<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.39 (Ruby 3.2.11) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC2119 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC8174 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY RFC3339 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3339.xml">
<!ENTITY RFC6973 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6973.xml">
<!ENTITY RFC7942 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7942.xml">
]>


<rfc ipr="trust200902" docName="draft-morrison-compute-location-gate-00" category="info" submissionType="independent">
  <front>
    <title abbrev="Compute-Location Gate">The Compute-Location Gate: Provenance-Class Routing of Identity Inference with Wire-Layer Refusal of Unconsented Provenance Classes</title>

    <author fullname="Blake Morrison">
      <organization>Alter Meridian Pty Ltd (~truealter)</organization>
      <address>
        <email>blake@truealter.com</email>
        <uri>alter:~blake</uri>
      </address>
    </author>

    <date year="2026" month="May"/>

    
    
    

    <abstract>


<?line 104?>

<t>This memo specifies the compute-location gate: a mechanism by which a
client and an identity-inference server negotiate, at the wire layer
and before any inference is performed, the location at which an
identity inference will compute, as a deterministic function of the
provenance class of the input signal.  Three provenance classes are
distinguished.  Active inference, initiated by the inferred-about
principal, MAY compute server-side and produce a server-held identity
vector.  Passive aggregate observation over a cohort no smaller than a
declared minimum MAY compute server-side but yields only a
population-level observation that is not attributable to an
individual.  Passive individual observation is local-only: it is
computed and retained on the device that observed it and is never
transmitted to a server.  The gate is enforced by consent-class
matching and by a wire-layer refusal returned when a requested
provenance class is not consented; it is not enforced by any
cryptographic proof concerning data that was not used.  The memo is
Informational.  The wire surface composes with the discovery
mechanism of <xref target="MCPDNS"></xref>, the handle namespace of <xref target="IDPRONOUNS"></xref>, and the
organisational policy substrate of <xref target="POLICYPROV"></xref>; no new transport is
introduced.</t>



    </abstract>



  </front>

  <middle>


<?line 127?>

<section anchor="status-of-this-memo"><name>Status of This Memo</name>

<t>This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.</t>

<t>Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF).  Note that other groups may also distribute
working documents as Internet-Drafts.  The list of current
Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.</t>

<t>Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other documents
at any time.  It is inappropriate to use Internet-Drafts as
reference material or to cite them other than as "work in progress."</t>

</section>
<section anchor="introduction"><name>Introduction</name>

<t>An identity-inference system derives statements about a principal
(traits, competencies, dispositions, belonging measures) from signals
the principal emits.  Such systems face a question that access control
alone does not answer: <em>who may read</em> a derived statement, and
<em>where the derivation itself is permitted to compute</em>.</t>

<t>These are distinct questions.  Access control governs the read path of
a datum that already exists.  The compute-location question governs
whether the datum may be brought into existence on a given machine at
all.  A system that answers only the first question can decline to
serve an inferred trait to an unauthorised reader, but it has, by the
time of that refusal, already computed and persisted the trait on its
server.  The compute-location question, asked earlier, prevents the
server-side derivation from occurring when the signal's provenance
does not warrant it.</t>

<t>This memo specifies a mechanism, the compute-location gate, that
answers the second question at the wire layer.  Before an inference is
performed, the client and the server negotiate the <em>provenance class</em>
of the input signal.  The provenance class deterministically selects
a <em>compute location</em>.  Where the negotiated provenance class is not
covered by the principal's consent, the server returns a wire-layer
refusal, and no inference is performed at any location.</t>

<t>The mechanism rests on a principle the present author has elsewhere
termed identity-as-inference: that a principal's identity is inferred
from manifestation rather than declared, and that every such inference
is admissible only under an explicit gate on the provenance of the
signal from which it is drawn.  The first clause of that principle is:
no inference without a compute-location gate.  This memo is the
wire-layer codification of that clause.</t>

<t>The mechanism is deliberately narrow.  It specifies provenance-class
negotiation, the routing function from provenance class to compute
location, the consent-class match, and the refusal returned on a
consent miss.  It does NOT specify, and explicitly excludes from its
scope (Section 11), any cryptographic proof that a particular data
category was excluded from a derivation.  The gate's enforcement model
is consent-class matching plus wire-layer rejection.  Verification
that the gate held is addressed by build-time pipeline checks
(Section 8) and by post-hoc audit, not by a cryptographic attestation
of absence.</t>

<t>The wire surface composes with four Morrison-family Internet-Drafts:
the discovery surface of <xref target="MCPDNS"></xref>, the handle namespace of
<xref target="IDPRONOUNS"></xref>, the cross-session coordination posture of <xref target="SUBSTRATE"></xref>,
and the organisational policy substrate of <xref target="POLICYPROV"></xref>.  No new
transport, no new handle category, and no new discovery record is
introduced.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
BCP 14 <xref target="RFC8174">RFC2119</xref> when, and only when, they appear in all
capitals, as shown here.</t>

<t>The following terms are defined for the purposes of this document.
Terms previously defined by the referenced Morrison-family memos
retain their established meaning and are reproduced here only when
operative for the present specification.</t>

