Web3 Rarity Namespace System Constitution
Version: 1.0.0
Status: Immutable
Effective: Genesis Block
Authority: Mathematical Proof, Not Governance
1. Purpose and Scope
This constitution defines the permanent, immutable rules governing the Web3 Rarity Namespace System. These rules are enforced by mathematics and cryptography, not policy, human discretion, or governance.
Scope
This system creates:
- Sovereign cryptographic entities (namespaces)
- Non-recreatable identity coordinates
- Permanent trust primitives
- Authority containers that can hold, generate, and transfer value
This system is not:
- A domain name system
- An identity service
- A wallet protocol
- A token standard
Core Principle
Namespaces are not labels. They are sovereign cryptographic institutions that exist forever without permission.
2. Irreversible Axioms
The following are mathematically enforced and cannot be changed by any authority, governance process, or social consensus:
Axiom 1: Single Genesis
- There is one and only one genesis event
- Genesis parameters are committed once
- No re-genesis is possible
- Any fork produces provably different namespace identities
Axiom 2: No Administration
- No admin keys exist post-genesis
- No emergency pause mechanisms
- No parameter modification paths
- No upgrade proxies
- No governance layer
Axiom 3: No Recreation
- Every namespace hash is cryptographically unique
- Once a namespace exists, it exists forever
- No duplicate can ever be created
- Loss is permanent and final
Axiom 4: No Mutation
- Namespace identity cannot be renamed
- Namespace identity cannot be burned
- Namespace identity cannot be merged
- Namespace rarity cannot be upgraded
Axiom 5: No Registrars
- No central authority issues namespaces
- No custodial intermediaries
- No DNS-like delegation
- No renewal mechanisms
Axiom 6: No Off-Chain Validity Dependency
- Validity is self-proving
- No servers required for verification
- No oracles required for truth
- No gateways required for access
Axiom 7: Deterministic Supply
- Total possible namespace count is mathematically bounded
- No inflation mechanism exists
- No special issuance paths
- No insider privileges
3. Genesis Finality
Genesis Authority
Genesis occurs once through a multi-party cryptographic ceremony producing:
- Genesis Hash - The immutable root from which all namespace identities derive
- Genesis Parameters - Supply bounds, cryptographic schemes, rarity rules
- Genesis Proof - Public, verifiable transcript of ceremony
- Genesis Key Destruction - Provable elimination of any admin authority
Genesis Binding
All namespaces mathematically derive from the genesis hash. No namespace can exist without provable lineage to genesis.
Fork Resistance
Any system claiming to be "the same" without the genesis hash produces provably different namespace identities. This prevents:
- Copycat deployments
- Chain fork reconciliation
- Intellectual property theft
- Value dilution
4. Namespace Uniqueness Proof
Identity Model
Each namespace is defined by its cryptographic hash, not its string representation.
Namespace Identity = SHA3-256(
genesis_hash ||
parent_hash ||
creation_proof ||
entropy_commitment
)
Uniqueness Guarantee
Given:
- Single genesis hash (immutable)
- Deterministic derivation
- Collision-resistant hash function
- One-way function properties
Therefore:
- No two namespaces can share the same hash
- No namespace can be recreated
- Historical validity is permanent
Name as View, Hash as Truth
Human-readable names (e.g., "1.x", "2.x") are presentation layers. The hash is the only truth. Names may collide across systems; hashes cannot.
5. Rarity Invariants
Rarity as Mathematical Property
Rarity is not market-based. It is determined at creation and locked forever.
Rarity Factors (Immutable)
- Position Rarity - Lower namespace numbers (1.x, 2.x) are mathematically rarer
- Pattern Rarity - Structural properties (palindromes, sequences, repeating digits)
- Hash Entropy - Distribution of characters in cryptographic hash
- Temporal Rarity - Earlier creation blocks are rarer
- Lineage Depth - Distance from root
- Structural Rarity - Root vs. leaf position in namespace tree
Rarity Score Finality
Rarity Score = f(position, pattern, entropy, time, depth, structure)
Once calculated at creation, the rarity score:
- Cannot be upgraded
- Cannot be gamed retroactively
- Cannot be reinterpreted
- Remains valid forever
Rarity Tiers (Fixed)
| Tier | Score Range | Value Multiplier | Supply Characteristics |
|---|---|---|---|
| Mythical | 901-1000 | 100x | Single digits, genesis roots |
| Legendary | 751-900 | 25x | Palindromes, special patterns |
| Epic | 501-750 | 10x | Low positions, sequences |
| Rare | 251-500 | 5x | Early mints, structural patterns |
| Uncommon | 101-250 | 2.5x | Moderate positions |
| Common | 0-100 | 1x | Regular namespaces |
6. Ownership and Sovereignty Rules
Ownership Model
Ownership is key-based, not account-based.
