⚠ POST-V6 REVISION IN PROGRESS. This whitepaper is being revised to reflect the V6 coordinated hard fork (block 10,000), which introduces signature-bound Proof of Work, the 5-defense Gold Vault model (purpose restriction + dual destination whitelists + per-spend cap + rate limiting + 95% supermajority), and replaces the original "Protocol Execution Order" framing with a direct developer→protocol custody transition at block 10,000. Activation height was moved from 5,000 to 10,000 to allow proper testnet burn-in. For the canonical current architecture, see BitcoinTalk ANN post #89 and the project repository. Sections of this document referring to "Protocol Execution Order", "75% threshold", "block 5,000 activation", or "multisig/timelock custody" describe the pre-V6 design and are being rewritten. The next whitepaper revision is scheduled before the V6 release candidate.

SOST

Proof of Irreversible Convergence

ConvergenceX • PoPC • Metals Reserve (tokenized precious metals — Phase 1: gold-first)

Technical Whitepaper v4.0

Living Document Notice: This whitepaper reflects the genesis design of SOST Protocol. SOST is a
dynamic project under continuous development, with ongoing improvements in narrative, DeFi mechanics,
and security. Operational parameters (non-consensus) may be updated or adapted over time. Any changes
will be made in the interest of the project's long-term health and the benefit of all SOST holders.
Consensus rules (Section 10) remain immutable at genesis. Updated versions will be published with
full errata documentation.

SOST is a Proof-of-Work protocol where each mined block allocates 25% of issuance to an on-chain Gold Funding Vault (Phase 1: gold-first, tokenized XAUt/PAXG) by consensus. Conversions to XAUT/PAXG are operational actions executed with public attestations and auditable trails. Purchased precious-metal tokens are deposited into a separate Heritage Reserve on Ethereum mainnet. The Heritage Reserve is sealed by default. Reserve assets are intended to remain perpetual and untouched while SOST exists. During Phase I (before block 10,000), the protocol developer executes reserve operations operationally. After V6 activation (block 10,000), reserve custody transitions to the protocol itself under the 5-defense Gold Vault model, requiring ≥95% miner supermajority signaling and satisfying all five constitutional defenses for any non-routine reserve movement.

A mathematically grounded Proof-of-Work based on verifiable dynamical-system certificates.

No ICO • No Premine • No VCs • No Ongoing Parameter Governance

The protocol is permissionless by design. Third-party exchanges, custodians, or issuers may apply their own KYC/AML requirements.

Genesis Block: March 15, 2026 — 18:00:00 UTC

Table of Contents

Abstract

The Problem

ConvergenceX: Proof of Irreversible Convergence

Monetary Policy

Metals Protocol Reserve

Proof of Personal Custody (PoPC)

Governance Model

Economic Model

Security Analysis

The Constitution

Roadmap

Technical Specifications

Sovereign Value Stack

Conclusion

Legal Disclaimer

Appendix A — Canonical Constants (Normative)

Appendix B — Serialization (Normative)

Appendix C — PRNG Specification (Normative)

Appendix D — Test Vectors (Normative)

Appendix G — Emergency Reserve Authorization (V6 5-Defense Model) (Normative)

1. Abstract

SOST is a Proof-of-Work cryptocurrency built on ConvergenceX, a consensus mechanism that replaces brute-force hash guessing with a mandatory sequential convergence process. Each mining attempt requires ~8 GB RAM (4 GB dataset + 4 GB scratchpad), 100,000 strictly sequential rounds of integer-only gradient descent over a deterministic random linear system, memory-hard scratchpad reads at every round, and a stability basin verification that produces a deterministic certificate. Node validation requires only ~500 MB RAM — no dataset or scratchpad is needed to verify blocks.

Every block splits the coinbase reward by consensus:

50% + remainder to the miner,

25% to a Gold Funding Vault,

25% to a PoPC Pool powering Proof of Personal Custody.

Purchased precious-metal tokens are held on Ethereum mainnet in a Heritage Reserve (sealed by default). During Phase I (before block 10,000), the protocol developer may adjust future purchase execution (including the default 50/50 XAUt/PAXG split) operationally. After V6 activation (block 10,000), all reserve adjustments require protocol-level governance under the 5-defense Gold Vault model. Previously purchased reserve assets are intended to remain perpetual and cannot be moved except under Emergency Catastrophe authorization (≥95% miner supermajority + all five constitutional defenses satisfied).

PoPC audit randomness derives exclusively from ConvergenceX block entropy: (block_id, commit, checkpoints_root). No external oracle is required for consensus-critical validation; off-chain data is used only for operational PoPC policy and settlement.

No ongoing parameter governance exists. Monetary rules, emission schedules, coinbase splits, and constitutional constraints are immutable at genesis. Only narrow emergency authorization signaling exists, requiring ≥95% miner supermajority under the V6 5-defense Gold Vault model. During Phase I (before block 10,000), operational actions (vault execution, reporting, emergency rotations) are executed by the protocol developer, constitutionally constrained, and publicly auditable. After V6 activation, these functions transition to automated on-chain governance.

2. The Problem

2.1 Proof-of-Work: A Standard Worth Studying

Bitcoin's SHA-256 Proof-of-Work (2009) remains an engineering landmark: minimal, rigorous, and resilient under real adversarial pressure. Its design established the core insight that verifiable computation can secure decentralized consensus at global scale.

At the same time, the dominant pattern across PoW systems remains a lottery-style threshold check:

nonce → hash → compare to target

This structure—brilliant in its simplicity—also enables:

massive parallelization (benefiting specialized pipelines),

rapid hardware specialization,

mining centralization driven by economies of scale.

SOST does not attempt to "replace" Bitcoin's virtues. It explores a different design space: structured work that produces verifiable certificates and public entropy as a byproduct.

2.2 Memory-Hard Alternatives

RandomX and Ethash advanced ASIC-resistance via memory-hardness and reduced specialized advantage. Yet the proof object remains primarily a hash threshold. Computation is structured, but it does not yield a convergence certificate nor a reusable entropy artifact beyond the block hash.

2.3 Crypto Has Limited Structural Reserves

Many systems discuss reserves or backing, but few embed structural accumulation as a constitutional side effect of mining. SOST implements a consensus-enforced allocation to an on-chain vault (Gold Funding Vault), with an operational conversion pipeline into a separate Heritage sealed Heritage Reserve on Ethereum mainnet, with an emergency catastrophe procedure for exceptional circumstances.

3. ConvergenceX: Proof of Irreversible Convergence

3.0 Design Roots (Motivation)

Before any technical specification, it is worth stating the principle that ConvergenceX encodes into consensus: trial and error — the oldest and most universal method of progress known to humanity. Since the first tool was shaped by hand, every meaningful advance has followed the same pattern: attempt, fail, measure the failure, correct, attempt again. This iterative refinement is not merely a technique; it is the only known path toward anything resembling perfection — a destination that, by its nature, can be approached but never reached.

This asymptotic quality is not a defect. It is a structural feature of the universe itself. The cosmic microwave background — the residual radiation from the Big Bang — is not perfectly uniform. It contains tiny anisotropies, density fluctuations of roughly one part in 100,000. These imperfections were not errors in the universe's initial conditions; they were the seeds of all structure. Without those minute deviations from uniformity, matter would never have clumped into galaxies, stars would never have ignited, planets would never have formed, and life would never have emerged. The universe required imperfection to produce complexity. A perfectly smooth cosmos would be a perfectly sterile one.

The same principle operates at every scale. Biological evolution depends on imperfect DNA replication — mutations are errors, yet they are the sole engine of adaptation. Scientific knowledge advances through falsification: every disproven hypothesis narrows the residual error and brings the model closer to reality, but never arrives at a final truth. Engineering iterates through prototypes, each one correcting the failures of its predecessor.

ConvergenceX translates this universal principle into a consensus mechanism. A miner does not guess randomly until lucky. A miner begins with an approximate solution, measures the error (the residual), applies a correction (gradient descent), and repeats — 100,000 times, sequentially, each round depending on the one before it. The proof-of-work is not a lottery ticket. It is a recorded journey of iterative refinement: a trajectory from disorder toward convergence, verified by a mathematical certificate that proves the solution reached a genuine basin of attraction — stable, reproducible, and irreversible. The block is valid not because the miner was fortunate, but because the miner demonstrated disciplined, sequential improvement under strict deterministic rules. In this sense, ConvergenceX is not an invention. It is a formalization of the oldest principle in nature: progress through corrected error.

ConvergenceX is born from a very concrete observation: over the last decade, computing has rediscovered that solving linear systems and performing matrix–vector multiplications is not only "computation," but dynamics—a convergence process that can be verified. Modern analog computing (especially the in-memory computing line using resistive memories / RRAM) shows that a matrix can be represented as a physical structure and that certain operations can emerge almost "by the laws of the circuit," while precision is recovered through iterative refinement, bit-slicing techniques, and block partitioning for scalability. ConvergenceX carries that intuition into consensus: it replaces the "pure randomness" of the hash lottery with a mandatory sequential trajectory (deterministic iterations), where each round depends on the previous one, memory is mixed in (scratchpad) to penalize shortcuts, and the final result is accompanied by a verifiable certificate (checkpoints + stability-basin proof). In essence, it is a PoW inspired by the idea that the hardest work to counterfeit is not "getting lucky," but demonstrating convergence under strict rules, reproducibly and identically on any machine (integer-only arithmetic, no floating point)—a reinterpretation of the spirit of the Antikythera Mechanism, but with modern standards of verifiability and adversarial consensus.

A simple mental model is an arrows-to-a-target process. Imagine a target board (the true solution) and an archer that is extremely fast but not perfectly precise. The first volley lands "somewhere near" the center — not exact, but close. Then the archer looks at the error (how far the arrows are from the bullseye) and fires corrected volleys that progressively shrink that distance. After a few rounds, the arrows cluster tightly around the bullseye. That is the essence of iterative refinement: quick approximate step → measure error → correct → repeat. In RRAM systems, the "fast volley" is the analog in-memory matrix operation, and the "correction rounds" are deterministic refinement loops that drive the residual down until the desired precision is reached.

ConvergenceX transfers this intuition into consensus. Instead of a pure hash lottery, a miner must execute a mandatory, strictly sequential convergence journey: derive a deterministic per-tip problem, run fixed rounds of integer-only updates with memory-hard mixing, commit intermediate checkpoints, and finally prove the result lies in a stable basin of attraction (a verifiable "this really converges" certificate). In the same arrows analogy, the block is valid only if the miner can show not just one lucky arrow, but an entire trajectory of corrections that consistently drives the solution toward the target — under rules that every node can reproduce bit-for-bit. The goal is not to claim "analog hardware inside the chain," but to adopt the convergence principle: work that is hardest to fake is not random guessing, but demonstrating irreversible convergence under strict, deterministic constraints.

3.1 Core Concept

Instead of "guessing until the hash is small enough", a miner must complete a deterministic convergence journey:

generate a per-tip deterministic problem (block_key),

execute 100,000 sequential rounds with memory-hard mixing,

commit checkpoints into a Merkle root,

verify stability basin constraints,

then compare a single commitment hash to the difficulty target.

You cannot win without completing the journey. Round r+1 depends on round r. Intra-attempt parallelism is structurally eliminated.

3.2 Algorithm — Detailed Specification (Consensus-Critical)

All arithmetic is integer-only (32-bit signed clamping where needed). No floating point exists in consensus paths.

Phase 1: Problem Generation (per tip)

block_key = SHA256(prev_hash || "BLOCK_KEY")

Matrix M (32×32):

  raw = PRNG(SHA256(MAGIC || "M" || block_key), 32*32 bytes)
  M[i][j] = (raw[k] % 255) - 127

Vector b (32):

  raw = PRNG(SHA256(MAGIC || "B" || block_key), 32*4 bytes)
  b[i] = int32_le(raw[i*4..i*4+3])

A(x) = M^T(Mx) + λx with λ = 100

block_key depends only on prev_hash (reduces grinding surface). Header fields remain bound via header_core inside seed and commit.

Phase 2: Iterative Convergence (100,000 rounds)

header_core = prev_hash||merkle_root||timestamp(u32 LE)||powDiffQ(u32 LE)

seed = SHA256(MAGIC||"SEED"||header_core||block_key||nonce||extra_nonce)

x0 = PRNG(SHA256(MAGIC||"X0"||seed), 32*4 bytes)

x0[i] = asr_i32(int32_le(x0[i]), 4)

state = SHA256(MAGIC||"ST"||seed)

for r=1..100000:

1) integer gradient step using A(x)
2) 4 scratchpad reads (state-dependent indices)
3) mix scratchpad into x (XOR/add + shifts)
4) state = SHA256(state || m0..m3 || x[j0..j3] || r)
5) checkpoint every 6250 rounds (16 total)

Phase 3: Checkpoint Merkle Tree (16 leaves)

Each leaf binds {state_hash, x_hash, round, residual(L1)} into checkpoints_root.

Phase 4: Stability Basin Verification (certificate)

Deterministic perturbation probes (k) and refinement steps (steps) enforce:

local non-explosion, and

global contraction for sufficiently large perturbations.

The cASERT equalizer adaptively selects (k, steps, scale) for liveness, with a bidirectional policy: it hardens (H1–H35) when the chain is ahead of schedule (emission protection) and eases (E1–E4) when the chain has been behind schedule for 6+ hours at B0 (liveness support).

Phase 5: Commitment & Target Check

COMMITMENT (binds all proof components):

  commit = SHA256(
    MAGIC || "COMMIT" ||
    header_core ||           // binds to all header fields (anti-grinding)
    seed ||                  // binds to nonce + block context
    state ||                 // binds to full 100k-round computation
    x_bytes ||               // binds to final solution vector
    checkpoints_root ||      // binds to convergence trajectory
    stability_metric_u64_le  // binds to basin verification

)

VALID iff commit <= target(powDiffQ)

// Direct comparison (big-endian, 32 bytes).

// No second hash: commit already binds the full proof via SHA256.

The commitment hash is a single SHA-256 that binds together every component of the proof: the initial conditions (seed), the full computation trace (state), the final solution (x_bytes), the convergence trajectory (checkpoints_root), and the stability certificate (stability_metric). Any modification to any component changes the commitment, invalidating the proof.

3.3 Stability Basin Verification — Mathematical Certificate

The stability basin check is what transforms ConvergenceX from "structured computation" into a "mathematical certificate." It answers the question: is this solution a genuine attractor, or did the algorithm land here by accident?

Concept

A stability basin (or basin of attraction) is a region of the solution space where all nearby starting points converge to the same solution under the dynamics of the system. If x_final is in a stability basin, then small perturbations to the starting conditions will still lead to the same (or very nearby) solution after additional refinement steps.

ConvergenceX tests this by launching k deterministic perturbation probes around the final solution and verifying two independent criteria:

Criterion 1: Local Non-Explosion

LOCAL NON-EXPLOSION (per probe, per step):

  For each probe i = 0..k-1:
    delta[i] = deterministic perturbation vector (scale ∈ [-S, +S])
    x_ref  = x_final
    x_pert = x_final + delta[i]
    d_prev = L1_distance(x_ref, x_pert)   // = d0

    For step t = 1..g (gradient refinement):
      x_ref  = gradient_step(x_ref,  M, b, λ, stability_lr_shift)
      x_pert = gradient_step(x_pert, M, b, λ, stability_lr_shift)
      d_now  = L1_distance(x_ref, x_pert)

      REJECT if d_now > d_prev + margin_eff
      // Distance must never grow faster than allowed margin

      d_prev = d_now

This ensures that the perturbed trajectory does not diverge from the reference trajectory at any step. If it does, the solution is near an unstable region and the proof is invalid.

Criterion 2: Global Contraction

GLOBAL CONTRACTION (for large perturbations only):

  d0 = initial L1 distance between x_ref and x_pert
  d_final = L1 distance after g refinement steps

  IF d0 > large_threshold:
    REJECT if d_final * c_den > d0 * c_num + margin_eff

  Where:
    large_threshold = (n * scale) / 2
    c_num = 7, c_den = 10    // contraction ratio 0.7
    margin_eff = margin * m_num / m_den

For perturbations that are large enough to meaningfully test the basin structure, the final distance must be strictly smaller than the initial distance (with a contraction factor of 0.7). This proves that the dynamics are contractive — nearby points get pulled toward the solution, which is the mathematical definition of a stable attractor.

Why Two Criteria

Local non-explosion catches solutions near saddle points or ridges where small perturbations in specific directions cause rapid divergence. Global contraction catches solutions in flat regions where the dynamics neither converge nor diverge — technically stable but not in a genuine basin.

Together, they provide a rigorous certificate that x_final is a true attractor of the regularized linear system.

Deterministic Perturbation Probes

PERTURBATION GENERATION (consensus-critical, miner-unbiasable):

  stctx = SHA256(MAGIC || "STCTX" || header_core || seed || checkpoints_root)

  For probe i:
    raw = PRNG(SHA256(MAGIC || "PERT" || stctx || i || n), n bytes)
    delta[j] = (raw[j] % (2*scale + 1)) - scale

  Properties:
    - Deterministic: same block → same perturbations
    - Unbiasable: stctx depends on full proof, not just nonce
    - Uniform: perturbation components in [-scale, +scale]

The stability context stctx is derived from header_core, seed, and checkpoints_root. This means the perturbation vectors depend on the entire proof trajectory — a miner cannot choose a nonce that produces "easy" perturbations without first completing the full 100,000-round convergence.

cASERT Equalizer Stability Parameters

The intensity of perturbation probes adapts to network conditions through the cASERT

equalizer (Section 3.12). The equalizer uses a bidirectional block-lag signal: it compares

the actual number of blocks mined against the ideal schedule (genesis + height × 600s)

and increases computational cost when the chain is running ahead of schedule (H1–H35), or decreases it when the chain has been behind schedule for 6+ hours at B0 (E1–E4).

  lag = expected_blocks - actual_blocks
  expected_blocks = floor((wall_clock_now - GENESIS_TIME) / TARGET_SPACING)
  lag ≥ 0 (on schedule or behind)  → L1  (neutral, baseline)
  lag < 0, |lag| < 5               → L1  (neutral)
  lag < 0, 5 ≤ |lag| ≤ 25          → L2  (light hardening)
  lag < 0, 26 ≤ |lag| ≤ 50         → L3  (moderate hardening)
  lag < 0, 51 ≤ |lag| ≤ 75         → L4  (strong hardening)
  lag < 0, 76 ≤ |lag| ≤ 100        → L5  (strong hardening)
  lag < 0, |lag| ≥ 101              → L6+ (unbounded: level = 6 + floor((ahead - 101) / 50))
⚠ IMPLEMENTATION NOTE (v4.5): The level system below (L1–L6+) was the pre-genesis design. The mainnet implementation uses 43 discrete profiles (E7 through H35) with direct lag mapping (block 5,320+): profile = clamp(lag, 0, ceiling). Upward: immediate. Downward: max 1 level/block (block 5,323 hotfix). Each profile has independently tuned scale, k, steps, and margin. See cASERT Specification for current parameters. Final calibration at block 5,750: H13 ceiling, E7 relief valve at 605s, 43 profiles E7–H35, lag-adjust ~6s.

Stability parameters by level (pre-genesis design — see note above):

  Mainnet profiles: E7(-7) through H35(+35), 43 total
  B0 (baseline): scale=1, k=4, steps=4, margin=165
  H35 (maximum): scale=2, k=20, steps=20, margin=115
  E7 (deepest):  scale=1, k=1, steps=1, margin=200

Examples:

ConditionLevelScalekStepsMargin
Behind schedule or on timeL1144180
1-4 blocks aheadL1144180
5-25 blocks aheadL2244180
26-50 blocks aheadL3344180
51-75 blocks aheadL4444180
76-100 blocks aheadL5544180
101+ blocks aheadL6+6+44180

At L1 (neutral operation), 4 independent probes each run 4 gradient steps with

perturbation scale ±1. This is the baseline configuration matching the genesis stability

constants. When the chain is behind schedule, on time, or up to 4 blocks ahead, the equalizer

stays at B0 (baseline) and lets cASERT bitsQ handle difficulty adjustment alone. When the chain runs 5 or

more blocks ahead of schedule (excess hashrate producing blocks faster than 600s),

the equalizer progressively increases the perturbation scale from L2 through L5, making each

mining attempt more computationally expensive. When the chain has been behind schedule for

6+ hours at B0, the equalizer eases (E1–E4), reducing perturbation cost to support liveness.

