Implementation Gaps in the DIA Constitutional Layer¶
Document Status¶
| Field | Value |
|---|---|
policy-id |
DIA-CONST-GAPS-001 |
type |
Architectural review / backlog of implementing documents |
version |
0.1.0-draft |
date |
2026-03-10 |
Purpose of the Document¶
This document collects the gaps that remain after completion of the Constitution
and the first documents under doc/normative/50-constitutional-ops/. It has no normative force;
it serves to organize the next implementation steps.
Recently Closed¶
FEDERATION-MEMBERSHIP-AND-QUORUM.md¶
Closed on 2026-03-10 by document DIA-FED-001, which defines:
- the statuses of active, dormant, suspended, and retired federations,
- the minimum activity criteria,
- electorate snapshot, quorum, and decision classes,
- the rules for losing veto rights by a dead federation.
PROCEDURAL-REPUTATION-SPEC.md¶
Closed on 2026-03-12 by document DIA-PROC-REP-001, which defines:
- reputation domains and signal types,
- the definition of an active node for reputation purposes,
- bootstrap and bootstrap restrictions,
- a portable evidence package instead of naked score transfer,
- cartel-detection hooks and connection to health metrics M1-M5.
PANEL-SELECTION-PROTOCOL.md¶
Closed on 2026-03-12 by document DIA-PANEL-SEL-001, which defines:
- panelist eligibility,
- entropy source and auditable panel draw,
- COI, veto, and composition-replacement procedure,
- escalation to an inter-federation pool,
- panelist identity-disclosure levels and relation to appeal.
ABUSE-DISCLOSURE-PROTOCOL.md¶
Closed on 2026-03-12 by document DIA-ABUSE-DISC-001, which defines:
- prohibition on general investigation without a credible present-day signal,
- conditions for entering the full case history,
stake-levelandevidence-levelthresholds,- multisig roles, disclosure scope, retention, appeal, and jurisdictional notifications.
ROOT-IDENTITY-AND-NYMS.md¶
Closed on 2026-03-12 by document DIA-ROOT-ID-001, which defines:
- the separation of
root-identity,anchor-identity,node-id,nym,station-id, andagent-id, - identity assurance levels (
IAL0-IAL4), - the rule "greater influence -> greater disclosure and stronger confirmation",
- a multisig attestation model for jurisdictions without strong eID,
- limits on multiplying influence through many nyms from one anchor source.
IDENTITY-ATTESTATION-AND-RECOVERY.md¶
Closed on 2026-03-12 by document DIA-ID-REC-001, which defines:
- first attestation of
root-identity, - memory of prior attestation for
anchor-identity, - the role of the recovery phrase,
salt, and KDF parameters, - reconstruction of
anchor-identitywithout repeated full attestation, - the procedure for identity-data update and revocation.
ATTESTATION-PROVIDERS.md¶
Closed on 2026-03-12 by document DIA-ATTEST-PROVIDERS-001, which defines:
- the attestation-strength classes
weak/strong, - the default mapping from methods to maximum
IAL, - restrictions for phone numbers and other low-evidence sources,
weak -> strongupgrade rules without loss of anchor continuity.
IDENTITY-UPGRADE-ANOMALY-SIGNALS.md¶
Closed on 2026-03-12 by document DIA-ID-UPGRADE-ANOM-001, which defines:
- signal classes
A1-A8for attestation upgrade, - minimum response levels
monitor,soft_hold,manual_review,hard_block, - the default profile for
phone -> strong, - the relation between attestation upgrade and procedural dispute.
IDENTITY-UNSEALING-BOARD.md¶
Closed on 2026-03-12 by document DIA-SEAL-BOARD-001, which defines:
- the Federation of Sealed Chambers as a redundant IRL organ,
- thresholds
U1-U3for descentnym -> node-id -> root-identity, - multi-chamber and cross-jurisdictional quorum,
- split knowledge for mapping
node-id -> root-identity, - appeal from full-unsealing decisions.
UNSEAL-CASE-MODEL.md¶
Closed on 2026-03-12 by document DIA-UNSEAL-CASE-001, which defines:
- a shared
unseal_casemodel for thresholdsU1-U3, - a separate decision record with scope, side effects, and appeal window,
- minimal fields for retention, COI, panel, and notifications,
- the rule that scope escalation does not overwrite case history.
ROLE-TO-IAL-MATRIX.md¶
Closed on 2026-03-12 by document DIA-ROLE-IAL-001, which defines:
- the minimum map from role classes to
IAL0-IAL4, - the rule that
IALis mainly a gate, not an influence multiplier, - the
fixed_power_bonuscap of<= 1%, - default minimums for panels, sealed chambers, and high-stake roles.
