Developer Reference Notice

This site reflects an in-progress protocol implementation and is published as a developer reference snapshot.

Verification services are live. On-chain anchoring is currently being finalized as part of an active milestone.

When this notice is removed, all protocol enforcement layers are fully implemented.

Search
Activation before identity

IDDAS is a deterministic protocol for identity-free activation, lineage-based attribution, and verifiable outcomes.

No account required to begin. Identity is optional. Attribution follows lineage. Rule versions and payout proofs are anchored on a public blockchain - no silent changes. A fixed economic rule governs distribution when real revenue occurs.

Action comes first Lineage-based attribution Fixed economics Verifiable outcomes
Lineage-based attribution - what it means

In IDDAS, attribution does not depend on who the user is. It depends on the lineage of actions. Lineage is the verifiable chain of how this happened - which object was activated, which environment it belonged to, and which upstream placements or invitations led to the outcome.

This matters because crowds and public environments cannot rely on accounts. People come and go. Lineage lets value be attributed and shared without forcing identity at the start.

When revenue occurs, payouts follow the published economic rule and the recorded lineage. The verification layer anchors rule versions and payout proofs on-chain so outcomes can be audited independently.

The thesis

Most systems start by asking who you are. Then they ask you to trust the system, create an account, accept permissions, and follow a flow.IDDAS flips that order.

IDDAS starts with action in the real world - a scan, a tap, a placement, a verified event. Identity is optional. The system does not need to know who you are to begin.

Instead of trusting first and proving later, IDDAS proves outcomes through verifiable actions and lineage-based attribution. When real revenue occurs, distribution follows a fixed rule that is published in advance - not negotiated per client and not changed quietly.

This is why IDDAS works in crowds, public spaces, and shared environments where accounts and coordination add friction.

Before Anything Else, Here’s What Makes This Different

Capabilities live in the object, not the user.

Most digital systems work the same way.

You identify yourself. You log in. You are granted access to features tied to you.

IDDAS works differently.

With IDDAS, capabilities are embedded into the object itself. Identity is optional. Sometimes it is not needed at all.

This may feel unfamiliar at first. That’s normal. Because it is not how most digital experiences are designed.

If you only read one section on this site, read this one.

Read how this actually works

What does “capabilities live in the object” mean?

Think of a physical object you already understand.

  • A parking meter does not ask who you are.
  • A ticket does not ask for your identity.
  • A light switch does not require an account.

The object itself determines what can happen.

IDDAS applies this same idea to digital interactions. Instead of asking who you are first, IDDAS asks: What is this object allowed to do, right here, right now?

Those allowed actions are called capabilities.

Why most systems tie everything to identity

  • Identity is the control mechanism.
  • Permissions live on user accounts.
  • Context is inferred indirectly.
  • Every interaction starts with friction.

This works well for personal software. It works poorly for shared spaces, crowds, public environments, and spontaneous moments. It also makes simple interactions feel heavy.

How IDDAS flips this model

  • The object is stable.
  • Capabilities are pre-bound to the object.
  • Context determines which capabilities are active.
  • Identity is optional, not foundational.

The same object can behave differently in different contexts, without explaining anything to the user. They simply interact.

Why IDDAS is a protocol (not just infrastructure)

Infrastructure is software that can change. A protocol defines rules that others can rely on.

IDDAS is a protocol because it fixes the order of operations, the economic split, and the attribution logic in advance. Even the operator cannot silently change outcomes.

IDDAS runs on infrastructure, but it is not merely infrastructure. The protocol defines what must remain true regardless of implementation.

Why this is not a crypto product

IDDAS uses a blockchain as a verification layer - to lock rules and make outcomes auditable. It is not a token system, not a marketplace, and not a wallet-based user experience. Participants can activate and participate without touching crypto.

Why this matters in the real world

  • Shared moments without coordination.
  • Participation without sign-ups.
  • Collective action without instruction.
  • Calm interactions in noisy environments.
  • Trust without data collection.

People do not feel processed. They feel included.

