Open technical standards, protocols, and specifications enabling sovereign control, human-first design, and global interoperability across 170+ nations through net3.eth coordination.
The constitutional root for Internet 3.0 — establishing the human as the first sovereign
This Charter establishes that identity is human-anchored, title is lawful and traceable, surveillance is not the price of inclusion, and coercion by code is prohibited.
The human is the root of all authority. Identity, consent, and control cannot be delegated without explicit authorization.
Critical operations require human authorization. Automated systems must preserve human decision-making power.
Legal authority is determined by jurisdiction. Systems must honor sovereign boundaries and local law.
History cannot be erased. All changes are recorded in immutable lineage, preserving provenance and accountability.
Cryptographic custody designed to survive quantum computing threats using post-quantum cryptography.
Violations result in credential invalidation, not censorship. Bad actors lose standing, not voice.
Rights inscribed into cryptography to outlive platforms — inspired by the Cyrus Cylinder's enduring record of human rights
CYRUS© references the Cyrus Cylinder — the ancient declaration of human rights recorded to outlive empires.
CYRUS© Binding inscribes rights into cryptography so they outlive platforms, creating durable records independent of any single provider or government.
CYRUS© Binding requires rigorous attestation to ensure durability and authenticity:
Human authorization required for all binding events
Multiple independent witnesses validate events
Classical + post-quantum algorithms for future-proofing
Bitcoin integrity proofs for immutable timestamping
Registry persistence serves as the canonical record, ensuring continuity even if individual nodes fail.
CYRUS© Binding supports continuity from Web2 trust anchors (DNS/DNSSEC where available) without making Web2 a gatekeeper. Legacy systems can bridge to sovereign infrastructure while preserving Internet 3.0 sovereignty.
CYRUS© cryptographically binds the Wyoming Sovereign Purpose Trust governance structure on-chain for 1,000 years, ensuring:
Trust's purpose (sovereign infrastructure) cryptographically locked—cannot be changed by any party
Professional trustees administer per Wyoming law—no equity owners, no corporate control
Foundation exists in perpetuity for its purpose—no one can acquire or control it
Key Protection: Even Charter Members have no governance rights over the Foundation. This ensures TitleChain serves 170+ nations impartially for 1,000 years. Learn more about governance →
Open technical standards for sovereign digital infrastructure, registry protocols, and interoperability frameworks
TCID© inscription, cryptographic binding, human-first origination, and post-quantum security requirements.
M1–M5 asset classification framework: physical cash, deposits, securities, commodities, and digital bearer instruments.
Registry persistence, lineage preservation, ownership proofs, and jurisdiction-native compliance standards.
Validator, witness, oracle, storage, and PSN (Private Sovereign Node) operational specifications.
Legacy + sovereign bridging protocols, translation layers, and dual-stack compatibility frameworks.
Jurisdiction-specific compliance templates, audit trail requirements, and regulatory attestation protocols.
Human-in-the-loop standards, agent delegation rules, and automated system constraints.
Four-layer namespace architecture (L1–L4) coordinated through net3.eth master registry.
Zero-knowledge proofs, selective disclosure, encrypted data handling, and privacy-preserving computation standards.
Based on ODI (Open Data Institute) principles and Solid POD architecture, M5POD provides users with self-sovereign data storage and control.
M5 infrastructure adheres to globally recognized Web3 and decentralized identity standards:
Cloud-independent, sovereign-first infrastructure: M5Bank and member nations are not dependent on Google Cloud, AWS, or Azure. Our tokenized hybrid cloud stack enables full sovereignty with flexible deployment options.
Kubernetes on OpenStack: We run Kubernetes on top of OpenStack, using OpenStack to provision the underlying VM infrastructure and networking for Kubernetes clusters. This delivers:
Alternative: M5Bank members can run the M5Cloud OpenStack control plane on Kubernetes, benefiting from Kubernetes' lifecycle management and automation for OpenStack services themselves.
M5 Deterministic Offline LLMs: Our intelligence engine runs on private GPU infrastructure to ensure Sovereign AI standards and complete data separation.
Key Principle: M5Bank cannot access member POD data. AI models run locally within sovereign infrastructure boundaries.
🛡️ Zero Dependency on Hyperscalers: M5 runs on self-managed OpenStack + Kubernetes infrastructure, ensuring nations and institutions retain full control over their digital sovereignty without reliance on Google, Amazon, or Microsoft.
Lawful migration paths from Web2 and traditional finance into Internet 3.0 sovereign infrastructure
ICSN supports a lawful migration path from legacy Web2 naming into Internet 3.0 without creating dependence or gatekeepers.
Note: ICANN is referenced for compatibility only. ICSN operates independently with sovereign namespace control.
An optional interoperability layer for credentialed institutions to participate in sovereign Internet 3.0 index and exchange economy.
Important: SWIFT BRIDGE© is not controlled by "10 central banks." It is a standards-based participation framework aligned with the member reality of SWIFT.
Institutions see counterparty credential status in real-time as active, deactivated, or under review.
Global laboratory network and canonical contract repository for sovereign innovation
A global lab network for credentialed members—universities, research centers, agencies, and builders—advancing sovereignty, sustainability, and human-first innovation.
A canonical contract and document repository where creators and inventors can publish, license, and receive direct compensation—while keeping title and rights intact.
