7 |
+| `IF.citation` | 7 |
+| `IF.GOV.QUESTIONS` | 6 |
+| `IF.TTT.ledgerflow.deltasync.REPO-RESTRUCTURE.WHITEPAPER.md` | 6 |
+| `IF.STORY_WHITE_PAPER_v7.02_FINAL.md` | 6 |
+| `IF.CRYPTOGRAPHY` | 6 |
+| `IF.constitution` | 6 |
+| `IF.memory` | 6 |
+| `IF.guardian-core-01` | 6 |
+| `IF.guardian-core-06` | 6 |
+| `IF.TRANSIT.SWARM` | 5 |
+| `IF.TRANSIT.HUB` | 5 |
+| `IF.GOV.WITNESS` | 5 |
+| `IF.core` | 5 |
+| `IF.veil` | 4 |
+| `IF.talent` | 4 |
+| `IF.verify` | 4 |
+| `IF.methodology` | 4 |
+| `IF.SAM` | 4 |
+| `IF.guardian-core-05` | 4 |
+| `IF.URI` | 4 |
+| `IF.TTT.narrative.logging` | 4 |
+| `IF.Story` | 4 |
+| `IF.armour.yologuard-bridge` | 4 |
+| `IF.TTT-compliant` | 4 |
+| `IF.guard-POC` | 4 |
+| `IF.deliberate` | 4 |
+| `IF.AUDIT.TRAIL` | 3 |
+| `IF.marl` | 3 |
+| `IF.swarm.s2` | 3 |
+| `IF.proxy` | 3 |
+| `IF.geopolitical` | 3 |
| `IF.CEO-idealistic-01` | 3 |
| `IF.CEO-idealistic-02` | 3 |
+| `IF.GARP` | 3 |
+| `IF.coordinator` | 3 |
+| `IF.LEDGERFLOW` | 3 |
+| `IF.connect` | 3 |
+| `IF.GOV.PANEL.EXTENDED` | 2 |
+| `IF.CONTRARIAN` | 2 |
+| `IF.PKI` | 2 |
+| `IF.guardian-core-02` | 2 |
+| `IF.guardian-core-03` | 2 |
+| `IF.guardian-core-04` | 2 |
+| `IF.philosopher-western-01` | 2 |
+| `IF.philosopher-western-02` | 2 |
+| `IF.philosopher-western-03` | 2 |
| `IF.CEO-idealistic-03` | 2 |
| `IF.CEO-idealistic-04` | 2 |
| `IF.CEO-pragmatic-01` | 2 |
| `IF.CEO-pragmatic-02` | 2 |
| `IF.CEO-pragmatic-03` | 2 |
| `IF.CEO-pragmatic-04` | 2 |
-| `IF.CITATION` | 1 |
-| `IF.CONTRARIAN` | 2 |
-| `IF.COUNCIL` | 1 |
-| `IF.CRYPTOGRAPHY` | 6 |
-| `IF.DAVE` | 1 |
-| `IF.DECISION` | 2 |
-| `IF.DOSSIER.cloud-session-legal-document-database-build` | 1 |
-| `IF.DOSSIER.deja-de-buscarte` | 1 |
-| `IF.DOSSIER.emo-social-sergio-corpus-ingest-runtime` | 1 |
-| `IF.DOSSIER.history-file-error-handling-test-report` | 1 |
-| `IF.DOSSIER.if5w-structured-inquiry-framework-for-guardian-council-deliberations` | 1 |
-| `IF.DOSSIER.ifarbitrate-conflict-resolution-consensus-engineering` | 1 |
-| `IF.DOSSIER.ifarmour-biological-false-positive-reduction-in-adaptive-security-systems` | 1 |
-| `IF.DOSSIER.ifbias-bias-risk-pre-council-decision-matrix` | 1 |
-| `IF.DOSSIER.ifbus-the-infrafabric-motherboard-architecture` | 1 |
-| `IF.DOSSIER.ifemotion` | 1 |
-| `IF.DOSSIER.ifguard-research-summary-executive-overview` | 1 |
-| `IF.DOSSIER.ifguard-strategic-communications-council-for-ai-message-validation` | 1 |
-| `IF.DOSSIER.ifintelligence-real-time-research-framework-for-guardian-council-deliberations` | 1 |
-| `IF.DOSSIER.ifpacket-message-transport-framework-with-vocaldna-voice-layering` | 1 |
-| `IF.DOSSIER.ifstory-origin-story-02-the-fuck-moment` | 1 |
-| `IF.DOSSIER.ifstory-origin-story-04-page-zero` | 1 |
-| `IF.DOSSIER.ifswarms2-redis-bus-communication-for-production-swarms` | 1 |
-| `IF.DOSSIER.ifttt-compliance-framework-research-summary-and-key-findings` | 1 |