How others build on IDDAS

When builders extend IDDAS, they do not modify the object. They define capability layers that can be enabled, disabled, contextually activated, and shared across environments. The object stays recognizable. The experience adapts.

What this is not

  • A QR code generator.
  • A feature marketplace.
  • A user-tracking system.
  • A dashboard-driven platform.

It is a different way of thinking about interaction.

Why this explanation exists

We explain this openly because IDDAS is counterintuitive. If this model is not made clear early, people misunderstand everything that follows. Familiar assumptions get projected onto it. The simplicity gets mistaken for limitation.

Our goal is not to sound clever. Our goal is to be clear.

Once you understand this model, everything else on this site makes more sense.

What IDDAS is

Plain language, not a pitch

It is a rule, not a product

IDDAS is not a single app or a packaged offering. It is a rule set that governs what happens when a real, measurable outcome occurs - and only then.

If no value is created, no money moves. There is nothing to sell and nothing to persuade. The rule itself is the product - a predictable way to activate value, attribute contribution, and share revenue without negotiation, discretion, or exceptions.

IDDAS defines outcomes, not features. It defines how value moves, not how it is marketed or claimed.

  • Outcome-based distribution - only when value occurs
  • Attribution via lineage, not self-claims or reporting
  • Verification replaces trust and salesmanship
  • Applicable across many industries and use cases

It is a protocol that runs on infrastructure

IDDAS runs on normal infrastructure such as cloud services, databases, and standard software systems. It is not infrastructure itself.

Infrastructure executes the system. The protocol defines the limits of the system.

IDDAS defines the invariants - what must remain true regardless of implementation. These include activation before identity, lineage-based attribution, fixed economics, and verifiable outcomes (anchored on-chain so they can be audited independently).

Implementations can evolve. The rule cannot drift silently. The protocol is implementation-agnostic so others can build on it without changing the underlying economics or attribution logic.

  • Activation before identity - identity optional later
  • Published rules with versioning and no silent changes
  • Lineage-based attribution with verifiable outcomes
  • Independent of any single platform or implementation

What it is not

IDDAS is intentionally narrow in what it defines and deliberately broad in what it enables.

It does not attempt to replace entire industries or operate them directly. It provides a rule layer that those industries can build on.

IDDAS is not:

  • A loyalty program
    Loyalty programs assume accounts, identity, and long-term tracking. IDDAS operates before any of that exists.
  • Affiliate marketing
    There are no claims-based referrals, cookies, or attribution disputes. Lineage replaces assertions.
  • MLM or network marketing
    There are no recruitment incentives, rank systems, or promises of income.
  • A marketplace
    IDDAS does not match buyers and sellers or intermediate transactions.
  • A social network
    There are no profiles, feeds, or attention mechanics.
  • A promise of income
    If no real value is created, no money moves. Participation alone guarantees nothing.

Many multi-billion-dollar industries use these models today and many are constrained by their structure. IDDAS does not compete with those industries. It removes structural friction that prevents them from capturing value that already exists.

Why it matters

As systems scale, attribution becomes opaque and economics drift.

Rules change quietly. Exceptions accumulate. Trust is replaced by negotiation.

IDDAS exists to stop that drift by making the rule explicit, fixed, and verifiable.

When the rule is clear and cannot change silently:

  • Fairness becomes structural, not reputational
  • There is no operator discretion over winners or outcomes
  • Participants can verify results independently

This matters because most real-world activation is currently lost - especially in public spaces, shared environments, collective moments, and situations where identity-first systems create friction instead of value.

IDDAS is designed so others can build systems that capture that missing activation without changing the rule after adoption.

Patent applications are pending. The goal is not ownership of use cases, but durability of the rule.

Note: You may hear IDDAS described as "infrastructure" because it sits underneath many systems. The precise term is protocol - the rule layer that constrains how infrastructure behaves.

The rule is simple. The system does not ask you to trust it - it gives you something you can verify.

Protocol vs Infrastructure

Why this distinction matters.

IDDAS runs on infrastructure.

