Skip to main content

Design Principles for Type 6 Presence Adjudication Systems

A Type 6 Presence Adjudication System should not be judged only by whether it is novel, decentralized, or cryptographically sophisticated.

Those qualities may matter, but they do not by themselves make a system good.

A good Type 6 PAS is one that solves the right problem in the right way. It must make consequential claims of physical presence usable across organizational boundaries without collapsing into unilateral authority, indiscriminate surveillance, weak finality, or decorative staking. It must be able to support reliance while remaining privacy-disciplined, adversarially robust, and institutionally legible.

That is a demanding standard. It is also the right one.

The purpose of this page is to state the main design principles that follow from the preceding analysis. These are not implementation instructions. They are architectural commitments: principles that distinguish serious Type 6 systems from weaker systems that merely borrow the language of decentralization or cryptographic proof.

Begin From the Claim, Not the Trace

A mature presence system should begin by asking what proposition needs to be established, not how much telemetry can be collected.

This is one of the most important design shifts in the whole field. Weak systems treat presence as something to be inferred from raw traces after the fact. Stronger systems begin by defining the claim itself: a person was within a region during an interval; an asset remained inside a controlled zone; an event boundary was crossed under valid conditions.

This matters because the shape of the claim determines the shape of the evidence, the proof, the dispute, and the disclosure burden. If the system begins from the trace, overexposure tends to become normal. If it begins from the claim, proportionate evidence becomes possible.

A good Type 6 PAS should therefore be claim-oriented before it is telemetry-oriented.

Treat Presence as an Evidentiary Problem

Presence is not just a data problem and not just a sensing problem. It is an evidentiary problem.

That means the system must be designed not merely to observe, but to support judgments that others can rely upon. It must be able to answer questions such as:

  • what exactly is being claimed
  • what evidence is admissible
  • how that evidence is verified
  • how challenges work
  • when outcomes become durable
  • what remains inspectable later

A system that collects impressive measurements but cannot bring them into a legible adjudicative form is not yet a serious PAS. It may be a useful sensing or analytics system. But it has not yet solved the problem this section is concerned with.

Minimize Unilateral Authority

The defining promise of Type 6 systems is not that authority disappears. It is that authority is no longer silently concentrated in one operator’s internal record.

A good Type 6 PAS should minimize the degree to which any single platform, verifier, committee, data provider, or governance body can define reality for everyone else without meaningful constraint. This does not mean that every role must be maximally decentralized. It means that exclusive control over consequential outcomes should be structurally difficult, visible, and challengeable.

Where unilateral authority remains necessary, it should be explicit and narrow.

Make Trust Explicit and Disciplined

A serious system should never pretend to be trustless.

Trust does not vanish in Type 6 architectures. It is redistributed, formalized, and exposed to challenge. Measurement sources, proof systems, verifiers, challengers, publication layers, and governance mechanisms all carry assumptions.

The design goal should therefore be trust discipline. The major assumptions should be visible. Their scope should be bounded. Their failure modes should be understandable. Their correction paths should be real.

A good Type 6 PAS is not one that claims to remove trust. It is one that makes trust legible enough to evaluate.

Use Capital as Discipline, Not Decoration

Stake and bonded capital should be treated as instruments of discipline, not symbols of seriousness.

A system with large nominal stake but weak detection, weak slashing, weak dispute rights, or highly correlated control may be far less secure than it appears. Conversely, a smaller but better-structured system may have a more credible security envelope.

A good Type 6 PAS should therefore link economic exposure to actual adjudicative risk. Capital should be meaningfully slashable. Misconduct should be attributable. Collusion should be costly. Hidden escape routes from penalty should be minimized.

Capital matters because it changes incentives. But it only matters if the downside is real.

Design for Challenge, Not Just Initial Judgment

A system is not serious because it can produce an answer. It is serious because it can survive disagreement.

This means dispute architecture is not a secondary add-on. It is part of the core design. A good Type 6 PAS should assume that some claims will be wrong, fraudulent, collusive, or misleading, and should provide a real path by which such outcomes can be challenged and corrected.

Challenge rights should be usable. Challenger incentives should be viable. Dispute windows should be long enough to matter and short enough to preserve usability. Successful disputes should produce meaningful correction, not symbolic complaint.

A PAS that performs well only in undisputed cases is not yet mature.

Separate Ordinary Proof From Escalation

A well-designed system should not force every ordinary claim to carry the full evidentiary burden of the hardest possible dispute.

This is where layered disclosure becomes important. Ordinary adjudication should operate on bounded claims and proportionate evidence. More invasive or more detailed evidentiary access, where it exists, should belong to structured challenge or escalation modes rather than being normalized for everyday use.

This principle matters for both privacy and system usability. It allows the system to preserve disciplined disclosure in routine cases while still retaining a path for deeper examination when justified.