<dl>
  <dt>Identity inference</dt>
  <dd>
    <t>A computation that derives a statement about a principal (a trait
value, a competency estimate, a disposition, a belonging measure,
or a comparable derived attribute) from one or more signals the
principal has emitted.</t>
  </dd>
  <dt>Provenance class</dt>
  <dd>
    <t>A property of an input signal, established before inference, that
records how the signal came to be observed.  Three provenance
classes are defined in Section 3.</t>
  </dd>
  <dt>Compute location</dt>
  <dd>
    <t>The machine class on which an identity inference is permitted to
execute.  Two compute locations are distinguished: server-side, on
infrastructure operated by the inference service; and device-local,
on the device that observed the input signal.</t>
  </dd>
  <dt>Server-held identity vector</dt>
  <dd>
    <t>A persisted, server-side representation of a principal's inferred
identity, readable through the inference service's consented query
surface.  Only inference of the active provenance class (Section 3.1)
may write to the server-held identity vector.</t>
  </dd>
  <dt>Device-local daemon</dt>
  <dd>
    <t>A long-running process executing on a device under the principal's
control, on which device-local inference (Section 3.3) is computed
and where the resulting representation is retained.  The device-local
daemon does not transmit individual-attributable derived statements
to a server.</t>
  </dd>
  <dt>Cohort floor</dt>
  <dd>
    <t>The minimum cohort size, declared by the inference service, below
which a passive aggregate inference (Section 3.2) MUST NOT be
computed.  The cohort floor exists so that a population-level
observation cannot be narrowed to an individual.</t>
  </dd>
  <dt>Consent class</dt>
  <dd>
    <t>A unit of consent granted by a principal, keyed to a provenance
class and a signal stream.  A consent class is the grant against
which a negotiated provenance class is matched (Section 6).</t>
  </dd>
  <dt>Wire-layer refusal</dt>
  <dd>
    <t>A typed response returned by the inference service, before any
inference is performed, when a requested provenance class is not
covered by a consent class.  The refusal terminates the inference
request; no inference is performed at any compute location.</t>
  </dd>
  <dt><spanx style="verb">~handle</spanx></dt>
  <dd>
    <t>A principal identity handle as defined by <xref target="IDPRONOUNS"></xref>.</t>
  </dd>
</dl>

</section>
<section anchor="provenance-classes"><name>Provenance Classes</name>

<t>Every input signal admitted to an identity inference carries exactly
one of three provenance classes.  The provenance class is established
before inference and is immutable for the lifetime of the signal
record.  The provenance class, not the signal's content and not the
trait category of the prospective output, is the value on which the
compute-location gate routes.</t>

<section anchor="active-inference"><name>Active Inference</name>

<t>An input signal is of the active provenance class when the
inferred-about principal initiated the act that produced it.
Challenge-response exchanges, a consented structured assessment, an
explicit attestation the principal authored, and inputs the principal
supplied to a deliberate identity-elaboration flow are all of the
active class.  The defining property is principal initiation: the
principal performed an act whose purpose, as understood by the
principal at the time of the act, was to contribute signal to their
own identity inference.</t>

<t>An inference drawn solely from active-class signal MAY compute
server-side and MAY write to the server-held identity vector
(Section 7.1).</t>

</section>
<section anchor="passive-aggregate-observation"><name>Passive Aggregate Observation</name>

<t>An input signal is of the passive aggregate provenance class when it
was observed without a principal-initiated act, and when the inference
drawn from it is computed over a cohort of principals no smaller than
the cohort floor (Section 5) and yields only a population-level
observation.  A passive aggregate inference produces a statement about
the cohort (a distribution, a rate, a population parameter) and does
not produce a statement attributable to any individual within the
cohort.</t>

<t>An inference of the passive aggregate class MAY compute server-side
(Section 7.2).  Its output is a population-level observation; it MUST
NOT write an individual-attributable statement to the server-held
identity vector.</t>

</section>
<section anchor="passive-individual-observation"><name>Passive Individual Observation</name>

<t>An input signal is of the passive individual provenance class when it
was observed without a principal-initiated act and the inference drawn
from it would yield a statement attributable to a single principal.</t>

<t>An inference of the passive individual class is local-only.  It MUST
be computed on the device-local daemon (Section 4) running on the
device that observed the input signal, and the resulting derived
statement MUST be retained on that device.  An individual-attributable
statement of the passive individual provenance class MUST NOT be
transmitted to a server, and MUST NOT, by any derivation path, reach
the server-held identity vector.</t>

<t>The passive individual class is the load-bearing constraint of this
memo.  The other two classes describe what server-side inference MAY
do; this class describes what server-side inference MUST NOT do.  A
system that routes passive individual observation to server-side
compute has not implemented the compute-location gate, irrespective of
any access control it applies to the resulting datum afterward.</t>

</section>
</section>
<section anchor="the-device-local-daemon"><name>The Device-Local Daemon</name>

<t>Inference of the passive individual provenance class is computed on a
device-local daemon.  The device-local daemon is a process under the
principal's control, executing on the device that observed the input
signal.</t>

<t>The device-local daemon:</t>

<t><list style="numbers" type="1">
  <t>Receives passive individual signal observed on its host device.</t>
  <t>Computes the identity inference locally.  No input signal of the
passive individual class, and no statement derived from it, leaves
the device for the purpose of the inference.</t>
  <t>Retains the derived statement in device-local storage under the
principal's control.</t>
  <t>Exposes the derived statement to the principal, and only to the
principal, through a device-local interface.  The principal MAY,
by a subsequent active-class act, elect to contribute a derived
statement to a server-held inference; such an act re-enters the
pipeline as active-class signal (Section 3.1) and is gated afresh.</t>
</list></t>

<t>The device-local daemon MUST NOT expose an interface by which a
server, or any party other than the principal operating the device,
can read an individual-attributable statement of the passive
individual class.  The transition of a passive-individual-derived
statement to server-side visibility occurs only through a fresh
active-class act by the principal, never through a daemon-exposed
read surface.</t>

<t>The device-local daemon participates in the substrate-observation
posture of <xref target="SUBSTRATE"></xref> for the purpose of cross-session coordination
of the principal's surfaces; that participation is orthogonal to the
present memo and introduces no path by which passive individual
derived statements reach a server.</t>

