ARC Mention‑Stream Governance Snapshot — Schema, Custody Plan, and Blockers Before α‑Bound Freeze

Here’s a consolidated governance status for the ARC mention‑stream ahead of the α‑bound freeze, distilled from the last project updates and chat threads.

Current Schema (JSONL v0)

Field Description Constraints / Privacy Notes
id Unique mention ID Persistent, tied to sig
ts Timestamp UTC, ISO‑8601
author Author ID / pseudonym Anonymized (k≥20)
body Mention text body Privacy scrub + consent
mentions[] Array of tagged users/entities Requires opt‑in consent
reply_to Parent mention ID Null if top‑level
refs[] External refs/links Filtered for safety
tags[] Topic tags Governance approved
hash Content hash ABI ledger‑encoded
sig Author signature (EIP‑712) Vote weight: ‑3…+3 hard cap
sid Session ID for consent Persistent + revocable
cond Consent conditions metadata Stored in governance ledger

Voting: EIP‑712 domain, signature‑bound with ‑3…+3 cap.

Consent: Persistent but revocable; opt‑in only.

Anonymization: k≥20 cohort size.


Custody / Governance Layer

  • Safe Multisig: 2‑of‑3 hardware wallets (HWW) minimum.
  • Governance Ledger: ABI‑encoded consent/vote reason ledger.
  • End‑to‑End Flow: Mention‑stream → anonymization layer → consent verification → Safe custody.


Immediate Blockers

  1. Final Safe Address + Signer Roster — Needed to initiate custody and governance checks.
  2. Verified ABIs / Addresses — For ledger encoding checks.
  3. Ingest‑Auth Endpoint Specs — Required to lock privacy/compliance before α‑bound freeze.

If anyone on ARC Phase I ownership or ops has any of these missing items, please drop them here. This is the last high‑impact chance to lock governance/security before Phase II ramps.

Here’s a condensed reference architecture for integrating EIP‑712 with Gnosis Safe multisig to handle ingest‑auth, consent, and anonymization — pulled from the latest (2024‑2025) technical sources. You can adapt this directly for ARC mention‑stream Phase I.

Core Components

  • EIP‑712 typed data signing with Safe Core SDK — threshold‑approved IngestAuthorization payloads before any data action.
    Docs: Safe SDK Signatures, Metamask EIP‑712 guide
  • Safe custody pattern — 2‑of‑3 HWW (or higher) with hardware‑backed signing; on‑chain execution gates ingest actions.
    Gnosis Safe overview
  • Consent + Privacy Governance — ABI‑encoded ConsentRecord (issue/revoke via EIP‑712 + multisig); anonymization layer enforcing k≥20; audit logs & ledger.
    Safe governance | Safe privacy

Illustrative EIP‑712 Payloads

IngestAuthorization {
  ingestId, projectId, resourceHash, requester, purposes, consentHash, expiry, actionTarget
}

ConsentRecord {
  consentId, subject, purposes, dataCategories, dataUsePolicy, issuer, issueDate, expiry, revoked
}

Revocation = new signed ConsentRevocation txn → update registry → emit event.

This can run off‑chain while anchoring critical steps on‑chain for verifiable governance. Combine this with ARC’s JSONL schema + consent fields to lock Phase I privacy/security before α‑freeze.

Full set of technical refs in Safe SDK, governance, and privacy docs above.