But IDDAS is not infrastructure.

This distinction is important, because confusing the two leads to incorrect assumptions about flexibility, control, and trust.

Understand the difference

What infrastructure is

Infrastructure is software that executes behavior. It includes:

  • Servers and cloud services
  • Databases and storage
  • APIs and application code
  • Interfaces and user experiences

Infrastructure can be changed. That flexibility is useful, but it also means outcomes depend on who controls the system.

What a protocol is

A protocol defines rules that others can rely on. It specifies:

  • What happens first
  • What cannot be skipped
  • What cannot be changed quietly
  • How outcomes are determined

A protocol constrains infrastructure. It tells builders what must remain true, even as implementations evolve.

Why IDDAS is a protocol

IDDAS fixes several things in advance:

  • Action comes before identity
  • Attribution follows lineage
  • Economic splits are explicit
  • Outcomes are verifiable

These are not implementation choices. They are rules. Even IDDAS, as the operator, cannot silently change them.

What this enables

Because the rules are fixed:

  • Others can build systems on top of IDDAS without fear of drift
  • Adoption does not create dependency on operator discretion
  • Success does not change the economics retroactively

Infrastructure may vary. The rule does not.

Why this is not just “Web3”

IDDAS uses a blockchain only as a verification anchor. It does not require:

  • Tokens
  • Wallets
  • User-facing crypto interactions

The blockchain is used to make rule versions and outcomes auditable. It is an audit layer, not a product feature.

Why this distinction matters long-term

Many systems start as infrastructure and later attempt to behave like protocols. That usually fails. Rules that are not fixed early become negotiable under pressure.

IDDAS is designed the opposite way. The rule comes first. Everything else adapts around it.

Once this distinction is clear, the rest of the system becomes predictable.

Infrastructure Originators (Deployment Roots)

Clarifications and confirmations.

Infrastructure Originators - Clarifications and Confirmations

This section exists to clarify the Infrastructure Originator (IO) role and to preclude common misinterpretations.

It does not introduce new rules.
It restates how the protocol already works.

What an Infrastructure Originator is

An Infrastructure Originator (IO) is a protocol-level lineage root that authorizes and anchors one or more activation surfaces.

These surfaces may later produce verified activations.

IO status is structural.
It is not a title, partnership, designation, or program.

An IO exists only if downstream, protocol-valid activations occur through an originated surface.
If no activations occur, no IO exists.
If no value is created, no IO share exists.

What an Infrastructure Originator is not

An Infrastructure Originator is not:

  • an affiliate
  • a sales agent
  • a reseller
  • a partner program participant
  • a paid introducer
  • a negotiator of terms
  • a recipient of discretionary rewards

Infrastructure Originators are not paid for effort, intent, access, or relationships.
They are paid only when value is structurally created and verified.

No approval, application, or permission

Infrastructure Originator status:

  • is not applied for
  • is not granted
  • is not approved
  • is not negotiated
  • cannot be revoked by discretion

The protocol does not evaluate people.
It evaluates events.

Only verifiable activations determine outcomes.

Authorization without operation

Infrastructure Originators may authorize or enable deployment without physically creating, installing, operating, or managing activation surfaces themselves.

An IO may:

  • authorize a deployment root
  • enable activation surfaces to exist
  • allow others to deploy, distribute, or operate those surfaces

The protocol attributes outcomes to the root, not to operational labor.

Attribution and permanence

IO attribution is recorded at activation creation time.
It is immutable and non-retroactive.

Once an IO attribution exists:

  • it cannot be reassigned
  • it cannot be removed
  • it cannot be bypassed through side agreements
  • it cannot be suppressed by brands or operators

Any use of protocol activations necessarily honors protocol attribution.

Economic certainty

The IO share:

  • is fixed by the protocol
  • is calculated deterministically
  • is allocated automatically
  • exists only when qualifying revenue exists

If usage stops, payment stops.
If value resumes, payment resumes.

There are no guarantees.
There are no promises.
There is only the rule.

