diff --git a/public/about/values.html b/public/about/values.html index 905afc77..622f5a46 100644 --- a/public/about/values.html +++ b/public/about/values.html @@ -59,6 +59,7 @@ • Transparency • Harmlessness • Community + Architectural Principles Te Tiriti o Waitangi & Digital Sovereignty Indigenous Data Sovereignty Governance & Accountability @@ -175,6 +176,83 @@ + + +
+

Architectural Principles

+ +
+

+ Our values—sovereignty, transparency, harmlessness, community—guide what we build. But values alone don't prevent systems from drifting. We need architectural principles that show how to preserve values through structure, not aspiration. +

+

+ Drawing on Christopher Alexander's work in architectural pattern languages, we've identified five principles that translate living systems thinking into governance architecture. These aren't metaphors—they're operational requirements that shape every framework decision. +

+
+ +
+ +
+

Deep Interlock

+

+ Six governance services coordinate through mutual validation, not operate in silos. When BoundaryEnforcer detects a values conflict, CrossReferenceValidator checks if it aligns with stored instructions, ContextPressureMonitor assesses session conditions, and PluralisticDeliberationOrchestrator coordinates stakeholder deliberation if needed. +

+

+ Connects to Transparency: Service coordination creates audit trails showing how governance decisions emerge from multiple reinforcing checks, not single-point failures. +

+
+ + +
+

Structure-Preserving

+

+ Framework changes enhance without breaking. When we add new governance rules or refine service logic, historical audit logs remain interpretable. A decision made under framework v4.2 can still be understood in v4.4—institutional memory preserved across evolution. +

+

+ Connects to Accountability: Structure-preserving transformations mean governance continuity. Organizations can demonstrate regulatory compliance across framework versions because the audit trail remains coherent. +

+
+ + +
+

Gradients Not Binary

+

+ Governance operates on intensity scales (NORMAL/ELEVATED/HIGH/CRITICAL), not yes/no switches. Context pressure monitoring adjusts behavior gradually as session conditions change—token usage climbs, message length increases, task complexity escalates. Nuanced response to risk, not mechanical on/off. +

+

+ Connects to Harmlessness: Gradients prevent both under-response (missing risks) and over-response (alert fatigue). The system adapts governance intensity to match actual risk levels, like living systems responding to environmental stress. +

+
+ + +
+

Living Process

+

+ The framework evolves from operational failures, not predetermined roadmaps. When the "27027 incident" revealed pattern recognition bias (AI autocorrected user's explicit "port 27027" to "port 27017"), we didn't just document the failure—we built CrossReferenceValidator to prevent that class of error architecturally. +

+

+ Connects to Community: Living process means continuous learning from real-world use. The framework grows smarter through operational experience shared across the community, not consultant wisdom imposed from above. +

+
+ + +
+

Not-Separateness

+

+ Governance is woven into the deployment architecture, not bolted on as afterthought. PreToolUse hooks intercept actions before execution. Services run in the critical path. Bypasses require explicit --no-verify flags and are logged. Enforcement is structural, not voluntary. +

+

+ Connects to Sovereignty: Not-separateness ensures AI cannot bypass governance to override human agency. The architecture makes it structurally difficult to erode boundaries, preserving decision-making authority where it belongs—with affected humans. +

+
+
+ +
+

+ Note: These principles were integrated into the framework in October 2025. We're monitoring their effectiveness through audit log analysis and operational metrics. This is active research—we're learning whether architectural principles from the built environment translate meaningfully to AI governance. +

+
+

Te Tiriti o Waitangi & Digital Sovereignty