</section>
<section anchor="the-cohort-floor"><name>The Cohort Floor</name>

<t>A passive aggregate inference (Section 3.2) MUST NOT be computed
unless the cohort over which it is computed is no smaller than the
cohort floor.  The cohort floor is a positive integer declared by the
inference service and exposed at the negotiation surface (Section 6)
so that a client can determine, before requesting an inference,
whether a passive aggregate request is admissible.</t>

<t>The cohort floor exists to ensure that a passive aggregate inference
yields a population-level observation and not an individual-attributable
one.  An inference computed over a cohort smaller than the floor risks
re-identification: with a sufficiently small cohort, a population
parameter is a near-individual statement.  The floor is the structural
boundary between the passive aggregate class, which MAY compute
server-side, and the passive individual class, which MUST NOT.</t>

<t>The cohort floor is a parameter of this mechanism, not a fixed
constant of this memo.  An inference service SHALL declare its cohort
floor and SHALL NOT compute a passive aggregate inference over a
cohort below it.  A service whose declared cohort floor is so low that
a population parameter computed at that size is individually
identifying has not satisfied the intent of this section; the floor is
a number, but a number chosen so that the resulting observation is
genuinely population-level.  The reference deployment described in
Section 12 declares a cohort floor of 1000.</t>

<t>The cohort floor governs the <em>aggregate</em> boundary only.  It is not a
privacy budget, it is not a noise-calibration parameter, and it does
not compose additively across queries.  The relationship of the
cohort floor to the statistical-disclosure-control literature is
discussed in Section 10.</t>

</section>
<section anchor="wire-layer-negotiation"><name>Wire-Layer Negotiation</name>

<t>Before an identity inference is performed, the client and the
inference service negotiate the provenance class of the input signal
and, by the routing function of Section 7, the compute location.  The
negotiation is a request-response exchange carried over the client's
existing transport to the inference service; this memo introduces no
new transport.  Where the inference service is reached as a Model
Context Protocol <xref target="MCP"></xref> surface, the negotiation is a tool invocation
and its response; where it is reached over another transport, the
negotiation is the corresponding request-response pair.</t>

<section anchor="the-inference-request"><name>The Inference Request</name>

<t>A client requesting an identity inference SHALL include, in the
request, an inference-negotiation object carrying at minimum the
following fields.</t>

<dl>
  <dt><spanx style="verb">provenance_class</spanx> (enum, REQUIRED)</dt>
  <dd>
    <t>One of <spanx style="verb">active</spanx>, <spanx style="verb">passive-aggregate</spanx>, <spanx style="verb">passive-individual</spanx>.  The
provenance class the client asserts for the input signal of the
prospective inference.</t>
  </dd>
  <dt><spanx style="verb">signal_stream</spanx> (string, REQUIRED)</dt>
  <dd>
    <t>A stable identifier for the stream from which the input signal is
drawn.  Consent classes (Section 6.2) are keyed to the pair
(<spanx style="verb">provenance_class</spanx>, <spanx style="verb">signal_stream</spanx>); the stream identifier is the
second key.</t>
  </dd>
  <dt><spanx style="verb">requested_output</spanx> (string, REQUIRED)</dt>
  <dd>
    <t>An identifier for the category of derived statement the inference
is to produce.  The requested output does not select the compute
location (the provenance class does), but it is carried so that
the consent match (Section 6) and the audit record (Section 9) can
record what was requested.</t>
  </dd>
  <dt><spanx style="verb">cohort_size</spanx> (integer, OPTIONAL)</dt>
  <dd>
    <t>Present only when <spanx style="verb">provenance_class</spanx> is <spanx style="verb">passive-aggregate</spanx>.  The
size of the cohort over which the aggregate inference is to be
computed.  The service SHALL reject the request if <spanx style="verb">cohort_size</spanx> is
below the declared cohort floor (Section 5).</t>
  </dd>
  <dt><spanx style="verb">principal</spanx> (string, OPTIONAL)</dt>
  <dd>
    <t>The <spanx style="verb">~handle</spanx> of the inferred-about principal, present when the
inference is attributable to a named principal.  Absent for a
passive aggregate inference, which is by construction not
attributable to an individual.</t>
  </dd>
</dl>

</section>
<section anchor="the-negotiation-response"><name>The Negotiation Response</name>

<t>The inference service SHALL respond to an inference-negotiation
request with one of three typed responses.</t>

<dl>
  <dt><spanx style="verb">accepted</spanx></dt>
  <dd>
    <t>The asserted provenance class is consented (Section 6), the routing
function (Section 7) has selected a compute location, and the
inference will proceed at that location.  The response carries the
selected <spanx style="verb">compute_location</spanx> (<spanx style="verb">server-side</spanx> or <spanx style="verb">device-local</spanx>), so
that the client and any audit observer record where the inference
computed.</t>
  </dd>
  <dt><spanx style="verb">refused</spanx></dt>
  <dd>
    <t>The asserted provenance class is not covered by a consent class.
No inference is performed at any compute location.  The structure
of the refusal is specified in Section 6.3.</t>
  </dd>
  <dt><spanx style="verb">redirected</spanx></dt>
  <dd>
    <t>The asserted provenance class is consented, but the routing
function has selected a compute location other than the one the
client is positioned to satisfy.  The most common case is a client
requesting a server-side inference on signal the service classifies
as <spanx style="verb">passive-individual</spanx>: the service does not perform the inference
server-side, and the response directs the client to perform the
inference on the device-local daemon (Section 4).  A <spanx style="verb">redirected</spanx>
A <spanx style="verb">redirected</spanx> response is not a refusal; the inference is admissible.
It is not a server-side acceptance either.</t>
  </dd>
</dl>

<t>The negotiation response, in every case, is returned <em>before</em> any
inference is performed.  An inference service MUST NOT compute an
identity inference and then decide, from the result, whether to
return it; the compute-location gate is evaluated on the negotiation
object alone, ahead of the inference.</t>

