Appearance
Architecture
This page is the manual map for the public SocioProphet architecture.
SocioProphet is a governed operational intelligence system built for institutions, operators, learners, and builders. The public architecture is organized around bounded execution, deterministic safety claims, proof-bearing workflows, and explicit separation between public-safe documentation and restricted operational detail.
1. Core architectural thesis
The platform is organized around a few core claims:
- intelligence must be governed
- important transitions must be attributable
- consequential actions must produce evidence
- reversibility is a design property, not an afterthought
- institutional deployment requires explicit safeguards and review boundaries
- public documentation must explain the architecture honestly without disclosing restricted tactical internals
This is not a chat-first architecture. It is a controlled systems architecture.
2. Primary layers
Organizations and institutional deployment
Organizations is the institutional umbrella surface. It is where public-sector, nonprofit, educational, sovereign, and mission-aligned deployments are framed.
Key references:
- Organizations Governance and Institutional Safety
- Platform Human Protection and Safeguarding
- Public vs Restricted Security Boundary
Governed AI and cybernetics
This layer explains how bounded execution, human oversight, and proof-bearing control loops are organized.
Key references:
- Governed AI and Cybernetics
- Deterministic AI and Mathematical Safety
- Provenance, Promotion, and Reversibility
Agent plane and operator workflows
This layer describes operator roles, workflow states, capability routing, review, and bounded execution.
Key references:
- Agent Plane and Operator Workflows
- Auth and Connections
- Provider Capability Routing
- Provider Safety and Capability Eligibility
- Auth Recovery and Connection Health
Entity Analytics
Entity Analytics is the governed identity, event, graph, merge, and proof subsystem.
Key references:
- Entity Analytics Reference
- Worked Example: Michael Cross-Context
- Entity Analytics Overview
- Identity Prime and Event-IR
- Entity Graph and Safe Linkage
- Policy-Constrained Merging and Unmerge
- Marketer-Safe Outputs and Segment Proofs
Authorized cyberdefense and simulation
This layer is public-safe and defense-first. It covers defensive validation, simulation boundaries, evidence, and institutional review posture.
Key references:
- Authorized Cyberdefense and Simulation
- Boundary-Centric Cyber Hypergraph
- Public vs Restricted Security Boundary
3. Learning and theory layer
SocioProphet also includes a learning, theory, and semantic-model layer. This is where the system’s representational logic, topic organization, and curriculum-facing structure are documented.
Key references:
- Operating Modes: Learning and Defense
- 23-Topic Canon
- Governed Cybernetic Stack
- Semantic Vector Stack
- Semantic Representation Ladder
- LSA / LSI / LDA Geometry
- Semantic Model Workstreams
- Hybrid Representation Builder
- Temporal Graph Evolution
4. Product and surface layer
The public site exposes multiple surfaces, but they are not all equivalent. Some are institutional, some are learning-oriented, and some are domain or product extensions.
Key references:
- Products Overview
- Product Surface Standard
- Product Surface Maturity Matrix
- Domain Surface
- Digital Trust and Capability Routing
- Academy Policy Index
5. Boundary-first model
One of the key public-safe architectural ideas is that the boundary is the unit of truth.
The system models crossings through explicit structures such as:
- component
- port
- contract
- boundary event
- evidence
- expectation
- finding
- artifact
This keeps the architecture explainable at the point where action, policy, and observation meet.
Primary reference:
6. Deterministic and bounded posture
SocioProphet presents itself publicly as deterministic AI because it is built around bounded execution, measurable safety, and proof-bearing transitions rather than ambient improvisation.
Primary references:
- Deterministic AI and Mathematical Safety
- Governed AI and Cybernetics
- Provenance, Promotion, and Reversibility
7. Public-safe versus restricted material
The public docs explain the architecture, the control model, the safety posture, the governance boundary, and the evidence model.
The public docs do not contain restricted tactical internals such as:
- sensitive operator kits
- high-fidelity adversary simulation mechanics
- exact detection thresholds
- exploit or persistence workflows
- privileged runbooks
- misuse-enabling tradecraft
Primary reference:
8. Reading paths
Executive and institutional path
- Getting Started
- Organizations Governance and Institutional Safety
- Deterministic AI and Mathematical Safety
- Authorized Cyberdefense and Simulation
Operator and security path
- Governed AI and Cybernetics
- Agent Plane and Operator Workflows
- Boundary-Centric Cyber Hypergraph
- Entity Analytics Reference
Builder and researcher path
- Semantic Vector Stack
- Hybrid Representation Builder
- Operating Modes: Learning and Defense
- 23-Topic Canon
9. Use this page
Use this page as the architecture map.
Use the sidebar to move into the layer that matches the question at hand:
- institutional deployment
- governed execution
- agent operations
- analytics and evidence
- defense and validation
- learning and theory
- product surfaces