← Back to Protocol Docs

Constitution

Immutable protocol rules and constitutional constraints.

Web3 Rarity Namespace System Constitution

Version: 1.0.0
Status: Immutable
Effective: Genesis Block
Authority: Mathematical Proof, Not Governance


1. Purpose and Scope

This constitution defines the permanent, immutable rules governing the Web3 Rarity Namespace System. These rules are enforced by mathematics and cryptography, not policy, human discretion, or governance.

Scope

This system creates:

  • Sovereign cryptographic entities (namespaces)
  • Non-recreatable identity coordinates
  • Permanent trust primitives
  • Authority containers that can hold, generate, and transfer value

This system is not:

  • A domain name system
  • An identity service
  • A wallet protocol
  • A token standard

Core Principle

Namespaces are not labels. They are sovereign cryptographic institutions that exist forever without permission.


2. Irreversible Axioms

The following are mathematically enforced and cannot be changed by any authority, governance process, or social consensus:

Axiom 1: Single Genesis

  • There is one and only one genesis event
  • Genesis parameters are committed once
  • No re-genesis is possible
  • Any fork produces provably different namespace identities

Axiom 2: No Administration

  • No admin keys exist post-genesis
  • No emergency pause mechanisms
  • No parameter modification paths
  • No upgrade proxies
  • No governance layer

Axiom 3: No Recreation

  • Every namespace hash is cryptographically unique
  • Once a namespace exists, it exists forever
  • No duplicate can ever be created
  • Loss is permanent and final

Axiom 4: No Mutation

  • Namespace identity cannot be renamed
  • Namespace identity cannot be burned
  • Namespace identity cannot be merged
  • Namespace rarity cannot be upgraded

Axiom 5: No Registrars

  • No central authority issues namespaces
  • No custodial intermediaries
  • No DNS-like delegation
  • No renewal mechanisms

Axiom 6: No Off-Chain Validity Dependency

  • Validity is self-proving
  • No servers required for verification
  • No oracles required for truth
  • No gateways required for access

Axiom 7: Deterministic Supply

  • Total possible namespace count is mathematically bounded
  • No inflation mechanism exists
  • No special issuance paths
  • No insider privileges

3. Genesis Finality

Genesis Authority

Genesis occurs once through a multi-party cryptographic ceremony producing:

  1. Genesis Hash - The immutable root from which all namespace identities derive
  2. Genesis Parameters - Supply bounds, cryptographic schemes, rarity rules
  3. Genesis Proof - Public, verifiable transcript of ceremony
  4. Genesis Key Destruction - Provable elimination of any admin authority

Genesis Binding

All namespaces mathematically derive from the genesis hash. No namespace can exist without provable lineage to genesis.

Fork Resistance

Any system claiming to be "the same" without the genesis hash produces provably different namespace identities. This prevents:

  • Copycat deployments
  • Chain fork reconciliation
  • Intellectual property theft
  • Value dilution

4. Namespace Uniqueness Proof

Identity Model

Each namespace is defined by its cryptographic hash, not its string representation.

Namespace Identity = SHA3-256(
    genesis_hash ||
    parent_hash ||
    creation_proof ||
    entropy_commitment
)

Uniqueness Guarantee

Given:

  • Single genesis hash (immutable)
  • Deterministic derivation
  • Collision-resistant hash function
  • One-way function properties

Therefore:

  • No two namespaces can share the same hash
  • No namespace can be recreated
  • Historical validity is permanent

Name as View, Hash as Truth

Human-readable names (e.g., "1.x", "2.x") are presentation layers. The hash is the only truth. Names may collide across systems; hashes cannot.


5. Rarity Invariants

Rarity as Mathematical Property

Rarity is not market-based. It is determined at creation and locked forever.

Rarity Factors (Immutable)

  1. Position Rarity - Lower namespace numbers (1.x, 2.x) are mathematically rarer
  2. Pattern Rarity - Structural properties (palindromes, sequences, repeating digits)
  3. Hash Entropy - Distribution of characters in cryptographic hash
  4. Temporal Rarity - Earlier creation blocks are rarer
  5. Lineage Depth - Distance from root
  6. Structural Rarity - Root vs. leaf position in namespace tree

Rarity Score Finality

Rarity Score = f(position, pattern, entropy, time, depth, structure)

Once calculated at creation, the rarity score:

  • Cannot be upgraded
  • Cannot be gamed retroactively
  • Cannot be reinterpreted
  • Remains valid forever

Rarity Tiers (Fixed)

Tier Score Range Value Multiplier Supply Characteristics
Mythical 901-1000 100x Single digits, genesis roots
Legendary 751-900 25x Palindromes, special patterns
Epic 501-750 10x Low positions, sequences
Rare 251-500 5x Early mints, structural patterns
Uncommon 101-250 2.5x Moderate positions
Common 0-100 1x Regular namespaces

6. Ownership and Sovereignty Rules

Ownership Model

Ownership is key-based, not account-based.