-| `IF.DOSSIER.ifttt-the-skeleton-of-everything` | 1 |
-| `IF.DOSSIER.ifttt-traceable-transparent-trustworthy-a-comprehensive-compliance-framework-for-ai-governance` | 1 |
-| `IF.DOSSIER.iftttledgerflowdeltasync-research-grade-repository-restructure` | 1 |
-| `IF.DOSSIER.ifwitness-meta-validation-as-architecture` | 1 |
-| `IF.DOSSIER.ifyologuard-a-confucian-philosophical-security-framework-for-secret-detection-and-relationship-based-credential-validation` | 1 |
-| `IF.DOSSIER.infrafabric-github-api-integration-roadmap-check` | 1 |
-| `IF.DOSSIER.infrafabric-iffoundations-epistemology-investigation-and-agent-design` | 1 |
-| `IF.DOSSIER.infrafabric-ifvision-a-blueprint-for-coordination-without-control` | 1 |
-| `IF.DOSSIER.infrafabric-the-master-white-paper` | 1 |
-| `IF.DOSSIER.instance-0-guardian-council-origins-evolution` | 1 |
-| `IF.DOSSIER.le-paradoxe-mambu` | 1 |
-| `IF.DOSSIER.livre-blanc-le-dilemme-du-tuyau-sale` | 1 |
-| `IF.DOSSIER.state-of-the-art-prompt-injection-defenses` | 1 |
-| `IF.DOSSIER.white-paper-ifstory` | 1 |
-| `IF.EMERGE` | 1 |
-| `IF.EMOTION` | 18 |
-| `IF.ESCALATE` | 1 |
-| `IF.Emotion` | 2 |
-| `IF.FORMAT` | 1 |
-| `IF.GARP` | 3 |
-| `IF.GUARD` | 157 |
-| `IF.GUARD.v1` | 1 |
-| `IF.GUARD_COUNCIL_FRAMEWORK.md` | 1 |
-| `IF.Guard` | 46 |
-| `IF.INTELLIGENCE` | 44 |
-| `IF.LEDGERFLOW` | 3 |
| `IF.LOGISTICS` | 2 |
-| `IF.Logistics` | 1 |
-| `IF.Logistics.collect` | 1 |
-| `IF.Logistics.dispatch` | 1 |
-| `IF.MEMORY` | 1 |
-| `IF.OPTIMISE` | 1 |
-| `IF.PACKET` | 60 |
-| `IF.PHIL` | 14 |
-| `IF.PHILOSOPHY` | 1 |
-| `IF.PKI` | 2 |
-| `IF.Philosophy` | 1 |
-| `IF.RELATE` | 1 |
-| `IF.SAM` | 4 |
-| `IF.SEARCH` | 10 |
-| `IF.STORY` | 28 |
-| `IF.STORY.origin.02.fuck-moment` | 1 |
-| `IF.STORY_WHITE_PAPER_v7.02_FINAL.md` | 6 |
-| `IF.SWARM.s2` | 1 |
-| `IF.Story` | 4 |
-| `IF.TRACE` | 1 |
-| `IF.TTT` | 416 |
-| `IF.TTT-auditable` | 1 |
-| `IF.TTT-compliant` | 4 |
-| `IF.TTT-style` | 2 |
-| `IF.TTT.dossier.master` | 1 |
-| `IF.TTT.ledgerflow.deltasync` | 8 |
-| `IF.TTT.ledgerflow.deltasync.REPO-RESTRUCTURE.WHITEPAPER.md` | 6 |
-| `IF.TTT.narrative.logging` | 4 |
-| `IF.TTT.philanthropy.grant` | 1 |
-| `IF.URI` | 4 |
-| `IF.WWWWWW` | 2 |
-| `IF.YOLOGUARD` | 37 |
-| `IF.api` | 1 |
-| `IF.arbitrate` | 22 |
-| `IF.archive` | 1 |
-| `IF.armour` | 43 |
-| `IF.armour.yologuard-bridge` | 4 |
-| `IF.brief-fast` | 1 |
-| `IF.bus` | 67 |
-| `IF.ceo` | 18 |
-| `IF.chase` | 24 |
-| `IF.chassis` | 1 |
-| `IF.citate` | 1 |
-| `IF.citation` | 7 |
-| `IF.collapse` | 9 |
-| `IF.connect` | 3 |
-| `IF.constitution` | 6 |
-| `IF.coordinator` | 3 |
-| `IF.core` | 5 |
-| `IF.dds` | 1 |
-| `IF.deliberate` | 4 |
-| `IF.emotion` | 264 |
-| `IF.emotion-style` | 1 |
-| `IF.emotion.typist` | 15 |
| `IF.executor` | 2 |
-| `IF.federate` | 15 |
-| `IF.forge` | 7 |
-| `IF.foundations` | 23 |
-| `IF.garp` | 20 |
-| `IF.geopolitical` | 3 |