Clear pathways for nations, institutions, operators, and research partners to participate in ICSN
Nation/state/tribe root authority for jurisdiction-native namespace control and monetary sovereignty.
Registry services, SBaaS© deployment, and interoperability delivery for credentialed jurisdictions.
Infrastructure operators running validator, oracle, storage, witness, or PSN nodes.
Financial institution or agency credentialing for participation in sovereign exchange networks.
Git3Labs© member conducting standards research, testing, and proof-of-concept development.
Technical contributor to ICSN protocol development, specification drafting, and standards evolution.
Credentialed verification of participant identity and legal standing
Clear jurisdictional boundaries and legal authority documentation
Infrastructure capability and technical compliance verification
Privacy, non-capture, and agent rules compliance attestation
Issuance of credentials and publication to registry manifest upon successful completion.
Answers to key questions about ICSN governance, technical architecture, and participation
No. ICSN is a standards coordination body, not a decentralized autonomous organization. Governance is vested in credentialed sovereigns and working group members, not token holders.
net3.eth serves as the master registry coordinating sovereign namespaces. No single entity controls the root—authority is distributed across credentialed sovereigns at L2 (national), L3 (state/tribal), and L4 (municipal) layers.
Funding does not confer authority. Participation does not convey governance rights. Standards are stewarded by credentialed sovereigns and working group consensus, not investors or platforms.
No. ICSN is standards and coordination only. Custody is provided by credentialed operators under declared law. ICSN never holds, controls, or touches member assets or value.
CYRUS© Binding uses Bitcoin for public notary anchoring—timestamped integrity proofs published to Bitcoin's immutable ledger. This provides tamper-evident timestamps without Bitcoin controlling the registry or custody.
Yes. SWIFT BRIDGE© enables previously excluded institutions (credit unions, agencies, community banks) to participate using modern credentialing instead of legacy SWIFT© codes.
Credentials are suspended and counterparties see the status in-wallet as deactivated or under review. Due process exists, but enforcement is immediate at the credential layer to protect the network.
Rehypothecation is tracked in lineage. Title cannot be duplicated or hidden. Any secondary use of assets is recorded in the chain-of-custody, preserving transparency and preventing fraud.
Privacy is a pre-political human right. Zero-knowledge proofs, selective disclosure, and encrypted M5POD© architecture prevent honeypot creation. Users control what becomes public.
M5 USC© is our economic framework classifying value across five layers: M1 (utility/currency), M2 (commodities), M3 (one-of-a-kind assets: identity, vehicles, NFTs), M4 (securities), M5 (financial instruments: gov-to-gov, interbank, central bank-to-bank settlement). This prevents "surveillance money" by preserving privacy-appropriate asset classes and preventing forced traceability of all transactions.
NYCP© (New York Convention Protocol) integrates the New York Convention (1958) — ratified by 170+ nations — into TitleChain's Title Standards. The first implementation, nycp26.eth under unitednationschain.eth, enables constitutional-grade arbitration enforcement across borders. In the U.S., this is implemented through Chapter 2 of the Federal Arbitration Act (9 U.S.C. §§ 201–208).
"Deployment Chain" emphasizes inaugural infrastructure nodes launching Internet 3.0. Wave 1 features UK (Oxford M5Node with Sir Tim Berners-Lee), US (California, New York, Wyoming, Texas), Bhutan, Switzerland, and Singapore. These aren't just "priority" — they're the foundational deployment infrastructure for sovereign banking.
Wyoming hosts the TitleChain Sovereign Purpose Trust — a 1,000-year noncharitable purpose trust designed to outlast corporations, governments, and technological paradigm shifts. Wyoming's favorable digital asset laws and trust statutes make it the constitutional home for Internet 3.0 governance. The wyomingchain.eth deployment is Wave 1 Priority #3.
Charter Membership is infrastructure sponsorship, not investment. Charter Members fund the launch and deployment of Internet 3.0 infrastructure (M5Nodes, ICSN coordination, energy sector pilots). There is no equity, no securities offering, and no promise of financial returns. Charter Members receive recognition as Constitutional Founders supporting 1,000-year digital sovereignty infrastructure.
260 total founding positions available across four tiers: Tier 1 — Constitutional Founder ($5M+, 10 spots) sponsors complete M5Node deployments with permanent trust recognition; Tier 2 — Sovereign Partner ($1M-$4.9M, 30 spots) co-sponsors nodes with working group participation; Tier 3 — Infrastructure Supporter ($250K-$999K, 70 spots) funds specific components; Tier 4 — Founding Member ($50K-$249K, 150 spots) contributes to general infrastructure. All levels receive recognition in the 1,000-year constitutional framework.
Yes. M3 is designed for unique, non-fungible assets including identity credentials (TCID©), vehicle titles, real estate deeds, and NFTs. Each M3 asset has a distinct provenance and cannot be duplicated. This is fundamentally different from M1 (fungible currency) or M2 (commodity units). M3 preserves individual ownership records while preventing unauthorized duplication.
M5 financial instruments are institutional/sovereign-level only by design. M5 enables government-to-government settlements, interbank transfers, and central bank-to-commercial bank operations. Restricting M5 to institutional use prevents retail surveillance while maintaining appropriate oversight for high-value sovereign financial operations. This constitutional separation protects consumer privacy (M1-M3) while enabling institutional coordination (M5).