Appearance
Public vs Restricted Security Boundary
This page is the public manual entry point for SocioProphet's disclosure boundary.
SocioProphet is explicit about what belongs in the public architecture layer and what remains restricted. That is not a contradiction and not a hedge. It is part of the system design.
1. Why this boundary exists
A serious system must be legible without becoming a misuse amplifier.
That means the public layer must provide:
- clarity
- governance legibility
- architectural honesty
- safety-boundary explanation
- institutional confidence
- evidence that the platform is bounded and reviewable
At the same time, the public layer must not disclose tactical detail that materially increases misuse value.
This boundary is therefore part of the platform's safety architecture.
2. What we publish publicly
The public layer includes:
- product architecture
- governance model
- bounded-execution model
- deterministic AI thesis
- operator role model
- workflow states
- evidence and provenance model
- institutional deployment framing
- public-safe defensive posture
- public-safe analytics and boundary model
- reversibility and promotion logic at the architectural level
This gives institutions, operators, researchers, and stakeholders enough information to understand the system honestly.
3. What remains restricted
Restricted material includes:
- sensitive operator kits
- exact tactical playbooks
- exploit or persistence workflows
- high-fidelity adversary-emulation mechanics
- evasion-sensitive logic
- restricted thresholds
- privileged deployment internals
- misuse-enabling tradecraft
- other details that materially increase misuse value
We do not publish those details merely to sound advanced.
4. What this means in practice
In practice, the public layer explains:
- what the system does
- how it is governed
- how work moves through it
- how analytics, workflows, and validation connect
- how promotions and reversals work
- where the authorization boundary sits
- why some implementation detail is intentionally withheld
The restricted layer contains the tactical and operational material that would make the public docs unsafe or irresponsible if published in full.
5. Relationship to deterministic AI
The public-vs-restricted boundary is tied directly to the deterministic AI thesis.
A deterministic and bounded system is not only about execution. It is also about disclosure discipline.
If the public layer published every sensitive tactical internal, the platform would be violating its own safety claims.
Relevant references:
6. Relationship to organizations
Institutions need to know not only that the system is governed, but that the documentation boundary itself is governed.
This matters because institutional adoption depends on:
- clear governance
- clear authorization
- clear evidence model
- clear disclosure discipline
- confidence that public explanation does not collapse into irresponsible release of tactical detail
Relevant reference:
7. Relationship to defense and validation
Authorized Cyberdefense and Simulation is the clearest example of this boundary in action.
The public layer can explain:
- authorization boundary
- defense-first posture
- evidence-bearing validation
- remediation logic
- governance and review
The public layer does not need to publish:
- restricted simulation internals
- tactical adversary tradecraft
- exact playbooks
- restricted thresholds
Relevant reference:
8. Relationship to the boundary-first model
The Boundary-Centric Cyber Hypergraph helps explain this documentation boundary.
The public docs can explain the model of:
- component
- port
- contract
- boundary event
- evidence
- expectation
- finding
without publishing every restricted data source, tactic, or internal operator mechanic.
Relevant reference:
9. Why this matters
Without an explicit public-vs-restricted boundary, one of two bad things usually happens.
Either:
- the public layer becomes vague and untrustworthy
or:
- the public layer becomes recklessly over-disclosive
SocioProphet rejects both.
The system is designed to be:
- honest
- legible
- reviewable
- bounded
- explicit about what remains outside the public layer
10. Use this page
Use this page when the question is:
- Why are some details public and others restricted?
- Where is the disclosure boundary?
- How does the documentation boundary connect to the platform's safety claims?
- How do deterministic AI, institutional governance, and authorized validation reinforce this line?