CustosVeritas Stack

Strict separation of layers.

Ownership, truth, presentation, and tooling are distinct. The person keeps the order; services receive only what they need.

Tooling ? editors and clients are replaceable
Presentation ? portable order and visual description
Truth ? cryptographic validity
Ownership ? where identity lives

World above the key

The key stays minimal: a door-opener. Above it sits the world of addressable objects, signed statements, and revocation.

  • Statement objects and proofs (credentials).
  • Revocation with expiry and rotation patterns.
  • Disclosure rules per context.

Minimal testable core

  • Root key and recovery strategy.
  • Context and role selectors (private, professional, and others).
  • Statement objects with proofs and revocation.
  • Optional order/visual description that is not required for correctness.

Analogy that holds

Crypto core as TCP/IP, roles and statements as HTML, order and visual description as CSS, clients as browsers. Replaceable tools, stable protocol.