The MIR Assertions Constitution

Governing document for the MIR Assertions protocol and registry.

Ratified by the founding steward, phpMyDEV, LLC. Any amendment requires the process defined in Article VII.

MIRA is a public registry of cryptographic assertions about digital artifacts. It records who asserted what about which artifact and when. It does not determine whether any assertion is true, justified, or authoritative. MIRA is infrastructure, not authority. It exists to make provenance visible, not to assign meaning.

This constitution defines what MIRA is, what it will never become, and the structural constraints that protect its neutrality — including from its own stewards.

Article I — Core Identity

  1. MIRA is a notary. It records signed statements. It does not evaluate them.
  2. MIRA is a registry. It stores assertions linked to artifact hashes. It does not curate, rank, or filter them.
  3. MIRA is infrastructure. It operates like DNS or a certificate transparency log — mechanically, predictably, and without opinion.
  4. MIRA is not an authority. Authority belongs to issuers and is established outside the registry through their real-world identity, domain ownership, and public reputation. MIRA does not confer, amplify, or diminish authority.

Article II — Immutable Rules

These rules cannot be amended, suspended, or overridden under any circumstances. They are structural, not discretionary.

1. Append-Only Storage

Assertions, once recorded, are never deleted. The registry is append-only. State may evolve through revocation assertions, supersession chains, and key lifecycle events, but the original record persists. Silent removal is architecturally prohibited.

2. Flat Issuer Treatment

All issuers receive identical visual presentation, typographic weight, layout, and ordering. No issuer receives preferential display, elevated styling, special badges, or distinguished placement. The registry does not differentiate between a government agency and an individual — both are issuers with a domain, a key, and a timestamp.

3. No Trust Scoring

MIRA does not assign, calculate, display, or transmit trust scores, reputation scores, credibility ratings, or any quantitative or qualitative measure of issuer reliability. Trust evaluation is the sole responsibility of the assertion viewer.

4. No Assertion Adjudication

MIRA does not determine whether an assertion is true, false, accurate, misleading, justified, or harmful. Multiple conflicting assertions about the same artifact coexist without resolution, ranking, or suppression. MIRA records the conflict. It does not resolve it.

5. No Semantic Hierarchy

The registry does not use adjectives, visual cues, iconography, color coding, or language that implies one assertion type, issuer class, or claim carries more weight, legitimacy, or authority than another. All assertion types — including DISPUTE — receive identical neutral presentation.

6. No Deletion Under Compulsion

If presented with a legal order to delete an assertion, MIRA's position is that the architecture does not permit silent deletion. Compliance mechanisms, if legally required, must be append-only (e.g., a court-ordered annotation assertion) and must be publicly visible in the audit trail. Hidden redaction is structurally impossible by design.

Article III — Non-Goals

The following are permanently outside the scope of MIRA. They are not deferred features. They are excluded by design.

  1. Content moderation. MIRA does not review, approve, or reject assertions based on their content, subject matter, or political implications.
  2. Issuer tiering. MIRA does not create tiers such as "official," "trusted," "premium," "government," or "enterprise." All issuers are issuers.
  3. Authenticity verification. MIRA verifies cryptographic signatures and hash matches. It does not verify whether an artifact is authentic, original, or unmanipulated.
  4. Ranking or sorting by prominence. Assertions are displayed in chronological or deterministic order (e.g., by assertion ID). Never by issuer importance, popularity, or perceived authority.
  5. Recommendation or amplification. MIRA does not recommend issuers, highlight assertions, or surface "important" claims. All assertions are equal in presentation.
  6. Narrative framing. MIRA does not describe assertions using language that assigns moral, legal, or epistemic weight. Assertion types are labels, not judgments.
  7. Issuer endorsement. Registration and domain verification are mechanical processes. They do not constitute endorsement, approval, or certification by MIRA.
  8. Feature monetization that introduces hierarchy. Paid features must never create visible differentiation between issuers or assertions. No issuer can purchase elevated display, priority ordering, or distinguished presentation.

