The Sovereign Stack
Every component. How they connect. Where you fit in.
Stack Layers
Six layers from transport to agent runtime. Each is independent, auditable, and forkable.
Transport
Stealth wire protocol with DPI evasion, protocol mimicry, and PNG steganography. Fixed 88-byte LWF header.
Identity
Sovereign Key Helix – post-quantum identity from a single seed phrase. ML-DSA-65 lattice root, Persona contexts, STARK zero-knowledge proofs, and QVL trust graph.
Session
Resilient connections surviving network partitions and light-minutes of latency. Janus by default; Zig for Sovereign Profile features.
Governance
Federated chapters with constitutional exit rights, dual-delegation voting, and Vickrey mechanisms. Janus primary; Zig for advanced features.
Applications
Sovereign messaging, social feeds, and coordination tools. Four-tier encryption with world, channel, group, and message keys. Janus primary.
Agents
Sovereign AI agent runtime with local inference, tool use, and Membrane isolation boundary. Janus primary; Zig for isolation boundaries.
Run Your Own Node
Clone, build, run. Sovereignty starts with a single process.
For Developers
Pick a layer. Build something sovereign.
Transport
Build transport protocols
L1Identity
Work on identity and trust
L2Session
Implement session management
L3Governance
Design governance mechanisms
L4Applications
Create sovereign applications
L5Agents
Build AI agent runtimes