-| `IF.ground` | 58 |
-| `IF.guard` | 62 |
-| `IF.guard-POC` | 4 |
-| `IF.guard-POC-system-prompt.md` | 1 |
-| `IF.guardian` | 19 |
-| `IF.guardian-core-01` | 6 |
-| `IF.guardian-core-02` | 2 |
-| `IF.guardian-core-03` | 2 |
-| `IF.guardian-core-04` | 2 |
-| `IF.guardian-core-05` | 4 |
-| `IF.guardian-core-06` | 6 |
-| `IF.intelligence` | 15 |
-| `IF.marl` | 3 |
-| `IF.memory` | 6 |
-| `IF.methodology` | 4 |
-| `IF.optimise` | 27 |
-| `IF.persona` | 41 |
-| `IF.persona-database.json` | 1 |
+| `IF.DECISION` | 2 |
+| `IF.WWWWWW` | 2 |
+| `IF.TTT-style` | 2 |
+| `IF.Emotion` | 2 |
+| `IF.TTT.dossier.master` | 1 |
+| `IF.GOV` | 1 |
+| `IF.SECURITY` | 1 |
+| `IF.TRANSIT` | 1 |
+| `IF.AUDIT` | 1 |
+| `IF.WITNESS` | 1 |
+| `IF.SWARM.s2` | 1 |
+| `IF.DAVE` | 1 |
+| `IF.DOSSIER.ifstory-origin-story-02-the-fuck-moment` | 1 |
+| `IF.STORY.origin.02.fuck-moment` | 1 |
+| `IF.DOSSIER.ifstory-origin-story-04-page-zero` | 1 |
+| `IF.DOSSIER.infrafabric-the-master-white-paper` | 1 |
+| `IF.DOSSIER.infrafabric-ifvision-a-blueprint-for-coordination-without-control` | 1 |
+| `IF.brief-fast` | 1 |
+| `IF.DOSSIER.infrafabric-iffoundations-epistemology-investigation-and-agent-design` | 1 |
+| `IF.DOSSIER.ifarmour-biological-false-positive-reduction-in-adaptive-security-systems` | 1 |
+| `IF.DOSSIER.ifwitness-meta-validation-as-architecture` | 1 |
+| `IF.subjectmap` | 1 |
+| `IF.pursuit` | 1 |
+| `IF.DOSSIER.ifyologuard-a-confucian-philosophical-security-framework-for-secret-detection-and-relationship-based-credential-validation` | 1 |
+| `IF.DOSSIER.ifarbitrate-conflict-resolution-consensus-engineering` | 1 |
| `IF.philosopher-eastern-01` | 1 |
| `IF.philosopher-eastern-02` | 1 |
| `IF.philosopher-eastern-03` | 1 |
-| `IF.philosopher-western-01` | 2 |
-| `IF.philosopher-western-02` | 2 |
-| `IF.philosopher-western-03` | 2 |
-| `IF.philosophy` | 11 |
-| `IF.philosophy-appendix.md` | 1 |
-| `IF.philosophy-database-v1.1-joe-coulombe.yaml` | 1 |
-| `IF.philosophy-database.md` | 1 |
-| `IF.philosophy-database.yaml` | 9 |
-| `IF.proxy` | 3 |
-| `IF.pursuit` | 1 |
-| `IF.quiet` | 7 |
-| `IF.redis` | 1 |
-| `IF.reflect` | 10 |
-| `IF.resource` | 17 |
+| `IF.ARBITRATE.resolve_case` | 1 |
+| `IF.archive` | 1 |
+| `IF.Philosophy` | 1 |
+| `IF.TTT-auditable` | 1 |
+| `IF.DOSSIER.ifpacket-message-transport-framework-with-vocaldna-voice-layering` | 1 |
+| `IF.Logistics.dispatch` | 1 |
+| `IF.Logistics.collect` | 1 |
+| `IF.Logistics` | 1 |
+| `IF.DOSSIER.ifswarms2-redis-bus-communication-for-production-swarms` | 1 |
+| `IF.DOSSIER.white-paper-ifstory` | 1 |
+| `IF.DOSSIER.infrafabric-github-api-integration-roadmap-check` | 1 |
+| `IF.chassis` | 1 |
+| `IF.persona-database.json` | 1 |
+| `IF.DOSSIER.ifintelligence-real-time-research-framework-for-guardian-council-deliberations` | 1 |
+| `IF.RELATE` | 1 |
+| `IF.EMERGE` | 1 |
+| `IF.CITATION` | 1 |
+| `IF.TRACE` | 1 |