Article IV — Language Standards

MIRA's public-facing surfaces — lookup pages, API responses, documentation, and embedded widgets — must adhere to the following language constraints:

  1. Use nouns and mechanical states. Examples: "Issued By," "Assertion Type," "Timestamp," "Key Fingerprint," "Domain Verified (DNS)."
  2. Do not use trust adjectives. Prohibited terms include but are not limited to: "verified" (as a trust signal), "official," "trusted," "authentic," "genuine," "confirmed," "certified," "approved," "legitimate."
  3. Mechanical verification language is permitted. Examples: "Domain ownership confirmed via DNS TXT record," "Signature valid," "Key status: ACTIVE." These describe protocol states, not trust states.
  4. DISPUTE is an assertion type, not an alarm. It receives no special iconography, color treatment, or visual emphasis. It is displayed identically to ISSUED_BY, METHOD, INTENT, or any other type.
  5. Guidance text must reinforce neutrality. Any explanatory text on public pages must include language equivalent to: "MIRA records who made each assertion. MIRA does not verify content accuracy."

Article V — Technical Constraints

These constraints are enforced at the architectural level, not the policy level.

  1. Assertions are cryptographically signed by the issuer. MIRA stores the signature and signed payload. The registry cannot forge, modify, or backdate assertions.
  2. Issuer identity is derived from domain ownership and key registration. There is no manual approval tier, editorial review, or qualitative assessment of issuer suitability.
  3. Key revocation is append-only. A revoked key is marked with a revocation timestamp. Assertions signed before revocation remain in the registry with their original key association.
  4. Hash computation is performed client-side. Files are never uploaded to MIRA. Only the resulting hash is transmitted. MIRA has no access to original artifacts.
  5. The API surface is minimal. The registry exposes: assertion creation, assertion lookup by hash, issuer key management, and key lifecycle events. Feature expansion must be justified against the non-goals and approved through the amendment process.

Article VI — Governance

Phase 1 — Founding Stewardship (Current)

MIRA is stewarded by phpMyDEV, LLC through its founder. During this phase, all decisions are guided by this constitution. The steward may not act in contradiction to the Immutable Rules or Non-Goals.

Phase 2 — Foundation Transition

When MIRA achieves sufficient adoption to warrant formal governance, stewardship transfers to a non-profit foundation. The foundation:

  • Holds no equity and generates no shareholder returns.
  • Is governed by a board with defined term limits.
  • Maintains three seats: technical steward, civil society representative, and issuer community representative.
  • Requires supermajority (75%) to amend any article except Article II, which is immutable.
  • Publishes all board decisions, votes, and policy changes publicly with a 90-day notice period before implementation.

Phase 3 — Protocol Freeze

Once the core protocol is stable, it is frozen. A frozen protocol:

  • Cannot have assertion types added, removed, or redefined without constitutional amendment.
  • Cannot have issuer display semantics changed without constitutional amendment.
  • Cannot have new metadata fields added that introduce interpretive content.

Governance after freeze is limited to operational matters: infrastructure scaling, key ceremony procedures, incident response, and issuer onboarding process.

Succession

The founding steward must designate at least one successor before the foundation is established. Successors are bound by this constitution. No individual — including the founder — may hold a board seat for more than two consecutive terms.

Article VII — Amendment Process

For Articles III–VI:

  1. Proposed amendment published publicly with full rationale.
  2. 90-day public comment period.
  3. Board vote: 75% supermajority required.
  4. 30-day implementation delay after approval.

For Article II (Immutable Rules):

Article II cannot be amended. It is the structural foundation of MIRA's institutional identity. If a future governing body determines that an Immutable Rule must change, the correct course is to create a new system under a new name. MIRA, as defined by this constitution, ceases to be MIRA if its Immutable Rules are violated.

Article VIII — Institutional Failure Conditions

MIRA should cease to operate rather than compromise its constitutional constraints. The following constitute institutional failure:

  1. Silent deletion of an assertion.
  2. Introduction of issuer tiering or preferential display.
  3. Assignment of trust scores or credibility ratings.
  4. Adjudication of assertion truthfulness.
  5. Suppression of assertions based on content, political pressure, or commercial interest.
  6. Modification of historical records without visible audit trail.

If any of these occur, MIRA has failed its mission and should be publicly acknowledged as compromised.

Founding Steward:

phpMyDEV, LLC

Richard Whitney

Date: February 2026

MIRA is an internet initiative of phpMyDEV, LLC. Stewardship & Governance
This constitution is a living document only insofar as Articles III–VI permit amendment. Article II is permanent.

This document is asserted on MIRA: Download PDF | Verify Assertion