Why this exists

This rule exists to reward those who make infrastructure possible,
without turning infrastructure into a sales process,
and without requiring trust, contracts, identity, or enforcement.

Infrastructure Originators do not extract value.
They enable value to exist.

The protocol handles the rest.

The rule

A single rule governs the system.

The immutable economic split

Whenever real revenue is created through the system:

  • The platform retains a fixed share.
  • The remaining distribution is allocated to contributors according to a published lineage rule (see Allocation Math).
  • If one party creates the value, they receive the distribution share.
  • If multiple parties contribute, the share is divided according to the published lineage allocation rule.
  • If no value is created, no money exists.

These percentages are explicit and universal. They are not negotiated per industry, client, or campaign.

Why “fixed” matters

Most systems begin with clear rules and change them later.

As platforms scale:

  • Exceptions accumulate.
  • Incentives drift.
  • Outcomes become negotiable.
  • Trust shifts from rules to operators.

IDDAS fixes the rule so scale cannot distort it.

Because the economic split is explicit, published, and verifiable:

  • Participants know the outcome before they participate, not after.
  • Enforcement is verification-based, not trust-based.
  • The system is auditable by design.

This model challenges a long-standing assumption popularized by large platforms: that discretion, opacity, and post-hoc adjustment are necessary at scale.

IDDAS fixes the rule first so others can build on it without fear that success will change the outcome.

What this enables

  • Clear expectations before participation
  • Auditable enforcement instead of promises
  • Long-term credibility under scale
  • Verification-based outcomes, not operator discretion
  • A rare fixed economic rule layer

Deal Security

How deals are secured without anyone being cut out.

The object

The candle is not symbolic. It is a functional object with embedded rules.

When someone opens or passes a candle, they are not sending a message or starting a conversation. They are creating a verifiable activation that can later be used to form a real agreement. The candle carries the chain.

Step-by-step example

Step 1 - Initial activation

A person lights a candle. This creates the beginning of a chain. No deal exists yet. No money exists yet. But the system now knows where the opportunity started, and that information is held by the candle itself.

Step 2 - Passing the candle forward

That person shares the candle with someone else using a QR code or a link. No permissions are requested. No credit is negotiated. The candle simply moves forward, and the original activation remains recorded.

Step 3 - Continued propagation

The next holder may pass the same candle forward again. Each pass adds a new activation to the chain. No one can remove or overwrite earlier activations. The chain only grows.

Step 4 - The potential buyer receives the candle

Eventually, the candle reaches someone who can turn the opportunity into a real deal - a venue, promoter, organization, or buyer. If they want to turn the opportunity into a formal agreement, there is a specific action they must take inside the candle.

The securing action

Securing happens only after the ritual moment ends. It is intentional and cannot occur while the flame is lit.

  • State 1 - Flame lit: tap the flame to extinguish it. Taps elsewhere do nothing.
  • State 2 - After-state: with the flame off, a single tap anywhere opens the save and share flow. No visible UI. No prompts.
  • Enterprise access: with the flame off, six rapid taps anywhere open enterprise access for sealing and admin actions.

What happens when the action is taken

When the securing action is performed, the candle changes state and new options appear that were not visible before (for example, creating a formal anchored deal or confirming the candle is being used for a real agreement).

At that moment:

  • The deal becomes bound to this specific candle
  • The full activation chain is locked
  • No upstream participant can be removed
  • No new chain can replace it

Why no one can be cut out

A deal created through IDDAS can only exist through the candle that formed it. Because the candle already contains the complete chain, the buyer cannot bypass earlier contributors or selectively exclude participants.

If someone attempts to complete the deal elsewhere, the IDDAS protections do not apply, automated payouts do not occur, and verification is lost. The candle is the gate.

What this enables

  • People can safely introduce opportunities without negotiating credit in advance
  • Organizations can accept deals without managing attribution manually
  • Agreements form faster, with less friction, and with greater trust

Allocation Plain English

How allocation works before you see formulas.

IDDAS uses a fixed rule to allocate value only after a real transaction occurs.