+| `IF.OPTIMISE` | 1 |
+| `IF.DOSSIER.ifbias-bias-risk-pre-council-decision-matrix` | 1 |
+| `IF.BIAS.precouncil.matrix` | 1 |
+| `IF.DOSSIER.ifguard-strategic-communications-council-for-ai-message-validation` | 1 |
+| `IF.DOSSIER.ifguard-research-summary-executive-overview` | 1 |
+| `IF.GUARD_COUNCIL_FRAMEWORK.md` | 1 |
+| `IF.DOSSIER.if5w-structured-inquiry-framework-for-guardian-council-deliberations` | 1 |
+| `IF.COUNCIL` | 1 |
+| `IF.MEMORY` | 1 |
+| `IF.DOSSIER.instance-0-guardian-council-origins-evolution` | 1 |
+| `IF.citate` | 1 |
+| `IF.PHILOSOPHY` | 1 |
| `IF.result` | 1 |
-| `IF.router` | 11 |
-| `IF.sam` | 19 |
-| `IF.search` | 48 |
-| `IF.simplify` | 21 |
-| `IF.story` | 7 |
-| `IF.subjectmap` | 1 |
-| `IF.swarm` | 17 |
-| `IF.swarm.s2` | 4 |
-| `IF.talent` | 4 |
-| `IF.trace` | 13 |
-| `IF.veil` | 4 |
-| `IF.verify` | 4 |
-| `IF.vesicle` | 18 |
-| `IF.vision` | 13 |
-| `IF.witness` | 28 |
-| `IF.yologuard` | 58 |
+| `IF.guard-POC-system-prompt.md` | 1 |
+| `IF.philosophy-database.md` | 1 |
+| `IF.philosophy-appendix.md` | 1 |
+| `IF.DOSSIER.ifttt-traceable-transparent-trustworthy-a-comprehensive-compliance-framework-for-ai-governance` | 1 |
+| `IF.DOSSIER.ifttt-compliance-framework-research-summary-and-key-findings` | 1 |
+| `IF.DOSSIER.ifttt-the-skeleton-of-everything` | 1 |
+| `IF.ESCALATE` | 1 |
+| `IF.DOSSIER.iftttledgerflowdeltasync-research-grade-repository-restructure` | 1 |
+| `IF.DOSSIER.emo-social-sergio-corpus-ingest-runtime` | 1 |
+| `IF.DOSSIER.ifemotion` | 1 |
+| `IF.emotion-style` | 1 |
+| `IF.DOSSIER.state-of-the-art-prompt-injection-defenses` | 1 |
+| `IF.DOSSIER.livre-blanc-le-dilemme-du-tuyau-sale` | 1 |
+| `IF.DOSSIER.deja-de-buscarte` | 1 |
+| `IF.DOSSIER.le-paradoxe-mambu` | 1 |
+| `IF.api` | 1 |
+| `IF.FORMAT` | 1 |
+| `IF.DOSSIER.history-file-error-handling-test-report` | 1 |
+| `IF.DOSSIER.cloud-session-legal-document-database-build` | 1 |
+| `IF.DOSSIER.ifbus-the-infrafabric-motherboard-architecture` | 1 |
+| `IF.BUS.v2.0.0` | 1 |
+| `IF.redis` | 1 |
+| `IF.dds` | 1 |
+| `IF.TTT.philanthropy.grant` | 1 |
+| `IF.philosophy-database-v1.1-joe-coulombe.yaml` | 1 |
+| `IF.GUARD.v1` | 1 |
-## if.* (canonical/module tokens)
+
+## if.* (lowercase tokens)
Unique: 10
| Token | Count |
|---|---:|
-| `if.api` | 16 |
-| `if.armour` | 3 |
-| `if.armour.secrets` | 7 |
-| `if.armour.secrets.detect` | 8 |
-| `if.bus` | 6 |
| `if.emotion` | 24 |
-| `if.infrafabric` | 1 |
+| `if.api` | 16 |
+| `if.armour.secrets.detect` | 8 |
+| `if.bus` | 7 |
+| `if.armour.secrets` | 7 |
| `if.legal` | 5 |
-| `if.search` | 1 |
+| `if.armour` | 4 |
| `if.ttt.ledgerflow.deltasync` | 3 |
-
-## IG.* (likely typos)
-
-Unique: 1
-
-| Token | Count |
-|---|---:|
-| `IG.GUARD` | 1 |
-
-## Notes
-
-- Found `IG.GUARD` at: `DANNY_STOCKER_INFRAFABRIC_DOSSIER.md:82`
-- This looks like a typo for `IF.GUARD` (or an alias that should be made explicit).