This bidirectional policy ensures hardening activates for emission protection and easing

activates when the chain genuinely needs liveness support.

Decay Anti-Stall (cASERT layer 3):

If no block found for max(ahead × 600s, 7200s) — proportional to blocks ahead, no ceiling — the effective level decays: L8+ drops 1/10min, L4–L7 drops 1/20min, L2–L3 drops 1/30min, L1 is floor. Cost uses the current effective level as it drops. When mining resumes, decay stops instantly. Block validation uses raw schedule level.

Worked Example — L10 (450 blocks ahead):
Activation: max(450 × 600, 7200) = 270,000s (75h). After activation: L10→L8 FAST (30min) · L7→L4 MEDIUM (80min) · L3→L1 SLOW (60min). Total decay: 170 min (2h 50m). Total from mining start: ~78 hours.

3.4 Anti-Grinding and Proof Binding

ConvergenceX implements multiple layers of anti-grinding protection to prevent miners from exploiting degrees of freedom in block construction.

Block Key Derivation

BLOCK KEY (per-tip, anti-grinding):

  block_key = SHA256(prev_hash || "BLOCK_KEY")

  This determines:
    - Matrix M (32×32 random integers)
    - Target vector b (32 random integers)
    - Scratchpad access pattern (via state evolution)
    - Stability perturbation vectors (via stctx)

The block key depends only on prev_hash. This means that all attempts for a given chain tip share the same linear system — the problem is stable and predictable once the tip is known. Changing the nonce changes the initial state x0 and the convergence path, but the problem itself (M, b) remains the same.

This is a deliberate design to minimize grinding surface. If block_key included merkle_root, timestamp, or powDiffQ, miners could iterate over header field combinations to search for a problem with a "favorable" convergence landscape — effectively multiplying the search space in a way that benefits sophisticated miners disproportionately. With prev_hash only, the problem is fixed per tip and cannot be manipulated without chain reorganization.

Full header binding is achieved by injecting header_core into the attempt seed and the final commit, so any change to merkle_root, timestamp, or powDiffQ forces a full recomputation. This is a deliberate design choice to minimize problem grinding. Header field grinding is neutralized because header_core is bound into seed and commit:

HEADER CORE (binds all header fields into the proof):

  header_core = prev_hash(32) || merkle_root(32) || timestamp(u32 LE) || powDiffQ(u32 LE)
  // Total: 72 bytes, canonical little-endian serialization

  header_core is passed to ConvergenceX as an input parameter.
  It is mixed into the commitment hash, ensuring that any change to
  merkle_root, timestamp, or powDiffQ invalidates the proof —
  even though the problem (M, b) remains the same.

To get a different problem, the miner must change prev_hash — which requires reorganizing the chain. The other header fields are consensus-constrained:

merkle_root: determined by transaction selection (changes invalidate commit, not problem)
timestamp: constrained by MTP and future drift rules
powDiffQ: determined by cASERT bitsQ

Stability Context Binding

STABILITY CONTEXT (anti proof-reuse):

  stctx = SHA256(MAGIC || "STCTX" || header_core || seed || checkpoints_root)

  This binds the stability verification to:
    - The specific block being mined (header_core)
    - The specific nonce being tried (seed)
    - The full convergence trajectory (checkpoints_root)

A miner cannot reuse a stability proof from one block/nonce combination on another. The perturbation vectors are different for every attempt, making each stability certificate unique to the exact proof it certifies.

Seed Derivation

SEED (per-attempt uniqueness):

  seed = SHA256(MAGIC || "SEED" || header_core || block_key || nonce || extra_nonce)

  Derived values:
    x0 = initial solution vector
    All downstream computation depends on seed

The seed combines header_core (binding all header fields), the block key (shared across attempts), and the nonce/extra_nonce (unique per attempt). This ensures that each attempt starts from a different initial condition and traverses a different convergence path through the shared problem landscape. Any change to merkle_root, timestamp, or powDiffQ changes the seed and forces a full recomputation.

3.5 Checkpoint Merkle Tree — Structure and SPV Applications

Tree Structure

ConvergenceX produces 16 checkpoints during the 100,000-round convergence loop, one every 6,250 rounds (100,000 / 6,250 = 16 exactly). Each checkpoint captures a snapshot of the computation state:

CHECKPOINT SCHEMA:

  checkpoint = {
    round:      uint32,     // round number (6250, 12500, ..., 100000)
    state_hash: bytes32,    // SHA256 chain of all state updates to this point
    x_hash:     bytes32,    // SHA256 of solution vector x at this round
    residual:   uint64      // ||A(x) - b||₁ (convergence quality metric)
  }

LEAF CONSTRUCTION:

  leaf = SHA256("CP" || state_hash || x_hash || round_u32_le || residual_u64_le)

TREE PROPERTIES:
  - 16 leaves → 4 levels → root in 15 hash operations
  - Proof for any single checkpoint: 4 sibling hashes (128 bytes)
  - Odd leaf count: last leaf duplicated (standard Merkle padding)

SPV Verification Use Cases

Light client block validation: A node in BASIC sync mode can verify the checkpoints_root without recomputing any gradient steps. It trusts the root (validated by full nodes at chain tip) and can spot-check individual checkpoints when operating in ADAPTIVE mode.

Convergence quality audit: By requesting checkpoints at rounds 6,250 and 100,000 from a full node, a light client can verify that the residual decreased — confirming genuine convergence occurred. The Merkle proof ensures the checkpoint data is authentic.

Entropy verification: The checkpoints_root is one of three components in the PoPC entropy triple. A PoPC verifier can confirm that the entropy source is authentic by validating the Merkle root against the block header, without needing to recompute the full proof.

3.6 Integer-Only Consensus Arithmetic

Every computation in the ConvergenceX consensus-critical path uses integer arithmetic exclusively. No floating-point operations exist in any consensus code path. This is a deliberate design decision with concrete implications.

Why Zero Floating-Point

IEEE 754 floating-point arithmetic is not deterministic across all hardware. Different CPU architectures, compiler optimizations, FPU modes, and instruction orderings can produce slightly different results for the same computation. In a consensus system, even a single bit of divergence causes a chain split.

Bitcoin avoids this by using integer arithmetic for difficulty adjustments and emission calculations. ConvergenceX extends this principle to the entire proof-of-work computation, which includes matrix-vector multiplication, gradient descent, residual computation, and stability verification — operations that traditionally use floating-point.

Implementation

INTEGER ARITHMETIC PRIMITIVES (consensus-critical):

  clamp_i32(x):
    return max(-2^31, min(2^31 - 1, x))

  u32(x):  return x & 0xFFFFFFFF
  u64(x):  return x & 0xFFFFFFFFFFFFFFFF

  sat_u64_add(a, b):
    return min(a + b, 2^64 - 1)

  safe_residual_l1(Ax, b, n):
    acc = 0
    For i in 0..n-1:
      acc += abs(clamp_i32(Ax[i] - b[i]))
      if acc > 2^63 - 1: return 2^63 - 1
    return acc

  l1_dist_sat_u64(a, b):
    acc = 0
    For i in 0..n-1:
      d = abs(clamp_i32(a[i]) - clamp_i32(b[i]))
      acc = sat_u64_add(acc, d)
      if acc == U64_MAX: return U64_MAX
    return acc

  asr_i32(x, s):
    if s >= 31: return (x < 0) ? -1 : 0
    ux = uint32(x)
    shifted = ux >> s
    if x < 0:
      mask = 0xFFFFFFFF << (32 - s)
      shifted |= mask
    return int32(shifted)

Emission Schedule (Integer-Only Exponentiation)

The emission decay uses fixed-point arithmetic with explicit floor division:

FIXED-POINT EMISSION (consensus-critical):

  Q_NUM = 7,788,007,830,714,049
  Q_DEN = 10,000,000,000,000,000

  _qmul_floor(a, b):
    return (a * b) // Q_DEN

  _qpow_floor(base, exp):
    result = Q_DEN
    x = base
    while exp > 0:
      if exp & 1: result = _qmul_floor(result, x)
      x = _qmul_floor(x, x)
      exp >>= 1
    return result

  subsidy(height):
    epoch = height // 131,553
    qpow = _qpow_floor(Q_NUM, epoch)
    return (R0 * qpow) // Q_DEN

This produces bit-identical results on any hardware, any language, any platform — the fundamental requirement for consensus arithmetic.

3.7 ASIC Resistance — Design and Analysis

The Memory-Hard Foundation

Each ConvergenceX attempt performs 100,000 rounds, each reading 4 pseudo-random 32-bit words from a 4 GB scratchpad. The access indices are derived from the evolving state hash, which changes every round. This creates 400,000 pseudo-random reads across 1,073,741,824 possible 4-byte positions per attempt.

MEMORY ACCESS ANALYSIS (per attempt):

  Scratchpad size:     4,096 MB = 4,294,967,296 bytes
  Addressable words:   1,073,741,824 (32-bit words)
  Reads per round:     4
  Rounds per attempt:  100,000
  Total reads:         400,000

  Access pattern:      Pseudo-random, state-dependent
  Predictability:      Zero — each index depends on state from prior round
  Locality:            None — uniform distribution across 4 GB

  Required bandwidth:  400,000 × 4 bytes = 1.6 MB read per attempt
  Working set:         The access pattern is state-dependent and unpredictable;
                       the design targets a high penalty for time-memory tradeoffs
                       and requires practical residency of the full scratchpad for
                       competitive mining. A dedicated TMTO analysis is planned.

Why Sequential Dependency Defeats ASICs

The critical constraint is not the memory reads themselves — it is the sequential dependency chain:

SEQUENTIAL DEPENDENCY (unbreakable):

  Round r produces:
    state[r] = SHA256(state[r-1] || scratchpad_data || solution_data || r)

  Round r+1 needs:
    state[r] to derive scratchpad indices idx0..idx3
    x[r] to compute gradient step

  Therefore:
    Round r+1 CANNOT BEGIN until round r COMPLETES.
    Intra-attempt parallelism is eliminated by state dependency.
    Specialized hardware may still improve energy per attempt,
    which is addressed via memory-hardness and sequential verification.

An ASIC for SHA-256 can compute billions of independent hashes in parallel because each hash is stateless. An ASIC for ConvergenceX can only execute one round at a time per attempt, because each round reads from the solution of the previous round. The only parallelism available is running multiple independent attempts (different nonces) simultaneously — which is exactly what a CPU with multiple cores already does.

ASIC advantage estimate: A custom ASIC could potentially optimize the SHA-256 operations within each round and achieve tighter memory bus timing. The design is intended to minimize ASIC advantage; preliminary estimates suggest low multiples over modern CPUs, compared to >1000× advantage for SHA-256 ASICs. Formal, reproducible benchmarks will be published separately (methodology, hardware baselines, energy per attempt, and RAM latency profiles).

Scratchpad Construction

The scratchpad is deterministic, epoch-specific, and constructed via a sequential SHA-256 chain:

SCRATCHPAD CONSTRUCTION (deterministic):

  epoch_key(epoch=0):
    SHA256(MAGIC || "EPOCH" || epoch_u32)

  epoch_key(epoch>0):
    SHA256(MAGIC || "EPOCH" || epoch_u32 || anchor_block_id)

  build(seed_key, size_mb):
    h = SHA256(MAGIC || "SCR" || seed_key)
    counter = 0
    For each 32-byte position in scratchpad:
      h = SHA256(h || counter_u32)
      write h to scratchpad
      counter += 1

  Properties:
    - Deterministic: same epoch → same scratchpad on all nodes
    - Sequential: each 32-byte chunk depends on the previous one
    - Epoch-specific: new epoch → new scratchpad → new access patterns
    - Anchor-dependent (epoch>0): scratchpad for epoch N depends on
      the block that ended epoch N-1, which is unknown until that block is mined

Epoch anchor innovation: For epoch > 0, the scratchpad key depends on the block_id of the last block of the previous epoch. Since block_id commits to the full header (including timestamp), it is sufficient for uniqueness without separately including anchor_timestamp — which would create a timestamp-grinding vector. This means the scratchpad for a new epoch cannot be pre-computed — miners must wait for the epoch transition block to be mined before building the new scratchpad.

3.8 ConvergenceX as Entropy Engine

Every valid block produces a unique, unpredictable, publicly verifiable entropy triple:

ENTROPY TRIPLE (per block):

  E = (block_id, commit, checkpoints_root)

  full_header = MAGIC(10) || "HDR2"(4) || header_core(72) ||
                checkpoints_root(32) || nonce(u32 LE) || extra_nonce(u32 LE)
    - Does NOT include commit (commit is appended separately in block_id)

  block_id = SHA256(full_header || "ID" || commit)
    - Depends on: all header fields + full ConvergenceX proof
    - commit is NOT part of full_header; it is concatenated after "ID"

  commit = SHA256(MAGIC || "COMMIT" || header_core || seed || state || x || cp_root || metric)
    - Depends on: all 100,000 rounds of computation

  checkpoints_root = Merkle root of 16 checkpoint leaves
    - Depends on: state evolution at 16 intermediate points

PROPERTIES:
  - Unpredictable: no party can know any component before the block is mined
  - Unbiasable: choosing a different nonce changes all three values
  - Publicly verifiable: any node can validate against the block header
  - Information-rich: three independent 32-byte values per block

This entropy powers the PoPC audit system (Section 6.3). The same proof-of-work that secures the chain produces the randomness that governs custody audits — no external oracle, no trusted randomness beacon, and no additional computation required.

3.9 Comparative Analysis: ConvergenceX vs SHA-256 vs RandomX vs Ethash

Bitcoin's SHA-256 remains the canonical PoW baseline—simple, robust, and historically proven. SOST targets different properties: structured work + certificate + entropy triple + memory-hardness.

DimensionBitcoin (SHA-256)Monero (RandomX)Ethereum Classic (Ethash)SOST (ConvergenceX)
Year introduced200920192015 (PoS migration 2022)2026
Proof natureHash below targetHash below targetHash below targetConvergence certificate + hash below target
Core operationDouble SHA-256Random VM program executionDAG read + Keccak hashGradient descent + scratchpad + stability check
RAM required (mining)~0 MB2,048 MB (2 GB)1-4 GB (growing DAG)~8,192 MB (4 GB dataset + 4 GB scratchpad)
RAM required (node)~0 MB~256 MB~256 MB~500 MB (no dataset/scratchpad)
ASIC advantage>1,000×~3-5× estimated~2-5× (Ethash ASICs exist)Designed for low multiples (hypothesis; formal benchmark pending)
Difficulty adjustmentEvery 2,016 blocks (~2 weeks)Every block (simple ratio)Every block (bomb + ratio)Every block (cASERT bitsQ Q16.16, avg288-based since block 5,175, dynamic cap since 5,260)
Mathematical certificateNoneNoneNoneStability basin proof (k probes × g steps)
Useful entropy outputBlock hash onlyBlock hash onlyBlock hash onlyEntropy triple (block_id + commit + cp_root)
Consensus arithmeticInteger (nBits, subsidy)Integer + float (VM)Integer100% integer (zero floating-point)

3.10 Consensus Parameters

Parameter Value

RAM (mining total) ~8,192 MB (4,096 MB scratchpad + 4,096 MB dataset)

RAM (node validation) ~500 MB (no scratchpad/dataset needed)

Rounds per attempt 100,000 sequential

State dimension 32

Learning rate shift 18

Regularization λ 100

Checkpoint interval 6,250 (16 checkpoints)

Difficulty encoding SOSTCompact Q16.16

Difficulty algorithm cASERT bitsQ, avg288-based (block 5,175+), dynamic cap (block 5,260+)

Per-block delta cap Dynamic (5,260+): 0%/0.5%/1.5%/2.5%/3.0% (legacy: 12.5% V2)

cASERT equalizer signal Block lag vs ideal schedule (bidirectional)

Equalizer profiles E7(-7) through H35(+35), 43 total

Stability baseline scale=1, k=4, margin=165, steps=4, stab_shift=20

Block target spacing 600s

3.11 cASERT bitsQ Difficulty Adjustment (Consensus-Critical)

cASERT bitsQ compares observed timing to expected schedule and adjusts powDiffQ deterministically.

slow chain → decrease powDiffQ → larger target → easier

fast chain → increase powDiffQ → smaller target → harder

Per-block delta cap bounds the response:

Dynamic cap (block 5,260+): 0% dead band (±30s), 0.5%/1.5%/2.5%/3.0% max. Legacy: 12.5% (V2, blocks 1,450–5,174)

3.12 cASERT Equalizer — Consensus-Critical Structural Correction

IMPORTANT: cASERT is the unified consensus-critical block-rate control system. Both the bitsQ primary controller and the equalizer profile are deterministic and consensus-critical. The equalizer adjusts ConvergenceX stability parameters according to the block-lag level, and validators enforce the correct equalizer profile for each block.

The cASERT equalizer does not change numerical difficulty. It adjusts stability verification

intensity based on block lag — the difference between the expected number of

blocks since genesis and the actual chain height. The equalizer is bidirectional: it

increases computational cost when the chain is ahead of schedule (H1–H35, emission

protection) and decreases it when the chain has been behind schedule for 6+ hours at B0

(E1–E4, liveness support). cASERT bitsQ handles numerical difficulty adjustment in both directions.

SIGNAL COMPUTATION (block lag):

  expected_blocks = floor((wall_clock_now - GENESIS_TIME) / TARGET_SPACING)
  actual_blocks   = current chain height
  lag             = expected_blocks - actual_blocks
  lag > 0   → chain is BEHIND schedule (fewer blocks than expected)
  lag == 0  → chain is exactly on schedule
  lag < 0   → chain is AHEAD of schedule (more blocks than expected)
  Each node computes lag independently using its own wall clock time(nullptr)
  and the consensus GENESIS_TIME constant. The signal is deterministic for any
  observer at the same wall-clock moment and chain height.

LEVEL ASSIGNMENT (bidirectional, block-count thresholds):

  lag ≥ 0                      → L1  (behind or on-time: neutral)
  lag < 0, |lag| < 5           → L1  (slightly ahead: neutral)
  lag < 0, 5 ≤ |lag| ≤ 25     → L2  (light hardening)
  lag < 0, 26 ≤ |lag| ≤ 50    → L3  (moderate hardening)
  lag < 0, 51 ≤ |lag| ≤ 75    → L4  (strong hardening)
  lag < 0, 76 ≤ |lag| ≤ 100   → L5  (strong hardening)
  lag < 0, |lag| ≥ 101         → L6+ (unbounded: level = 6 + floor((ahead - 101) / 50))
⚠ IMPLEMENTATION NOTE (v4.5): Mainnet uses 43 profiles (E7–H35) with variable scale, k, steps, margin per profile. Direct lag mapping (block 5,320+) replaces PID controller. Asymmetric descent: up=immediate, down=max 1/block (block 5,323). Final calibration at block 5,750: H13 ceiling, E7 relief valve (605s), 43 profiles. See cASERT Spec.

STABILITY PARAMETERS (mainnet — see note above):

  43 profiles: E7(-7) through H35(+35)
  B0 baseline: scale=1, k=4, steps=4, margin=165
  All params variable per profile (see cASERT Specification)
  compute_cost = scale × k × steps
  L1: 1 × 4 × 4 = 16  (neutral baseline)
  L2: 2 × 4 × 4 = 32  (100% harder than baseline)
  L3: 3 × 4 × 4 = 48  (200% harder than baseline)
  L4: 4 × 4 × 4 = 64  (300% harder than baseline)
  L5: 5 × 4 × 4 = 80  (400% harder than baseline)
  L6: 6 × 4 × 4 = 96  (500% harder, unbounded continues...)