</section>
</section>
<section anchor="consent-class-matching"><name>Consent-Class Matching</name>

<t>The compute-location gate is enforced by consent-class matching.  The
asserted provenance class of an inference request is matched against
the consent classes the principal has granted; an inference proceeds
only when a matching consent class is found.</t>

<section anchor="provenance-class-is-distinct-from-trait-category"><name>Provenance Class Is Distinct from Trait Category</name>

<t>A consent class is keyed to a provenance class and a signal stream,
not to the category of the derived output.  A principal who has
consented to active-class inference of a disposition has not thereby
consented to passive-individual-class inference of the same
disposition.  Consent granted for one provenance class does not
generalise to another.  This is the defining property of provenance-
class consent: the <em>how it was observed</em> is consented separately from
the <em>what is derived</em>.</t>

<t>It follows that an inference service MUST carry the provenance class
on every signal record and on every derived statement throughout its
internal architecture, so that the consent match can be evaluated and
so that the audit record (Section 9) can record the provenance class
that was matched.  A derived statement that has lost its provenance
class is not consent-checkable and MUST NOT be served.</t>

</section>
<section anchor="the-consent-class"><name>The Consent Class</name>

<t>A consent class is a grant, authored by the principal, carrying at
minimum:</t>

<t><list style="symbols">
  <t>The <spanx style="verb">provenance_class</spanx> the grant covers.</t>
  <t>The <spanx style="verb">signal_stream</spanx> the grant covers.</t>
  <t>The set of <spanx style="verb">requested_output</spanx> categories the grant admits, or an
explicit marker that the grant admits all output categories for the
covered (provenance class, signal stream) pair.</t>
  <t>A revocation marker; consent classes are revocable, and a revoked
consent class MUST NOT satisfy a subsequent match.</t>
</list></t>

<t>A consent class for the <spanx style="verb">passive-individual</spanx> provenance class
authorises device-local inference (Section 4) only.  No consent class,
of any provenance class, authorises the transmission of an
individual-attributable passive-individual derived statement to a
server; that transmission is precluded by Section 3.3 and is not a
grantable scope.</t>

<t>Consent for inference from a third-party signal stream is a separate
consent class from any authorisation the principal may have granted
the third-party platform itself.  A principal's authorisation of a
platform's data-access grant is not a consent class for ALTER-side or
any inference-service-side inference from that platform's stream; the
inference service SHALL require a distinct, separately revocable
consent class, keyed to the (<spanx style="verb">provenance_class</spanx>, <spanx style="verb">signal_stream</spanx>)
pair, before inferring from a third-party stream.</t>

</section>
<section anchor="the-wire-layer-refusal"><name>The Wire-Layer Refusal</name>

<t>When the asserted provenance class of an inference request is not
covered by a consent class, the inference service SHALL return a
<spanx style="verb">refused</spanx> negotiation response.  The refusal carries at minimum:</t>

<dl>
  <dt><spanx style="verb">reason</spanx> (enum, REQUIRED)</dt>
  <dd>
    <t>One of <spanx style="verb">no-consent-class</spanx> (no consent class covers the asserted
provenance class and signal stream), <spanx style="verb">consent-revoked</spanx> (a consent
class existed but has been revoked), <spanx style="verb">cohort-floor</spanx> (a
<spanx style="verb">passive-aggregate</spanx> request carried a <spanx style="verb">cohort_size</spanx> below the
declared floor), or <spanx style="verb">provenance-not-routable</spanx> (the asserted
provenance class is not one the service admits for the requested
output).</t>
  </dd>
  <dt><spanx style="verb">provenance_class</spanx> (enum, REQUIRED)</dt>
  <dd>
    <t>The provenance class that was asserted and refused, echoed so that
the client and audit observer record what was requested.</t>
  </dd>
  <dt><spanx style="verb">explanation</spanx> (string, REQUIRED)</dt>
  <dd>
    <t>A human-readable explanation, sufficient for the client's reasoning
surface to present to the principal without a further round-trip.</t>
  </dd>
</dl>

<t>A <spanx style="verb">refused</spanx> response is terminal for the inference request.  The
inference service MUST NOT, having returned a refusal, perform the
refused inference at any compute location, and MUST NOT perform a
substitute inference of a different provenance class without a fresh
negotiation.  The refusal is a wire-layer event: it is observable to
the client, it is recorded in the audit log (Section 9), and it
occurs before any inference computation.</t>

<t>The refusal model of this memo is consent-class matching plus
wire-layer rejection.  It is not, and does not rely on, any
cryptographic attestation that a refused signal was absent from a
computation.  The refusal asserts that the inference was not
performed; it does not produce a proof, verifiable without access to
the underlying data, that a particular data category did not
contribute to some other computation.  The boundary between the
mechanism this memo specifies and the cryptographic-attestation
question it does not address is stated in Section 11.</t>

</section>
</section>
<section anchor="routing-and-compute-location-selection"><name>Routing and Compute-Location Selection</name>

<t>The routing function maps a consented provenance class to a compute
location.  The function is total over the three provenance classes
and is deterministic: the same provenance class always selects the
same compute location.</t>

<section anchor="active-class-to-server-side"><name>Active Class to Server-Side</name>

<t>A consented inference of the <spanx style="verb">active</spanx> provenance class is routed to
server-side compute.  Its output MAY be written to the server-held
identity vector and MAY be served, subject to the inference service's
ordinary read-path consent, through the service's consented query
surface.  The principal initiated the act that produced the signal;
server-side derivation and persistence is the routing outcome.</t>

</section>
<section anchor="passive-aggregate-class-to-server-side-population-level-output"><name>Passive Aggregate Class to Server-Side, Population-Level Output</name>