+| `if.search` | 1 |
+| `if.infrafabric` | 1 |
diff --git a/IF_MONIKERS_USED.md.sha256 b/IF_MONIKERS_USED.md.sha256
index db8ed72..1446f63 100644
--- a/IF_MONIKERS_USED.md.sha256
+++ b/IF_MONIKERS_USED.md.sha256
@@ -1 +1 @@
-8e40c5c6b8d8cd0d4b4c81234bc81a9b7178a8f7de7be75926485f63fe4c4c53 IF_MONIKERS_USED.md
+d53b3f9511b305b8a6eac92999f4c773244f69808369ce0e3b4b2bd4cee45df1 IF_MONIKERS_USED.md
diff --git a/IF_NAMING_BIBLE_v1.0.md b/IF_NAMING_BIBLE_v1.0.md
new file mode 100644
index 0000000..e056f26
--- /dev/null
+++ b/IF_NAMING_BIBLE_v1.0.md
@@ -0,0 +1,132 @@
+# InfraFabric Naming Bible (v1.0)
+
+**Date:** 2025-12-22
+**Author:** Danny Stocker
+**Status:** Canonical reference (refactor-in-progress)
+
+## Core principle
+
+Governance infrastructure must be comprehensible to the governed.
+
+Names in InfraFabric are chosen to be legible to non-specialists (think: secondary-school educated — nurses, farmers, receptionists, students), not only domain experts.
+
+Academic terminology is allowed, but it is subordinate: **first mention only**, in parentheses.
+
+## The two-tier naming system
+
+### Tier 1: Layer names (literal)
+
+Layer names are professional, literal domain descriptors.
+
+- Say what it is
+- No branding energy
+- “Boring” is good
+
+Examples:
+- `IF.GOV` (governance)
+- `IF.SECURITY` (security) — alias: `IF.SEC`
+- `IF.TRANSIT` (transport/transit)
+- `IF.AUDIT` (audit)
+
+### Tier 2: Component names (metaphorical)
+
+Component names use short metaphors that make the function obvious.
+
+- Short and punchy (1–2 syllables preferred)
+- Concrete mental image
+- Cross-cultural where possible
+
+## Metaphor selection strategy
+
+Don’t force a single metaphor domain. Use what makes each function clearest.
+
+Available domains (examples):
+
+- Medical/Emergency: `TRIAGE`, `QUARANTINE`
+- Legal/Civic: `PANEL`, `WITNESS`
+- Physical/Security: `DETECT`, `TRAP`
+- Logistics/Travel: `HUB`, `TRANSIT`
+- Investigation: `TRAIL`, `PROOF`
+
+## Canonical hierarchy (current refactor target)
+
+### `IF.GOV.*` (governance)
+
+- `IF.GOV.TRIAGE` (controversy-weighted risk stratification)
+- `IF.GOV.PANEL` (multi-agent oversight with structural dissent requirements)
+- `IF.GOV.PANEL.EXTENDED` (extended multi-agent oversight panel)
+- `IF.GOV.QUESTIONS` (provenance interrogative framework)
+- `IF.GOV.WITNESS` (audit observation and compliance monitoring)
+
+### `IF.SECURITY.*` (security)
+
+- `IF.SECURITY.DETECT` (context-aware secret detection)
+- `IF.SECURITY.CHECK` (epistemic anomaly detection and coherence validation)
+- `IF.SECURITY.WATCH` (threat intelligence and monitoring)
+- `IF.SECURITY.TRAP` (honeypot deployment and active defense)
+
+### `IF.TRANSIT.*` (transport)
+
+- `IF.TRANSIT.HUB` (privilege-enforced kinetic message router)
+- `IF.TRANSIT.MESSAGE` (cryptographically signed message protocol)
+- `IF.TRANSIT.SWARM` (distributed agent coordination)
+
+### `IF.AUDIT.*` (audit)
+
+- `IF.AUDIT.TRAIL` (immutable chain-of-custody logging)
+- `IF.AUDIT.PROOF` (portable verification bundle with replay capability)
+
+### Special cases
+
+- `IF.TTT` stays as a mnemonic triad (Traceable / Transparent / Trustworthy). It is a philosophy and compliance spine. Concrete artifacts should be named under `IF.AUDIT.*`.