FIP-MEMBERSHIP-AND-QUORUM.md¶
Closed on 2026-03-12 by document DIA-FIP-QUORUM-001, which defines:
- chamber statuses from
candidatetoretired, - minimum conditions for
activestatus, - default quorum
2 of 3forU2and3 of 5forU3, - emergency mode, composition snapshot, and jurisdictional diversity rules.
SWARM-ECONOMY-SUFFICIENCY.md¶
Closed on 2026-03-21 by document DIA-SUFF-001, which defines:
- the operational model of the sufficiency threshold and tapering band,
- permissible classes of concentration brakes and the anti-pyramid test,
- the minimal data model of federation economic policy,
- common circulation of surpluses and their destination classes,
- the barrier between economic reward and procedural power.
RAW-SIGNAL-POLICY.md¶
Closed on 2026-03-21 by document DIA-RAW-001, which defines:
- the modes
raw/structured/transformed/redacted, - permissible bases for signal transformation,
- mandatory meta-markers for AI intervention,
- the minimal audit trace for utterance transformation,
- compliance tests against hidden aestheticization and professionalization.
UNIVERSAL-BASIC-COMPUTE.md¶
Closed on 2026-03-21 by document DIA-UBC-001, which defines:
- the minimal
Proof-of-Personhoodmodel without default de-anonymization, - the non-withdrawable minimum of compute for communication, orientation, and protective modes,
- limited cross-federation portability: unlimited emergency plus limited communication and care,
- the data models
proof_of_personhood_attestation,ubc_allocation, andubc_settlement, - public funding sources for
UBCand compliance tests against hidden exclusion.
UBC-LIMIT-PROFILES.md¶
Closed on 2026-03-21 by document DIA-UBC-LIMITS-001, which defines:
- the canonical profiles
emergency_unlimited,communication_limited, andcare_limited, - the minimal
bridge_minimumprofile for PoP recognition through theFIPbridge/registry, - the portability profiles
local_only,trans_federation_limited, andtrans_federation_extended, - the explicit
FIPbridge record model and the rule that federations may only extend limits, - compliance tests against nominal cross-federation PoP recognition without real access.
Priority A - Required Before Real Governance Goes Live¶
After closing PROCEDURAL-REPUTATION-SPEC.md,
PANEL-SELECTION-PROTOCOL.md, and ABUSE-DISCLOSURE-PROTOCOL.md,
there is currently no open Class A gap. The minimum governance layer now has the
three implementing acts that were previously missing.
Priority B - Required Before Higher-Stakes Autonomy and Sensorium¶
1. EMERGENCY-ACTIVATION-CRITERIA.md¶
Closed on 2026-03-28 by DIA-EMRG-ACT-001, which defines:
- trigger classes
TC1-TC5, - credibility thresholds
C0-C4, - the sensorium -> evaluation -> activation pipeline,
- default TTLs, extension rules, and mandatory review,
- and a TC2 subclass for
council:did:keycompromise with trapdoor freeze, emergency key rotation, and ad-hoc audit panel requirements.
2. SENSITIVE-DATA-REDUCTION.md¶
Why it is missing: publication, whistleblowers, exceptions, and onboarding refer to redaction of sensitive data, but there is no shared standard of redaction and disclosure.
What it must define:
- classes of sensitive data,
- levels of redaction,
- rules of selective disclosure,
- minimum audit traces without deanonymization.
Priority C - Required Before Federation-Scale Expansion¶
3. ROLE-REGISTRY.md¶
Why it is missing: the Constitution and supplements use notions such as "public-trust role," "operator," "red team," and "panel," but they do not have a shared role registry.
What it must define:
- catalog of base roles,
- minimum permissions and forbidden role combinations,
- screening requirements,
- paths of rotation and substitutability.
4. TRACE-MINIMUM.md¶
Why it is missing: agent autonomy, exceptions, reputation, and constitutional defense require action traces, but they do not yet have a shared minimum schema.
What it must define:
- required trace fields,
- relation trace -> audit -> appeal,
- retention classes,
- trace versioning and signatures.
Final Note¶
The most critical gaps of the governance layer have been closed by
EXCEPTION-POLICY.md, FEDERATION-MEMBERSHIP-AND-QUORUM.md,
PROCEDURAL-REPUTATION-SPEC.md, PANEL-SELECTION-PROTOCOL.md, and
ABUSE-DISCLOSURE-PROTOCOL.md. The next logical step is to specify
emergency activation criteria, sensitive-data redaction, and the
minimum action-trace schema, so the implementing layer is equally coherent
outside disputes and governance.