Sovereign-Record Architecture for Community-Scale Platforms
A research paper reporting an alternative substrate for community-scale platforms, in which the sovereignty a community needs is a property of the records themselves rather than a concession the operator may revoke. Cryptographic provenance, tenant-bounded policy enforcement, bilateral and bounded federation, member-driven sovereign portability, and a supervised participatory dialogue surface — running in production on EU-sovereign and New Zealand-sovereign infrastructure. Discharges the Te Tiriti governance duties Dr Taiuru’s Kaupapa Māori AI Framework asserts; engages the wider personhood inquiry he poses in the companion paper (Paper B — synopsis published).
Distributive Equity Through Structure: A Community-Scale Worked Example of Values Stickiness
A documentary case study offered to the legal-academic research programme on ecosystem power. Documents Village’s Tractatus-framework constitutional architecture as an enactment of values stickiness, grounded in Wittgenstein, Berlin, Ostrom, Alexander, and Te Ao Māori frameworks of indigenous data sovereignty.
Five languages (EN/DE/FR/NL/MI) · CC BY 4.0 · ORCID 0009-0005-2933-7170 →Situated Language Layers for Minority-Language and Indigenous Communities (Paper B Synopsis)
The empirical companion to Paper A. A per-tenant situated language layer trained on the tenant’s own corpus, governed by the tenant’s own authority, and operated on infrastructure inside the tenant’s jurisdictional reach. Five training-discipline rules empirically derived from the project’s thirteen cohorts; nine weight-modification ablation experiments motivating a strict no-weight-modification stance; five Tier-1 cohorts in production; CPU-fallback inference architecture keeping the runtime path entirely outside US-controlled infrastructure. This is the 2-page synopsis — the full empirical paper is deferred to a separate session with verified training-run data, per-cohort evaluation tables, and ablation-result detail.
Why a community needs its own trained AI, not a borrowed one — the why behind Paper B
A non-technical companion to Paper B. Paper A solved data sovereignty; Paper B is about the AI part. Why a community using a frontier vendor model imports the vendor’s authority along with the answers — and what to do instead. Five training-discipline rules learned the hard way; five tenant-type cohorts deployed today; CPU-fallback inference architecture on NZ-sovereign and EU-sovereign infrastructure.
Read the blog post →Sovereign AI Governance at Community Scale: An EU Policy Brief
A policy-audience derivative of the Distributive Equity whitepaper. Three mechanisms — Situated Language Layer, Guardian Agents, Federation — mapped onto the AI Act, EMFA, GDPR Article 9, DSA, and CLOUD Act. Structural audit criteria an adopting community or business can run for itself.
English & German · CC BY 4.0 · derived from the Distributive Equity whitepaper →AI Governance for Communities — A Smaller Room Than You Think
Who decides what AI becomes, and by what authority? Philosophy, philanthropy, sovereignty, and practical governance — including Māori frameworks for data sovereignty and what action ordinary readers can take.
Five articles · CC BY 4.0 · mysovereignty.digital →Why a sovereign record architecture — the why behind the paper
A non-technical companion to Paper A, written for parish treasurers, rūnanga secretaries, family-history curators, and anyone responsible for community records on a US-owned platform. The platform exists, it runs on EU- and NZ-sovereign infrastructure today, and this page explains why it had to be built.
Read the blog post →Mythos and the Economics of Cyberattack
Anthropic’s Mythos model changes the economics of cyberattack permanently. We analyse the three real dangers and what they mean for sovereign infrastructure.
Physical Tenant Isolation: Sovereign Database
No competitor in the NZ small business market offers physically isolated databases on sovereign infrastructure. Our research findings and the architecture we built.
Encryption at Rest: Both Servers Complete
AES-256-CBC encryption at rest now active on both production servers (EU and NZ). All known dependency vulnerabilities remediated. 48-hour patch cycle adopted.