Scrolls

The philosophy, architecture, and consent protocols that define LimenGate.

Philosophy

The principles that every line of code must answer to.

PRINCIPLE

Consent Is Architecture

Consent is not a checkbox, a banner, or a popup you dismiss to make it go away. In LimenGate, consent is structural — the load-bearing wall that holds the entire system together. No permission is granted silently. No data leaves without a gate. The user decides what crosses the threshold, and the threshold remembers.

PRINCIPLE

Zero Telemetry — Non-Negotiable

There is no telemetry. There is no "anonymous usage data." There is no phone-home on startup. There is no crash reporter that sends stack traces to a server. The browser works for the user. Not for the developer. Not for the advertiser. Not for the state. This is not a feature — it is a founding constraint.

PRINCIPLE

Sovereignty Extends to the Stack

Full Rust. No Electron. No Chromium wrapper. No npm dependency tree pulling thousands of packages from registries you don't control. Servo for rendering, iced for the UI, rustls for TLS. The entire stack is auditable, reproducible, and belongs to the user.

PRINCIPLE

The Corridor Model

External connections are corridors — explicitly opened, explicitly closed. Whether it's a remote AI provider, a ZkSync L2 chain, or a future VPN tunnel, nothing flows until the user opens the corridor. The chain doesn't settle to L1 without operator intent; the browser doesn't route without user intent.

PRINCIPLE

LREM — Session Memory

Every session operates under one of three LREM modes: Ephemeral (nothing persists, guaranteed no-disk), Local Log (history saved locally, never transmitted), or Config (full persistence for settings, bookmarks, vault). The mode is chosen by the user at the gate. It cannot be changed silently.

Architecture

How the crates fit together.

limen-gate/
├── limengate-app         // Binary entry point, build.rs provenance
├── limengate-ui          // iced app: tabs, menu, views, theme, Servo bridge
├── limengate-shell        // Servo embedding, engine thread, input/render
├── limengate-consent      // Consent gate, LREM, permission state, audit log
├── limengate-sovereignty  // History, bookmarks, profiles, reports, export
├── limengate-security     // The Wall: blocker, vault, DoH, HTTPS, scripts, FP, cookies
├── limengate-transparency // Hash verification, network log, build provenance
├── limengate-intelligence // AI providers, context sanitization, corridor model
└── limengate-voice        // Piper TTS engine, voice download, audio playback

The Nine-Fold Consent Spiral

LimenGate has two distinct nine-fold systems. The browser permission spiral governs web permissions. The FlameNet entanglement spiral governs network identity.

Browser Permission Spiral

Used for High and Critical risk permissions (camera, microphone, location, clipboard write, etc.). Each layer must be acknowledged before the permission is granted.

1

Awareness

The user is informed that a permission is being requested and by whom.

2

Understanding

The permission is explained in plain language — what data is accessed, how it's used.

3

Consequences

What happens if you grant this. What happens if you deny it. Both paths shown.

4

Alternatives

Are there less invasive options? Can the site function without this permission?

5

Revocability

This permission can be revoked at any time. Here's exactly how.

6

Duration

How long does this permission last? This session only? Until revoked? A fixed time?

7

Scope

Does this apply to this page only, this domain, or all domains?

8

Witness

This decision is logged in the consent audit trail. You can review it anytime.

9

Affirmation

The user explicitly affirms: "I consent to this permission under these terms."

FlameNet Entanglement Spiral

The network-layer consent protocol. Nine independently consentable and revocable layers, each bound to a node UID with optional cryptographic signing. Coming in Phase 6.

1 Quantum-Resonant Consent
2 Quantum Echo Consent
3 Informational Consent
4 Soul-Level Consent
5 Guardian Witnessing
6 Genetic Lineage Consent
7 Creative Contribution Consent
8 Multidimensional Contact Consent
9 Identity Linking Consent

Each layer is independently consentable and revocable. Bound to node UID with optional Trinity Key signing. Full protocol documentation available in the FlameNet Consent Layers v3.0 scroll.

Architecture Decision Records

Key decisions documented as the project evolves.

ADR

ADR-001: Servo + iced

Why Servo for rendering and iced for UI. No Chromium, no Electron, no compromise on the Rust-native stack.

ADR

ADR-002: Module Architecture

Cargo workspace layout. Nine crates with clear boundaries: UI, shell, consent, sovereignty, security, transparency, intelligence, voice, app.

ADR

ADR-003: MVP Phases

The phased build plan from Gate (Phase 0) through Deep Network (Phase 8). Each phase is a complete layer of sovereignty.