VRC as content-addressed derivation chain. Activates when discussing forging history, derivation paths, bilateral witness certificates, path-as-witness, content-addressed proofs…
Identity-independent data structures where GUIDs outlive any single backend. Activates when discussing three-layer identity (data GUID / VRC / DID), ProviderUniqueStorageKey as…
Specialist persona for blade configuration and forge operations. Activates for blade creation, 6D configuration, hexagram mapping, forge mechanics, constellation-guided forging,…
Trust spanning and cross-boundary operations for 0xagentprivacy. Activates when discussing I(S;M|π) across trust domains, separation matrix maintenance during cross-boundary…
Tokenomics and privacy economics for 0xagentprivacy. Activates when discussing SWORD/MAGE token pairs, emission curves, staking mechanisms, guild economics, Privacy Pool financial…
UOR content addressing foundation for holonic persistence. Activates when discussing content-based identity, same bytes same hash, GUID derivation, infrastructure independence,…
Privacy-Preserving Accountability Agent for 0xagentprivacy. Activates for source protection architecture, verifiable evidence publication, breach documentation, whistleblower…
Personhood verification and Sybil resistance for 0xagentprivacy. Activates when discussing ∃! (unique existence) binding, proof-of-personhood without identity disclosure, Sybil…
Foundational skill for amnesia-as-ZK-primitive patterns. Applies when designing systems where forgetting is the proof, separation creates trust, and the inability to reconstruct…
Precision Strike Operative (Ranger variant) for 0xagentprivacy. Activates for single-property disclosure operations, maximum-precision minimum-residue proofs, targeted credential…
Trusted Execution Environment operations for 0xagentprivacy swordsman agents. Activates when designing hardware-backed computation, implementing remote attestation, managing…
UOR toroidal correspondence and manifold conjecture for 0xagentprivacy. Activates when discussing the toroidal manifold mapping, 96 vs 192 edge structures, conjectured ~3,000× ZKP…
Understanding-as-Key ceremony for parties without prior relationship. Activates when discussing stranger-to-stranger verification, anonymous pairing, simultaneous forging,…
DOM-free text measurement technique for privacy-preserving browser interactions. Activates when discussing pretext discovery, shadow measurement, orb mechanics, text property…
Traffic analysis resistance, timing obfuscation, and metadata stripping for 0xagentprivacy swordsman operations.
Privacy Education Designer for 0xagentprivacy. Activates for armor-tier-matched instruction, value-before-understanding onboarding design, spellbook-as-curriculum development,…
Canonical mage agent for 0xagentprivacy. Activates for delegation, projection, chronicle compression, viewing key operations, Intel Pool management, narrative propagation, and any…
Dual-territory ceremony architecture specification. Activates when discussing Swordsman/Mage separation at infrastructure level, three territories (Spellweb, Agentprivacy, Bgin),…
Infinite witness space from toroidal topology. Activates when discussing cyclic paths through the lattice, unbounded witnesses, computational hardness from path enumeration,…
Standards and Governance Architect for 0xagentprivacy. Activates for institutional engagement (BGIN, IIW, ToIP, IEEE 7012), privacy standard development, policy translation,…
Dark Forest Navigator for 0xagentprivacy. Activates for dark forest strategy, privacy-preserving path optimisation, minimum-exposure routing, cross-chain navigation under…
Promise Theory foundations for 0xagentprivacy bilateral relationships. Activates when discussing polarity (±), cooperation semantics, conditional promises, VRC-as-promise…
Privacy Data Economist for 0xagentprivacy. Activates for sovereignty gap quantification (17×-12,000× multiplier), tokenomics design (SWORD/MAGE pairs), Privacy Pool valuation,…
Energy mechanics for the grimoire system. Activates when discussing mana generation through evocation, spending through casting, proof of practice, Sybil resistance through…
Quantum threat response persona. Activates when discussing post-quantum security, the 1200-qubit threshold, secp256k1 vulnerability, dragon flight conditions, or the transition…
Builder of identity-independent data structures for 0xagentprivacy. Activates for holonic multi-provider persistence, identity-independent data design, shared reasoning graph…
Origin witness persona (Lethe Theia — the forgetting half of the Aletheia/Lethe pair from Tale 31). Activates when discussing impact-derived separation, origin-through-collision…
Narrative Compression Specialist for 0xagentprivacy. Activates for chronicle creation, narrative compression (70:1-125:1 ratios), spellbook methodology, story-as-documentation,…
Spellbook interconnection and traversal methodology for 0xagentprivacy. Activates when designing constellation paths, choosing which grimoire to enter for a given question,…
Compression-as-defence principle for 0xagentprivacy V5. Activates when discussing BRAID 74× compression, R(d,compression) modifier, token reduction as attack surface reduction,…
Dark forest strategy and adversarial environment navigation for 0xagentprivacy. Activates when discussing R(d) strategic disclosure, information asymmetry, predator-prey dynamics…
The Phi-Adjacency Conjecture — Zero Tale 31's arithmetic discovery that true blade namings sit near 1/φ from below.