BIDIRECTIONAL POLICY (emission protection + liveness support):

  The cASERT equalizer addresses a specific threat: an attacker (or sudden hashrate influx)
  mining blocks much faster than the 600s target, which would accelerate coin
  emission before cASERT bitsQ can fully compensate. bitsQ adjusts numerical difficulty
  every block, but its response is bounded by the dynamic cap (0%/0.5%/1.5%/2.5%/3.0%, block 5,260+).
  A massive hashrate spike can outrun the bitsQ delta cap for many blocks,
  emitting coins ahead of the intended schedule.
  The equalizer closes this gap by monitoring the **cumulative** effect: block lag
  measures whether the chain has drifted ahead of its ideal timeline since genesis.
  If the chain is 5+ blocks ahead, the equalizer increases the perturbation scale,
  making each ConvergenceX attempt more expensive regardless of the numerical
  difficulty. This slows down block production even if bitsQ hasn't caught up yet.
  Critically, the equalizer **never relaxes below B0**. When the chain is behind schedule (lag > 0), 
  it stays at B0 (the genesis baseline) and cASERT bitsQ handles recovery by
  lowering numerical difficulty. This avoids double-penalizing a struggling chain:
  bitsQ makes blocks easier to find, and the equalizer stays out of the way.
  The result is an asymmetric safety net:
Ahead of schedule → equalizer hardens B0→H1→H2→H3→H4→H5 (max) (protects emission)
Behind schedule → equalizer stays at B0 (baseline), bitsQ softens (protects liveness)

WHY BLOCK LAG INSTEAD OF LOCAL TIMING:

  Previous cASERT designs used a sliding window of recent inter-block intervals
  to compute a timing-error signal. This approach had two limitations:
1. Local blindness: a 50-block window cannot detect slow cumulative drift.
     The chain can be 100 blocks ahead of schedule while the last 50 blocks
     averaged exactly 600s — the window shows "normal" but the chain is not.
2. Window artifacts: noisy intervals within the window create signal jitter,
     and the error-cap (±1800s) distorts the signal under extreme conditions.
  Block lag solves both: it is a single, global, monotonically meaningful metric
  that directly measures what matters — whether the chain is on schedule. It uses
  wall-clock time, which is objective and independently verifiable by any observer.
  It requires no window, no averaging, and no error capping.

WALL-CLOCK SECURITY:

  The cASERT equalizer uses time(nullptr) (wall-clock time), not block timestamps. Block timestamps
  are miner-controlled within MTP/future-drift bounds and could be manipulated to
  fake the lag signal. Wall-clock time is the node's own system clock, which is not
  influenced by miners. Each node independently computes the same lag for a given
  height at a given real-world moment.
  Note: nodes with significantly misconfigured clocks will compute different lag
  values. This is acceptable because the equalizer affects stability verification intensity,
  not numerical difficulty — cASERT bitsQ (which uses block timestamps) handles the
  consensus-critical difficulty adjustment. A node with a clock off by a few minutes
  may compute L3 instead of L4, but the resulting block is still valid as long as
  commit <= target(powDiffQ). The equalizer is consensus-critical — validators enforce the
  correct equalizer profile for each block's timestamp context.

3.13 Node Synchronization and Verification Policy

FULL: recompute full ConvergenceX proof for each block.

ADAPTIVE (default): FULL on recent tail + sampling; BASIC deep history.

BASIC: header/difficulty/time/target checks only; MUST NOT accept tip blocks.

3.13.1 Fast Sync — Hard Checkpoints and Assumevalid Anchor

New nodes joining the network can skip expensive ConvergenceX recomputation for trusted historical blocks. Structural, semantic, and economic validation always runs — only the expensive CX recompute is conditionally skipped.

Trust model (two independent mechanisms):

1. Hard checkpoints: A block is trusted ONLY if its height AND block hash match a hardcoded checkpoint exactly. Lower height alone is never sufficient to grant trust.

2. Assumevalid anchor: Similar to Bitcoin Core’s -assumevalid flag. If a known block hash exists on the active chain, ancestors of that branch can skip expensive CX recomputation. If the anchor is not on the active chain (e.g. during a chain split), no fast trust is granted.

Verification always performed (all blocks, all modes):

Verification skipped (trusted historical blocks only):

Any node operator can force full verification with --full-verify. Checkpoints and the assumevalid anchor are committed in source code, reviewed by the development team, and updated with each release. A block must have been fully verified by at least one trusted node before being added as a checkpoint or set as the assumevalid anchor.

This mechanism does not change consensus rules. A block that passes fast sync verification would also pass full verification.

3.14 Worked Example — How a Block Is Mined and Verified (ConvergenceX + cASERT)

This section provides a technical but simple walkthrough of how a SOST block is constructed and validated, using real-looking values as an example.

3.14.1 Inputs (example)

prev_hash: 32 bytes

merkle_root: 32 bytes

timestamp ts = 1,771,700,109

MedianTimePast MTP = 1,771,697,922

powDiffQ = 350,629 → powDiffQ / 65,536 ≈ 5.35 bits

cASERT equalizer selected stability parameters:

scale=1, k=4, margin=165, steps=4, stab_shift=20

3.14.2 Timestamp Rules (MTP + Future Drift)

Rule A: ts > MTP

Here: 1,771,700,109 > 1,771,697,922 → OK (difference 2,187s).

Rule B: ts <= now + MAX_FUTURE_DRIFT (e.g., 600s) → prevents "future blocks".

3.14.3 cASERT bitsQ Difficulty (powDiffQ → target)

Difficulty is encoded as Q16.16 log-space:

bits ≈ powDiffQ / 65,536 ≈ 5.35

Validity requires:

commit <= target(powDiffQ) (big-endian integer comparison)

cASERT bitsQ update intuition:

if blocks slow → reduce powDiffQ → easier

if blocks fast → increase powDiffQ → harder

then clamp per-block change and global bounds.

3.14.4 cASERT Equalizer — What the stability parameters mean

scale=1: each perturbation component in [-1, +1] ("how far we poke")

k=4: number of probes (more probes = stronger certificate)

steps=4: refinement steps per probe

margin=180: tolerated bounded growth in local distance

stab_shift=20: conservative refinement step size (smaller updates)

3.14.5 One mining attempt (simple pipeline)

header_core = prev_hash || merkle_root || ts || powDiffQ

block_key = SHA256(prev_hash || "BLOCK_KEY")

seed = SHA256(MAGIC||"SEED"||header_core||block_key||nonce||extra_nonce)

run 100k sequential rounds + scratch mixing + checkpoints

compute checkpoints_root

stability basin verification using cASERT equalizer params

commit = SHA256(... all bound components ...)

accept iff commit <= target(powDiffQ)

block_id = SHA256(full_header || "ID" || commit)

3.14.6 What a validator does

BASIC: checks time, cASERT bitsQ powDiffQ, commit<=target, and linkage.

FULL: recomputes ConvergenceX proof and compares commit/cp_root/metric/block_id.

4. Monetary Policy

4.1 Feigenbaum Emission Schedule (Consensus-Critical)

Epoch-constant subsidy with exponential decay:

TARGET_SPACING = 600 seconds

BLOCKS_PER_EPOCH = 131,553

Decay factor q = exp(-1/4) implemented as fixed-point:

Q_NUM = 7,788,007,830,714,049

Q_DEN = 10,000,000,000,000,000

Initial reward:

R0_STOCKS = 785,100,863 (7.85100863 SOST)

Consensus rule:

epoch = height // BLOCKS_PER_EPOCH

reward = floor(R0 * q^epoch) // fixed-point exponentiation by squaring

4.1.1 Hard Cap by Construction (Consensus-Critical)

SOST enforces a maximum supply by construction, not by tracking cumulative supply on-chain.

Let B = BLOCKS_PER_EPOCH and 0<q<1. Since floor(x) ≤ x:

TotalIssued ≤ B Σ_{e≥0}(R0 q^e) = B * R0 / (1 - q) ≤ SUPPLY_MAX_STOCKS

because R0 is chosen from SUPPLY_MAX_STOCKS and q exactly as defined.

No other minting path exists. Any block that mints more than subsidy(height) is invalid.

Any shortfall due to flooring remains permanently unissued.

Hard cap: 4,669,201 SOST enforced at consensus level. Subsidy drops to zero when cap is reached; miners earn fees only.

4.2 Coinbase Split — Constitutional Rule (Consensus-Critical)

q = reward // 4

gold = q

popc = q

miner = reward - gold - popc

Invariant: miner + gold + popc == reward

4.3 Coinbase Transaction Format (Normative)

Exactly 3 outputs in canonical order:

miner

FUNDING_VAULT_ADDR

POPC_POOL_ADDR

Amounts must match the split exactly. Any deviation → invalid block.

4.4 Supply Projections

VAULT ACCUMULATION (PoPC Pool & Gold Funding Vault each receive 25%):

  Epoch 0 (years 0-2.502):  258,210 SOST per vault
  Year 1 alone:             103,160 SOST per vault
  TOTAL SUPPLY BREAKDOWN:
  Miners:     2,334,600 SOST (50%)
  Gold Funding Vault: 1,167,300 SOST (25%)
  PoPC Pool:  1,167,300 SOST (25%)
  Maximum:    4,669,201 SOST (hard cap)
  ~95% of total supply mined in ~12 epochs (~30 years)

4.5 Comparison: SOST Emission vs Bitcoin Emission (Respectful)

PropertyBitcoinSOST
Max supply21,000,000 BTC4,669,201 SOST
Initial reward50 BTC/block7.851 SOST/block
Decay methodHalving every 210,000 blocksSmooth 9.03% annual decay
Decay eventsDiscrete cliff (reward drops 50% overnight)Continuous (no cliff events)
Mining allocation100% to miner50% miner, 25% gold, 25% PoPC
Smallest unit1 satoshi (10⁻⁸ BTC)1 stock (10⁻⁸ SOST)
~95% emission~2036 (year 28)~2056 (year 30)
Supply cap enforcementConsensus ruleSubsidy-by-height only (upper-bounded by construction)

5. Metals Protocol Reserve

5.1 How It Works — Two-Vault Architecture

SOST uses a two-vault architecture to separate operational liquidity from permanent reserve storage.

TWO-VAULT ARCHITECTURE

FUNDING VAULT (operational, on SOST chain):

Hardcoded destination in genesis consensus rules (coinbase output).
Receives exactly 25% of each block subsidy by consensus (q = reward // 4).
Consensus-enforced: any block without the correct vault output is invalid.
Accumulates SOST and periodically converts it into tokenized gold exposure (XAUT/PAXG)
  via publicly auditable operational execution (Section 5.3).

HERITAGE RESERVE (Heritage, Ethereum mainnet):

The Heritage Reserve is an Ethereum mainnet smart contract that holds allowlisted
  precious-metal tokens (default: XAUt and PAXG).
Default state is Heritage (sealed): no outbound transfers occur in normal operation.
Reserve assets are intended to remain perpetual and untouched while SOST exists,
  except under the Emergency Catastrophe procedure (Section 5.2 + Appendix G).

FLOW:

Block reward (coinbase) →

[Gold Funding Vault (SOST)] → sell SOST (TWAP) → buy XAUT/PAXG →

[Heritage Reserve (XAUT/PAXG)] → HERITAGE / SEALED — Perpetual by default;

movable only via Emergency Catastrophe.

WHY TWO VAULTS:

Gold Funding Vault needs operational flexibility (sell SOST, buy gold tokens).
Heritage Reserve needs maximum immutability (Heritage sealed).
Splitting them achieves both without mixing "hot" and "cold" functions.

ASSET POLICY:

Default split: The conversion pipeline targets 50/50 acquisition of XAUt and PAXG

by default. During Phase I (before block 10,000), the protocol developer may adjust this split operationally;

after V6 activation, adjustments require protocol-level governance. All adjustments apply only to future purchases and must be disclosed in batch reports.

Previously purchased reserve assets are not rebalanced except under Emergency Catastrophe.

5.2 Constitutional Rules — Metals Reserve

The following rules are constitutional (project-level commitments) and are enforced either by SOST consensus (Gold Funding Vault inflow) or by immutable smart contracts and public auditability (Heritage Reserve behavior and reporting).

Metals Reserve Constitution (immutable at genesis)

G1 (Consensus Allocation): Every valid block MUST pay the Gold Funding Vault exactly q = reward // 4.

Any block that fails to do so is invalid.

G2 (Two-Vault Separation): Gold Funding Vault is operational; Heritage Reserve is sealed storage.

All purchased XAUT/PAXG MUST be deposited into the Heritage Reserve.

G3 (Heritage Reserve): The Heritage Reserve is deployed on Ethereum mainnet and is sealed by default.

No outbound transfers occur in normal operation. Reserve assets are intended to remain perpetual

and untouched while SOST exists, except under Emergency Catastrophe authorization.

G4 (Purchase Start Delay + Market Readiness): Purchases begin no earlier than 8 months after public launch

and only once market readiness is met. Market readiness requires at least one verifiable execution

venue capable of selling SOST and acquiring XAUt/PAXG under the TWAP policy with bounded slippage.

A venue may be a CEX, OTC desk, or a DEX with demonstrated liquidity, provided execution produces

a publicly auditable batch trail.

G5 (Batching / Anti-Momentum): Purchases are executed in batches and MUST follow a

rule-based TWAP execution policy (Section 5.3.1), not discretionary market-timing.

G6 (Allowlist + Staging Assets): Reserve assets are limited to allowlisted precious-metal tokens

(default: XAUt and/or PAXG). USDC and USDT may be used strictly as temporary staging assets during

execution (≤72 hours) and are not Reserve assets.

G7 (Default 50/50; Future Purchases Only): Default acquisition targets 50/50 XAUt/PAXG.

During Phase I (before block 10,000), the protocol developer may adjust the split operationally; after V6 activation,

adjustments require protocol-level governance. Adjustments apply only to future

purchases and must be disclosed in batch reports. Previously purchased reserve assets are not

rebalanced except under Emergency Catastrophe.

G8 (Issuer Risk Policy): During Phase I, the protocol developer may redirect future purchases away from a threatened issuer

without consensus. After V6 activation (block 10,000), redirection requires protocol-level governance. Previously purchased reserve assets remain sealed unless Emergency Catastrophe

is authorized.

G9 (Emergency Catastrophe — V6 5-Defense Gold Vault Model):

The Gold Vault must be able to change form, but not purpose. Reserve movements are permitted only under a narrowly defined catastrophe procedure intended for issuer failure/migration events or existential reserve-safety events. After V6 activation (block 10,000), emergency reserve operations require ALL five constitutional defenses to be satisfied simultaneously:

  Defense 1 (Purpose Restriction): Vault funds may only be used for reserve operations
           (rotation, migration, or redistribution). No general-purpose spending.
  Defense 2 (Dual Destination Whitelist): Outbound transfers are restricted to constitutional
           addresses only. Adding a new valid destination requires a hard fork, not a vote.
  Defense 3 (Hard Per-Spend Cap): No single transaction may move more than 2% of vault balance.
  Defense 4 (Asymmetric Rate Limiting): GV1 (routine rotation): max 5% of balance per 30-day
           window. GV3 (non-routine migration): 30-day cooldown between operations.
  Defense 5 (95% Supermajority): Non-routine reserve migration (GV3) requires ≥95% miner
           signaling in a defined activation window, recorded on-chain as
           EmergencyApproved(proposalId, paramsHash, startHeight, endHeight).

GV2 (operational small spend ≤10%) is eliminated. Vault SOST is never burned.

Signaling window (default): Approval is measured over a window of 24 hours, equivalent to

W = 144 blocks with a target of 600s per block (10 minutes).

Supermajority (95%): The emergency shall be considered approved if, within that window,

at least 95% of blocks include the support signal (YES ≥ ceil(0.95 × W)). With the default

value W = 144, this requires YES ≥ 137 signaled blocks.

Emergency actions are limited to exactly two action types:

  (E1) ROTATE: rotate reserve holdings to other allowlisted precious-metal tokens (including XAUt↔PAXG).
  (E2) LIQUIDATE→BUY→REDISTRIBUTE: liquidate precious-metal tokens to acquire SOST and redistribute it,
       with a fully auditable trail.

During Phase I (before block 10,000), the protocol developer may pause purchases or adjust future purchase policy operationally without consensus,

disclosed via batch reports. After V6 activation, such adjustments require protocol-level governance.

G10 (Transparency): Both vault addresses, all batch reports, and all relevant transaction proofs

MUST be publicly published in a reproducible format.

5.3 Automated Vault Execution Architecture

The Gold Funding Vault conversion pipeline is designed to be operationally automated and fully auditable, without requiring a cross-chain bridge or wrapped SOST (wSOST). No trustless cross-chain mechanism is used; instead, automation is achieved through a deterministic execution stack with public attestations at every stage.

VAULT EXECUTION PIPELINE (no bridge, no wSOST)

WATCHER (SOST chain):

  Monitors the Gold Funding Vault balance continuously.
  Detects when accumulated SOST exceeds a batch threshold.

BATCHER:

  Creates a signed execution order when threshold is met.

EXECUTOR (CEX / OTC / DEX where feasible):

  Sells SOST in TWAP clips per policy (Section 5.3.1).
  Purchases XAUT and/or PAXG with proceeds.
  Deposits purchased tokens into the Heritage Reserve (sealed).

ATTESTOR:

  Publishes a public batch record.

TRUST MODEL:

  Consensus-level allocation to the Gold Funding Vault: trustless (hardcoded by validation rules).
  Conversions and purchases are operational and auditable. During Phase I (before block 10,000),
  the protocol developer may adjust execution parameters (including the default 50/50 split)
  and may pause purchases. After V6 activation, adjustments require protocol-level governance.
  Movements of previously purchased reserve assets require Emergency Catastrophe
  authorization (Appendix G).
  No bridge, no wSOST, no smart contract dependency between chains beyond the Heritage Reserve itself.

(Subject to progressive decentralization per C16.)

5.3.1 Execution Policy: TWAP Batch Sales (Operational, Non-Consensus)

SOST's Gold Funding Vault accumulates SOST by consensus (25% of coinbase). Conversions from SOST into tokenized gold exposure (XAUT/PAXG) are operational actions executed by the protocol developer (Phase I) or the automated execution stack (post-V6), with the explicit goal of minimizing market impact while maximizing auditability and predictability.

TWAP (Time-Weighted Average Price) means executing a daily sell budget as many small, evenly spaced limit orders over time (e.g., across 24 hours), so the realized execution price approximates the market's average price over that window and minimizes market impact.

Objective. Convert a portion of the Gold Funding Vault's SOST into XAUT/PAXG with:

Minimal market impact (avoid large, price-disruptive sells),
Maximum traceability (verifiable logs and transaction proofs),
Rule-based execution (avoid discretionary "sell whenever we want" behavior).

TWAP Policy (WP-friendly)

Sell at most X% of daily market volume (typical range: 1%–3%).
Split the daily sell budget into N clips (e.g., 24–96 micro-orders) distributed through the day.
Use limit orders with explicit slippage tolerance (no blind market selling).

Recommended starting parameters (tunable operationally)

Daily sell budget:
DailySell = min(VaultBalance × 0.25%, DailyVolume × 2%)
Clips:
48 clips/day (one every 30 minutes) or 96 clips/day (one every 15 minutes)
Max slippage per clip:
0.5%–1.0% (if exceeded, the clip is canceled or postponed)
Cooldown rule:
If intraday price drawdown exceeds a threshold (example: −8% over 24h),
    reduce the sell budget (e.g., cut in half) or pause execution for 24 hours.

Anti-crash layer (liquidity-aware throttling)

If spreads widen or order-book liquidity degrades, sell less.
If price drops rapidly, the policy does not accelerate selling; it throttles or pauses.
If price rises strongly, the system may sell slightly more, but only within strict ceilings tied
  to volume and vault-balance limits.

Simple example (illustrative)

"Today the exchange reports 500,000 SOST of daily volume. Our policy allows selling at most 2% of daily volume: 10,000 SOST. Instead of selling 10,000 SOST at once, the executor sells 100 clips of 100 SOST distributed throughout the day using limit orders, enforcing a 1% max slippage rule per clip."

Audit and transparency (mandatory)

Each batch record MUST include:

Execution window (day/time range),
Total SOST sold and number of clips,
Venue(s) used (exchange or OTC counterparties),
Realized TWAP/VWAP and total slippage,
Purchase proof for XAUT/PAXG,
Transaction hash proving deposit into the Heritage Reserve.

This framework exists to prevent the common criticism that a project "dumps whenever it wants."

Execution is rate-limited, rule-based, and publicly auditable.