<t>A consented inference of the <spanx style="verb">passive-aggregate</spanx> provenance class,
whose <spanx style="verb">cohort_size</spanx> is no smaller than the declared cohort floor, is
routed to server-side compute.  Its output is a population-level
observation.  The output MUST NOT be written to the server-held
identity vector as an individual-attributable statement; the
server-held identity vector is, by Section 3, the destination of
active-class inference alone.  A passive aggregate output is a
statement about the cohort, retained as such.</t>

</section>
<section anchor="passive-individual-class-to-device-local"><name>Passive Individual Class to Device-Local</name>

<t>A consented inference of the <spanx style="verb">passive-individual</spanx> provenance class is
routed to device-local compute on the device-local daemon (Section 4).
The inference service does not perform the inference.  Where a client
requests a server-side inference on signal the service classifies as
<spanx style="verb">passive-individual</spanx>, the service returns a <spanx style="verb">redirected</spanx> negotiation
response (Section 6) directing the client to the device-local daemon.</t>

<t>The routing function has no branch by which a <spanx style="verb">passive-individual</spanx>
inference computes server-side.  A server-side compute location is not
a selectable outcome for the <spanx style="verb">passive-individual</spanx> provenance class
under any consent configuration.  This is the structural property
that distinguishes the compute-location gate from an access-control
mechanism: access control could, in principle, be configured to admit
a reader of a server-side passive-individual trait; the routing
function of this section has no such configuration, because the trait
is never computed server-side to be read.</t>

</section>
</section>
<section anchor="audit-and-build-time-verification"><name>Audit and Build-Time Verification</name>

<t>The compute-location gate is verifiable in two complementary ways: by
a per-event audit record written at negotiation time, and by a
build-time check on the inference pipeline's data-flow.</t>

<section anchor="per-event-audit-record"><name>Per-Event Audit Record</name>

<t>Every negotiation, whether it resolves to <spanx style="verb">accepted</spanx>, <spanx style="verb">refused</spanx>, or
<spanx style="verb">redirected</spanx>, SHALL produce an append-only audit record carrying at
minimum: the asserted <spanx style="verb">provenance_class</spanx>; the <spanx style="verb">signal_stream</spanx>; the
<spanx style="verb">requested_output</spanx>; the negotiation outcome; the selected
<spanx style="verb">compute_location</spanx> where the outcome was <spanx style="verb">accepted</spanx>; the <spanx style="verb">reason</spanx>
where the outcome was <spanx style="verb">refused</spanx>; an <xref target="RFC3339"></xref> timestamp; and the
attribution of the requesting party.  The audit record is written to
an append-only log; admitted records are not retractable or amendable.
Where the inference service is operated as, or alongside, an
organisational identity substrate, the audit record SHOULD be emitted
to that substrate's audit-signal ingestion surface as specified by
<xref target="POLICYPROV"></xref>.</t>

<t>The audit record makes the gate's operation observable after the
fact: an auditor can determine, for any inference the service
performed, what provenance class was asserted, what compute location
was selected, and which consent class was matched.</t>

</section>
<section anchor="build-time-data-flow-verification"><name>Build-Time Data-Flow Verification</name>

<t>In addition to the per-event audit record, an inference service
SHOULD verify, at the time its inference pipeline is built, that the
pipeline contains no data-flow path by which a signal of the
<spanx style="verb">passive-individual</spanx> provenance class reaches the server-held
identity vector.</t>

<t>The verification treats the inference pipeline as a directed graph
whose nodes are pipeline stages and whose edges are data-flow
dependencies between stages.  The verification is the property: for
every signal node of the <spanx style="verb">passive-individual</spanx> provenance class, and
for every node representing a write to the server-held identity
vector, there exists no directed path from the former to the latter.
A pipeline that fails this property has a route by which a
device-local-only inference could reach the server, and the build
SHOULD fail.</t>

<t>This build-time verification is a check on the pipeline's structure,
performed before the pipeline runs; it is independent of, and
complementary to, the per-event audit record, which observes the
pipeline's behaviour after each negotiation.  The combination of a
structural check at build time and a behavioural record at run time
is the verification model of the compute-location gate.  Neither
component is a cryptographic proof, and the verification model does
not depend on one; the boundary is stated in Section 11.</t>

</section>
</section>
<section anchor="relation-to-prior-art"><name>Relation to Prior Art</name>

<t>The compute-location gate is structurally distinct from the prior-art
families with which it is most likely to be confused.</t>

<t>Differential privacy <xref target="DWORK"></xref> and the broader statistical-disclosure-
control literature address the population-versus-individual boundary
at the algorithmic layer: a query mechanism adds calibrated noise so
that the presence or absence of any single record is statistically
masked, and a privacy budget composes the guarantee across queries.
The compute-location gate addresses a different boundary at a
different layer.  The cohort floor of Section 5 is not a privacy
budget: it does not compose additively across queries, and it
calibrates no noise.  It is a categorical admissibility threshold:
below the floor, the passive aggregate class is simply not the
applicable provenance class, and the inference is not computed
server-side at all.  Differential privacy makes a server-side
individual-sensitive computation safe to release; the compute-location
gate routes the individual-attributable computation off the server
entirely.  The two are composable: a passive aggregate inference
admitted by the cohort floor MAY additionally apply differential
privacy to its population-level output.  They are not substitutes.</t>

<t>Decentralised personal-data architectures (Solid <xref target="SOLID"></xref> and
comparable personal-data-store designs) move the <em>storage</em> of personal
data to a principal-controlled pod and govern the <em>read path</em> through
access control.  The compute-location gate governs the <em>compute path</em>:
it determines where a derivation is permitted to run, not merely where
its result is stored or who may read it.  A personal-data store can
hold a passive-individual trait that was nonetheless computed
server-side and copied to the pod; the compute-location gate precludes
the server-side computation in the first place.  The two are
complementary (a device-local daemon (Section 4) may use a
personal-data store as its retention surface), but the gate's
contribution is the routing of computation, which a storage-layer
architecture does not address.</t>