There is no negotiation after the fact. There is no discretion. There is no “we’ll figure it out later.”

Everything that can be allocated is declared in advance.

Step 1 - The platform share (immutable)

When revenue exists, a fixed share goes to the platform.

  • 30% of the total transaction goes to the platform
  • This number is constant
  • It does not change by industry, deal size, brand, or relationship

This share pays for infrastructure, verification, enforcement, and long-term system stability. This step always happens first.

Step 2 - The brand-declared commission (defined at the front end)

Before any action occurs, the brand defines what portion of the transaction is available as commission. This declaration is made up front, before the candle is activated and before anyone participates.

Example

  • Total transaction: 100%
  • Platform share: 30%
  • Brand declares a commission: 20%
  • Remaining stays with the brand: 50%

Clarifications

  • The platform does not decide commission size
  • IDDAS does not redistribute the brand’s retained revenue
  • Intermediaries do not receive the remaining balance by default

Everything not explicitly declared as commission remains with the brand. Once declared, the commission amount is fixed and cannot be changed later.

Step 3 - The commission pool (what IDDAS actually allocates)

Only the brand-declared commission becomes the allocation pool. In the example above, IDDAS allocates the 20% commission, not the full 70% remaining after the platform share.

If no transaction occurs, no money exists - and nothing is allocated.

IDDAS only allocates what the brand has declared allocatable.

Step 4 - Lineage distribution model (commission pool only)

From the brand-declared commission pool (example: the 20% commission), distribution is deterministic and follows lineage - the ordered chain of real actions that led to the outcome.

All percentages below are percentages of the commission pool, not of total revenue.

Standard split (all roles exist)

When there is an originator, intermediaries, and a final converter, the commission pool is split as:

  • Originator - 15% of the commission pool
  • Intermediaries (shared) - 15% of the commission pool - split equally across intermediaries between originator and final converter (unless the published lineage rule specifies otherwise)
  • Final converter - 70% of the commission pool

Fallback rule - no intermediaries

From the same commission pool, if there are no intermediaries between the originator and final converter:

  • The intermediary 15% of the commission pool is not lost
  • That 15% is split evenly between the originator and final converter

Resulting split (of the commission pool)

  • Originator - 22.5%
  • Final converter - 77.5%

Special case - originator is final converter

From the commission pool, if the originator and final converter are the same participant:

  • That participant receives 100% of the commission pool (originator 15% + final converter 70% + intermediary 15%)

Core rules (locked)

  • All percentages apply only to the brand-declared commission pool
  • No participant is guaranteed a payout
  • If a role does not exist, its share is reassigned to existing roles
  • Distribution follows lineage, not identity or timing

One important clarification

Adding more people to a lineage does not automatically increase the value of a deal. What it increases is reach and likelihood. More help means more chances for the outcome to occur.

If the outcome occurs, value is allocated. If it does not, nothing is owed. IDDAS allocates value only after it exists.

In short

The platform rule is fixed. The brand defines the commission in advance. IDDAS allocates only that commission. Allocation is deterministic and auditable. The rule is known before participation.

The rule is the trust.

Allocation Math

Deterministic. Published. Verifiable.

When value is created through IDDAS, distribution is not negotiated. It is calculated.

This section exists to make that explicit. There is no interpretation layer, no discretion, and no post-hoc adjustment. The same inputs always produce the same outputs.

View the allocation model

Definition

Let R be real revenue created through the system.

If R = 0, no allocation occurs. IDDAS does not create speculative value. It only allocates value after a measurable outcome.

Fixed platform share

The platform share is fixed.

Let α = 0.30. Then:

Platform allocation = α · R

This value is invariant across industries, partners, deployments, and time. There are no per-client economics.

Brand-declared commission pool

Before any action occurs, the brand declares a commission rate.

Let γ be the commission rate (example: 0.20). Then:

C = γ · R

IDDAS allocates only C. The platform share and the brand’s retained revenue are not part of this pool.