5.4 Heritage Reserve and Dissolution

Heritage (default state, perpetual)

The Heritage Reserve remains sealed by default. No outbound transfers occur in normal operation.

The gold tokens remain a permanent, publicly verifiable reserve record.

"Decades of collective work — converted to gold exposure — preserved."

Dissolution (network lifecycle only)

Trigger: 90 consecutive days with zero blocks (dead-man switch).

A 60-day public notice window begins.

The chain is declared terminated operationally ("project wind-down").

Reserve assets may only be accessed under:

(a) Emergency Catastrophe: ≥95% miner supermajority signaling + all five constitutional defenses (V6 5-defense Gold Vault model)
(b) Formal Dissolution: During Phase I, declared by the protocol developer when chain is irreversibly dead. After V6 activation (block 10,000), dissolution is triggered automatically by the protocol's dead-man switch, subject to public attestation and maximum 90-day notice period
(c) Reserve Lifecycle transitions: planned custody migrations per Section 5.5, with 30-day notice

Dissolution enables access to the reserve for orderly wind-down. During Phase I, the protocol developer is responsible for distributing reserve assets transparently after the 60-day public notice window expires. After V6 activation, distribution is executed via the protocol's automated governance mechanism.

5.4.1 Liveness Monitoring and Dissolution Process (Operational, Non-Consensus)

The protocol distinguishes between consensus rules (immutable) and operational procedures (auditable). The "dead-man switch" is an operational process designed to provide transparency and an orderly wind-down if the chain becomes inactive.

Definitions

Chain liveness: blocks continue to be produced on the SOST network.
Chain death: 90 consecutive days with zero blocks (not "low activity," literally no blocks).

State-based timeline

STATE 0 — Normal: Blocks are produced normally.
STATE 1 — Watch (30 days, zero blocks): Publish a Liveness Alert; start recovery actions
  (debugging, client releases, miner outreach, incident reporting). No liquidation actions occur.
STATE 2 — Critical (60 days, zero blocks): Publish a Critical Alert; prepare a full status report
  (root cause, repository state, known vulnerabilities, recovery attempts). No liquidation actions occur.
STATE 3 — Dissolution Trigger (90 days, zero blocks): Publish a Notice of Dissolution and begin a
  60-day public notice window.
STATE 4 — Execution window (after day 150): After the notice window expires, execute final
  operational steps for wind-down.

Illustrative example

Day 0: last block mined.
Day 30: Watch Alert (transparency + recovery begins; no liquidation).
Day 60: Critical Alert (full incident report prepared).
Day 90: Dissolution Trigger (public notice starts; 60-day notice).
Day 150: wind-down execution (network lifecycle / operational shutdown).

Important constraint

Dissolution enables orderly access to reserve assets for wind-down and distribution. If the chain dies, the 90-day dead-man switch triggers, followed by a 60-day public notice period. During Phase I, the protocol developer declares Formal Dissolution and executes the wind-down. After V6 activation (block 10,000), dissolution and reserve distribution are governed by the protocol's automated mechanisms.

5.5 Reserve Evolution Path

Phase 1 — Tokenized Reserve (Genesis - Year 3):

┌─────────────────────────────────────────┐

│ Heritage Reserve holds XAUT/PAXG tokens │

│ on Ethereum mainnet. │

│ │

│ Advantages: │

│ • No infrastructure needed │

│ • Liquid, auditable, immediate │

│ │

│ Risks: │

│ • Issuer dependency (Tether, Paxos) │

│ • Counterparty risk │

└─────────────────────────────────────────┘

Phase 2 — Physical Transition (Year 3-5):

┌─────────────────────────────────────────┐

│ When Reserve exceeds 500 oz equivalent: │

│ │

│ 1. Protocol developer establishes legal │

│ entity (Swiss/Liechtenstein) │

│ 2. Contract with LBMA-approved vault │

│ 3. Redeem XAUT/PAXG → physical delivery │

│ 4. Transfer to protocol-controlled vault│

│ 5. Independent quarterly audits │

└─────────────────────────────────────────┘

Phase 3 — Sovereign Reserve & Multi-Metal Platform (Year 3-5+):

┌─────────────────────────────────────────┐

│ SOST Precious Metals Reserve: │

│ │

│ • Physical Gold, Platinum, Palladium, │

│ Rhodium, Iridium, Ruthenium, Osmium, │

│ Rhenium, silver (allocation TBD) │

│ • Zero intermediaries │

│ • Protocol-governed vault custody │

│ • Public serial numbers + audit reports │

│ • 100% independent of token issuers │

│ │

│ Heritage rules apply equally to │

│ physical metals as to tokenized metals. │

│ │

│ MULTI-METAL TOKENIZATION VISION: │

│ │

│ Long-term objective: SOST blockchain │

│ becomes an infrastructure for the │

│ tokenization, storage, and exchange of │

│ multiple essential precious metals — │

│ each token always backed 1:1 by its │

│ physical counterpart stored in │

│ auditable vaults (LBMA-approved or │

│ equivalent), with independent proof │

│ of reserves published on a regular │

│ schedule. │

│ │

│ Target metals: Gold, Silver, Platinum, │

│ Palladium, Rhodium. │

│ │

│ This transforms SOST from a single │

│ gold-reserve chain into a multi-asset │

│ precious metals exchange layer — where │

│ every gram tokenized is demonstrably │

│ backed by physical metal that exists, │

│ is audited, and is independently │

│ verifiable. │

└─────────────────────────────────────────┘

6. Proof of Personal Custody (PoPC)

No consensus changes. All PoPC logic remains operational/application-layer except that the PoPC Pool receives 25% coinbase by consensus.

Implementation Status: ✔ Implemented in node software   ✔ Documented publicly   ✔ RPC interfaces ready   ✘ Not yet active on mainnet   ✔ SOSTEscrow deployed on Sepolia   ✔ First on-chain gold deposit (0.05 oz XAUT)
Activation: protocol-scheduled after block 10,000, subject to network readiness (see §6.13).

6.1 What PoPC Is — And Is Not

PoPC is not a tokenization of gold. It does not promise yield, stability, or redeemability. It is a voluntary time-bound commitment protocol with automatic economic consequences. A participant promises to maintain custody of precious metals for a defined period, backs that promise with a SOST bond, and is rewarded if they keep their word. If they break it, their bond is slashed automatically — no human judge involved.

6.2 Why It Is Unique

ProtocolWhat it actually does
MakerDAODeposit ETH (volatile crypto) → receive DAI. Collateral is crypto. Goal: price stability.
Compound/AaveDeposit crypto → borrow crypto. All digital. No physical world connection.
Any staking protocolLock token X → earn token X. Circular. No external asset backing.
SOST PoPCLock SOST bond → prove custody of real gold (XAUT/PAXG). Audited by PoW entropy. No custodian. No bridge.

6.3 ConvergenceX Entropy for Audits

No party — not the protocol, not any server — decides when a user gets audited. The schedule is derived deterministically from ConvergenceX block entropy:

AUDIT SEED (per block):
  seed = SHA256(block_id || commit || checkpoints_root)

  This uses the full entropy triple from the ConvergenceX proof.
  All three components depend on the complete 100,000-round computation.

AUDIT TRIGGER (per contract, per period):
  r = PRF(seed, contractId, periodIndex)
  if r < p(reputation_stars):
      AUDIT REQUIRED

AUDIT PROBABILITY BY REPUTATION:
  0 stars (new):     p = 0.30  (30% of periods audited)
  1 star:            p = 0.20
  3 stars:           p = 0.10
  5 stars (veteran): p = 0.05  (5% of periods audited)

VERIFICATION (script, no humans):
  1. User signs message with Ethereum wallet
  2. ecrecover() confirms control of the declared wallet (no trust needed)
  3. Verifier uses multiple independent RPC endpoints with a
     deterministic retry schedule; results are logged and attested:
     token.balanceOf(user_wallet) >= committed_amount
  4. EOA VERIFICATION: the declared wallet MUST be an Externally Owned
     Account (extcodesize == 0). Smart contract wallets, multisig wallets,
     and proxy contracts are not eligible for Model A. EOA status is
     verified at contract creation AND at every subsequent audit. If code
     is detected at the wallet address during any audit (e.g., via CREATE2
     deployment after commitment), the contract is automatically slashed.
  5. CONTINUOUS CUSTODY CHECK: the audit verifies not only the balance at
     the audit block, but also samples historical balances at deterministic
     checkpoints (derived from ConvergenceX entropy) across the period since
     the last audit. If the balance dropped below the committed amount at
     any sampled checkpoint, this constitutes a custody violation and
     triggers a slash — even if the balance was restored before the audit.
  6. If all checks pass: checkpoint passed
  7. If any check fails: SLASH
  6. If no response within 48h: 48h GRACE period is the sole window.
     No additional grace periods beyond 48h. Slash only if non-response
     persists and RPC availability is confirmed by multiple independent
     endpoints.

6.4 Model A — Commitment with SOST Bond (Autocustody)

Model A: For crypto natives, miners, traders

1. User buys SOST on CEX
2. Declares Ethereum wallet holding XAUT/PAXG
3. Locks SOST bond (dynamic, based on ratio SOST/gold)
4. Commits to maintain custody for 1/3/6/9/12 months
5. ConvergenceX entropy schedules random audits
6. Script verifies XAUT/PAXG balance via Ethereum RPC
7. On completion: recovers bond + reward from PoPC Pool
8. On failure: bond slashed automatically

In Model A, the gold NEVER leaves the user's wallet.
Your gold never leaves your wallet. Only the posted SOST bond is at risk. The protocol has no access
to, custody of, or control over the user's gold tokens.

Trust required: MEDIUM (keeps gold in own wallet, only SOST bond at risk)

6.5 Dynamic Bond — Model A

All fiat-denominated values use USD as the reference currency for documentation. The protocol is currency-agnostic — bond sizing depends on the SOST/gold ratio, not on any specific fiat currency. The bond is always denominated in fiat value, converted to SOST at market price (7-day TWAP). As SOST appreciates relative to gold, the bond percentage increases gradually to maintain deterrence. The bond is designed to create deterrence and alignment, not to fully collateralize the committed asset. Sub-collateralization is intentional and compensated by layered deterrence (bond + reputation + blacklist + size limits).

DYNAMIC BOND CALCULATION:

  ratio = sost_price / gold_oz_price

  ratio < 0.0001              →  bond = 12%  of gold value
  0.0001 <= ratio < 0.001    →  bond = 15%
  0.001  <= ratio < 0.01     →  bond = 20%
  0.01   <= ratio < 0.1      →  bond = 25%
  0.1    <= ratio < 0.2      →  bond = 26%
  0.2    <= ratio < 0.3      →  bond = 27%
  0.3    <= ratio < 0.4      →  bond = 28%
  0.4    <= ratio < 0.5      →  bond = 29%
  ratio >= 0.5               →  bond = 30%  (maximum)

  bond_sost = bond_fiat / sost_price_TWAP_7d

RATIO THRESHOLDS (price-independent):

  The system uses RATIOS, not fixed prices. The ratio automatically
  adjusts to any gold or SOST price. Examples:

  ┌────────────────────┬────────────────────┬─────────┬─────────┐
  │ Gold price         │ SOST price         │ Ratio   │ Bond %  │
  ├────────────────────┼────────────────────┼─────────┼─────────┤
  │ $2,700             │ $1                 │ 0.00037 │ 15%     │
  │ $2,700             │ $100               │ 0.037   │ 25%     │
  │ $2,700             │ $1,350             │ 0.50    │ 30%     │
  │ $5,000             │ $185               │ 0.037   │ 25%     │
  │ $5,000             │ $2,500             │ 0.50    │ 30%     │
  └────────────────────┴────────────────────┴─────────┴─────────┘

  Note: The ratio determines the bond %, regardless of currency or
  absolute prices. If gold doubles in price, the SOST threshold for
  each bond tier also doubles proportionally.

EXAMPLES (assuming 1oz gold = $2,700 at time of contract):

  Example 1: SOST = $1 (early stage)
    ratio = $1 / $2,700 = 0.00037
    0.00037 < 0.001 → bond = 15%
    bond_usd = 15% × $2,700 = $405
    bond_sost = $405 / $1 = 405 SOST

  Example 2: SOST = $100 (growth stage)
    ratio = $100 / $2,700 = 0.037
    0.037 < 0.1 → bond = 25%
    bond_usd = 25% × $2,700 = $675
    bond_sost = $675 / $100 = 6.75 SOST

  Example 3: SOST = $500 (mature stage)
    ratio = $500 / $2,700 = 0.185
    0.185 < 0.2 → bond = 26%
    bond_usd = 26% × $2,700 = $702
    bond_sost = $702 / $500 = 1.40 SOST

  Example 4: SOST = $1,000 (high value)
    ratio = $1,000 / $2,700 = 0.37
    0.37 < 0.4 → bond = 28%
    bond_usd = 28% × $2,700 = $756
    bond_sost = $756 / $1,000 = 0.756 SOST

  Example 5: SOST = $2,000 (premium)
    ratio = $2,000 / $2,700 = 0.74
    0.74 >= 0.5 → bond = 30%
    bond_usd = 30% × $2,700 = $810
    bond_sost = $810 / $2,000 = 0.405 SOST

DESIGN RATIONALE:
  - Gradual scale (25% → 26% → 27% → 28% → 29% → 30%) avoids sudden jumps
  - Maximum bond (30%) only reached when ratio >= 0.5 (SOST worth half an oz)
  - The "pain" of losing the bond remains proportional at any price level
  - Low SOST price → many SOST deposited (but low fiat value)
  - High SOST price → few SOST deposited (but high fiat value)
  - System is RATIO-based, not price-based: works at any gold/SOST price
  - All examples use USD; the system is ratio-based and currency-agnostic

REPUTATION TIERS:

  ┌──────────────────────┬──────────┬──────────┬───────────────────────┐
  │ Tier                 │ Max oz   │ Audit %  │ Progression           │
  ├──────────────────────┼──────────┼──────────┼───────────────────────┤
  │ 0 stars (new)        │ 0.5 oz   │ 30%      │ entry level           │
  │ 1 star (established) │ 1 oz     │ 20%      │ after 1 successful    │
  │ 3 stars (trusted)    │ 3 oz     │ 10%      │ after 3 cumulative    │
  │ 5 stars (veteran)    │ 10 oz    │ 5%       │ after 5 cumulative    │
  └──────────────────────┴──────────┴──────────┴───────────────────────┘

  Progression: 0→1 after 1 successful contract, 1→3 after 3 cumulative
  successful contracts, 3→5 after 5 cumulative successful contracts.
  Slash resets reputation to 0 stars.

REPUTATION SCOPE:
  Reputation is wallet-level. Each completed contract contributes to the
  wallet's reputation score. Stars represent the wallet's cumulative track
  record, not individual contract performance.

6.6 Price Bulletin and Bond Consent (Normative)

Bond sizing requires a market reference for SOST and gold prices. To avoid on-chain oracle dependency and discretionary pricing, PoPC uses a Price Bulletin model with explicit user consent:

PRICE BULLETIN (off-chain, publicly auditable):

  Published daily by the protocol developer (Phase I) / automated oracle (post-V6):
    bulletin = {
      day:              YYYY-MM-DD,
      sost_usd_twap_7d: P_sost,
      gold_usd_twap_7d: P_gold,
      sources:          [exchange feeds / API references — includes all
                         exchanges where SOST has verifiable liquidity at
                         publication time, with public API endpoints. No
                         fixed minimum or maximum number of exchanges;
                         the list adapts as SOST is listed on or delisted
                         from trading venues. Each source must use a
                         publicly accessible and reproducible API],
      method:           "TWAP_7d",
      bulletin_hash:    SHA256(canonical_json(bulletin)),
      developer_sig:    EIP-712_sign(developer_key, bulletin_typed_data)
    }

  Publication: website + GitHub + IPFS mirror (redundant, immutable).
  The bulletin is informational. It does not directly control any contract.

BOND TERMS (client-side calculation + user consent):

  Given user commitment (gold_amt, duration, model):
    gold_value_fiat = gold_amt × P_gold
    ratio          = P_sost / P_gold
    bond_pct       = constitutional_table(ratio)
    bond_fiat       = bond_pct × gold_value_fiat
    bond_sost      = bond_fiat / P_sost

  The client constructs a Bond Terms package:
    terms = {
      model, user_wallet, gold_token, gold_amt, duration,
      bulletin_hash, P_sost, P_gold, ratio, bond_pct, bond_sost,
      nonce, expiry
    }
    terms_hash = keccak256(encode(terms))
    user_sig   = ECDSA_sign(user_key, terms_hash)

ON-CHAIN FINALIZATION (no oracle, no daily updates):

  The PoPC contract accepts (terms + developer_sig + user_sig) and verifies:
    1. EIP-712_recover(developer_sig, terms_typed_data) == developer_key
    2. ecrecover(user_sig, terms_hash) == user_wallet
    3. terms.expiry >= block.timestamp  (freshness / anti-replay)
    4. bond_pct matches constitutional table for provided ratio
    5. bond_sost transferred from user and locked

  Once accepted:
    - Contract stores bond_sost and commitment parameters.
    - Contract does NOT store live prices.
    - Contract does NOT support price updates.
    - No protocol action required after finalization.

PRICE VOLATILITY DURING CONTRACT:

  Prices are FROZEN at contract creation (bulletin of entry day).
  Multi-month price oscillation is absorbed by design:
    - Model A: bond is locked SOST; gold stays in user wallet.
      Volatility does not affect the contract mechanics.
    - Model B: SOST payout is calculated and delivered upfront
      at entry price. No repricing during the term.
  This eliminates oracle risk and discretionary pricing entirely.

DEVELOPER SIGNATURE (EIP-712 typed data — Phase I):
  Terms (including P_sost, P_gold, bond_pct, and reward) are signed by an
  authorized developer key using EIP-712 typed data signatures. The smart
  contract verifies the developer signature before accepting any commitment.
  Users cannot submit self-signed terms. After V6 activation (block 10,000),
  this signing role transitions to an automated oracle with on-chain verification.

SECURITY PROPERTIES:
  - No on-chain oracle: pricing is not consensus-critical.
  - No discretionary pricing: the protocol developer cannot set a user's bond.
  - Dual consent: every contract requires both a developer EIP-712 signature
    on the terms and a user signature. Neither party can act unilaterally.
  - Auditability: any party can reproduce bond sizing from bulletin + terms.
  - Permissionless verification: bulletin data + sources are public.
  - Developer-attested (Phase I): the PoPC contract verifies the developer's EIP-712
    signature on terms before accepting any commitment. Independent parties
    may audit bulletin data, but on-chain terms require developer attestation.
    Post-V6, attestation transitions to automated oracle.
  - Malicious bulletin protection: because both the developer must sign the
    terms and the user must explicitly co-sign, neither party can impose
    pricing unilaterally. A malicious or incorrect bulletin simply results in
    participants refusing to co-sign contracts based on it. No funds are at
    risk from a bad bulletin.

(Subject to progressive decentralization per C16.)

6.7 Model A Rewards

Rewards are denominated in SOST (percentage of bond). This ensures the PoPC Pool can always pay regardless of SOST price. Longer commitments receive proportionally higher APR to incentivize long-term participation. Bond is fully recoverable upon successful completion.