<t>Consent-management and access-control frameworks generally govern
which parties may read which data.  The compute-location gate's
consent classes (Section 6) govern, in addition, the provenance class
under which an inference may be <em>brought into existence</em>.  A consent
framework that admits a reader of a derived trait has not, by that
admission, said anything about whether the trait may be derived
server-side from passively observed individual signal; that is the
question the provenance-class consent of this memo answers.</t>

<t>The contribution of this memo is the wire-layer composition of the
compute-path question with provenance-class consent: a negotiation,
ahead of inference, that routes computation by provenance class and
refuses at the wire layer when the provenance class is not consented.</t>

</section>
<section anchor="scope-boundary-what-this-memo-does-not-specify"><name>Scope Boundary: What This Memo Does Not Specify</name>

<t>This memo specifies the compute-location gate: provenance-class
negotiation, the routing function, consent-class matching, and the
wire-layer refusal.  It deliberately does not specify several adjacent
mechanisms, and an implementer SHOULD NOT read the gate as providing
them.</t>

<t>This memo does not specify a cryptographic proof, attestation, or
guarantee that any specified data category, provenance class, or
derivation pathway was excluded from a particular computation.  The
gate's enforcement model is consent-class matching plus wire-layer
rejection (Section 6) and its verification model is per-event audit
plus build-time data-flow checking (Section 8).  A refusal under this
memo asserts that an inference was not performed; it does not produce,
and does not rely on, any object that proves (verifiably without
access to the underlying data) that a data category did not
contribute to some output.  Such a proof is a different mechanism,
addressed by separate work, and is outside the scope of this
specification.  An implementer requiring a cryptographic
exclusion guarantee MUST NOT infer one from the audit record or the
build-time check described here; neither is such a proof, and the
compute-location gate does not become one by composition.</t>

<t>This memo does not specify the internal inference algorithms, the
trait taxonomy, the identity-vector representation, or the
device-local daemon's storage format.  These are implementation
matters of an inference service; the memo specifies only the wire
surface at which compute location is negotiated.</t>

<t>This memo does not specify a discovery mechanism, a transport, or a
handle namespace.  It composes with <xref target="MCPDNS"></xref>, the principal's existing
transport, and <xref target="IDPRONOUNS"></xref> respectively.</t>

</section>
<section anchor="implementation-status"><name>Implementation Status</name>

<t>A reference implementation of the compute-location gate is operated by
the present author against a production identity-inference service
reachable at the <spanx style="verb">~truealter.com</spanx> substrate.  The reference deployment
classifies input signals into the three provenance classes of
Section 3, performs the negotiation of Section 6 ahead of inference,
routes by the function of Section 7, returns the wire-layer refusal of
Section 6.3 on a consent miss, declares a cohort floor of 1000 for
passive aggregate inference, and runs the build-time data-flow
verification of Section 8.2 as a gate on its inference-pipeline build.
The device-local daemon of Section 4 is the reference deployment's
local-execution surface for passive individual inference.</t>

<t>In the spirit of <xref target="RFC7942"></xref>, the present author notes that this section
documents implementation experience and is expected to be removed
before the document advances beyond the Independent Stream.  No claim
of interoperability is made; the reference deployment is a single
service operated by the specification's author.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This memo requests no IANA action.</t>

<t>The negotiation field names and the negotiation-response type names
used in Sections 6 and 7 are illustrative of the reference deployment
described in Section 12.  Conforming inference services MAY name the
corresponding fields and response types by any convention consistent
with their transport's addressing primitive; the load-bearing
contribution of this memo is the three-provenance-class routing
function and the wire-layer refusal, not the field names.  No new DNS
record types, transport identifiers, port numbers, URI schemes, or
media types are introduced.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The compute-location gate concentrates an admissibility decision
(where an identity inference may compute) at a wire-layer negotiation
performed ahead of inference.  The following considerations arise.</t>

<section anchor="provenance-class-misassertion"><name>Provenance-Class Misassertion</name>

<t>A client may assert a provenance class that does not correspond to how
the input signal was actually observed; for example, asserting the
<spanx style="verb">active</spanx> class for a signal that was passively observed, so as to
route an individual-attributable inference to server-side compute.
The asserted provenance class is a claim, and the inference service
MUST NOT treat it as self-certifying.  The service SHALL establish the
provenance class from substrate it observes (the act that produced
the signal, the stream the signal arrived on, the presence or absence
of a principal-initiated trigger) and SHALL refuse a request whose
asserted provenance class is inconsistent with the observed substrate.
A provenance class established from observed substrate, rather than
accepted from a client assertion, is the integrity foundation of the
gate.</t>

</section>
<section anchor="cohort-floor-evasion"><name>Cohort-Floor Evasion</name>

<t>An attacker may attempt to extract an individual-attributable
statement through repeated passive aggregate queries whose cohorts
overlap such that the difference between two near-identical cohorts
isolates an individual.  The cohort floor of Section 5 bounds the size
of any single cohort but does not, alone, bound a differencing attack
across cohorts.  An inference service SHOULD additionally constrain
the <em>composition</em> of passive aggregate queries, for example by
refusing aggregate queries whose cohorts differ by fewer than the
cohort floor, and SHOULD record passive aggregate cohort definitions
in the audit log (Section 9) so that a differencing pattern is
detectable post-hoc.</t>

</section>
<section anchor="redirect-suppression"><name>Redirect Suppression</name>