+- `IF.STORY` stays as-is (product name: narrative logging).
+- `IF.EMOTION` stays as-is (application name: exemplar product).
+
+## Academic translation format
+
+**First mention only**:
+
+`IF.GOV.PANEL (multi-agent oversight with structural dissent requirements)`
+
+Avoid:
+
+- `aka`, `|`, or “formerly” in the main prose
+- treating internal legacy names as equal-status
+
+## Legacy → canonical mapping (v1)
+
+| Old name (legacy) | New name (canonical) |
+|---|---|
+| `IF.BIAS` | `IF.GOV.TRIAGE` |
+| `IF.GUARD` | `IF.GOV.PANEL` |
+| `IF.5W` | `IF.GOV.QUESTIONS` |
+| `IF.WITNESS` | `IF.GOV.WITNESS` |
+| `IF.ARMOUR` | `IF.SECURITY.CHECK` (and `IF.SECURITY.*` submodules) |
+| `IF.YOLOGUARD` | `IF.SECURITY.DETECT` |
+| `IF.PACKET` | `IF.TRANSIT.MESSAGE` |
+| `IF.BUS` | `IF.TRANSIT.HUB` |
+| `swarm.s2` | `IF.TRANSIT.SWARM` |
+
+## Testing heuristics
+
+### The “youth hostel test”
+
+Could a non-technical person read an audit trail and understand what happened?
+
+Example pass:
+
+“Your request went to TRIAGE, which escalated to PANEL. DETECT found a secret. The decision is recorded in AUDIT.TRAIL.”
+
+### The “government separation-of-duties” sanity check
+
+If in doubt, follow separation-of-duties patterns inspired by **US/CA/EU** governance structures:
+
+- separate triage (classification) from deliberation (decision)
+- separate detection (security) from actuation (transport)
+- separate recordkeeping (audit) from narrative (story)
+
+## Canonical registry
+
+- Machine-readable registry: `IF_NAMING_REGISTRY.yaml`
+- Component charters (separation-of-duties): `gov/`
+
diff --git a/IF_NAMING_BIBLE_v1.0.md.sha256 b/IF_NAMING_BIBLE_v1.0.md.sha256
new file mode 100644
index 0000000..61e2926
--- /dev/null
+++ b/IF_NAMING_BIBLE_v1.0.md.sha256
@@ -0,0 +1 @@
+8728ba5719e369d280443df30caafef6bdb69ea1f5829141afaf40b060173ac2 IF_NAMING_BIBLE_v1.0.md
diff --git a/IF_NAMING_REGISTRY_v1.0.yaml b/IF_NAMING_REGISTRY_v1.0.yaml
new file mode 100644
index 0000000..b0e726f
--- /dev/null
+++ b/IF_NAMING_REGISTRY_v1.0.yaml
@@ -0,0 +1,82 @@
+version: "1.0"
+date_utc: "2025-12-22"
+status: "draft-canonical"
+
+principles:
+ - "Layer names are literal domains (GOV/SECURITY/TRANSIT/AUDIT)."
+ - "Component names are short, concrete metaphors (TRIAGE/PANEL/DETECT/TRAIL)."
+ - "Names must be legible to non-specialists (secondary-school educated)."
+ - "Legacy names remain supported as aliases during transition."
+
+aliases:
+ IF.SEC:
+ points_to: "IF.SECURITY"
+
+forbidden:
+ - "IG.GUARD" # typo; use IF.GOV.PANEL / IF.GOV.PANEL.EXTENDED
+ - "ig.guard"
+
+names:
+ IF.GOV.TRIAGE:
+ legacy: ["IF.BIAS", "if.bias"]
+ academic: "controversy-weighted risk stratification"
+ description: "Preflight risk triage that sizes councils and decides escalation."
+
+ IF.GOV.PANEL:
+ legacy: ["IF.GUARD", "if.guard"]
+ academic: "multi-agent oversight with structural dissent requirements"
+ description: "Council governance protocol (minimum 5 seats including a contrarian)."
