These are design explorations meant to spark thinking. They are not promises of a working system. Some may prove impractical. Some may inspire better ideas. That is the point.

1 Policy as Code

What it is

Safety and governance rules expressed as versioned, machine-readable artifacts; not prose documents or informal agreements. Every policy bundle has a version number, a content hash, and a cryptographic signature.

Why it matters

"We follow best practices" is not auditable. A signed policy hash included in every response bundle is. When rules are code, compliance can be checked by a machine. When rules are prose, compliance is checked by optimism.

How it works
Benefit: machine-verifiable compliance

An auditor checks the policy hash against the response bundle. The rules that governed the interaction are provably the ones on file. Compliance is a fact, not a claim.

Risk: policy language rigidity

An overly rigid policy blocks a legitimate use case. The trustee cannot override it without a new version, a new signature, and a new approval cycle. Flexibility and safety are in tension.

Benefits

Risks and open questions. Policy languages are hard to get right. Expressiveness and safety pull in opposite directions. Overly rigid policies can block legitimate use; overly flexible ones can be gamed. Writing good policy code requires both domain expertise and formal reasoning skills, and the intersection of those two groups is small. There is also the question of who audits the policy language itself.

2 Local-First Archive

What it is

The archive is encrypted, portable, and user-controlled from the start. This is not a cloud service that happens to encrypt. The data lives where the decedent (or their trustees) put it, in a format that does not depend on any single operator.

Why it matters

If the archive lives on someone else's infrastructure with someone else's keys, "your data" is a polite fiction. Operator bankruptcy, acquisition, or policy changes can make the archive inaccessible overnight. Local-first means the archive survives the service.

How it works
Benefit: portable and resilient

The trustee moves the archive to a new host. The integrity manifests still check out. The archive survives the death of the original operator.

Risk: key management burden

A trustee loses their key share. If too many shares are lost, the archive becomes permanently inaccessible. The safety margin depends on the original trustee configuration.

Benefits

Risks and open questions. Users and trustees take on real responsibility for key management. The trustee model mitigates this, but it does not eliminate it. Format obsolescence is a concern over decades, though standard packaging (BagIt, well-known encryption formats) helps. The operational burden is larger than "just upload to the cloud." Some people will find this unacceptable, and that is a fair objection.

3 Verifiable Audit Trail

What it is

A transparency log with cryptographic inclusion proofs; not just a database table of events. Every significant action in the system is recorded in an append-only structure that third parties can verify independently.

Why it matters

"We logged everything" means nothing if the logs can be silently edited. A conventional database can be changed by anyone with admin access, and no one outside the organization would know. Append-only logs with cryptographic proofs make tampering detectable, even by people who do not trust the operator.

How it works
Benefit: independent verification

Two independent auditors fetch the same checkpoint and reach the same conclusion. Neither has to trust the operator or each other.

Risk: log availability

The log server goes down or withholds entries. Monitors detect the gap eventually, but not instantly. Metadata in the logs could also be sensitive.

Benefits

Risks and open questions. Log availability depends on infrastructure. A compromised log server can withhold entries; monitors will detect this, but detection is not instantaneous. Logs necessarily contain metadata (who accessed what, when, how often) that could itself be sensitive. Balancing transparency with privacy in the log design is a genuine tension that does not have a clean resolution yet.

4 Model Drift Containment

What it is

Frozen behavior profiles and regression anchors that detect when the persona's behavior changes unexpectedly. The system does not just check whether the persona sounds right; it checks whether the persona follows the same structural rules it followed before.

Why it matters

Models change. Updates, fine-tuning, infrastructure migrations, and even hardware differences can subtly alter behavior. Without a detection mechanism, drift is invisible. The persona might start making claims it would not have made last month, and no one notices until someone is hurt.

How it works
Benefit: early warning

The reviewer runs regression anchors after a model update. Two anchors fail: the persona accepted a question it should have refused. The system flags the change before any requestor encounters it.

Risk: untested surface area

The anchors cover common cases but miss an edge case. The persona drifts in a way the tests do not detect. The requestor receives a subtly wrong response.

Benefits

Risks and open questions. Regression anchors test a sample, not exhaustive behavior. Subtle drift in untested areas can still happen. Maintaining anchors requires ongoing effort; they need to be updated as the archive grows and policies change, but each update risks introducing new blind spots. There is also a philosophical question: how much behavioral change is acceptable? Zero tolerance may be unrealistic for systems that depend on external model infrastructure.

5 Challenge and Correction Channel

What it is

A structured path for third parties to dispute death verification, report errors, and trigger corrections. Not a suggestion box; a formal mechanism with defined resolution procedures and real consequences.

Why it matters

No verification process is perfect. The system needs a way to receive "you got this wrong" that does not require trusting the challenger or the system. If the only way to correct an error is to convince the operator they made a mistake, errors will persist indefinitely. A structured channel makes correction a process, not a negotiation.

How it works
Benefit: error recovery

A third party files a challenge with evidence. The trustees convene, evaluate the evidence, and issue a correction. The original determination and the correction both exist in the log.

Risk: channel abuse

Frivolous challenges flood the system. Each one requires trustee attention and delays legitimate activation. The balance between accessibility and protection against harassment is difficult to calibrate.

Benefits

Risks and open questions. Challenge channels can be abused. Frivolous or malicious challenges consume trustee time and delay legitimate use. Balancing access with protection against harassment is a real design problem; too easy and the channel is a weapon, too hard and it fails its purpose. Resolution timelines also matter: a challenge that takes months to resolve can delay activation past the point of usefulness. There is no clean answer here, only tradeoffs that need to be tuned for specific deployments.