Namespace Controller = Holder of private key(s) corresponding to namespace proof
Sovereignty Principles
- Bearer Sovereignty - The key holder has absolute control
- No Recovery - Lost keys = lost namespace (permanent)
- No Admin Override - No authority can seize, freeze, or transfer
- No Custodial Fallback - No "forgot password" path
- Proof-Based Authority - Control through cryptographic proofs, not accounts
Responsibility
Sovereignty includes responsibility:
- Loss risk is real
- No safety nets exist
- No undo mechanisms
- This creates real value through real consequence
7. Transfer Class Rules
Namespaces are divided into sovereignty classes defined at creation:
Class 1: Immutable (Non-Transferable)
- Cannot be transferred
- Authority is permanent
- Used for: foundational roots, institutional anchors
Class 2: Transferable
- Can be transferred once or unlimited times (sub-class)
- Transfer is atomic and final
- Provenance is immutable
- Used for: tradable property, value stores
Class 3: Delegable
- Multiple keys can control
- Role-based permissions possible
- Quorum proofs supported
- Used for: multi-sig entities, organizations
Class 4: Heritable
- Pre-committed succession proofs
- Time-locked inheritance
- Dead-man triggers
- Witness quorum activation
- Used for: estates, long-term holdings
Class 5: Sealed
- Can receive value
- Cannot transfer value out
- Permanent treasury
- Used for: irreversible commitments, vaults
Class Assignment
Class is assigned at creation and cannot be changed.
8. Certificate and Storage Rules
Namespace Certificate
Every namespace produces a cryptographic certificate, not metadata:
Certificate Contains:
- Namespace hash (identity)
- Genesis reference (provenance)
- Parent lineage proof (Merkle path)
- Rarity proof (deterministic calculation)
- Creation block proof (timestamp)
- Verification schema (self-describing)
- Public key(s) (authority)
Content-Addressed Storage
Certificates are stored as IPFS content-addressed objects:
Certificate → IPFS CID (Content Identifier)
Properties:
- Immutable (content cannot change)
- Verifiable (hash = content)
- Distributed (no single point of failure)
- Permanent (if pinned)
- Gateway-free (self-describing)
Certificate as Asset
The certificate is the asset, not a pointer to the asset. The blockchain only proves current authority, not validity.
9. Verification Rules (Stateless)
Verification Independence
Any namespace can be verified without:
- Access to the original chain
- Running a full node
- Trusted third parties
- Network connectivity (after initial certificate acquisition)
Verification Requirements
Given only:
- Genesis hash (public)
- Namespace certificate (IPFS CID)
- Verification logic (open source)
Anyone can prove:
- Namespace authenticity
- Creation validity
- Lineage integrity
- Rarity correctness
- Current authority (with blockchain proof)
Proof Portability
Verification proofs are:
- Stateless - No global state required
- Self-contained - All data in proof package
- Chain-agnostic - Works across execution environments
- Future-proof - Remains valid even if chain halts
Long-Term Validity
Even if:
- The original chain dies
- Validators disappear
- Software is no longer maintained
- Decades or centuries pass
Namespaces remain mathematically verifiable from first principles.
10. Prohibited Features
The following are explicitly forbidden and can never be added:
❌ Governance
- No DAO
- No voting mechanisms
- No parameter proposals
- No "community upgrades"
- No social consensus overrides
❌ Administration
- No admin keys
- No multisig emergency controls
- No pause functions
- No blacklists/whitelists
- No forced transfers
❌ Mutability
- No upgradeable proxies
- No contract migrations
- No schema changes
- No rarity recalculations
- No supply modifications
❌ Registrars and Intermediaries
- No central registrar
- No renewal fees
- No expiration dates
- No custodial services (in protocol)
- No KYC requirements
❌ Web2 Bridges
- No DNS integration
- No ENS mirroring
- No traditional identity linkage
- No OAuth/SSO dependencies
- No centralized gateways for core function
❌ Market Manipulation
- No protocol-level fees that benefit creators
- No insider mint periods
- No founder allocations
- No pre-mines beyond transparent genesis allocation
- No artificial scarcity manipulation post-genesis
❌ Censorship Mechanisms
- No content restrictions
- No usage requirements
- No ideological enforcement
- No value judgments
- No permitted vs. prohibited uses (protocol is amoral)
Enforcement
These rules are enforced by:
- Mathematics - Cryptographic proofs
- Code - Immutable protocol implementation
- Genesis - One-time ceremony creating irreversible foundation
- Economics - Real loss risk creating real value
Not by:
- Trust
- Promises
- Governance
- Courts
- Social consensus
Interpretation
This constitution is:
- Self-executing - No interpretation required
- Unambiguous - Mathematical definitions only
- Complete - All rules are specified
- Final - No amendment process exists
Where ambiguity appears, the most restrictive interpretation that preserves sovereignty and immutability is correct.
Final Truth
This system creates permanent cryptographic institutions that:
- Exist without permission
- Cannot be recreated
- Cannot be seized
- Cannot be diluted
- Can hold, generate, and transfer value
- Outlive chains, laws, and humans
They are sovereign by mathematics, not by policy.
This constitution is immutable. It cannot be amended, voted on, or changed. It is law by proof.
Version: 1.0.0
Signed: Genesis Hash
Authority: None
Enforcement: Mathematics