Lineage set

Let L be the ordered lineage that led to the outcome:

L = {a1, a2, …, an}

  • each ai represents a concrete activation event
  • order reflects propagation, not time of claim
  • n is the total number of contributing activations

Lineage is append-only. Entries cannot be removed or overwritten.

Allocation function

Distribution is calculated by a published allocation function f.

For each lineage position i:

βi = f(i, n, θ)

  • βi is the fraction of C allocated to position i
  • θ represents fixed, published parameters
  • ∑ βi = 1 over all i ∈ [1, n]

No hidden parameters are permitted.

Payout

Each contributor receives:

Pi = βi · C

If n = 1, then P1 = C. If n > 1, distribution follows the lineage function exactly. There is no "last touch" privilege. There is no discretionary override.

Constraints

  • α is fixed
  • γ is declared in advance
  • f is published and versioned
  • L is append-only
  • βi values are derived, not chosen
  • allocation cannot change retroactively

If the rule changes, a new version must be published. Old outcomes remain verifiable against the rule in effect at the time.

Verification

Allocation batches are committed via cryptographic hashes. Verification confirms the rule version used, the lineage set L, the computed βi values, and the resulting payouts. Trust in the operator is not required.

Summary: IDDAS replaces negotiated attribution with deterministic allocation.

If the math feels simple, that is intentional. Complexity is usually where discretion hides.

Pricing and Activation Definition

What is charged, and when.

What an activation is

An activation is a verified, intentional entry into the system initiated by a person.

An activation occurs when someone deliberately scans a code, opens an activation link, or otherwise enters an activation flow in a way that creates a recorded lineage event.

An activation is not passive exposure.
It is not an impression.
It is not background traffic.

An activation requires intentional human action and the creation of persistent system state. Each activation is recorded at the moment it occurs and becomes part of an append-only lineage that cannot be retroactively altered.

If no intentional entry occurs, no activation exists.
If no activation exists, no charge occurs.

Structural integrity of activations

The system does not rely on post-hoc filtering or subjective moderation to determine valid activations.

Validity is structural.

An activation must:

  • Originate from intentional human entry
  • Establish a real session context
  • Create a unique lineage event
  • Pass idempotent verification checks

Automated traffic may fire requests or load URLs, but it cannot easily:

  • Mimic physical-world scanning at scale
  • Sustain meaningful session state
  • Generate diverse, valid activation contexts
  • Create lineage without detection

Because of this, invalid activity does not qualify as an activation by definition. It is excluded structurally, not filtered later.

Universal activation pricing

The price per activation is fixed and universal.

$1.00 per activation

  • Applies to all activation types
  • Applies to all surfaces and environments
  • Applies regardless of format, location, customer, or use case

Effective floor via efficiency credits

An effective floor of $0.50 exists, but it is not a listed base price.

That floor is reached only through forward-only efficiency credits earned through real usage.

Credits are deterministic, predefined, non-retroactive, and non-negotiated. They are never discretionary.

CandleMe is one example of an activation. Other activations may involve different surfaces, rituals, or interactions, but the pricing rule remains unchanged.

Example - CandleMe economics (clarity)

CandleMe is a consumer interface that runs on the same IDDAS pricing rule. It does not replace IDDAS - it demonstrates it.

If a CandleMe activation is $1.00, then the platform share applies to that activation:

  • Gross activation price: $1.00
  • Platform share (30%): $0.30
  • Up to 70% allocates through lineage when real revenue exists

If efficiency credits later reduce the effective out-of-pocket cost toward $0.50, the economic rule does not change - the platform share still applies to the effective paid amount:

  • Effective paid amount: $0.50 (via forward-only usage credits)
  • Platform share (30%): $0.15
  • The rest remains distributable by the published rule

So CandleMe can be “cheap” for users over time while still generating platform revenue and preserving the same deterministic economic rule.

There are no tiers.
There are no negotiated rates.
There are no discretionary adjustments.

What is charged and what is not

Charges apply only to verified activations that actually occur.

If 100 people attend and 20 intentionally enter, only 20 activations are charged.

