amduat-api/notes/Sedelpress.md
2026-01-17 00:19:49 +01:00

100 lines
4.2 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

Ah, I love that metaphor! “Sedelpress” as in a press for stamping or minting receipts — in English we could think of it as a **“stamp press”** or **“receipt press”**: you feed it the raw material, and it mints a deterministic, certified output (the PER). Perfect for your rescue node scenario.
Heres how I would visualize your **Rescue Node data flow with PER generation as the first-class citizen**:
---
# Rescue Node ASL + PER Flow Diagram (Conceptual)
```
┌──────────────────────────────┐
│ Local Material / Input │
│ - Home dir, app data │
│ - Certificates │
│ - Program specs / provenance│
│ - Intent / contract │
└─────────────┬────────────────┘
┌──────────────────────────────┐
│ Sedelpress / PER Engine │
│ - Deterministic execution │
│ - TGK edges & provenance │
│ - Snapshot boundaries │
│ - Logs + execution receipts │
└─────────────┬────────────────┘
│ PERs + TGK provenance
┌──────────────────────────────┐
│ Personal Domain Store │
│ - Blocks (sealed) │
│ - Index segments │
│ - Logs / append-only │
│ - Snapshots for CURRENT │
└─────────────┬────────────────┘
│ optional encrypted export
┌──────────────────────────────┐
│ Common / Unity Domain │
│ - Shared blocks & artifacts │
│ - Read-only pinned snapshot │
│ - Published receipts │
└─────────────┬────────────────┘
│ optional trust / import
┌──────────────────────────────┐
│ Foreign Domains │
│ - Pinned imported artifacts │
│ - Read-only │
│ - Trusted by policy hash │
└──────────────────────────────┘
```
---
### Key Notes:
1. **PER First**
* Think of the Sedelpress as **minting a certified record**. Everything you feed it — your home directory, certificates, intent — is stamped into the PER.
* After PER generation, storing artifacts in ASL is just archival. The **semantic contract** already exists in the receipt.
2. **Personal Domain**
* Acts as your **private safe harbor** for rescued artifacts and PERs.
* Optional encryption if you publish to Common / Unity domain.
3. **Common / Unity Domain**
* Acts as **shared infrastructure**. Only selected artifacts or PERs are published here.
* Everyone can reconstruct shared CURRENT via snapshots and logs.
4. **Foreign Domains**
* Imported artifacts are **read-only**, pinned to deterministic snapshots.
* Trust enforced via policy hash + offline roots.
5. **Snapshots Everywhere**
* ZFS or overlay snapshots ensure **deterministic recovery**.
* Sealed blocks and segments provide **immutable audit trails**.
6. **Intent / Contract Layer**
* Your “message in a bottle” analogy: you define what you want certified, and the Sedelpress mints the PER.
* Avoid writing arbitrary data directly into the store — it would break deterministic guarantees.
---
If you want, I can take this **diagram further** and make a **layered architectural figure** showing:
* Input layers → Sedelpress → PER + TGK edges
* Personal / common / foreign domains
* Snapshot and sealing overlays
* Trust pins and policy hash integration
It could be like a **map of the rescue river**, where your input flows in, gets stamped, and only certified, published artifacts leave.
Do you want me to create that next?