Six laws governing how a sovereign system remembers, forgets,
and decides what it is allowed to know.
The S(R, F) Series asks: what is the shape of coherence? One rigid element, one fuzzy element, one binding — the minimal pattern that generates authorization, time, identity, truth, governance, action, and geometry.
This paper asks the complementary question: what happens inside the shape? When you fill S(R, F) with actual data — millions of vectors representing documents, decisions, identities, and events — what are the physical laws that govern how that data is stored, retrieved, aged, protected, audited, and eventually forgotten?
There are six. Each is a conservation law — something that the system preserves even as everything else changes. Together, they define the physics of sovereign memory.
| Law | Conserved Quantity | Schema |
|---|---|---|
| I. Compression | Ranking order | f32 → i8 : rank preserved |
| II. Opacity | Governance budget | mask & W → O(1) per entry |
| III. Decay | Temporal ordering | w(t) = e−λΔt → monotonic fade |
| IV. Integrity | Hash chain | H(n) = BLAKE3(n || H(n−1)) → tamper-evident |
| V. Echo | Institutional memory | Active → Modified → Retired → echo |
| VI. Composition | Independence | 9 nodes · 0 circular deps · ∞ configurations |
Each law preserves one thing while everything else changes. Together they define a memory that is governed, temporal, auditable, and modular.
Can you lose precision without losing meaning?
A 768-dimensional embedding vector occupies 3,072 bytes as 32-bit floats. Multiply every component by 127, round, clamp to [-127, +127], and store as a signed byte. The vector is now 768 bytes. 75% of the memory is gone.
The question is whether the compression destroys the thing you actually need. You don't need the exact distances. You need the ranking — which vectors are closest to the query. If the nearest neighbor in f32 space is still the nearest neighbor in i8 space, the quantization is lossless in the only dimension that matters.
The conserved quantity is ranking order. At low noise — the regime where real embedding models operate — the quantized distances produce the same top-k results as the originals. The absolute distances change. The relative ordering is preserved.
Can access control cost nothing?
Every vector database does access control backwards. Search first — compute expensive distances against every vector in the corpus — then filter out the results the user isn't allowed to see. The governance cost is O(n × d), where n is corpus size and d is dimensionality. The system does full work, then throws most of it away.
Canon inverts this. Governance comes first. Every stored vector carries a W-bit capability mask — a 64-bit integer where each bit encodes a governance capability. Every query carries a required mask. Before any distance computation, a single bitwise AND determines access:
One instruction. One cycle. The AND gate either passes or blocks. If it blocks, the system never loads the vector, never computes the distance, never touches the memory beyond the 8-byte mask word. The unauthorized vector is opaque — not just filtered, but invisible to the computation.
After the mask gate, five additional predicates run before distance computation: manifold membership, temporal validity, trust threshold, classification level, and provenance depth. All five are scalar comparisons — O(1) each. Only entries that survive all six gates reach the distance function.
How does memory fade without losing sequence?
A memory that was relevant yesterday is less relevant today. A memory accessed this morning is more alive than one untouched for a month. Time matters — not as a filter, but as a weight. Canon doesn't exclude old memories. It lets them fade.
The decay function is exponential with a configurable half-life τ. After one half-life, the weight is 0.5. After two, 0.25. After ten, approximately 0.001. The function never reaches zero — a memory that decays is still findable, just ranked lower. This is the difference between forgetting and losing.
Freshness is the average of two decay signals: how old is the memory (creation age), and how long since it was last touched (access age). A ten-year-old document accessed this morning is fresher than a one-week-old document never accessed since creation. Use keeps memories alive.
But time in Canon isn't a scalar. It's an 8-dimensional vector — the Kronos spiral from the S(R, F) Series, Paper III. Daily, weekly, and yearly cycles encoded as sinusoidal pairs, plus linear epoch and bias. This means "Monday morning" is a direction in 8D space. "Last winter" is a region. Temporal queries become geometric operations.
How do you know nothing has been changed?
Every vector that enters Canon leaves a record in the Shadow Ledger — an append-only persistent store with BLAKE3 hash-chained entries. Each record carries the hash of the previous record. Modify any historical entry and every subsequent hash mismatches. The chain breaks forward.
This isn't a blockchain. There's no consensus mechanism, no distributed ledger, no token. It's a simple cryptographic audit trail: a linked list where each link is a hash of the previous content. Verification is O(n) in the chain length — walk forward, recompute hashes, compare. If they all match, nothing has been touched.
The ledger stores five tables: lineage (the hash chain itself), vectors (quantized embeddings), metadata, Merkle log (change events by epoch), and Merkle root (a periodic summary hash). The Merkle layer provides a second integrity check at a different granularity — you can verify the entire epoch without walking every individual entry.
How do you delete data without losing knowledge?
Compliance requires deletion. Privacy demands it. GDPR, CCPA, data retention policies — at some point, you must destroy the content. But hard deletion creates a different problem: the organization forgets that it ever knew something.
Canon uses a three-phase lifecycle with a fourth state that survives deletion.
Active: Full content. Fully searchable. Full governance participation.
Modified: An update creates a new version linked to the old one by hash.
Retired: The content is deleted. The vector is removed from the spatial index. But an echo record remains — enough to know that something existed and roughly what it concerned.
How many configurations can nine independent nodes produce?
Canon is not a monolith. It is the type foundation of a workspace where nine independent knowledge nodes each handle one concern.
| Node | Concern | Crates |
|---|---|---|
| Canon | Types, manifold, bridge, stages — the shared vocabulary | 5 |
| Shadow | Append-only audit ledger with BLAKE3 hash chains | 2 |
| Index | HNSW spatial search engine (brute + hierarchical) | 2 |
| Metronome | Temporal spine — tick counting, spiral encoding, trust decay | 2 |
| Library | Document ingestion, chunking, metadata | 2 |
| DNA | Geometric N-helix identity encoding | 3 |
| Rita's Chamber | Property graph for behavioral inference | 2 |
| Repository | Code artifact storage and versioning | 2 |
| Model Vault | ML model registry and lifecycle | 2 |
The connection fabric is canon-types — a shared crate providing QuantizedVector, Lineage, CanonNode, and governance metadata types.
Pipeline composition happens through StructuredStage. Inter-node communication happens through CanonRef.
I. Compression · II. Opacity · III. Decay · IV. Integrity · V. Echo · VI. Composition