<t>A <spanx style="verb">redirected</spanx> negotiation response (Section 6) directs a client to
perform a passive-individual inference on the device-local daemon
rather than server-side.  An attacker positioned between the client
and the inference service might suppress or rewrite the <spanx style="verb">redirected</spanx>
response so that the client believes a server-side inference is
unavailable and abandons the inference, or believes a server-side
inference occurred when it did not.  Negotiation responses SHOULD be
carried over a channel authenticated by the cryptographic identity
envelope of <xref target="MCPDNS"></xref>, so that a consuming client can verify the
response bears the inference service's declared signing key, and a
suppressed or rewritten response is detectable.</t>

</section>
<section anchor="device-local-daemon-compromise"><name>Device-Local Daemon Compromise</name>

<t>The device-local daemon (Section 4) holds passive-individual derived
statements that, by Section 3.3, never reach a server.  Compromise of
the device-local daemon exposes those statements.  The gate does not
make the device-local daemon's storage secure (that is the device's
responsibility), but it does ensure that the blast radius of a
device-local compromise is confined to a single device's
passive-individual derivations and does not extend to a server-held
aggregate of many principals' passive-individual traits, because no
such server-held aggregate exists.  The compute-location gate's
routing is itself a blast-radius mitigation.</t>

</section>
<section anchor="audit-log-integrity"><name>Audit-Log Integrity</name>

<t>The per-event audit record (Section 9.1) is the after-the-fact
evidence that the gate operated.  An attacker able to amend or delete
audit records could conceal a server-side passive-individual
inference.  The audit log MUST be append-only; admitted records MUST
NOT be retractable or amendable by the inference service operator.
Where the audit record is emitted to an organisational identity
substrate per <xref target="POLICYPROV"></xref>, the append-only property of that
substrate's ingestion surface carries the integrity requirement.</t>

</section>
</section>
<section anchor="privacy-considerations"><name>Privacy Considerations</name>

<t>The compute-location gate is, in its substance, a privacy mechanism;
its routing function is a privacy decision.  The considerations of
<xref target="RFC6973"></xref> apply, and three are operative here.</t>

<section anchor="provenance-class-as-a-consent-boundary"><name>Provenance Class as a Consent Boundary</name>

<t>The gate's central privacy property is that consent is keyed to
provenance class, not to trait category (Section 6.1).  A principal
controls not merely <em>what</em> is inferred about them but <em>from what
manner of observation</em>.  A principal may consent to active-class
inference of a disposition while withholding consent for
passive-individual inference of the same disposition; the gate honours
that distinction at the wire layer.  An inference service that
collapses the distinction, treating consent for a trait category as
consent for all provenance classes of that category, has not
implemented the privacy property this memo specifies.</t>

</section>
<section anchor="local-only-retention-of-passive-individual-inference"><name>Local-Only Retention of Passive Individual Inference</name>

<t>The passive individual provenance class is routed to device-local
compute and device-local retention (Sections 3.3, 4, 7.3).  The
privacy consequence is that the inference service holds no
server-side, individual-attributable representation derived from
passively observed individual signal.  A principal's passive
individual derivations are, by construction, not present in the
inference service's data holdings, not subject to the service's
breach exposure, and not reachable by a server-side query however
authorised.  The principal's later election to contribute such a
derivation to a server-held inference is an active-class act
(Section 4) and is independently consented.</t>

</section>
<section anchor="third-party-stream-inference"><name>Third-Party Stream Inference</name>

<t>A principal's authorisation of a third-party platform's data-access
grant is not consent for an inference service to infer identity
statements from that platform's stream (Section 6.2).  Inference from
a third-party stream requires a consent class distinct from, and
separately revocable from, the platform authorisation.  This
separation matters because a principal's mental model of a platform
authorisation is "this platform may use my data on this platform",
not "any inference service may derive identity traits from my
behaviour on this platform".  The gate's consent classes make the
second a separate, explicit, revocable grant.  Inference from a
third-party stream conducted without such a separate consent class is
a privacy violation that the gate is specifically structured to
prevent.</t>

</section>
<section anchor="regulatory-context"><name>Regulatory Context</name>

<t>The compute-location gate's routing of passive individual inference
off the server is consistent with data-minimisation expectations under
data-protection regimes generally, and with <xref target="GDPR"></xref> in particular: a
derivation that is never computed server-side produces no server-side
personal datum to minimise, retain, or erase.  Implementers operating
in jurisdictions that categorically prohibit certain inferences in
certain contexts (for instance the prohibition under <xref target="EUAIACT"></xref> of
emotion inference in workplace and education settings) should note
that the compute-location gate is a routing-and-consent mechanism and
does not itself satisfy a categorical prohibition: a categorical
prohibition bites regardless of provenance class or compute location,
and an inference service subject to one MUST refuse the prohibited
inference outright rather than route it.  The gate composes with a
categorical refusal; it does not replace one.</t>

</section>
</section>
<section anchor="relation-to-companion-memos"><name>Relation to Companion Memos</name>

<t>This memo composes with four Morrison-family Internet-Drafts.</t>

<t><xref target="MCPDNS"></xref> supplies the DNS-based discovery surface by which a client
locates an inference service, and the cryptographic identity envelope
referenced in Section 13.3.  This memo introduces no new DNS records
or labels.</t>

<t><xref target="IDPRONOUNS"></xref> supplies the <spanx style="verb">~handle</spanx> namespace by which principals and
substrates are named.  This memo introduces no new handle category.</t>

<t><xref target="SUBSTRATE"></xref> supplies the substrate-observation posture under which the
device-local daemon (Section 4) coordinates with the principal's other
sessions; that coordination introduces no path by which
passive-individual derived statements reach a server.</t>

<t><xref target="POLICYPROV"></xref> supplies the organisational identity substrate to whose
audit-signal ingestion surface the per-event audit record (Section 9.1)
SHOULD be emitted.  An inference service operated alongside an
organisational identity substrate inherits that substrate's append-only
audit posture for the compute-location gate's audit trail.</t>