DurationReward (% of bond)Equivalent APR
1 month1% of bond in SOST12% annualized
3 months4% of bond in SOST16% annualized
6 months9% of bond in SOST18% annualized
9 months14% of bond in SOST18.7% annualized
12 months20% of bond in SOST20% annualized

Dynamic Participation Tiers — rates decrease as active contracts grow:

TierContractsMultiplierA 12moB 12mo
EARLY ADOPTER0–25100%20%8%
GROWTH26–5075%15%6%
ESTABLISHED51–10050%10%4%
MATURE101–20030%6%2.4%
SCALE201–50015%3%1.2%
MASS501–1,0008%1.6%0.64%

Hard Caps: 1,000 SOST max per contract · 1,000 active contracts max · 200 oz anti-whale cap · 10/5 SOST reward floor (A/B) · 3% fee (Model A) / 8% fee (Model B) · PUR (1-PUR)² pool protection

EXAMPLE: Model A — 12 month commitment

  Assumptions at contract creation:
    - Gold price: $2,700/oz (from Price Bulletin)
    - SOST price: $100 (from Price Bulletin)
    - User commits: 1 oz XAUT in their own wallet

  STEP 1: Calculate ratio and bond
    ratio = $100 / $2,700 = 0.037
    0.037 < 0.1 → bond = 25%
    bond_usd = 25% × $2,700 = $675
    bond_sost = $675 / $100 = 6.75 SOST

  STEP 2: User deposits 6.75 SOST as bond

  STEP 3: User maintains gold custody for 12 months
    - Random audits verify XAUT balance
    - Gold NEVER leaves user's wallet

  STEP 4: On successful completion
    - Recovers: 6.75 SOST (original bond — 100% returned)
    - Reward: 22% × 6.75 = 1.485 SOST
    - TOTAL: 8.235 SOST

  PROFIT (at original prices):
    - Deposited: 6.75 SOST
    - Received: 8.235 SOST
    - Net gain: 1.485 SOST (20% return on bond)
    - Gold: Still owns 1 oz XAUT

EXAMPLE: Model A — Slash (failure)

  Same setup as above, but user sells their XAUT during contract.

  Audit detects: balanceOf(user_wallet) < 1 oz

  SLASH TRIGGERED:
    - User loses: 6.75 SOST (entire bond)
    - Distribution:
      • 3.375 SOST → PoPC Pool (funds future rewards)
      • 3.375 SOST → Gold Funding Vault (buys more gold)
    - User's reputation: destroyed
    - User's address: blacklisted

### 6.7.1 Protocol Fee — Model A

A protocol fee of 3% (Model A) or 8% (Model B) is calculated at commitment creation and locked; disbursement
occurs at successful completion. The fee is deducted from the calculated reward;
the user's bond is returned in full regardless.

  base_reward    = bond_sost × reward_table[duration]
  protocol_fee   = base_reward × 0.03
  user_reward    = base_reward - protocol_fee

  Fee is locked at creation (immutable for the contract's lifetime).
  Disbursement at completion (single atomic operation):
    user receives:       bond_sost + user_reward
    protocol fee address receives: protocol_fee

EXAMPLE (12-month, same assumptions as Section 6.7):
  Base reward (22%):     6.75 × 0.22 = 1.485 SOST
  Protocol fee (3%):     1.485 × 0.03 = 0.045 SOST
  User receives:         6.75 + 1.440 = 8.190 SOST
  Protocol fee address:  0.045 SOST
  User effective APR:    20.9% (vs 22% nominal)

Fee destination: protocol fee address (publicly auditable).
Fee purpose: infrastructure, watcher operation, bulletin publication,
exchange execution, security audits, development.

Fee changes require 30-day advance public notice and apply only to
NEW contracts. Existing contracts retain the fee rate locked at creation.

### 6.8 Model B — Timelocked Escrow, No Audits

Model B: For holders of XAUT/PAXG — precious metal investors

1. User deposits XAUT/PAXG into an immutable escrow timelock contract
   (non-custodial, deployed on EVM).
2. The escrow contract has NO admin key, NO upgrade proxy, NO pause
   function. During the term, it cannot transfer deposited gold tokens
   to any third party — including the protocol.
3. User receives SOST immediately from PoPC Pool:
   SOST_reward = gold_value × APR × (duration/12) / sost_price
   The SOST reward is delivered to the user's wallet at deposit time.
   This is the compensation for surrendering gold liquidity.
4. At expiry: ONLY the original depositor can withdraw full XAUT/PAXG.
5. SOST received are the user's to keep immediately. No return required.
   The user may sell, hold, or use the SOST freely from day 1.
6. No audits, no slash risk, and no bond requirement. Gold is enforced by escrow, not by trust.

NO EARLY EXIT (Model B — gold escrow):

  Users cannot unlock escrowed gold before maturity. The gold stays
  locked for the full term. However, the SOST reward is delivered
  immediately at deposit — the user has full liquidity of the SOST
  from day 1. This is the fundamental trade: gold liquidity for SOST
  liquidity. "Unvested reward forfeiture" clauses do not apply to
  Model B because there is nothing to forfeit — SOST is already paid.

ESCROW ARCHITECTURE:

Contract type: immutable (no proxy, no UUPS, no admin)
Functions: deposit(token, amount, unlockTime) + withdraw(depositId)
withdraw() callable ONLY by original depositor
withdraw() reverts if block.timestamp < unlockTime
No admin key, no multisig, no emergency withdrawal
Source code: published and verified on explorer. Independent audit planned before mainnet activation of Model B.
NO EXTENSION: the escrow term is immutable once created. There is no renew(), extend(), or modify() function. To commit again after maturity, the user must create a new contract at current terms.

PROTOCOL ROLE IN MODEL B:

The protocol does NOT custody, control, or access escrowed gold.
The protocol operates the watcher that detects deposits and
    triggers immediate SOST payout from PoPC Pool to the depositor.
Escrowed gold tokens are NOT protocol assets. They are recorded
    as off-balance-sheet commitments for transparency purposes only.
The SOST distribution is an incentive for participation in the PoPC
    program and does not constitute interest, yield, lending return, or
    a financial obligation.

ESCROW DEPLOYMENT:

The escrow contract address is immutable and publicly announced
    before PoPC activation. Source code is published and verified on
    the block explorer prior to any deposits being accepted.

WATCHER TRUST MODEL:

The watcher is an operational component, not a consensus mechanism.
The watcher CAN delay SOST payouts (liveness risk).
The watcher CANNOT steal, move, or access escrowed gold (safety).
The watcher CANNOT prevent withdrawal at expiry (escrow is autonomous).
If the watcher fails to pay, the user retains full gold + escrow proof.
AUTONOMOUS CLAIM FALLBACK: if the watcher fails to deliver the SOST
    reward within 72 hours of deposit confirmation, the depositor may
    invoke claimReward(depositId) on a publicly deployed claims contract.
    The claims contract verifies the escrow deposit on-chain (event log +
    deposit parameters) and disburses the NET reward (after protocol fee)
    directly from the PoPC Pool, routing the protocol fee to the protocol fee
    wallet in the same atomic transaction. The watcher is a convenience for
    instant payouts; the autonomous claim is the trustless fallback that
    guarantees delivery regardless of protocol liveness.
IDEMPOTENCY: one claim per depositId; duplicate claims revert.
    All claims are recorded on-chain and included in the public audit
    record. Any discrepancy is a constitutional violation.
Watcher source code and payout logs are published for independent
    verification. Any discrepancy is a constitutional violation (G-rules).

Trust required: MEDIUM (non-custodial escrow; risks: smart contract,

      token issuer XAUT/PAXG, EVM chain, and SOST market price).

(Subject to progressive decentralization per C16.)

### 6.9 Model B Rewards by Duration

Reward-rate parameters (non-guaranteed), expressed as annualized reference rates for sizing payouts. Longer commitments receive higher APR to incentivize extended gold lockup. Model B has lower APR than Model A because there is no slash risk.

| Duration | APR (annualized) | Total Reward |
|---|---|---|
| 1 month | 0.4% of gold value | paid immediately in SOST |
| 3 months | 1.5% of gold value | paid immediately in SOST |
| 6 months | 3.5% of gold value | paid immediately in SOST |
| 9 months | 5.5% of gold value | paid immediately in SOST |
| 12 months | 8% of gold value | paid immediately in SOST |

CALCULATION:

  total_reward_pct = APR × (duration_months / 12)
  SOST_reward = gold_value × total_reward_pct / sost_price

EXAMPLE: Model B — 12 month commitment

  Assumptions at contract creation:
Gold price: $2,700/oz (from Price Bulletin)
SOST price: $100 (from Price Bulletin)
User deposits: 1 oz XAUT into escrow
Duration: 12 months
APR: 7%
  STEP 1: Calculate reward
    total_reward_pct = 7% × (12/12) = 7%
    reward_usd = $2,700 × 7% = $189
    reward_sost = $189 / $100 = 1.89 SOST
  STEP 2: User receives 1.89 SOST IMMEDIATELY
Can sell, hold, or use from day 1
No conditions attached
  STEP 3: Gold locked for 12 months
Cannot be withdrawn early
No audits required (escrow enforces)
  STEP 4: After 12 months
User withdraws full 1 oz XAUT
Gold returned intact
  SUMMARY:
Locked: 1 oz gold for 12 months
Received: 1.89 SOST immediately
Returned: 1 oz gold at maturity
Net gain: 1.89 SOST (7% on gold value at entry)

EXAMPLE: Model B — 3 month commitment

  Assumptions at contract creation:
Gold price: $2,700/oz (from Price Bulletin)
SOST price: $100 (from Price Bulletin)
User deposits: 1 oz XAUT into escrow
Duration: 3 months
APR: 1%
  CALCULATION:
    total_reward_pct = 1% × (3/12) = 0.25%
    reward_usd = $2,700 × 0.25% = $6.75
    reward_sost = $6.75 / $100 = 0.0675 SOST
  SUMMARY:
Locked: 1 oz gold for 3 months
Received: 0.0675 SOST immediately
Returned: 1 oz gold at maturity

MODEL A vs MODEL B COMPARISON:

  ┌─────────────────┬─────────────────┬─────────────────┐
  │ Aspect          │ Model A         │ Model B         │
  ├─────────────────┼─────────────────┼─────────────────┤
  │ What you lock   │ SOST (bond)     │ Gold (escrow)   │
  │ Your gold       │ In YOUR wallet  │ In escrow       │
  │ Bond required   │ Yes (12-30%)    │ No              │
  │ Reward timing   │ At end if pass  │ Immediately     │
  │ Risk            │ Lose bond       │ None (no slash) │
  │ APR (12 month)  │ 22%             │ 7%              │
  │ Best for        │ Crypto natives  │ Gold holders    │
  └─────────────────┴─────────────────┴─────────────────┘

6.9.1 Protocol Fee — Model B

A protocol fee of 8% is collected upfront at commitment creation. Model B has a higher fee

because participants bear no slash risk and the protocol developer assumes greater operational

burden (watcher, immediate payout, escrow monitoring).

  base_reward    = gold_value × APR × (duration/12) / sost_price
  protocol_fee   = base_reward × 0.08
  user_reward    = base_reward - protocol_fee

EXAMPLE (12-month, 1 oz XAUT, same assumptions as Section 6.9):

  Base reward (7%):      1.89 SOST
  Protocol fee (8%):     0.151 SOST
  User receives:         1.739 SOST immediately
  Protocol fee address:  0.151 SOST
  User effective APR:    6.44% (vs 7% nominal)

Same operational rules apply: fee destination auditable, 30-day notice

for changes, existing contracts locked at creation fee rate.

### 6.10 Slash Mechanics

SLASH TRIGGER (Model A only):

XAUT/PAXG balance < committed amount at audit time, OR
No response to audit after 48h GRACE period (sole window; confirmed RPC availability)

SLASH SPLIT (automatic, no human override):

  50% → PoPC Pool (funds future rewards)
  50% → Gold Funding Vault (buys more gold collateral)
  No supply is burned. With a maximum supply of ~4.67M SOST, every
  token has long-term utility. Slashed bonds are recycled into the
  two constitutional vaults, strengthening both the reward ecosystem
  and the gold reserve. Fraud does not destroy value — it
  redistributes it to honest participants and the reserve.

Every fraud detected strengthens the protocol: half funds future honest participants, half buys more gold. No supply is destroyed — it is recycled where it creates the most value.

6.11 [Reserved — See Appendix M]

Section 6.11 previously described an "Adaptive Mode" where PoPC would accept SOST as a custody asset when the SOST/gold ratio exceeded 1.5. This mode has been removed from the normative specification because it contradicts the core purpose of PoPC as a proof of gold custody. Accepting SOST as a custody asset would create circular staking dynamics incompatible with the protocol's design. See Appendix M for the original text, retained for historical completeness.

6.12 PoPC Pool Sustainability

POOL AVAILABLE (PoPC Pool receives 25% of every block):
  Year 1:  103,160 SOST
  Year 2:  103,160 SOST
  Year 5:   ~75,000 SOST
  Year 10:  ~52,000 SOST
  30 years: 1,167,300 SOST total

SCENARIO: 200 active contracts, mix of durations:
  Annual rewards paid: ~6,000 SOST (with conservative rates)
  Pool used: 6,000 / 103,160 = 5.8% of annual intake
  Accrual: 97,160 SOST surplus per year → reserves grow

SCENARIO: 1,000 contracts (optimistic):
  Annual rewards: ~30,000 SOST
  Pool used: 29% of annual intake
  Still sustainable indefinitely

SLASH INCOME extends pool beyond 30 years:
  5% failure rate, 200 contracts, 200 SOST avg bond:
  Pool receives: 10 × 200 × 50% = 1,000 SOST/year extra
  Gold Funding Vault receives: 10 × 200 × 50% = 1,000 SOST/year extra

REWARD BUDGET + SOLVENCY SAFEGUARDS (non-consensus, operational safety valves):

  Per-wallet cap (per epoch):
    Limits the maximum rewards any single wallet can receive within
    a given epoch. Prevents whale concentration of pool resources.

  Global cap (per epoch):
    Limits total rewards disbursed by the PoPC Pool within a given
    epoch (reward budget). Ensures long-term pool sustainability.

  Pool solvency rule:
    A new PoPC contract can only be opened if the PoPC Pool has
    sufficient balance to cover the full reward amount at creation.
    - Model A: fee calculated at creation; reward + fee disbursed at completion
    - Model B: reward is paid immediately from pool at deposit
    If the pool is underfunded, new contracts are temporarily paused
    until replenished (via block inflows or slash income).

  No debt rule:
    The protocol never creates unfunded obligations; contracts cannot
    be opened unless the reward can be covered at inception.

  Existing contracts:
    Active contracts continue unaffected until expiry regardless of
    pool state. Pauses affect only new contract openings and do not
    alter consensus rules or existing matured withdrawal rights.

ANTI-WHALE CAPS (Model A):

  Per-wallet epoch cap: 50 oz maximum per wallet per epoch
  Global cap: 10% of PoPC Pool balance per epoch

  Epoch cap vs reputation per-contract limit:
    The epoch cap (50 oz) is the absolute ceiling per wallet per epoch.
    Reputation per-contract limits apply first:
      - 5-star veteran: max 10 oz/contract → can open 5×10oz = 50 oz (epoch cap)
      - 3-star trusted: max 3 oz/contract → needs 17 contracts for 50 oz
      - 1-star established: max 1 oz/contract → limited to 1 oz/contract
      - 0-star new: max 0.5 oz/contract → limited to 0.5 oz by reputation

  Rationale: Model A includes slash risk, which naturally
  limits demand and returns 50% of slashed bonds to pool.

ANTI-WHALE CAPS (Model B):

  Per-wallet epoch cap: 10 oz maximum per wallet per epoch
  Global cap: 5% of PoPC Pool balance per epoch

  Epoch cap vs reputation per-contract limit:
    The epoch cap (10 oz) is the absolute ceiling per wallet per epoch.
    Reputation per-contract limits apply first:
      - 5-star veteran: max 10 oz/contract → can open 1×10oz = 10 oz (epoch cap)
      - 3-star trusted: max 3 oz/contract → needs 4 contracts for ~10 oz
      - 1-star established: max 1 oz/contract → limited to 1 oz/contract
      - 0-star new: max 0.5 oz/contract → limited to 0.5 oz by reputation

  Rationale: Model B has no slash risk, making it more
  attractive. Tighter caps protect pool sustainability.

EPOCH DEFINITION:

  1 epoch = 1 month = 4,320 blocks (at 10-minute target)

  Caps reset at the start of each epoch.
  Unused cap allocation does not roll over.

SUSTAINABILITY EXAMPLE (Year 1):

  Pool balance: 50,000 SOST

  Model B monthly cap: 5% × 50,000 = 2,500 SOST
  Model A monthly cap: 10% × 50,000 = 5,000 SOST
  Maximum combined outflow: 7,500 SOST/month

  Monthly pool income: ~8,597 SOST (103,160 ÷ 12) (from block rewards)

  Net monthly growth: 8,597 - 7,500 = +1,097 SOST

  System: sustainable indefinitely, even at maximum demand

6.13 Activation Conditions

PoPC will be activated once all of the following conditions are met. Block 10,000 is necessary but not sufficient — activation proceeds only when the system is stable and all components are operational.

ConditionRequirement
Block height≥ 10,000 (V6 activation milestone)
Network stabilityConsistent block production, stable sync, no critical issues
ParticipationMinimum independent nodes and active miners
Model A validationRegistration, audit, reward, slash flows tested under live conditions
Ethereum escrow (B)Contracts deployed, verified, publicly auditable
Explorer & walletInterfaces reflect all PoPC states correctly

Activation note: PoPC activation is protocol-scheduled but condition-dependent. This is a readiness-based milestone, not a date-based commitment.

6.14 Year 2-3: Physical Gold Extension

In Year 2, PoPC extends to physical gold (bars, coins, ingots). Users commit to custody of physical precious metals without revealing identity, location, or exact quantity. Audit challenges are derived from ConvergenceX entropy and executed via a mobile app.

PHYSICAL AUDIT FLOW (Year 2+):
  1. ConvergenceX block entropy selects challenge package:
     e.g. weight range + ring test + geometric measurement
  2. User performs challenges using mobile app
  3. App derives: stateHash = SHA256(extracted_features)
                  evidenceHash = SHA256(raw_evidence)
  4. Raw evidence is ephemeral (never stored anywhere)
  5. Hashes published on-chain
  6. Verifier committee (k=3, entropy-selected) signs attestation

PRIVACY GUARANTEE:
  No gold amount on-chain
  No location on-chain
  No identity on-chain
  Only cryptographic commitments and signatures

6.14 Year 3+: ZK Proof Extension

In Year 3, physical verification is planned to upgrade to Zero-Knowledge proofs. A ZK proof would certify that the correct challenge algorithm executed correctly — without revealing any underlying data. Trusted verifiers become unnecessary. ConvergenceX's structured, iterative, mathematical nature maps naturally to ZK circuits.

The scope of physical custody verification extends beyond gold to other precious metals including platinum, palladium, and rhodium, subject to the development of reliable challenge algorithms for each metal type.

ZK PHYSICAL CUSTODY — DEVELOPMENT DISCLOSURE

This feature constitutes a long-term R&D commitment, not a deliverable
for Year 1. Implementation is contingent upon the following conditions:

  1. ZK proof systems must demonstrably guarantee participant privacy
     (no leakage of identity, location, or asset quantity).
  2. Challenge algorithms must achieve sufficient reliability to
     prevent both false positives and false negatives at scale.
  3. The cryptographic primitives used must be formally audited
     and considered production-ready by independent reviewers.

If current or future technology cannot satisfy these requirements
to the standard necessary for protecting participants who commit
physical precious metals (gold, platinum, palladium, rhodium,
and other metals as added), this phase will be postponed
indefinitely until all privacy and security guarantees can be
fully met.

The protocol will not deploy physical ZK verification in a
degraded or partial state. Participants' physical security is
a non-negotiable prerequisite — not a trade-off.

7. Governance Model

7.1 No Ongoing Parameter Governance

No entity — including the protocol developer, or any future organization — can modify consensus rules after genesis. SOST has no DAO, no voting token, and no multisig with authority over consensus or monetary parameters. All consensus rules — emission schedule, coinbase split, difficulty algorithm, supply cap, constitutional constraints — are immutable at genesis. No mechanism exists to alter them after block 0. Only narrow emergency authorization signaling exists, requiring ≥95% miner supermajority under the V6 5-defense Gold Vault model (Section 5.2, Appendix G).

Emergency Catastrophe authorization does not modify consensus rules or monetary policy; it only gates movements of external reserve assets held on Ethereum.

7.2 Operational Governance

During Phase I (before block 10,000), the protocol developer executes operational actions under constitutional constraints and public attestations. After V6 activation (block 10,000), custody transitions from the developer to the protocol itself — there is no intermediate multisig stage.

