Governance

Governance Architecture

Sovereign-grade infrastructure cannot be governed by commercial interests. If the entity that deploys hardware also controls the protocol, every sovereign participant faces counterparty risk. KeyIdentity eliminates this risk through constitutional separation.

Protocol Constitutional Domain

The protocol specification, the cryptographic algorithm governance, the root signing authority, and the biometric non-persistence guarantee exist within the Protocol Constitutional Domain. This domain is governed by two entities with no equity structure:

Protocol Foundation

A non-profit entity that governs the KIFP specification, the amendment mechanism, and the governance policy framework. It cannot be acquired through any corporate transaction.

Root Authority Custodian

A special-purpose entity that holds root cryptographic signing keys in hardware security modules under the governance of the Guardian Council — five geographically distributed custodians who must physically convene (any three of five) to perform root-level operations. The Custodian cannot be acquired.

Commercial Operating Domain

The Commercial Operating Company deploys infrastructure, manufactures Edge Appliances, and generates revenue. This is the only entity that issues equity. Investors participate here.

The Intellectual Property Holding Entity holds trademarks and copyrights. It is founder-controlled with no external equity.

Constitutional Separation

The structural guarantee:

If the Commercial Operating Company is acquired, goes bankrupt, or changes ownership, the Foundation and Custodian continue to operate independently. The protocol persists. The root keys remain under Guardian custody. Every sovereign participant's national node continues to function.

The protocol survives the company.

Non-Capture Covenant

VectorProtection
Investor captureEquity exists only at the OpCo level; no investment grants governance rights over the protocol
Sovereign captureNo single sovereign holds a Guardian majority; Foundation domiciled in neutral jurisdiction
Commercial captureOpCo operates under revocable license; breach of constitutional domain triggers automatic license revocation
Founder captureFounder holds constitutional veto but cannot unilaterally amend non-amendable protocol properties

Governance Neutrality

KIFP is neutral infrastructure. It must be usable by competing commercial participants, by sovereign states without bilateral trust, and by entities with no prior relationship.

  • No preferential treatment for any participant
  • No data extraction or monetization of participant activity
  • No ideological or political alignment required for federation participation
  • No surveillance capability — the protocol is structurally incapable of mass surveillance

This infrastructure cannot be acquired or politically captured.

The Foundation has no equity. The Custodian has no equity. Neither entity can be purchased, merged, or transferred. Root cryptographic keys are held in tamper-resistant hardware under threshold cryptography that requires three of five geographically distributed custodians to perform any operation.

No government, corporation, investor, or individual can unilaterally control this infrastructure. This is the structural basis for multi-sovereign federation.