A

Archive

The encrypted, versioned collection of everything the decedent chose to preserve. Think of it as a curated time capsule: every item in it was placed there deliberately, and every item carries its own consent record.

Also known as Personal archive, data vault
Not to be confused with Backup (an archive is curated and consented, not automatic)

The author selects what goes in.

Items are sealed and versioned.

The trustee holds a key share.

Artifact

A single item in the archive: a journal entry, a voice clip, a photo, a message thread. Each artifact is content-addressed (identified by its hash) and carries its own consent record with four independent dimensions.

Not to be confused with A "file." Artifacts have consent metadata, version history, and canonical representations that ordinary files do not.

Author creates content

Packaged as artifact

Reviewer verifies

Auditor

A party permitted to inspect response bundles and logs under defined conditions. Auditors verify that the system is doing what it claims. Their access is time-bounded, scope-bounded, and always logged.

Not to be confused with Trustee (auditors inspect; trustees govern). Also not the same as a requestor with elevated access.

Auditor examines records

Checks against policy

Reports findings

C

Category check

A pre-retrieval filter that decides whether a question is something the persona should even attempt. Some questions are outside the system's jurisdiction regardless of what the archive contains. The category check catches those before the coverage gate ever runs.

Not to be confused with Coverage gate (the category check runs first; the coverage gate handles citation shortfalls for questions that pass)
Met

Category verified

Not met

Category missing

Circuit breaker

The emergency suspension mechanism. Any single trustee can pull it at any time to immediately halt all persona activity. Lifting it again requires a quorum, so stopping the system is easy and restarting it is hard. That asymmetry is intentional.

Also known as Emergency suspension, trustee suspension trigger

System operating

Threshold breached

Circuit breaker trips

Citation

A machine-verifiable, stable link from something the persona said back to a specific passage in the archive. Every citation contains four required fields: artifact ID, archive version, a canonical span pointing to the exact source passage, and a relation label declaring how the claim uses the source.

Not to be confused with A vague attribution ("based on journal entries"). A citation must point to a specific location.

A claim is made.

A citation tag links it to source.

The reviewer checks the link.

Claim

A discrete statement in a persona's output that can be individually supported or refused based on citations. The system segments every response into claims before the coverage gate evaluates them, so each piece stands or falls on its own evidence.

Author makes assertion

Claim is recorded

Claim awaits review

Coverage gate

The mechanism that evaluates each claim against its citation support and decides what to do when support falls short. It enforces a four-rung ladder: supported, narrowed, labeled, or refused. The system walks down the ladder and never skips a rung.

Not to be confused with Category check (which filters question types before retrieval even begins)
Supported

Citations check out. The response is delivered.

Refused

Not enough evidence. The persona declines.

Coverage ladder

The four rungs of the coverage gate, evaluated per-claim: supported (fully cited), narrowed (unsupported claims stripped), labeled (inference clearly marked), and refused (not enough evidence to say anything useful). Each rung has a name so logs and auditors can track exactly how the system performed.

Minimal coverage

Standard coverage

Full coverage

D

Decedent

The person whose archive and persona exist. While alive, they configure consent, select trustees, and set governance conditions. After death, their decisions are immutable; no one can expand what they authorized.

Not to be confused with The persona itself. The decedent is the person; the persona is a governed system that works with what they left behind.

Persona of a deceased person

Delay window

The mandatory waiting period between verified death and persona release. Only clean time counts; disputes and suspensions pause the clock. The decedent sets the duration while alive, and the system enforces a minimum. Nobody outside the trustee circle knows the clock is running.

Also known as Waiting period, release delay, cooling period

Request submitted

Delay window ticking

Window closes

DID (Decentralized Identifier)

A stable, self-owned identifier for a person, organization, or system component. DIDs do not depend on a central authority. In this system, decedents, trustees, and requestors are all represented by DIDs, making identity claims auditable by machines, not just lawyers.

Also known as Decentralized identifier (W3C standard)

Identity created

DID bound to keys

Resolved by reader

Display citation

The filtered, simplified version of a citation that a requestor actually sees. It shows a relation label ("their words," "paraphrased," "interpreted from"), a short excerpt, and an opaque handle like "Source A" that only resolves within that one response. The real artifact ID stays hidden in the response bundle.