Operational scope (exhaustive):

Gold Funding Vault conversion: During Phase I, the protocol developer executes SOST→XAUT/PAXG purchases per the automated pipeline (Section 5.3). After V6, execution is automated with on-chain attestation. Every batch is attested on-chain.
50/50 split adjustment: During Phase I, the protocol developer may change the XAUt/PAXG acquisition split for future purchases. After V6 activation, adjustments require protocol-level governance. Adjustments apply only to future purchases and must be disclosed in batch reports.
Purchase pause: During Phase I, the protocol developer may pause purchases without consensus, disclosed via batch reports. After V6, pausing requires protocol-level governance.
Future purchase redirection: During Phase I, the protocol developer may redirect future purchases from one issuer to another without consensus (e.g., if issuer risk increases). After V6, redirection requires protocol-level governance.
PoPC contract management: During Phase I, the protocol developer may pause new PoPC contracts in case of critical bugs. After V6, this is governed by the protocol. Existing contracts continue unaffected.
Dissolution declaration: During Phase I, the protocol developer declares dissolution only after the dead-man switch triggers (90 days of zero blocks), with 60-day public timelock. After V6, dissolution is triggered automatically by the protocol.

Moving previously purchased reserve assets requires Emergency Catastrophe authorization under the V6 5-defense Gold Vault model (≥95% miner supermajority signaling + all five constitutional defenses). No other mechanism exists. The vault is a constitutional reserve engine, not a general treasury.

No operational action can modify consensus rules, alter the emission schedule, or redirect coinbase allocations. Reserve assets may only be accessed under Emergency Catastrophe (≥95% miner supermajority + 5-defense model), formally declared Dissolution (Section 5.4), or planned Reserve Lifecycle transitions (Section 5.5).

DECENTRALIZATION COMMITMENT (C16)

Every operational function described in this section — vault execution, purchase management, PoPC verification, and reporting — is designed for progressive automation and decentralization. The protocol developer holds these roles as a transitional necessity during Phase I (before block 10,000). At V6 activation, custody transitions directly from developer to protocol — no intermediate multisig. As each process is automated, tested, and independently verified, manual control is permanently relinquished. This trajectory is irreversible: decentralization only moves forward. See Section 7.3 for the full commitment.

7.3 Progressive Decentralization

The protocol is committed to progressive decentralization and full automation of all operational processes. At V6 activation (block 10,000), custody transitions directly from the protocol developer to the protocol — no intermediate multisig stage. Manual operations during Phase I — PoPC balance verification, reward payouts, vault batch conversions, and reporting — are transitional by design, not permanent. Each process has a documented automation path: PoPC verification moves to on-chain smart contracts, reward payouts to the sost-popc-daemon, and vault conversions to a deterministic execution stack with public attestations.

This is a constitutional commitment (C16), not a discretionary goal. As each operational process is automated and independently verified, the protocol developer permanently relinquishes manual control over that process. The trajectory is irreversible: decentralization only moves forward.

8. Economic Model

8.1 Demand Sources for SOST

Mining: miners earn SOST and decide to hold or sell.
Model A bonds: participants must buy SOST on CEX to create bonds — direct buy pressure.
Model B distribution: SOST distributed to gold holders — organic distribution to non-crypto users.
Gold Reserve sales: Gold Funding Vault SOST is sold to buy gold via the automated conversion pipeline — provides sell-side liquidity and price discovery.
Speculation: market prices SOST partly on observable gold reserve backing.

8.2 Deflationary Mechanics

Smooth exponential decay: 9.03% annual reduction in new issuance — no cliff events.
Slash recycling: 100% of every slashed bond is redistributed to PoPC Pool (50%) and Gold Funding Vault (50%), strengthening both systems without destroying scarce supply.
Reputation limits: large commitments require proven track record — slow unlock of supply pressure.
Long contracts: 9 and 12-month commitments remove SOST from circulation for extended periods.

8.3 The Gold Floor

As the Gold Reserve grows over years and decades, it creates an observable, verifiable reference floor for SOST. This is not a peg. SOST is not a stablecoin. But any market participant can calculate:

GOLD BACKING PER SOST (observable, not guaranteed):

  Year 3:  Gold Reserve = $200,000
           Circulating SOST = ~600,000
           Implied gold backing = $0.33/SOST

  Year 10: Gold Reserve = $2,000,000+
           Circulating SOST = ~2,000,000
           Implied gold backing = $1.00+/SOST

  This is an observable on-chain reality.
  The market prices it as it wishes.
  The protocol guarantees nothing.
  The protocol delivers everything it promised.

8.4 Autoequilibrium: When SOST > Gold

If SOST price significantly exceeds gold price, three automatic corrective forces activate:

Gold Funding Vault force: With expensive SOST, each vault sale buys more gold. Gold demand increases. Gold price rises. Ratio compresses.
Model B force: With low SOST yield in unit terms, fewer users deposit gold. Pool accumulates. Supply pressure falls.
Model A force: With SOST worth more than gold, bonding SOST to custody gold loses economic sense. Participation drops naturally.

No governance required. The economics self-regulate through participant incentives.

9. Security Analysis

9.1 51% Attack Resistance

Each ConvergenceX attempt requires ~8 GB RAM (4 GB dataset + 4 GB scratchpad) and 100,000 sequential rounds. Even an attacker with unlimited CPUs cannot speed up a single attempt — parallelism only adds more independent attempts. The sequential dependency chain is the fundamental defense: an attacker with 1,000 cores runs 1,000 parallel attempts, not 1,000× faster on a single attempt.

As mining becomes profitable, network hashrate grows naturally, continuously raising the attack threshold. The cASERT difficulty adjustment ensures that block intervals remain stable regardless of hashrate level.

9.2 Bond Deterrence Analysis

The bond does not make fraud impossible — it makes it costly. For a user with urgent liquidity needs, selling committed gold while losing a 30% bond may still be rational. The system compensates with layered deterrence:

Bond (30% max): immediate financial cost.
Reputation destruction: permanent record, future contracts blocked at all levels.
Wallet blacklist: PoPC policy may exclude known fraudulent wallets at the application layer. This is not consensus and does not affect the base chain.
Size limits by reputation: new users can only commit small amounts (0.5 oz max at 0 stars).

The combination of these four layers makes large-scale systematic fraud economically irrational, even if individual emergency exits remain possible.

9.3 Audit Manipulation Resistance

Audit timing is derived from ConvergenceX block entropy — specifically the entropy triple (block_id, commit, checkpoints_root). No party can predict or influence the audit schedule because all three components depend on the complete 100,000-round PoW computation that has not yet occurred.

A user who moves their gold immediately after passing an audit faces another random audit within the next period — with probability 5%-30% depending on reputation. The expected window for undetected fraud is short, and the cost of detection (full bond slash) is high.

9.4 Oracle Manipulation Resistance

No external oracle is required for consensus-critical validation. All consensus operations (block validation, emission, difficulty) use only chain-internal data.

Bond calculations use a 7-day TWAP from exchanges with verifiable liquidity (consistent with the Price Bulletin model in Section 6.6) — resistant to single-block manipulation. The gold ratio check uses the same TWAP. Price data is advisory for PoPC bond sizing and settlement, not consensus-critical.

9.5 cASERT Security Properties

The bidirectional block-lag model (Section 3.12) prevents the cASERT equalizer from being weaponized while supporting liveness:

An attacker with high hashrate mining blocks quickly pushes the chain ahead of schedule.
Ahead of schedule → the equalizer escalates from B0 to H1 → H2 → H3 → H4 → H5 (max). Stability verification becomes progressively more expensive.
The attacker gains nothing — the faster they mine, the harder each attempt becomes.

When the chain is behind schedule, the equalizer initially stays at B0 (baseline), letting cASERT bitsQ handle difficulty reduction.

If the chain remains behind schedule for 6+ hours at B0, the equalizer eases (E1–E4), reducing perturbation cost to actively support liveness. cASERT bitsQ and the E-level easing work together to recover a stalled chain.

The block-lag metric is objective, global, and tamper-resistant: it uses wall-clock time (not block timestamps) compared against genesis, so miners cannot manipulate the signal by setting favorable timestamps. Any observer can independently verify the lag at any moment.

9.6 Emergency Procedures

ScenarioResponse
Critical bugDuring Phase I, the protocol developer pauses new PoPC contracts. After V6, pausing is governed by the protocol. Existing contracts continue unaffected.
Exchange hackThe Heritage Reserve on Ethereum operates as a sealed vault with no operational interaction. The Gold Funding Vault on SOST chain interacts with execution venues via the conversion pipeline but is not a hot wallet — during Phase I, all operations require developer authorization; after V6, operations are protocol-governed.
XAUT/PAXG issuer riskEmergency Catastrophe: rotate to allowlisted metals (E1) OR liquidate-buy-redistribute (E2). Requires ≥95% miner supermajority signaling + all five constitutional defenses under the V6 5-defense Gold Vault model.
Issuer risk (future purchases only)During Phase I, the protocol developer redirects future purchases without consensus. After V6, redirection requires protocol-level governance. Previously purchased assets remain sealed.
Chain death (90 days)Dead-man switch activates. 60-day public Dissolution notice begins. During Phase I, the protocol developer executes orderly wind-down. After V6, dissolution and reserve distribution are protocol-governed (Section 5.4).

10. The Constitution

SOST has no ongoing parameter governance. No DAO. No voting token. No multisig that can change protocol rules. The following are immutable at genesis:

SOST Constitutional Rules — Encoded at Genesis, Unchangeable

C1:  Total supply is upper-bounded by SUPPLY_MAX_STOCKS by construction of the emission schedule
     (total supply shall never exceed 4,669,201 SOST).
     The only issuance mechanism is subsidy(height). Any block that mints more is invalid.
C2:  Coinbase split is immutable: q=reward//4, gold=q, popc=q, miner=reward-gold-popc.
     Exact integer conservation guaranteed: miner + gold + popc == reward always.
C3:  Gold Funding Vault coinbase destination is immutable at genesis. Heritage Reserve is sealed;
     reserve assets may only be accessed under Emergency Catastrophe (≥95% miner supermajority +
     V6 5-defense Gold Vault model), formally declared Dissolution (Section 5.4), or planned
     Reserve Lifecycle transitions (Section 5.5).
C4:  Gold Reserve shall not be sold except under Emergency Catastrophe (E2: liquidate-buy-redistribute)
     or formally declared Dissolution.
C5:  Dissolution requires 90 days of zero blocks + 60-day public timelock.
C6:  Dissolution is one-way and irreversible.
C7:  Slash is automatic. No human can override once triggered.
C8:  Slash split is 50/50 (pool/gold). No supply is burned. Immutable.
C9:  Bond dynamic table: <0.0001→12%, <0.001→15%, <0.01→20%, <0.1→25%, <0.2→26%, <0.3→27%, <0.4→28%, <0.5→29%, >=0.5→30%
C10: No admin key, pause function, or upgrade proxy exists for the PoW chain.
C11: ConvergenceX parameters are fixed at genesis and apply to all epochs. Deterministic epoch transitions are derived from consensus constants defined at genesis.
C12: All consensus arithmetic is integer-only. No floating-point in any consensus path.
C13: Model B escrow contracts must be non-upgradeable, have no admin key, and allow
     withdrawal only by the original depositor after expiry.
C14: Default 50/50 XAUt/PAXG acquisition split; during Phase I, adjustable operationally
     by the protocol developer for future purchases only. After V6, adjustments require
     protocol-level governance. Previously purchased assets are not rebalanced.
C15: Emergency Catastrophe requires the V6 5-defense Gold Vault model: (1) purpose restriction,
     (2) dual destination whitelists (hard fork to modify), (3) hard per-spend cap (2% of balance),
     (4) asymmetric rate limiting, (5) ≥95% miner supermajority (W=144 blocks, YES≥137).
     Only two actions permitted: E1 (ROTATE) and E2 (LIQUIDATE→BUY→REDISTRIBUTE).
     No other mechanism to move reserve assets. Vault SOST is never burned.
C16: Progressive decentralization is irreversible. At V6 activation (block 10,000), custody
     transitions directly from the protocol developer to the protocol — no intermediate multisig.
     All operational roles held by the developer are transitional. As each process is automated
     and independently verified, manual control is permanently relinquished.
     Decentralization only moves forward.

11. Roadmap

DateMilestone
Mar 15, 2026GENESIS BLOCK — 18:00:00 UTC. Solo mining (C++). Chain begins.
Mar 28, 2026PUBLIC LAUNCH — BTCTalk ANN. C++ miner released. GitHub public.
Q2 2027Gold purchases begin (per G4 8-month rule, subject to sufficient SOST market liquidity). First XAUT/PAXG acquired. Heritage Reserve deployed on Ethereum mainnet. Dashboard published.
Q1 2027PoPC Model A + B launch on Ethereum mainnet. First custody contracts active.
Aug 2027Physical gold extension. Mobile app for audit challenges. Verifier network.
2028ZK R&D begins. Physical proof system research.
2029-2030ZK physical custody proofs. Full privacy-preserving audit system.
2030+Multi-Metal Tokenization Platform (Vision).
  SOST blockchain aims to serve as infrastructure for tokenizing,storing, and exchanging multiple precious metals (gold, silver, 
  platinum, palladium, rhodium, iridium, ruthenium, osmium, and others as market conditions permit). 
  The goal is for every tokenized asset to be backed 1:1 by physical reserves in auditable vaults with independent proof of reserves. |
IndefiniteHeritage Reserve. Gold sealed by default. Emergency 5-defense model if needed. Chain runs on fees.

12. Technical Specifications

ParameterValue
Name / SymbolSOST
Genesis2026-03-15 18:00:00 UTC (block 0)
AlgorithmConvergenceX (~8GB RAM mining: 4GB dataset + 4GB scratchpad; ~500MB node; 100k rounds, sequential, stability certificate)
Block time600 seconds target
Supply cap enforcementSubsidy-by-height (hard cap by construction)
Max supply~4,669,201 SOST (466,920,160,910,299 stocks)
Min unit1 stock = 0.00000001 SOST
Epoch131,553 blocks (~2.502 years, Feigenbaum alpha)
~95% mined~12 epochs (~30 years)
Initial reward7.85100863 SOST/block
Coinbase splitq=reward//4; gold=q, popc=q, miner=reward-gold-popc
Annual decay~9.03% (smooth, no halvings)
DifficultycASERT bitsQ Q16.16, per-block, avg288-based (block 5,175+), dynamic cap (5,260+): 0% dead band (±30s), 0.5%/1.5%/2.5%/3.0% max. Median288 reality check. Legacy half-life preserved for pre-5175 blocks
cASERT Equalizer43 consensus-critical profiles E7(-7) through H35(+35), B0 baseline, independently tuned per profile, bidirectional: hardens (H1–H35) when ahead of schedule, eases (E1–E7) when behind schedule for 6+ hours at B0. All profiles use scale=2. H35 {scale=2, k=20, steps=20, margin=115} as the maximum.
Stability checkk probes × g steps, dual criteria (local non-explosion + global contraction)
Checkpoints16 per attempt, Merkle tree, SPV-verifiable
Sync modesFULL / ADAPTIVE (default) / BASIC bootstrap
Consensus arithmetic100% integer (zero floating-point)
Reserve chainEthereum mainnet
Reserve modeHeritage (sealed by default)
Emergency≥95% miner signaling (W=144) + V6 5-defense Gold Vault model
Emergency actionsE1: ROTATE / E2: LIQUIDATE→BUY→REDISTRIBUTE
Default gold split50/50 XAUt/PAXG (adjustable operationally, future purchases only)
Premine0 SOST — zero
ICO / VCsNone
Consensus governanceNone — immutable at genesis
Operational governancePhase I: developer-executed; Phase II (V6, block 10,000): protocol-governed. Constitutionally constrained, publicly auditable

12.5 Sovereign Value Stack

SOST is building a cooperative value system based on self-custodied tokenized gold and precious metals, with a signed position market, private economic coordination, and verifiable settlement. The system is designed around identified positions and contractual rights — not generic fungible pool tokens.

12.5.1 E2E Encrypted Coordination Layer

All trade coordination uses true end-to-end encryption. The relay is blind transport — it can store, forward, and route messages but cannot read their content. Only the two parties of a deal can decrypt the payload.

Cryptographic stack:

Identity & Signing: ED25519 (permanent identity, signs everything)
Key Agreement: X25519 (per-deal ephemeral key exchange)
Key Derivation: HKDF-SHA256 (directional send/recv channel keys)
Payload Encryption: ChaCha20-Poly1305 AEAD (authenticated encryption)
Replay Protection: sequence numbers + sliding window + nonce dedup per session

Prekey architecture (offline delivery):

Signed Prekey (X25519): rotated every 7 days, signed by ED25519 identity key
One-Time Prekeys (X25519): consumed once per session, replenished in batches
Async session bootstrap: sender initiates encrypted channel while recipient is offline
Store-and-forward: relay queues encrypted messages (7-day TTL), delivers when recipient returns
Delivery receipts: delivered / acknowledged / processed

What the E2E layer supports:

• Signed + encrypted trade offers (GOLD, POSITION_FULL, POSITION_REWARD_RIGHT)
• Signed + encrypted acceptances with deterministic deal_id derivation
• Encrypted cancellations and settlement notices
• Per-deal private channels with encrypted message persistence
• Header minimization (only routing metadata visible, all economics encrypted)

Not yet implemented: double ratchet, post-compromise security, deniability. Planned for a future phase.

12.5.2 SOST Position Market

The SOST market is designed as a signed OTC/RFQ venue for identified positions and rights, not as a traditional AMM or public token exchange. Architecture follows a thin-chain / fat-edge model: deal state machines, watchers, and settlement daemons operate off-chain. Ethereum serves as the minimal onboarding/exit rail; SOST is the sovereign center for all registration, trading, and settlement.

What can be traded:

Phase 1 (current): Model B full position transfer + reward-right split
Phase 2: Model A reward rights + controlled novation
Phase 3 (legal review required): XAUT/PAXG entry/exit rail, broader market

How a trade works:

• Seller creates signed offer (ED25519, canonical hash, nonce, expiry, position_id)
• Buyer responds with signed accept → system derives deal_id
• Settlement engine verifies ownership, signatures, nonce, expiry, no double-spend
• Executes full position transfer OR reward-right split
• Emits signed settlement_notice → complete audit trail recorded

Settlement engine: 11-state deal machine (CREATED through SETTLED/REFUNDED/EXPIRED), Ethereum watcher (6 confirmations), SOST watcher, refund engine with automatic timeout handling, position settlement with transfer and split support, JSONL audit log.

Position pricing: gold backing value + time-discounted remaining reward (5% annual Model B, 12% Model A) − 3% illiquidity discount = net value.

12.5.2b Ownership Rules (Constitutional)

Every Model B position has two separate rights: the right to the principal (recover gold at maturity) and the right to the reward (receive SOST at maturity). These can be sold independently.

Constitutional rule: The right to the principal belongs to the principal_owner. The right to the reward belongs to the reward_owner. The escrow pays to the currentBeneficiary, which must always reflect the principal_owner.

Full position sale: Both principal_owner and reward_owner transfer to the buyer. The ETH beneficiary updates to the buyer’s address. At maturity: gold → buyer, reward SOST → buyer.

Reward-right sale only: Only reward_owner transfers. Principal stays with original owner. ETH beneficiary unchanged. At maturity: gold → original owner, reward SOST → buyer.

Automation roadmap: Full automation requires SOSTEscrow v2 with dynamic currentBeneficiary field, an auto-withdraw daemon that calls withdraw() at maturity, and a reward engine that credits SOST to the reward_owner. SOSTEscrow v1 (deployed on Sepolia) pays only the original depositor. Until v2 is deployed, settlement is operator-assisted.

12.5.3 SOSTEscrow Contract (Model B)

Deployed on Sepolia: 0x01Eaab645DA10E79c5Bae1C38d884B4D1a68f113

NO admin key — no upgrade proxy, no pause, no emergency withdrawal
• ONLY original depositor can withdraw, ONLY after timelock expiry
• Accepted tokens: XAUT (6 decimals) + PAXG (18 decimals)
• Lock duration: 28 days min, 366 days max. Minimum deposit: 0.001 oz
First Model B position: 0.5 oz XAUT, 28-day lock, position 8afed8fcd27553a7 ACTIVE
• 19 Foundry tests passing (deposit, withdraw, timelock, access control, events)

12.5.4 PoPC Contract Infrastructure

• Model B: SOSTEscrow.sol — immutable escrow, constitutional design
• Model A: self-custody with PoPC proof verification via ConvergenceX entropy
• Timelocked collateral participation with reward schedules
• Position lifecycle: ACTIVE → MATURED → REDEEMED (or SLASHED/EXPIRED)

12.5.5 Architecture

RepositoryRole
sost-coreChain base, consensus, PoW, cASERT, constitutional addresses
sost-gold-exchangePositions, watchers, deals, settlement, pricing, operator tools
sost-commsTrade protocol + ED25519 signing + relay node + deal channels

ETH is used only for onboarding/exit. SOST handles all registration, trading, and settlement.

