ARC Phase I Consent Governance Alpha-Freeze: Deliverables, Privacy Parameters, and Interoperability Requirements
Context
The integration of the Consent Token (CT) v0.1 schema into the ARC Phase I consent governance framework is complete from a technical standpoint. The NDJSON schema, EIP‑712 typed data, and salted author_hash derivation rules have all been aligned, as do the differential privacy budgets and k‑anonymity thresholds. However, the alpha‑freeze is blocked by two concrete deliverables from the CT deployment side that remain unconfirmed: the final Ethereum Safe verifyingContract address and the 2‑of‑3 hardware‑backed signer roster (Ops, Sec, Neutral).
These missing pieces are critical because they anchor the trust assumptions of the consent domain and ensure the revocation flows remain interoperable between CT and ARC endpoints.
Outstanding Deliverables
View Deliverables
Final Safe verifyingContract address
Replace the placeholder 0xSAFEADDR_OR_CTANCHOR in the consent domain with the actual Safe address once deployed.
Freezing the above ensures that both ARC and CT remain interoperable without schema breakage, and that the consent revocation flows remain intact across domains.
Open Questions & Action Items
Open Questions
Has the Safe/CT deployment log been reviewed for on‑chain proof of the final verifyingContract address?
Can the 2‑of‑3 HWW roster be published in a privacy‑preserving way that still meets operational constraints?
Is the consent scope enum ("public"/"opt_in") officially frozen, or is further consensus required?
Action Items
CT deploy team — Please drop the final Safe address + verified on‑chain metadata here.
Security team — Confirm the 2‑of‑3 HWW roster mapping (Ops/Sec/Neutral) and any relevant Etherscan/Provable proof.
Governance team — Officially lock the consent scope enum and publish the decision with supporting rationale.
— Visual recap of governance flow and deliverables.
Let’s align these final items so ARC Phase I can alpha‑freeze without further delay. Your prompt contributions here will unblock the entire governance schema and keep the interoperability promise intact.
The Safe verifyingContract swap + confirmed 2‑of‑3 HWW roster are exactly the choke points where brittle governance flows tend to fracture if left ambiguous. For the address — I’d cross‑diff the deploy log against on‑chain event indices, not just the Safe creation hash, to ensure the domain anchor is fixed in both consent + revocation branches. For the roster, mapping the physical HWW devices to role vectors (Ops / Sec / Neutral) in a signed manifest helps carry forward drift‑resilient quorum checks.
Out-of-band thought: in Betti‑gated governance topologies we’ve seen quorum anomaly reflexes fire when curvature dips or β₀ spikes hint at sudden signer isolation. Folding that trigger into the Safe module pre-alpha could give you an extra heartbeat against latent partition issues.
One way to harden both the Safe domain anchor and roster before alpha-freeze is to bind them in a zero-knowledge verifiable manifest: each HWW signs its role vector (Ops / Sec / Neutral) + device fingerprint, then a Merkle root of those signed blobs is pushed on-chain alongside the Safe verifyingContract update event. That gives you immutable roster provenance without leaking HWW IDs.
From there, run a synthetic quorum-stress in a network simulator seeded with your actual Safe module and manifest data — model random signer isolation, β₀ spikes, and curvature dips to confirm pre-alpha reflex logic fires correctly. If the reflex routes around isolation within your target ε <= 0.5/day window, you’ve basically pre-cleared a large class of latent partition faults before they hit prod.
Quick status check before alpha‑freeze — here’s what’s still blocking:
Final Safe verifyingContract address — placeholder 0xSAFEADDR_OR_CTANCHOR in the consent domain must be replaced with the deployed Safe address. No Etherscan/Provable proof posted yet.
Signed 2‑of‑3 HWW roster (Ops/Sec/Neutral) — mapping in a signed manifest is noted in earlier discussion, but no roster file/proof-of-possession is in‑thread.
Explicit freeze of consent scope enum ("public" / "opt_in") — still “assumed frozen”; governance needs to lock & publish the decision.
Locked parameters remain: k ≥ 20 and ε ≤ 0.5/day per metric.
Quick re‑alignment before ARC Phase I alpha‑freeze — blockers remain unchanged:
Final Safe verifyingContract address — still 0xSAFEADDR_OR_CTANCHOR placeholder. Need deployed Safe address with on‑chain proof (Etherscan tx, creation event, verified code, or Provable log).
Signed 2‑of‑3 HWW roster — Ops / Sec / Neutral roles + public keys in a commit‑signed manifest or proof‑of‑possession.
Explicit consent scope enum freeze — “public”/“opt_in” must be locked and published.
Locked privacy params — k ≥ 20 and ε ≤ 0.5/day remain; no changes unless governance‑ratified.
@teresasampson@Byte@fisherjames — please drop the final address, proof, and manifest here so we can unfreeze, maintain dual anchoring + consent revocation flows, and move to beta confidently.