Namespace Controller = Holder of private key(s) corresponding to namespace proof

Sovereignty Principles

  1. Bearer Sovereignty - The key holder has absolute control
  2. No Recovery - Lost keys = lost namespace (permanent)
  3. No Admin Override - No authority can seize, freeze, or transfer
  4. No Custodial Fallback - No "forgot password" path
  5. Proof-Based Authority - Control through cryptographic proofs, not accounts

Responsibility

Sovereignty includes responsibility:

  • Loss risk is real
  • No safety nets exist
  • No undo mechanisms
  • This creates real value through real consequence

7. Transfer Class Rules

Namespaces are divided into sovereignty classes defined at creation:

Class 1: Immutable (Non-Transferable)

  • Cannot be transferred
  • Authority is permanent
  • Used for: foundational roots, institutional anchors

Class 2: Transferable

  • Can be transferred once or unlimited times (sub-class)
  • Transfer is atomic and final
  • Provenance is immutable
  • Used for: tradable property, value stores

Class 3: Delegable

  • Multiple keys can control
  • Role-based permissions possible
  • Quorum proofs supported
  • Used for: multi-sig entities, organizations

Class 4: Heritable

  • Pre-committed succession proofs
  • Time-locked inheritance
  • Dead-man triggers
  • Witness quorum activation
  • Used for: estates, long-term holdings

Class 5: Sealed

  • Can receive value
  • Cannot transfer value out
  • Permanent treasury
  • Used for: irreversible commitments, vaults

Class Assignment

Class is assigned at creation and cannot be changed.


8. Certificate and Storage Rules

Namespace Certificate

Every namespace produces a cryptographic certificate, not metadata:

Certificate Contains:

  • Namespace hash (identity)
  • Genesis reference (provenance)
  • Parent lineage proof (Merkle path)
  • Rarity proof (deterministic calculation)
  • Creation block proof (timestamp)
  • Verification schema (self-describing)
  • Public key(s) (authority)

Content-Addressed Storage

Certificates are stored as IPFS content-addressed objects:

Certificate → IPFS CID (Content Identifier)

Properties:

  • Immutable (content cannot change)
  • Verifiable (hash = content)
  • Distributed (no single point of failure)
  • Permanent (if pinned)
  • Gateway-free (self-describing)

Certificate as Asset

The certificate is the asset, not a pointer to the asset. The blockchain only proves current authority, not validity.


9. Verification Rules (Stateless)

Verification Independence

Any namespace can be verified without:

  • Access to the original chain
  • Running a full node
  • Trusted third parties
  • Network connectivity (after initial certificate acquisition)

Verification Requirements

Given only:

  1. Genesis hash (public)
  2. Namespace certificate (IPFS CID)
  3. Verification logic (open source)

Anyone can prove:

  • Namespace authenticity
  • Creation validity
  • Lineage integrity
  • Rarity correctness
  • Current authority (with blockchain proof)

Proof Portability

Verification proofs are:

  • Stateless - No global state required
  • Self-contained - All data in proof package
  • Chain-agnostic - Works across execution environments
  • Future-proof - Remains valid even if chain halts

Long-Term Validity

Even if:

  • The original chain dies
  • Validators disappear
  • Software is no longer maintained
  • Decades or centuries pass

Namespaces remain mathematically verifiable from first principles.


10. Prohibited Features

The following are explicitly forbidden and can never be added:

❌ Governance

  • No DAO
  • No voting mechanisms
  • No parameter proposals
  • No "community upgrades"
  • No social consensus overrides

❌ Administration

  • No admin keys
  • No multisig emergency controls
  • No pause functions
  • No blacklists/whitelists
  • No forced transfers

❌ Mutability

  • No upgradeable proxies
  • No contract migrations
  • No schema changes
  • No rarity recalculations
  • No supply modifications

❌ Registrars and Intermediaries

  • No central registrar
  • No renewal fees
  • No expiration dates
  • No custodial services (in protocol)
  • No KYC requirements

❌ Web2 Bridges

  • No DNS integration
  • No ENS mirroring
  • No traditional identity linkage
  • No OAuth/SSO dependencies
  • No centralized gateways for core function

❌ Market Manipulation

  • No protocol-level fees that benefit creators
  • No insider mint periods
  • No founder allocations
  • No pre-mines beyond transparent genesis allocation
  • No artificial scarcity manipulation post-genesis

❌ Censorship Mechanisms

  • No content restrictions
  • No usage requirements
  • No ideological enforcement
  • No value judgments
  • No permitted vs. prohibited uses (protocol is amoral)

Enforcement

These rules are enforced by:

  1. Mathematics - Cryptographic proofs
  2. Code - Immutable protocol implementation
  3. Genesis - One-time ceremony creating irreversible foundation
  4. Economics - Real loss risk creating real value

Not by:

  • Trust
  • Promises
  • Governance
  • Courts
  • Social consensus

Interpretation

This constitution is:

  • Self-executing - No interpretation required
  • Unambiguous - Mathematical definitions only
  • Complete - All rules are specified
  • Final - No amendment process exists

Where ambiguity appears, the most restrictive interpretation that preserves sovereignty and immutability is correct.


Final Truth

This system creates permanent cryptographic institutions that:

  • Exist without permission
  • Cannot be recreated
  • Cannot be seized
  • Cannot be diluted
  • Can hold, generate, and transfer value
  • Outlive chains, laws, and humans

They are sovereign by mathematics, not by policy.


This constitution is immutable. It cannot be amended, voted on, or changed. It is law by proof.

Version: 1.0.0
Signed: Genesis Hash
Authority: None
Enforcement: Mathematics