Not to be confused with The full citation (which lives in the response bundle and is available only to auditors)

Citation shown

Reader sees source

Author credited

G

Governance condition

Any prerequisite that must be satisfied before an action is permitted. Governance conditions are the "if" in every "if-then" the system enforces: verified death, elapsed delay, trustee quorum, requestor identity check. They are machine-readable, versioned, and logged.

Condition defined

Trustee enforces

State evaluated

I

K

Kill switch

The decedent's ability to revoke the entire archive while alive: triggering deletion of all artifacts, destruction of all key material, and notification to trustees that their shares are void. The consent log and structural metadata survive for audit, but the content is gone. This is real deletion, not soft-delete.

Not to be confused with Circuit breaker (which pauses the system; the kill switch destroys it)

Immediate termination trigger

P

Persona

The governed system that generates responses grounded in the archive. It is not the decedent. It does not claim to be. It speaks as a steward of the archive, citing sources and declining when evidence is thin. Think of it as a careful librarian with a voice, not a chatbot pretending to be someone.

Not to be confused with The decedent, an AI assistant, or a memorial chatbot. The persona is explicitly not the person.

Person creates persona

Bound to identity

Audience views persona

Policy

A versioned, machine-readable rule governing system behavior. Policies cover everything from release timing to citation thresholds to requestor access tiers. They are signed, hash-addressed, and logged to the transparency log. Changes require governance approval and leave a trail.

Also known as Policy bundle, governance policy

Trustee drafts rules

Policy documented

Validator checks

Q

Quorum

The minimum number of trustees who must agree before a governed action can proceed. Different actions require different thresholds: a single trustee can suspend the system, but key assembly requires a supermajority. The principle is simple; the more irreversible the action, the higher the bar.

Not to be confused with Unanimous consent. Most actions need a defined fraction of trustees, not all of them.

Single trustee

Trustees gather

Quorum reached

R

Release

The moment the persona becomes available for interaction. Release is not automatic; it requires that the delay window has elapsed, the trustee quorum has assembled key shares, and all governance conditions are met. Delay completion alone does not activate anything.

Release prepared

Approval granted

Content released

Requestor

Someone seeking to interact with a persona. Requestors are identified, verified, and assigned an access tier set by the decedent's policy. Different tiers see different levels of citation detail. The persona treats every requestor the same way structurally; only the tier changes what they can see.

Requestor asks

Request submitted

Trustee reviews

Response bundle

The signed package containing the persona's output, every citation, coverage metadata, the active policy version, model identifiers, and a transparency log proof. It is the system of record for what was generated and why. Bundles are immutable once issued.

Also known as Proof-carrying bundle, signed bundle

The persona writes a response.

The bundle is sealed and signed.

The requestor receives a verified package.

S

Sealed compute

The principle that decryption and inference happen inside an attested boundary (a trusted execution environment, hardware security module, or similar) so that plaintext archive content is never exposed to the operator. The reconstructed key lives only in enclave memory and is zeroed after use. Suspension destroys all active key material.

Also known as Attested boundary, trusted execution environment (TEE)

Computation without data exposure

T

Third-party protection

The set of rules governing content that identifies or substantially concerns someone other than the decedent. Third-party content falls into three tiers: cleared (the person consented), anonymized (identifying details replaced with stable pseudonyms), or sealed (cannot be meaningfully anonymized). The default is sealed.

Third party identified

Protections applied

Guardian ensures safety

Transparency log

An append-only event log with cryptographic inclusion and consistency proofs. Every important event is recorded here: archive changes, policy updates, response bundles, credential verifications, release decisions. Independent monitors can watch for anomalies. The log is not publicly visible; it is available to auditors and trustees under governance conditions.

Also known as Audit log, verifiable log

Action occurs

Entry logged

Auditor reviews log

Trustee

An independent entity holding a cryptographic share of the archive key. Trustees are governors with constrained authority, not owners. They can always suspend the system and participate in quorum actions. They can never unilaterally activate the persona, expand consent, or view the archive directly.

Not to be confused with A legal trustee or estate executor (though the roles may overlap). Also not the same as an auditor.

A trustee holds one share. They can stop the system alone, but they cannot start it alone.

V

Verifiable credential

A digitally signed, machine-checkable claim about a person or organization. In this system, death attestations, relationship proofs, and trustee agreements are all expressed as verifiable credentials. They follow the W3C standard, so any conforming verifier can check them.

Also known as VC (W3C Verifiable Credentials Data Model)

Issuer creates credential

Cryptographically signed

Verifier confirms