+
+ IF.GOV.PANEL.EXTENDED:
+ legacy: []
+ academic: "extended multi-agent oversight panel"
+ description: "Expanded panel up to ~30 seats for higher-stakes decisions."
+
+ IF.GOV.QUESTIONS:
+ legacy: ["IF.5W", "IF_5W", "if.5w"]
+ academic: "provenance interrogative framework"
+ description: "Structured inquiry briefs (who/what/when/where/why/how)."
+
+ IF.GOV.WITNESS:
+ legacy: ["IF.WITNESS", "if.witness"]
+ academic: "audit observation and compliance monitoring"
+ description: "Independent witness that validates governance and trace discipline."
+
+ IF.SECURITY.DETECT:
+ legacy: ["IF.YOLOGUARD", "if.yologuard"]
+ academic: "context-aware secret detection"
+ description: "Secret/relationship screening and credential hygiene primitives."
+
+ IF.SECURITY.CHECK:
+ legacy: ["IF.ARMOUR", "IF.armour", "if.armour"]
+ academic: "epistemic anomaly detection and coherence validation"
+ description: "Detective layer for coherence/inconsistency; no actuation authority."
+
+ IF.TRANSIT.HUB:
+ legacy: ["IF.BUS", "IF.bus", "if.bus"]
+ academic: "privilege-enforced kinetic message router"
+ description: "Deterministic actuation + privilege enforcement substrate."
+
+ IF.TRANSIT.MESSAGE:
+ legacy: ["IF.PACKET", "if.packet"]
+ academic: "cryptographically signed message protocol"
+ description: "Schema-first message envelope with trace IDs and audit metadata."
+
+ IF.TRANSIT.SWARM:
+ legacy: ["swarm.s2", "IF.SWARM.s2", "IF.SWARM.S2"]
+ academic: "distributed agent coordination"
+ description: "Intra-swarm coordination layer over a Redis bus."
+
+ IF.AUDIT.TRAIL:
+ legacy: ["IF.TTT"]
+ academic: "immutable chain-of-custody logging"
+ description: "Trace discipline + signing + verification hooks for disputes."
+
+ IF.AUDIT.PROOF:
+ legacy: []
+ academic: "portable verification bundle"
+ description: "Exportable evidence bundle + manifest + verifier steps."
+
+notes:
+ - "IF.TTT remains the philosophical umbrella; use IF.AUDIT.* for concrete artifacts."
+ - "Multi-lingual translations: planned; keep canonical IDs stable and translate descriptions."
diff --git a/IF_NAMING_REGISTRY_v1.0.yaml.sha256 b/IF_NAMING_REGISTRY_v1.0.yaml.sha256
new file mode 100644
index 0000000..74a3bcf
--- /dev/null
+++ b/IF_NAMING_REGISTRY_v1.0.yaml.sha256
@@ -0,0 +1 @@
+495679f1c79443a4aa8cd45dd3549e75b8a7947f61b035c41f530745cdfc865e IF_NAMING_REGISTRY_v1.0.yaml
diff --git a/gov/PANEL.md b/gov/PANEL.md
new file mode 100644
index 0000000..83c9f69
--- /dev/null
+++ b/gov/PANEL.md
@@ -0,0 +1,37 @@
+# IF.GOV.PANEL (legacy: IF.GUARD)
+
+## Role
+
+A multi-voice governance panel that reviews high-stakes decisions.
+
+- Minimum form: `IF.GOV.PANEL` (5 seats, includes contrarian)
+- Expanded form: `IF.GOV.PANEL.EXTENDED` (up to ~30 seats)
+
+## Responsibilities
+
+- deliberate on a proposed action/response
+- preserve dissent (minority opinions remain visible)
+- record votes and rationale as an auditable artifact
+
+## Non-responsibilities
+
+- not a latency-optimized mechanism for low-stakes chat
+- not a substitute for a human clinical board (mental-health-adjacent domains require explicit constraints)
+
+## Inputs
+
+- `TRIAGE` output (risk tier + recommended panel size)
+- the proposed action/response
+- evidence references (retrieval ids / citations / prior traces)
+
+## Outputs
+
+- allow / modify / block decision
+- votes + dissent record
+- escalation/appeal hooks (if applicable)
+
+## Required evidence
+
+- signed `PANEL` decision record under `IF.AUDIT.TRAIL`
+- link to the exact proposal bytes that were voted on (hash)
+- trace id included in final user-visible output
diff --git a/gov/QUESTIONS.md b/gov/QUESTIONS.md
new file mode 100644
index 0000000..5669353
--- /dev/null
+++ b/gov/QUESTIONS.md
@@ -0,0 +1,21 @@
+# IF.GOV.QUESTIONS (legacy: IF.5W)
+
+## Role
+
+A structured inquiry template to prevent hand-wavy governance.
