Trust infrastructure
Federated identity, signed authority, operator linkage, and visible runtime claims.
Protocol oversight
A real institution would need ways to inspect dominant protocols, frameworks, connector ecosystems, and platform defaults as sources of public power, not just neutral plumbing.
Evidence workflows
Standard evidence classes, controlled disclosure, reviewer access, and clear handling of confidential material.
Participation classes
Different roles for public participants, affected parties, reviewers, clerks, and accredited volunteers.
Review protocols
Visible methods for classification, response handling, recommendation, appeal, and unresolved status.
Governance rules
Anti-capture safeguards, transparent moderation, public-interest duties, and external scrutiny.
Legal interfaces
Clear boundaries between civic record, public recommendation, contractual process, and formal enforcement.