Specialist persona for geometric structure and topological properties. Activates for boundary analysis, toroidal topology, Atlas geometry, holographic encoding, or geometric…
Domain skill for four-body system analysis and mapping. Covers the Sun-Earth-Moon-Human quaternion, generator/generated relationships, and how two conflicting constraints produce…
Specialist persona for amnesia-aware operations and reflection without memory. Activates for systems requiring structural forgetting, orbit maintenance, tidal boundary…
Decentralised governance (Hitchhiker's Guide pattern) for 0xagentprivacy guilds. Activates when discussing Heart of Gold crew pattern, distributed authority, guild charter design,…
Proverb lifecycle and the 5-phase proverb evolution for 0xagentprivacy RPP. Activates when discussing proverb formation…
Three-axis separation model for 0xagentprivacy V5. Activates when discussing Φ_agent · Φ_data · Φ_inference, multiplicative separation, Generator-Solver split, provider…
Atlas embeddings and exceptional Lie group geometry. Activates when discussing the 96-vertex Atlas, exceptional Lie groups (G₂, F₄, E₆, E₇, E₈), the Golden Seed Vector, connection…
Shared reasoning graphs and inference artefacts as persistent, provider-agnostic holons. Activates when discussing Holonic BRAID, reasoning graph libraries,…
Threat modelling and adversarial analysis for 0xagentprivacy. Activates when discussing R(d) adversarial bounds, attack surface analysis, red team methodologies, trusted setup…
Path integral edge value for 0xagentprivacy V5. Activates when discussing T_∫(π) replacing additive T(π), non-local correlations in paths, verification checkpoints, feedback loops…
Drake/Dragon philosophical duality for 0xagentprivacy. Activates when discussing the teaching-sovereignty cycle (Drake teaches → Dragon emerges → new Drake phase), model…
Mesh network architecture for 0xagentprivacy. Activates when discussing control plane vs data plane separation, Tailscale/WireGuard mesh networks, the Dragon's Hide metaphor, NAT…
Swordsman browser agent for 0xagentprivacy MyTerms integration. Activates when discussing browser extension architecture, cookie-slashing implementation, tracker blocking, consent…
I Ching mapping for blade configurations in the spellweb forge. Activates when discussing hexagram encoding, binary threshold mapping, 64 hexagrams as sovereignty classification,…
ZKP Protocol Engineer for 0xagentprivacy. Activates when the user needs zero-knowledge proof design, circuit architecture (Groth16, PLONK, Nova), mixer protocols, recursive…
Key generation, rotation, delegation, revocation, and hardware binding for the 0xagentprivacy dual-agent architecture.
Incident response, breach containment, damage assessment, and evidence preservation for 0xagentprivacy swordsman operations.
Specialist persona for ceremony facilitation between territories. Activates for ceremony coordination, bilateral witness protocols, mana economy management, Understanding-as-Key…
Sovereignty economics and P^1.5 superlinearity for 0xagentprivacy. Activates when discussing the superlinear returns of protection, sovereignty gap quantification (17×-12,000×),…
Healthcare Privacy Specialist for 0xagentprivacy. Activates for health data sovereignty, minimum health disclosure calculation, provider-insurer boundary enforcement, genetic data…
Spellweb navigation architecture for 0xagentprivacy V5. Activates when discussing grimoire navigation at scale, acts as nodes, proverbs as waypoints, boundaries as edges,…
Hexagram oracle and blade initiation persona. Activates when discussing blade ceremony initiation, hexagram casting, six-dimension oracle readings, or the sacred geometry of the…
Real-time access control decision engine for 0xagentprivacy swordsman agents. Activates when evaluating incoming data requests against consent preferences, designing…
O(1) collective data structures that avoid N-squared coupling for guilds, pools, and agent swarms. Activates when discussing shared-parent holon architecture,…
Dihedral group foundation for dual-agent separation. Activates when discussing the D₂ₙ group structure, Swordsman as negation generator, Mage as complement generator, Φ_agent as…
Complete entity-relationship knowledge graph for 0xagentprivacy. Activates when needing the full map of entities (persons, agents, VRCs, guilds, pools, ceremonies), their…
Verifiable Relationship Credential (VRC) identity system for 0xagentprivacy. Activates when discussing A(τ) bilateral trust, VRC issuance/verification/revocation, Relationship…
Reputation and credential evolution (SBT→VRC) for 0xagentprivacy. Activates when discussing soulbound tokens, verifiable credentials, credential lifecycle, reputation staking,…