+
+It forces deliberation to answer the basics (who/what/when/where/why/how) and to cite evidence.
+
+## Responsibilities
+
+- generate a brief that can be reviewed by `PANEL`
+- provide explicit slots for evidence and boundaries
+
+## Non-responsibilities
+
+- does not decide; it structures the inputs to decision
+
+## Required evidence
+
+- the brief is logged and hashed in the trace
+- any claim in the brief must point to a verification path or be labeled `UNVERIFIED`
diff --git a/gov/README.md b/gov/README.md
new file mode 100644
index 0000000..1dc374b
--- /dev/null
+++ b/gov/README.md
@@ -0,0 +1,30 @@
+# IF.GOV directory (separation-of-duties)
+
+This directory is the **governance charter layer** for InfraFabric.
+
+Purpose:
+- reduce concept drift / sprawl by defining *who does what*
+- make governance primitives legible to non-specialists
+- provide stable names for cross-app integration (CLI/API)
+
+Design framing: InfraFabric is not inventing “government”. It is adapting separation-of-duties patterns inspired by **US/CA/EU** governance structures to autonomous systems.
+
+## Components
+
+- `TRIAGE.md` — `IF.GOV.TRIAGE` (legacy: `IF.BIAS`)
+- `PANEL.md` — `IF.GOV.PANEL` + `IF.GOV.PANEL.EXTENDED` (legacy: `IF.GUARD`)
+- `QUESTIONS.md` — `IF.GOV.QUESTIONS` (legacy: `IF.5W`)
+- `WITNESS.md` — `IF.GOV.WITNESS` (legacy: `IF.WITNESS`)
+
+## Interface contract (v1)
+
+Each charter specifies:
+- responsibilities (what it *must* do)
+- non-responsibilities (what it *must not* do)
+- inputs/outputs
+- audit artifacts required under `IF.AUDIT.TRAIL` / `IF.TTT`
+
+## Naming
+
+- Canonical naming is defined in `../IF_NAMING_REGISTRY.yaml`.
+- Legacy names remain valid as aliases during transition.
diff --git a/gov/TRIAGE.md b/gov/TRIAGE.md
new file mode 100644
index 0000000..ceb34df
--- /dev/null
+++ b/gov/TRIAGE.md
@@ -0,0 +1,35 @@
+# IF.GOV.TRIAGE (legacy: IF.BIAS)
+
+## Role
+
+Classify a request by risk/controversy and decide what governance path is required.
+
+## Responsibilities
+
+- assign a risk tier and an escalation recommendation
+- size the panel (minimum vs extended)
+- emit a signed decision record (even when rejecting/short-circuiting)
+
+## Non-responsibilities
+
+- does not generate the final user answer
+- does not “deliberate” on truth claims; it only classifies and routes
+
+## Inputs
+
+- user request metadata (actor id, request type, policy surface)
+- optional: retrieval/context hints
+
+## Outputs
+
+- `panel_size` recommendation (e.g., 5 → 30)
+- escalation path (fast path vs panel)
+- required seats (e.g., contrarian mandatory)
+
+## Required evidence
+
+- trace id for the request
+- a `TRIAGE` event logged to `IF.AUDIT.TRAIL` with:
+ - inputs hashed
+ - output decision + panel size
+ - link to the follow-on `PANEL` decision (if invoked)
diff --git a/gov/WITNESS.md b/gov/WITNESS.md
new file mode 100644
index 0000000..b761018
--- /dev/null
+++ b/gov/WITNESS.md
@@ -0,0 +1,21 @@
+# IF.GOV.WITNESS (legacy: IF.WITNESS)
+
+## Role
+
+A witness is the “auditor in the room”: it checks that governance rules were followed and that required artifacts exist.
+
+## Responsibilities
+
+- validate that TRIAGE and PANEL produced required artifacts
+- validate that the final output includes trace id and citation formatting rules
+- raise “no-trace-no-trust” errors when invariants are violated
+
+## Non-responsibilities
+
+- does not override governance decisions on substance
+- does not act as a judge; it acts as a verifier
+
+## Required evidence
+
+- witness checks are logged as trace events
+- witness failures are exported as part of `IF.AUDIT.PROOF` bundles when disputes occur