A good Type 6 PAS should therefore distinguish clearly between:

  • ordinary proof mode
  • challenge mode
  • escalation mode
  • exceptional override or external review, if any

Without that separation, systems often become either overexposing by default or too weak to handle real disputes.

Make Finality Legible

A claim is not useful merely because it has been evaluated. It becomes useful when it reaches a form of closure that others can rely upon.

A good Type 6 PAS should therefore define its finality surfaces clearly. It should be possible to understand:

  • when a claim is evidentially accepted
  • when ordinary disputes have closed
  • where the durable record of the outcome exists
  • what kind of downstream reliance is justified and when
  • whether exceptional reopening paths exist

Finality should not be vague, hidden, or purely rhetorical. The system should state what becomes final, at what threshold, for what purposes.

This is especially important where claims support payments, credentials, access rights, compliance outcomes, or later institutional scrutiny.

Publish Durable but Disciplined Outcomes

Durability matters, but so does proportionality.

A mature Type 6 PAS should produce outcomes that can be referenced later, inspected by relevant parties, and relied upon across institutional boundaries. But it should do so without turning durable publication into permanent overexposure of raw behavioral traces.

This means the system should think carefully about what becomes durable:

  • the claim
  • the proof object
  • the adjudication result
  • the challenge history
  • the finalization record
  • or some combination of these

Not every layer of evidence needs to become publicly exposed forever in order for the outcome to be replayable. A good system should publish enough to support durable reliance without making indiscriminate transparency its default evidentiary model.

Keep Governance Real but Bounded

Governance is unavoidable. The relevant question is not whether governance exists, but whether it is disciplined enough to preserve the neutrality and replayability the system claims to provide.

A good Type 6 PAS should distinguish between parameters that are operationally adjustable and parameters that are structurally constitutive. It should be much easier to tune routine settings than to alter core trust, dispute, privacy, or finality assumptions. Critical changes should be visible before they take effect. Retroactive alteration of already-submitted or already-finalized claims should be heavily constrained or disallowed.

Emergency powers, if they exist, should be narrow, auditable, and clearly part of the constitutional design rather than hidden forms of managerial override.

Match Security to Consequence

Not every presence claim carries the same stakes, and a mature system should not pretend otherwise.

A good Type 6 PAS should recognize that different claim classes may require different security thresholds, challenge windows, finality conditions, or evidentiary burdens. Low-stakes attendance proofs, high-value logistics releases, and legally sensitive compliance claims should not necessarily be treated as though one security model fits all.

This implies use-case discipline. The system should know what its security-capital surface can actually defend, and it should avoid inviting reliance beyond that envelope without stronger protections.

A serious PAS does not merely ask what is technically possible. It asks what is responsibly supportable.

Preserve Institutional Legibility

A presence adjudication system does not become useful merely because it is internally coherent. It becomes useful when other parties can understand how to rely on it.

A good Type 6 PAS should therefore be legible not only to protocol designers, but also to institutions, counterparties, regulators, auditors, and technically informed outsiders. Its claims should be understandable. Its trust assumptions should be articulable. Its dispute process should be explainable. Its finality conditions should be clear. Its governance powers should be documented.

This is not a concession to older institutions. It is part of what makes the system portable beyond its own internal culture.

Prefer Specification Over Informal Doctrine

As systems mature, principles should increasingly become specifications.

A strong Type 6 PAS should be able to describe:

  • its claim semantics
  • its proof architecture
  • its dispute rights
  • its finality thresholds
  • its capital discipline
  • its governance powers

in forms that are stable enough to study, compare, critique, and eventually assess for conformance.

This is a mark of maturity. The more consequential the system becomes, the less it should rely on informal operator narratives or vague promises. A PAS that cannot describe its own constitutional structure clearly is not yet ready for serious reliance.

What These Principles Add Up To

Taken together, these principles imply a distinct vision of what a Type 6 Presence Adjudication System should be.

It should be:

  • claim-oriented rather than trace-oriented
  • evidentiary rather than merely observational
  • challengeable rather than merely procedural
  • capital-disciplined rather than symbolically staked
  • finality-aware rather than output-focused
  • privacy-disciplined rather than surveillance-dependent
  • governed, but constitutionally bounded
  • normatively explicit about what kinds of consequences it can safely support

That is a much higher standard than simply saying the system is decentralized, verifiable, or privacy-preserving.

It is also the right standard.

Conclusion

The purpose of design principles is not to dictate one implementation. It is to make clear what kind of architecture deserves to be taken seriously.

A Type 6 Presence Adjudication System is not good because it uses cryptography, staking, or committees. It is good when those elements are arranged in ways that make consequential claims of presence neutral enough, challengeable enough, durable enough, and privacy-disciplined enough for real counterparties to rely upon.

That is the design task.

The next page asks the stronger question that follows from these principles: what would an ideal Type 6 Presence Adjudication System actually look like?