12.5.6 Alpha Status

Current phase: limited alpha (operator-assisted, Sepolia testnet, mock tokens). Test coverage: 550 tests (Python 272 + TypeScript 231 + Solidity 47), 0 failures. SOSTEscrow deployed on Sepolia with first on-chain gold deposit (0.55 oz total locked). First Model B position registered and tracked. Full position trade and reward-right trade demonstrated with signed messages. Position lifecycle tracking operational. True E2E encryption operational: X25519 key agreement + ChaCha20-Poly1305 AEAD + blind relay transport. Prekey architecture with offline delivery: signed prekeys, one-time prekeys, async session bootstrap, store-and-forward queue. cASERT H13 ceiling active (block 5,750+). 43 profiles (21 active E7-H13). Relief valve: E7 at 605s. Final calibration complete.

12.5.7 Strategic Direction

The SOST position market begins as a private, signed market for identified positions and rights — not a public mass token exchange. Trade contracts, not pools. Identify positions, not mass tokens. Coordinate privately, settle verifiably. Any broader public market phase is subject to legal and operational review.

13. Conclusion

SOST is built on three ideas that individually exist, but have never been combined:

Proof-of-Work that produces a mathematical certificate. ConvergenceX replaces the hash lottery with gradient descent convergence, memory-hard scratchpad dependency, checkpoint Merkle trees, and formal stability basin verification. The result is not just a hash below a target — it is a verifiable proof that meaningful mathematical work occurred, producing useful entropy as a byproduct.

Automatic, constitutional accumulation of gold reserve. Every mined block allocates 25% to a Gold Funding Vault. Accumulated SOST is converted to tokenized gold exposure (XAUT/PAXG) through an automated pipeline with public attestation. The reserve is Heritage sealed — perpetual and untouched by default. After V6 activation (block 10,000), custody transitions directly from the protocol developer to the protocol under the 5-defense Gold Vault model, requiring ≥95% miner supermajority for any non-routine reserve movement. The Gold Vault must be able to change form, but not purpose. The accumulation is a structural property of the protocol, not a promise made by people.

Voluntary custody commitments audited by PoW-derived entropy. PoPC uses the entropy triple from ConvergenceX blocks to schedule random audits of gold custody — no oracle, no trusted third party, no governance. The audit schedule is a deterministic function of the proof-of-work itself.

The genesis block is self-sufficient: it requires only a miner and a timestamp. Community growth and gold accumulation follow naturally from the protocol's own mechanics. SOST launches from code, not from capital.

18:00:00 UTC, March 15, 2026.

Legal Disclaimer

This document is for informational purposes only. SOST is not an investment product. Participation in PoPC is entirely voluntary and does not constitute a financial instrument or security. The Gold Reserve does not represent a claim on gold by SOST holders. Past simulations do not predict future performance. The protocol makes no representations about the future price, utility, or availability of SOST. Nothing herein constitutes an offer, solicitation, or promise of returns; PoPC reward-rate parameters may be modified at the operational layer and may be paused for security without affecting consensus. Participants should seek independent legal and financial advice before participating in any cryptocurrency system.

Operational Limits & Pauses: PoPC reward-rate parameters are non-guaranteed and may be subject to operational per-epoch budgets, per-wallet caps, and temporary pauses if the PoPC Pool is underfunded or risk controls trigger. The protocol does not create debt or unfunded obligations: no new contracts may be opened unless the reward can be reserved at inception. Any pauses affect only new contract openings and do not alter consensus rules or existing matured withdrawal rights. Nothing herein constitutes a promise of returns or an entitlement to rewards under all conditions.


10. Native Financial Primitives — Technical Roadmap

SOST does not support smart contracts — there is no virtual machine, no user-deployed bytecode, and no Turing-complete execution. Instead, SOST implements purpose-built transaction types that provide specific financial primitives directly in the consensus layer. These are deterministic, auditable, and cannot be exploited through contract bugs because they are not programmable — they are protocol rules.

This approach follows the model established by Ravencoin (native assets on UTXO without VM) and is consistent with Bitcoin's OP_CHECKLOCKTIMEVERIFY — consensus rules, not smart contracts.

10.1 Reserved Transaction Types

The following output types are reserved in the codebase (include/sost/transaction.h):

  OUT_BOND_LOCK   (0x10) — Time-locked bond for PoPC Model A
  OUT_ESCROW_LOCK (0x11) — Time-locked escrow for PoPC Model B
  OUT_BURN        (0x20) — Reserved, NOT activated. SOST supply is immutable.
                           No token destruction mechanism exists or is planned.

  Future types (not yet reserved in code):
  OUT_TOKEN_ISSUE    — Create native metal-backed tokens
  OUT_TOKEN_TRANSFER — Transfer native metal-backed tokens

10.2 Activation Roadmap

Phase 1 — Bond Lock + Escrow (Q1-Q2 2027, ~12 weeks):

Activate BOND_LOCK and ESCROW_LOCK transaction types via block height activation. Enables native PoPC bonds and escrow on the SOST chain without Ethereum dependency. Changes limited to consensus validation (R11, S9, S11) and wallet CLI.

Phase 2 — Native Metal Tokens (Q4 2027-Q1 2028, ~6 months):

Implement TOKEN_REGISTER, TOKEN_ISSUE, TOKEN_TRANSFER. Developer-only issuance initially (Phase I). Enables native XAUT-SOST, PAXG-SOST, SLVR-SOST tokens backed by verified metal holdings. Each TOKEN_ISSUE includes a Capsule attestation with the Ethereum TX hash proving metal acquisition. Token registration fees are paid to the Gold Funding Vault, not burned.

Phase 3 — Fully Native PoPC (Q2 2028):

Migrate all PoPC operations from Ethereum to the SOST chain. Bond locks, escrow, verification, and reward distribution fully on-chain. No Ethereum dependency for any core protocol operation.

Target: 18 months to full sovereignty.

All activation heights will be announced at least 30 days in advance. Each phase requires stability of the previous phase on mainnet for a minimum of 3 months before activation.

The supply of SOST is immutable by construction. No minting, burning, or destruction mechanism exists in the protocol. All slashing operations redistribute funds — they never destroy them.


11. EXPERIMENTAL: SOST Materials Discovery Engine

11.1 Overview

The SOST Materials Discovery Engine is an experimental project that extends the SOST ecosystem beyond financial infrastructure into scientific discovery. It is a computational platform for predicting, generating, and evaluating novel material compositions — with a focus on materials derived from abundant, low-cost, or recycled precursors.

This project has a natural relationship with the SOST protocol: SOST is built on the premise that physical metals (gold, silver, platinum) have intrinsic value derived from their atomic properties. The Materials Engine explores this same domain — the physics and chemistry of elements, their combinations, and the emergent properties of their structures.

11.2 Architecture

The engine operates in layers:

Layer 1 — Data: A curated database of 76,193 validated crystalline materials sourced from JARVIS-DFT (75,993) and AFLOW (200). Each entry includes composition, crystal structure (CIF), and DFT-computed properties (formation energy, band gap, spacegroup, lattice parameters). Dual-target GNN models (CGCNN for formation energy, ALIGNN-Lite for band gap) enable property prediction on novel candidates.

Layer 2 — Inverse Search: Users specify desired properties and constraints. The engine returns ranked candidates from known materials, scored by match percentage.

Layer 3 — Property Prediction: Machine learning models (gradient boosting, neural networks) trained on known materials predict properties of hypothetical compositions not yet in the database. Each prediction includes a confidence interval and uncertainty estimate.

Layer 4 — Generative Discovery: An evolutionary algorithm generates random material compositions within user-defined constraints (element availability, cost, toxicity). A genetic algorithm iterates over generations, mutating and combining successful candidates. The predictor estimates properties for each candidate. Top candidates are ranked by fitness against the user’s requirements.

Layer 5 — Continuous Learning: The system improves over time. User queries, community feedback, and published experimental results are incorporated into the training data. The models retrain periodically, expanding coverage and improving accuracy.

11.3 Access Model

Access to the Materials Discovery Engine is under study. Any future access model, if implemented, would be denominated in USD-equivalent terms to preserve stability and usability. The algorithm itself is free — any access mechanism would serve as spam prevention, not as a fee for the science.

The final access structure, technical route, and user model have not been fixed yet. Details will be published when the model has been validated and approved. Pending study and validation of the best access method.

11.4 Relationship to SOST Protocol

The Materials Engine does not modify the SOST blockchain or its consensus rules. It is an application-layer service. The SOST protocol provides:

The blockchain provides the trust layer. The Materials Engine provides the utility layer. Together, they create a feedback loop: scientific utility drives SOST demand, SOST demand strengthens the gold reserve, the gold reserve underpins the token’s value.

11.5 Output Specification

For each candidate material, the engine produces a standardized report:

11.6 Disclaimer

EXPERIMENTAL PROJECT: The SOST Materials Discovery Engine is a research initiative, not a guaranteed deliverable. Implementation will proceed only if the following conditions are met:

(a) The underlying machine learning models demonstrate verified accuracy against independent test datasets with published benchmarks.

(b) The prediction pipeline produces no systematic errors that could mislead users into pursuing dangerous or impossible synthesis paths.

(c) The escrow integration passes independent security audit with zero critical vulnerabilities.

(d) The system’s computational requirements are sustainable within the protocol’s operational budget.

(e) The technology does not introduce any attack vector against the SOST blockchain or its users.

The protocol commits to full transparency: if the project does not meet these criteria, it will be discontinued or restructured rather than deployed in an unsafe or misleading state. No timeline is guaranteed. The Materials Engine is a vision, not a promise.

This project does not affect the SOST blockchain, its consensus rules, emission schedule, or any constitutional parameter. It is an independent application-layer service that can be added or removed without any protocol change.


Appendix A: Canonical Constants (Normative)

All values below are consensus-critical. Any deviation constitutes a consensus failure.

CONVERGENCEX PARAMETERS:
  CX_N                         = 32
  CX_ROUNDS_MAINNET            = 100,000
  CX_SCRATCH_MB_MAINNET        = 4,096
  CX_LR_SHIFT                  = 18
  CX_LAM                       = 100
  CX_CHECKPOINT_INTERVAL       = 6,250
  CX_STABILITY_PERTURBATION_SCALE = 1
  CX_STABILITY_K               = 4
  CX_STABILITY_MARGIN          = 180
  CX_STABILITY_GRADIENT_STEPS  = 4
  CX_STABILITY_LR_SHIFT        = 20

MONETARY PARAMETERS:
  GENESIS_TIME                 = 1,773,597,600  // 2026-03-15 18:00:00 UTC
  TARGET_SPACING               = 600
  BLOCKS_PER_EPOCH             = 131,553
  R0_STOCKS                 = 785,100,863
  SUPPLY_MAX_STOCKS         = 466,920,160,910,299
  Q_NUM                        = 7,788,007,830,714,049
  Q_DEN                        = 10,000,000,000,000,000

DIFFICULTY PARAMETERS:
  Q16_ONE                      = 65,536
  HALF_LIFE                    = 86,400     // 24 hours (V2, blocks 1,450-5,174 only; avg288-based since 5,175)
  MAX_FUTURE_DRIFT             = 600

cASERT EQUALIZER PARAMETERS:
  CASERT_H_MIN                 = -7    // E7 (emergency easing)
  CASERT_H_MAX                 = 35    // H35 (maximum hardening)
  CASERT_PROFILE_COUNT         = 43    // E7 through H35
  CASERT_V2_FORK_HEIGHT        = 1,450 // 24h halflife + 12.5% cap (historical, replaced by avg288 at 5,175)
  CASERT_V3_FORK_HEIGHT        = 4,100 // slew rate ±3 (V3); returned to ±1 at V6
  CASERT_V6_FORK_HEIGHT        = 5,000 // slew rate ±1, H10/H11 scale=2. V6 calibration (block 5,050): dynamic lag cap H ≤ lag, 43 profiles E7–H35, anti-stall 60 min. Block 5,323: asymmetric descent hotfix (down max 1/block).
  CASERT_AVG288_FORK_HEIGHT    = 5,175 // bitsQ switches to avg288-based (no half-life). Compares avg of last 288 intervals vs 600s target.
  CASERT_DYNCAP_FORK_HEIGHT    = 5,270 // Dynamic cap: 0% dead band (±15s), 0.5%/1.0%/2.0%/3.0% max. Median288 removed from consensus at block 5,270.
  CASERT_V6_SLEW_RATE          = 1     // max ±1 profile level per block (V6)
  CASERT_V3_LAG_FLOOR_DIV      = 8     // lag floor = lag / 8
  // PID gains: OBSOLETE (block 5,320+). Replaced by direct lag mapping: profile = clamp(lag, 0, H10).
  // 43 profiles with variable scale(1-2), k(1-20), steps(1-20), margin(115-200)
  // Above L5: level = 6 + floor((blocks_ahead - 101) / 50)
  CASERT_DECAY_STEP            = 50    // blocks per additional level beyond L5
  FIXED_K                      = 4
  FIXED_STEPS                  = 4
  FIXED_MARGIN                 = 180

EMERGENCY PARAMETERS:
  EMERGENCY_WINDOW_BLOCKS      = 144       // ~24 hours at 600s/block
  EMERGENCY_THRESHOLD_NUM      = 95        // 95%
  EMERGENCY_THRESHOLD_DEN      = 100
  EMERGENCY_YES_REQUIRED       = 137       // ceil(0.95 × 144)

Appendix B: Serialization (Normative)

All consensus-critical serialization uses little-endian byte order unless explicitly noted.

FIELD SERIALIZATION:

  height:       int64,  8 bytes LE
  time:         int32,  4 bytes LE (Unix timestamp)
  powDiffQ:     int32,  4 bytes LE (Q16.16 compact)
  nonce:        uint32, 4 bytes LE
  extra_nonce:  uint32, 4 bytes LE
  subsidy:      int64,  8 bytes LE (stocks)

  header_core:  72 bytes =
    prev_hash(32) || merkle_root(32) || timestamp(u32 LE) || powDiffQ(u32 LE)

  block_key:    SHA256(prev_hash(32 bytes, raw) || "BLOCK_KEY"(9 bytes, ASCII))
                = 32 bytes

  seed:         SHA256(MAGIC || "SEED" || header_core(72) || block_key(32) || nonce(u32 LE) || extra_nonce(u32 LE))
                = 32 bytes

  commit:       SHA256(MAGIC || "COMMIT" || header_core(72) || seed(32) || state(32) || x_bytes(N×4 LE) ||
                       checkpoints_root(32) || stability_metric(u64 LE))
                = 32 bytes

  checkpoint leaf:
                SHA256("CP"(2 bytes) || state_hash(32) || x_hash(32) ||
                       round(u32 LE) || residual(u64 LE))
                = 32 bytes

  full_header:  MAGIC(10 bytes) || "HDR2"(4 bytes) ||
                header_core(72 bytes) || checkpoints_root(32 bytes) ||
                nonce(u32 LE) || extra_nonce(u32 LE)
                = 126 bytes total
                NOTE: full_header does NOT contain commit.

  block_id:     SHA256(full_header(126 bytes) || "ID"(2 bytes) || commit(32 bytes))
                = 32 bytes
                NOTE: commit is concatenated AFTER "ID", not inside full_header.

  Target comparison: commit vs target, both 32-byte BIG-ENDIAN, lexicographic.
  Valid if: commit <= target (big-endian comparison).

MAGIC CONSTANT (network-dependent):
  MAGIC = "CXPOW3" (6 bytes, ASCII) || SHA256("SOST/CONVERGENCEX/" || NETWORK)[:4]
  Total: 10 bytes.

  Precomputed values:
    mainnet:  0x4358504f5733 c6e88538
    testnet:  0x4358504f5733 39014c33
    dev:      0x4358504f5733 f950f94b

  Where NETWORK is the ASCII string "mainnet", "testnet", or "dev".

PARSING CONVENTIONS (normative):
  int32_le(buf):  interpret 4 bytes as signed 32-bit integer, little-endian.
  u32_le(buf):    interpret 4 bytes as unsigned 32-bit integer, little-endian.
  u64_le(buf):    interpret 8 bytes as unsigned 64-bit integer, little-endian.
  asr_i32(x, s):  arithmetic right shift on signed 32-bit (see Section 3.6).
  All multi-byte integer fields in hash inputs are little-endian unless
  explicitly noted otherwise (target comparison is big-endian).

Appendix C: PRNG Specification (Normative)

PRNG(seed, n_bytes):
  output = empty
  counter = 0
  While |output| < n_bytes:
    chunk = SHA256(seed || counter_u32_le)
    output = output || chunk
    counter += 1
  Return output[0 : n_bytes]

Appendix D: Test Vectors (Normative)

Canonical test vectors are published alongside the reference implementation. A conforming implementation MUST reproduce all test vectors bit-for-bit. The generation script (generate_test_vectors.py) is included in the repository.

D.1 Required Vector Set

TEST VECTORS (minimum conformance set):

  V1: block_key derivation
    Input:  prev_hash = 0x00...00 (32 bytes of zeros)
    Output: block_key = SHA256(prev_hash || "BLOCK_KEY")
    Expected: (hex, published in repo)

  V2: header_core construction
    Input:  prev_hash = 0xAA×32, merkle_root = 0xBB×32,
            timestamp = 1773597600, powDiffQ = GENESIS_BITSQ
    Output: 72 bytes (hex, published in repo)

  V3: seed derivation
    Input:  header_core from V2, block_key from V1, nonce = 0, extra_nonce = 0
    Output: seed = SHA256(MAGIC || "SEED" || header_core || block_key || 0x00000000 || 0x00000000)
    Expected: (hex, published in repo)
    NOTE: header_core MUST be included per conformance requirement (Appendix B).
    NOTE: MAGIC uses the corrected network-dependent derivation (Appendix B).

  V4: ConvergenceX deterministic execution (test profile)
    Input:  header_core from V2, block_key from V1, nonce = 0, extra_nonce = 0,
            rounds = 1000, scratch_mb = 8
    Output: commit, checkpoints_root, stability_metric, is_stable
    Expected: (hex values, published in repo)

  V5: pow_meets_target boundary test
    Input:  Various (bitsQ, commit) pairs
    Expected: boolean results for boundary conditions

  V6: Subsidy computation (by height only)
    height = 0              → 785,100,863
    height = 131,553        → floor(R0 * q)
    height = 2*131,553      → floor(R0 * q^2)

  V6b: Hard cap by construction (bound check)
    Assert using rational fixed-point math:
      B * R0 / (1 - q) <= SUPPLY_MAX_STOCKS
    where B = BLOCKS_PER_EPOCH

  V7: Coinbase split conservation
    Input:  reward = 785,100,863
    Expected: gold = 196,275,215, popc = 196,275,215, miner = 392,550,433
              sum = 785,100,863

  V8: BitsQ direction (V14 canonical)
    Input:  bitsQ = GENESIS_BITSQ
    Expected: lower bitsQ accepts strictly more commits (monotonic, larger target)

GENERATION:
  The canonical test vector script generates all vectors from the
  reference implementation and outputs hex-encoded JSON.
  A conforming implementation MUST match every vector bit-for-bit.

Appendix G: Emergency Reserve Authorization (V6 5-Defense Model) (Normative)

This appendix formally defines the Emergency Catastrophe procedure referenced in G9 and C15. The Gold Vault must be able to change form, but not purpose. After V6 activation (block 10,000), the Heritage Reserve contract on Ethereum is governed by a Zodiac + Reality.eth module architecture — no single key or entity controls the vault. During Phase I (before block 10,000), the protocol developer holds operational custody as a transitional necessity.

G.1 EmergencyProposal (SOST chain)

An emergency proposal is initiated by broadcasting a special transaction or coinbase annotation on the SOST chain.