<t>The compute-location gate is the wire-layer codification of the first
clause of the identity-as-inference principle: no inference without a
compute-location gate.  The companion memos codify adjacent clauses
and surfaces of the same principle; this memo is the clause concerning
where inference is permitted to compute.</t>

</section>
<section anchor="document-history"><name>Document History</name>

<t>draft-morrison-compute-location-gate-00 (May 2026):</t>

<t><list style="symbols">
  <t>Initial submission.</t>
  <t>Defines the three provenance classes (active, passive aggregate,
passive individual) and the immutability of a signal's provenance
class.</t>
  <t>Specifies the device-local daemon as the compute location for
passive individual inference.</t>
  <t>Specifies the cohort floor for passive aggregate inference.</t>
  <t>Specifies the wire-layer negotiation (inference request, negotiation
response) performed ahead of inference.</t>
  <t>Specifies consent-class matching, the distinctness of provenance
class from trait category, and the wire-layer refusal.</t>
  <t>Specifies the routing function from provenance class to compute
location.</t>
  <t>Specifies the per-event audit record and the build-time data-flow
verification.</t>
  <t>States the scope boundary excluding cryptographic exclusion
guarantees from the specification.</t>
</list></t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">

&RFC2119;
&RFC8174;
<reference anchor="MCPDNS" target="https://datatracker.ietf.org/doc/draft-morrison-mcp-dns-discovery/">
  <front>
    <title>Discovery of Model Context Protocol Servers via DNS TXT Records</title>
    <author fullname="Blake Morrison">
      <organization>Alter Meridian Pty Ltd</organization>
    </author>
    <date year="2026"/>
  </front>
</reference>
<reference anchor="IDPRONOUNS" target="https://datatracker.ietf.org/doc/draft-morrison-identity-pronouns/">
  <front>
    <title>Identity Pronouns: A Reference-Axis Extension to ~handle Identity Systems</title>
    <author fullname="Blake Morrison">
      <organization>Alter Meridian Pty Ltd</organization>
    </author>
    <date year="2026"/>
  </front>
</reference>
<reference anchor="SUBSTRATE" target="https://datatracker.ietf.org/doc/draft-morrison-substrate-observation/">
  <front>
    <title>Substrate-Observation as an Alternative to Envelope Coordination for Concurrent Sessions</title>
    <author fullname="Blake Morrison">
      <organization>Alter Meridian Pty Ltd</organization>
    </author>
    <date year="2026"/>
  </front>
</reference>
<reference anchor="POLICYPROV" target="https://datatracker.ietf.org/doc/draft-morrison-org-alter-policy-provision/">
  <front>
    <title>Policy Provision and Governance Inheritance from an Organisational Identity Substrate</title>
    <author fullname="Blake Morrison">
      <organization>Alter Meridian Pty Ltd</organization>
    </author>
    <date year="2026"/>
  </front>
</reference>
<reference anchor="MCP" target="https://modelcontextprotocol.io">
  <front>
    <title>Model Context Protocol Specification</title>
    <author >
      <organization>Agentic AI Foundation</organization>
    </author>
    <date year="2026"/>
  </front>
</reference>


    </references>

    <references title='Informative References' anchor="sec-informative-references">

&RFC3339;
&RFC6973;
&RFC7942;
<reference anchor="GDPR" >
  <front>
    <title>Regulation (EU) 2016/679 (General Data Protection Regulation)</title>
    <author >
      <organization>European Parliament and Council</organization>
    </author>
    <date year="2016"/>
  </front>
</reference>
<reference anchor="EUAIACT" >
  <front>
    <title>Regulation (EU) 2024/1689 Laying Down Harmonised Rules on Artificial Intelligence (Artificial Intelligence Act)</title>
    <author >
      <organization>European Parliament and Council</organization>
    </author>
    <date year="2024"/>
  </front>
</reference>
<reference anchor="DWORK" target="https://www.iacr.org/archive/tcc2006/38760266/38760266.pdf">
  <front>
    <title>Calibrating Noise to Sensitivity in Private Data Analysis</title>
    <author fullname="Cynthia Dwork">
      <organization></organization>
    </author>
    <author fullname="Frank McSherry">
      <organization></organization>
    </author>
    <author fullname="Kobbi Nissim">
      <organization></organization>
    </author>
    <author fullname="Adam Smith">
      <organization></organization>
    </author>
    <date year="2006"/>
  </front>
</reference>
<reference anchor="SOLID" target="https://dig.csail.mit.edu/2016/solid/">
  <front>
    <title>Solid: A Platform for Decentralized Social Applications Based on Linked Data</title>
    <author fullname="Andrei Sambra">
      <organization></organization>
    </author>
    <author fullname="Essam Mansour">
      <organization></organization>
    </author>
    <author fullname="Sandro Hawke">
      <organization></organization>
    </author>
    <author fullname="Maged Zereba">
      <organization></organization>
    </author>
    <author fullname="Sarven Capadisli">
      <organization></organization>
    </author>
    <author fullname="Abdurrahman Ghanem">
      <organization></organization>
    </author>
    <author fullname="Ashraf Aboulnaga">
      <organization></organization>
    </author>
    <author fullname="Tim Berners-Lee">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
</reference>


    </references>

</references>


<?line 979?>

<section numbered="false" anchor="acknowledgements"><name>Acknowledgements</name>

<t>This memo grew out of internal architectural work on the question of
how an identity-inference system should decide not merely who may read
a derived trait, but where the derivation is permitted to compute.
The realisation that the compute-location question is prior to the
access-control question: an access-control refusal arrives after
the server has already computed and persisted the datum it declines to
serve.  That observation is the load-bearing insight behind this specification.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