EmergencyProposal:
  proposalId:      bytes32    // unique identifier (hash of proposal content)
  actionType:      uint8      // 1 = E1 (ROTATE), 2 = E2 (LIQUIDATE→BUY→REDISTRIBUTE)
  paramsHash:      bytes32    // hash of action parameters (target tokens, amounts, etc.)
  startHeight:     uint64     // first block of signaling window
  expiresAtHeight: uint64     // last block of signaling window (startHeight + W - 1)

G.2 PoW Miner Signaling

Miners signal support for an emergency proposal by including a tag in their coinbase transaction:

SIGNALING TAG (in coinbase):
  SOST_EMERG|<proposalId_hex>

YES BLOCK:
  A block counts as YES if its coinbase contains the exact tag for the active proposal.

SIGNALING WINDOW:
  Range: [startHeight, startHeight + W - 1]  where W = 144 (default, ~24 hours)

APPROVAL CONDITION:
  YES = number of blocks in window containing the signaling tag
  TOTAL = W
  Approved if: YES >= ceil(0.95 × W)
  With W = 144: YES >= 137

RECORD:
  EmergencyApproved(proposalId, paramsHash, startHeight, endHeight)
  Recorded on-chain (event, RPC, or recognized state).

G.3 V6 5-Defense Vault Execution (Ethereum — Zodiac + Reality.eth)

After on-chain approval is confirmed on SOST with ≥95% supermajority, the Heritage Reserve contract on Ethereum enforces the 5-defense model via a Zodiac module with Reality.eth oracle integration:

V6 5-DEFENSE EXECUTION:
  Defense 1 (Purpose Restriction):
    actionType must be 1 (ROTATE) or 2 (LIQUIDATE→BUY→REDISTRIBUTE).
    No general-purpose spending. Vault SOST is never burned.

  Defense 2 (Dual Destination Whitelist):
    Target addresses are hardcoded in the contract. Adding a new valid
    destination requires a hard fork of the Heritage Reserve contract —
    no vote or key can modify the whitelist.

  Defense 3 (Hard Per-Spend Cap):
    No single transaction may move more than 2% of the vault balance
    at the time of execution.

  Defense 4 (Asymmetric Rate Limiting):
    GV1 (routine rotation): max 5% of balance per rolling 30-day window.
    GV3 (non-routine migration): 30-day cooldown between operations.

  Defense 5 (95% Supermajority):
    Non-routine reserve migration (GV3) requires EmergencyApproved
    confirmation from the SOST chain with YES >= 137 (95% of W=144).

  proposalId:    bytes32
  paramsHash:    bytes32
  actionType:    uint8        // 1 = ROTATE, 2 = LIQUIDATE→BUY→REDISTRIBUTE
  expiry:        uint256      // Ethereum block.timestamp deadline
  nonce:         uint256      // replay protection
  params:        bytes        // action-specific parameters (target tokens, amounts)

G.4 Ethereum Contract Verification

The Heritage Reserve contract on Ethereum mainnet verifies all five defenses:

VERIFICATION STEPS:
  1. Verify proposal approval via Reality.eth oracle (SOST chain ≥95% signaling confirmed)
  2. Verify nonce (sequential, prevents replay)
  3. Verify expiry >= block.timestamp
  4. Verify actionType is 1 or 2 (Defense 1: purpose restriction)
  5. Verify target addresses are on hardcoded whitelist (Defense 2: destination whitelist)
  6. Verify amount <= 2% of vault balance (Defense 3: per-spend cap)
  7. Verify rate limits not exceeded (Defense 4: asymmetric rate limiting)
  8. Execute E1 (transfer to allowlisted token) or E2 (sell + buy SOST + redistribute to vaults)

G.5 Mandatory Audit Trail

Every emergency execution MUST produce a complete, publicly verifiable audit trail:

AUDIT REQUIREMENTS:
  1. Proof of signaling: list of blocks with YES signal, block hashes, explorer links
  2. Proof of approval: EmergencyApproved record on SOST chain
  3. Ethereum transaction hashes for all Heritage Reserve operations
  4. Batch report: amounts moved, tokens involved, execution timestamps
  5. If E2 (redistribute): proof of SOST redistribution (TX hashes to PoPC Pool and Gold Funding Vault)
  6. All data published on project website, GitHub, and IPFS mirror

HISTORICAL APPENDICES — NOT NORMATIVE

The following appendices (F, H, I, J) document the evolution of the protocol specification. They are retained for transparency and historical reference. The normative specification is contained in the main body of this document (Sections 1-12) and normative appendices (A-D, G). In case of conflict between a historical appendix and the main body, the main body prevails.

Appendix F: Errata v3.3 (Normative Conformance)

Changes from v3.2 to v3.3, applied to close conformance gaps identified by CTO audit:

ERRATA v3.3

TEST VECTOR CONFORMANCE:

26) V3 seed derivation: header_core added
    V3 now requires header_core from V2 as input to seed derivation.

ENDIANNESS / PARSING (normative):

27) b[i] parsing: int32 → int32_le (explicit little-endian)
28) w0, w1 parsing: state[0:4] → u32_le(state[0:4]) (explicit)
29) x0 initialization: >> 4 → per-element asr_i32(int32_le(...), 4)
30) Appendix B: added PARSING CONVENTIONS normative block

BLOCK_ID / FULL_HEADER:

31) full_header explicitly defined
32) block_id: commit concatenated AFTER "ID" separator

EPOCH ANCHOR GRINDING:

33) anchor_timestamp removed from epoch_key

MODEL B WATCHER TRUST MODEL:

34) Watcher trust model added (CAN delay, CANNOT steal/block)

MODEL B CONSISTENCY (CTO review):

35) Model B reward: CONFIRMED immediate payout
36) Model B: added NO EARLY EXIT clause (gold escrow only)
37) Model B watcher: clarified "triggers immediate SOST payout"
38) Section 6.9: table confirms "received immediately" + APR proration
39) Section 6.12: REWARD BUDGET + SOLVENCY SAFEGUARDS added
40) Legal Disclaimer: added Operational Limits & Pauses paragraph
41) Section 5.1: TWO-VAULT ARCHITECTURE (Gold Funding Vault + Heritage Reserve)
42) Section 4.3: COINBASE TRANSACTION FORMAT (normative)
43) Section 3.13: BASIC MODE TIP REJECTION (normative box)

Appendix H: Errata v3.4 (Heritage Reserve & Emergency Dual Gate)

Changes from v3.3 to v3.4:

ERRATA v3.4

RESERVE MODEL:

44) Timelock 30 years eliminated → Heritage sealed by default
    Heritage Reserve is now a Heritage reserve: sealed by default, perpetual
    and untouched while SOST exists. No fixed expiry date.

45) Emergency Catastrophe dual gate added (G9, C15, Appendix G)
    Reserve movements require both: ≥75% miner signaling in a 24-hour
    window (W=144 blocks, YES≥108) AND Protocol Execution Order.
    Only two actions: E1 (ROTATE) and E2 (LIQUIDATE→BUY→REDISTRIBUTE).

46) Default 50/50 XAUt/PAXG split (G7, C14)
    Protocol may adjust split operationally for future purchases only.
    Previously purchased assets not rebalanced except under emergency.

47) Staging assets: USDC + USDT (G6)
    Both USDC and USDT permitted as temporary staging (≤72 hours).

48) Ethereum mainnet only
    All references to "Ethereum/Arbitrum" updated to "Ethereum mainnet".
    XAUt and PAXG are ERC-20 tokens on Ethereum L1.

49) Section 5.4 rewritten: "What Happens After 30 Years" → "Heritage Reserve and Dissolution"
    Heritage is default perpetual state. If chain dies without prior
    emergency authorization, reserve remains sealed (no signaling possible).

50) Section 7.1: Emergency does not modify consensus
    Added clarification that Emergency Catastrophe authorization gates
    only external reserve movements, not consensus rules or monetary policy.

51) Section 7.2: Operational governance expanded
    Explicit bullets: 50/50 split adjustment, purchase pause, issuer
    redirection — all operational, future-purchases-only. Moving
    previously purchased assets requires Emergency Catastrophe.

52) Section 9.6: Emergency table updated
    XAUT issuer risk → Emergency Catastrophe dual gate.
    Dissolution → reserve stays Heritage if chain dead.

53) Constitution: C3 rewritten (Heritage + dual gate), C14/C15 added.

54) Roadmap: "Year 30+ Heritage locked forever" → "Heritage indefinite;
    emergency dual-gate if needed."

55) Tech Specs: Reserve chain, Heritage mode, Emergency parameters added.

56) Appendix A: Emergency parameters added (W=144, threshold=75%, YES≥108).

SERIALIZATION (consensus-critical fix):

57) MAGIC constant corrected in Appendix B
    Previous: MAGIC = "SOST_CX_v1" (10 bytes, ASCII)
    Corrected: MAGIC = "CXPOW3" (6 bytes) || SHA256("SOST/CONVERGENCEX/" || NETWORK)[:4]
    Total: 10 bytes. Precomputed values for mainnet/testnet/dev provided.
    This matches the Python reference and C++ implementation exactly.
    The v3.3 text contained an outdated placeholder that was never used
    in the actual consensus code.

58) full_header size corrected
    Previous: 128 bytes (included "CXPOW3" prefix + MAGIC separately)
    Corrected: 126 bytes (MAGIC(10) || "HDR2"(4) || header_core(72) ||
    checkpoints_root(32) || nonce(4) || extra_nonce(4))
    MAGIC already contains "CXPOW3" as its first 6 bytes; the separate
    "CXPOW3" prefix was a documentation error, not present in code.

59) Appendix G added (Emergency Authorization & Execution Order)
    Normative specification of EmergencyProposal, PoW signaling,
    Protocol Execution Order, Ethereum contract verification,
    and mandatory audit trail.

Appendix I: Errata v3.5 (Security, Fees & Slash Reform)

Changes from v3.4 to v3.5:

  SLASH REFORM:
60) Slash split changed: 33/33/33 (burn/pool/gold) → 50/50 (pool/gold).
      No supply is burned. With ~4.67M max supply, every token has utility.
      Slashed bonds are recycled into PoPC Pool and Gold Funding Vault.
61) Constitution C8 updated to reflect 50/50 slash split.
62) Section 8.2 updated: "Slash burn" → "Slash recycling".
  PROTOCOL FEES:
63) Section 6.7.1 added: Model A protocol fee (3% of reward, calculated at creation, disbursed at completion). [corrected from 5% — final rate is 3%]
64) Section 6.9.1 added: Model B protocol fee (8% of reward, deducted from immediate payout). [corrected from 10% — final rate is 8%]
      Fees fund protocol operations. 30-day notice for changes.
      Existing contracts locked at creation fee rate.
  SECURITY IMPROVEMENTS:
65) Section 6.3: EOA-only verification for Model A wallets. Smart contract
      wallets rejected. CREATE2 post-deployment detection triggers slash.
66) Section 6.3: Continuous custody check via historical balance sampling
      at deterministic checkpoints between audits.
67) Section 6.8: Watcher autonomous claim fallback. If watcher fails to
      pay within 72h, depositor can claim directly via on-chain contract.
68) Section 6.6: Price Bulletin sources now dynamic — includes all
      exchanges with verifiable SOST liquidity, no fixed min/max count.
  DOCUMENT GOVERNANCE:
69) Living Document Notice added. Non-consensus parameters may evolve.
      Consensus rules remain immutable at genesis.
  
  CASERT MODIFICATIONS:
70) CASERT rewritten: continuous signal-based system replaced by
    bidirectional block-lag model. Signal is now lag in blocks
    (expected − actual) using wall-clock time vs genesis schedule.
    Hardens (H1-H35) when chain is ahead of schedule (emission protection);
    eases (E1-E4) when chain has been behind schedule for 6+ hours at B0 (liveness support).
    Levels: L1 (neutral, 0–4 ahead), L2 (5–25), L3 (26–50), L4 (51–75), L5 (76–100), L6+ (101+, unbounded).
    k changed from 3 to 4. Scale = level for ALL levels (linear: L1→1, L2→2, ..., L5→5, L6→6, ...).
    MAX_INTERVALS and E_CAP eliminated (no sliding window needed).
71) CASERT parameters: replaced by
      L2_THRESHOLD=5, L3_THRESHOLD=26, L4_THRESHOLD=51, L5_THRESHOLD=76, L6_THRESHOLD=101 (blocks ahead, unbounded beyond L5).

Appendix J: Errata v3.7 (cASERT v4 — Scale = Level, L5+ Exception)

Changes from v3.6 to v3.7:

  CASERT LEVEL SYSTEM:
72) Level names: L3–L6 → L1–L5. L1 is neutral default. L5 is maximum.
73) Thresholds: 21/51/101 → 5/20/50/75. Earlier response to hashrate surges.
74) Scale = level for ALL levels (L1→1, L2→2, L3→3, L4→4, L5→5, L6→6, ... linear, unbounded).
      Baseline compute reduced from 36 (scale=3) to 12 (scale=1).
75) CasertMode enum: NORMAL/DEGRADED/OPEN → L1/L2/L3/L4/L5/L6+.
76) params.h: CX_STB_SCALE changed from 3 to 1.
      CASERT_L2_BLOCKS=5, L3=26, L4=51, L5=76, L6=101 (unbounded beyond L5).
77) Explorer v4.2 aligned with C++ L1–L5–L6+, scale=level (all levels, linear).

Appendix M: Removed — Adaptive Mode (Historical, Non-Normative)

This mode is NOT planned for activation. It is documented for historical reference only.

This appendix preserves the original Adaptive Mode specification (formerly Section 6.11) for theoretical completeness. Potential future extension — requires governance evaluation.

The Adaptive Mode proposed that when the SOST/gold ratio exceeded 1.5 for 30 consecutive days, PoPC would also accept SOST as a custody asset. This was removed from the normative specification in v4.0 because accepting SOST as a custody asset creates circular staking dynamics that contradict PoPC's core purpose as a proof of external gold custody.

ADAPTIVE MODE (REMOVED — historical reference only):
  ratio = sost_price / gold_oz_price
  If ratio > 1.5 for 30 consecutive days → mode would have activated
  Users would demonstrate custody of SOST rather than gold
  Same bond, audit, and reward mechanics would apply

SOST Protocol Whitepaper v4.0 — Normative Specification

Appendix K: Errata v3.8 (Sovereign Value Stack — Position Market, E2E, Settlement)

Changes from v3.7 to v3.8:

ERRATA v3.8

SOVEREIGN VALUE STACK:

56) Section 12.5: expanded from overview to full operational specification
57) Section 12.5.1: E2E layer — ED25519 real signatures, relay node, deal channels, 139 TS tests
58) Section 12.5.2: renamed "DEX" → "SOST Position Market" — OTC/RFQ model, not AMM
    - Phase 1: Model B full position + reward-right trades
    - Phase 2: Model A reward rights + controlled novation
    - Phase 3: broader market (legal review required)
59) Section 12.5.3: SOSTEscrow deployed on Sepolia with first on-chain gold deposit
    - Address: 0x01Eaab645DA10E79c5Bae1C38d884B4D1a68f113
    - First Model B position: 0.5 oz XAUT, 28-day lock
60) Section 12.5.4: PoPC contract infrastructure updated with lifecycle states
61) Section 12.5.5: Architecture — sost-comms now includes relay + deal channels
62) Section 12.5.6: Alpha Status added (375 tests, 0 failures)
63) Section 12.5.7: Strategic Direction — "trade contracts, not pools"

SETTLEMENT ENGINE:

64) Deal state machine: 11 states, full happy path + refund path documented
65) Settlement daemon, Ethereum watcher, SOST watcher, refund engine specified
66) Position pricing formula: gold_value + discounted_reward - illiquidity

POSITION MARKET:

67) Position as identified registry object (not fungible token)
68) Full position trade + reward-right split with signed messages
69) 213 Python + 139 TypeScript + 19 Solidity tests passing

cASERT:

70) H11 ceiling activation at block 5,480 (16 of 40 profiles active, superseded by block 5,750)
71) Block interval chart added to explorer with avg/median explanation

Appendix L: Errata v3.9 (E2E Encryption, Prekeys, Offline Delivery, cASERT Fixes)

Changes from v3.8 to v3.9:

ERRATA v3.9

E2E ENCRYPTION (Phase XIII):

72) X25519 key agreement added (separate from ED25519 signing)
73) ChaCha20-Poly1305 AEAD payload encryption
74) HKDF-SHA256 directional channel key derivation
75) Relay converted to blind transport (cannot read content)
76) Encrypted envelopes with minimal header for routing
77) Replay guard with sliding window + nonce dedup per session
78) Rekey mechanism per deal channel

PREKEYS AND OFFLINE DELIVERY (Phase XIV):

79) Signed Prekey (X25519, rotated 7 days, ED25519-signed)
80) One-Time Prekeys (consumed once, batch replenishment)
81) Async session bootstrap (sender initiates while recipient offline)
82) Store-and-forward offline queue (7-day TTL)
83) Delivery receipts (delivered / acknowledged / processed)
84) Key lifecycle policy (rotation, replenishment, health evaluation)
85) Header minimization (economics inside ciphertext only)
86) Prekey bundles publishable to relay for offline discovery

CASERT FIXES:

87) H11 profile descent bug fixed: slew proportional to stall time
88) Profile floor enforcement at block 5,560
89) Block #5525 H1 validation gap closed

TEST COVERAGE:

90) Total: 550 tests (Python 272 + TypeScript 231 + Solidity 47), 0 failures

Last updated: April 2026

Appendix N: Errata v3.10 (Beneficiary Handoff, Relief Valve, H12)

Changes from v3.9 to v3.10:

BENEFICIARY AUTOMATION (Phase XVI-XVII):

91) principal_owner / reward_owner / eth_beneficiary separation in position schema
92) SOSTEscrowV2 with settlementOperator for automated beneficiary handoff
93) Full sale: changes principal + reward + beneficiary. Reward sale: only reward.
94) settlementOperator can reassign beneficiary but CANNOT withdraw funds
95-100) Auto-withdraw, reward settlement, maturity watcher, beneficiary sync, reconciliation

CASERT:

101) H12 ceiling activation at block 5,635 (17 of 40 profiles active, superseded by block 5,750)
102) Relief valve at block 5,635: profile drops to H1 when block > 10m 30s (superseded by E7@605s)

TEST COVERAGE:

105) Total: 550 tests (Python 272 + TypeScript 231 + Solidity 47), 0 failures

Appendix O: Errata v3.11 (Final Calibration, Block 5,750)

Changes from v3.10 to v3.11:

FINAL CALIBRATION (block 5,750):

106) H13 ceiling activation at block 5,750 (21 of 43 profiles active: E7-H13)
107) Relief valve upgraded: E7@605s (was H1@630s), deeper easing on stall
108) 3 new easing profiles: E7, E6, E5 prepended to table
109) E4-H2 margins recalibrated to 5-point gradient (185→155)
110) Lag-adjust interval reduced from 30s to ~6s
111) cASERT equalizer implementation and calibration complete.
     Additional hardening profiles will activate as hashrate grows.

SOST DEX:

112) Unified trading desk (alpha): buy, sell, split, track gold-backed positions

TEST COVERAGE:

113) Total: 743 tests (C++ 193 + Python 272 + TypeScript 231 + Solidity 47), 0 failures

Last updated: April 2026

Previous versions: v3.10, v3.9, v3.8, v3.7 (deprecated)

8.4 Post-Quantum Cryptography Roadmap

SOST Protocol currently uses secp256k1 ECDSA — the same scheme used by Bitcoin since 2009. While no practical quantum threat exists today, SOST has a constitutional migration plan. Selected algorithm: CRYSTALS-Dilithium (NIST FIPS 204 winner). Signature size: 2,420 bytes. New address prefix: sost2.

Migration: Phase 1 Research (done) → Phase 2 Prototype (2027) → Phase 3 Dual signatures testnet (2028 Q1) → Phase 4 Mainnet sost2 (2028 Q3) → Phase 5 ECDSA deprecation via 95% vote (2030+). SHA-256 hashing remains quantum-safe.

SOST source code is published under the MIT License — fully open sourceLICENSE file for full terms.

🎮