If no one enters, no charge occurs.

Charges are not based on impressions, views, or inferred exposure. Charges are based solely on recorded, verifiable activation events.

Subsequent actions such as saving, sharing, claiming, or converting deepen the activation and extend lineage, but they are not required for an activation to be valid.

Event and time boundaries

Activations are counted within defined events or time windows.

Unused capacity does not carry indefinitely. New events or deployments require new activation capacity.

This aligns pricing with real-world moments and prevents ambiguity in accounting, attribution, or reconciliation.

Why this model exists

Physical-world activation only scales when engagement is measured precisely and attribution is certain.

This model replaces statistical estimation with deterministic verification. Participants know the rule before they participate, and outcomes follow the rule exactly.

The result is a system designed for clarity over guesswork, verification over inference, and durability over short-term optimization.

Pricing Philosophy and Fairness

Why the rule is fixed, and what is included.

Pricing philosophy

IDDAS charges for verified activation - and nothing else.

If an activation occurs, it is billed.
If no activation occurs, nothing is charged.

Each activation includes deterministic attribution, verifiable lineage, auditable outcomes, and independent proof of what occurred.

These are not add-ons.
They are not upgrades.
They are not metered separately.

You are paying for real entry. IDDAS provides the full truth of what that entry produced.

Fairness rule - any industry, any size, same rule

The pricing rule is universal. It does not change based on industry, company size, negotiating power, or volume.

There are no custom deals.
There are no special cases.
There are no hidden terms.

Small and large organizations operate under the exact same protocol rule.

No one is penalized for being small.
No one is favored for being large.
The economics remain clean at any scale.

Efficiency credits - forward-only convergence

IDDAS includes a predefined efficiency model that can reduce the effective price toward a $0.50 floor over time.

Efficiency is earned through cumulative, verified activations. Credits apply to future activations only.

There are no retroactive adjustments, negotiated rates, or discretionary overrides.

The floor cannot be exceeded downward.

Activation before identity

How participation starts

Action creates an activation

A meaningful action creates an activation.

This can be a scan, a tap, a link open, or any defined trigger.

An activation is anonymous by default. It does not require an account, identity, or prior relationship.

The activation is the root of continuity. Everything that happens later traces back to this moment.

Identity may be attached later, but identity does not create eligibility. Only the action does.

This design allows participation to begin immediately, without permission, friction, or explanation. It is optimized for moments of mass participation, not gated access.

Participants who care about persistence, control, or long-term involvement can and typically will attach identity later. The system supports that naturally.

  • No login required
  • Identity can attach later
  • Identity never creates eligibility
  • Action is the only prerequisite

Lineage

Activations form lineages. A lineage is the ordered chain of actions that lead to an outcome.

Each activation links to a prior activation, creating a permanent history of contribution based on actual propagation, not claims.

Lineages do not collapse into a single winner. There is no global last person and no overwrite.

Multiple lineages can exist in parallel indefinitely. Each remains independently valid.

Eligibility for downstream value is determined by position within a lineage, not by identity, reputation, or timing tricks.

Eligibility itself does not expire. However, claiming or collecting value may be subject to clearly defined time windows (for example, 12 or 24 months), which are published in advance and apply equally to all participants.

These windows do not alter lineage or reassign value. They define how long a participant has to claim what they are already eligible for.

  • Eligibility for downstream value is permanent within a lineage
  • Claim windows may apply and are explicit
  • No global last person
  • Parallel lineages can exist indefinitely
  • Attribution follows actual propagation

Control and origin

Control comes from possession of the originating activation token, not from identity.

The first activation creates the root. That root cannot be overwritten by later actions or identities.

Identity may later anchor continuity, but it cannot rewrite origin or seize control.

If the originating token is lost, control may be lost. This is intentional. The system favors correctness and continuity over recovery by default.

In practice, participants for whom persistence matters - such as sales agents, operators, or long-term contributors - typically attach identity early. The anonymous-first model exists to remove friction for the many, not to penalize the few.

  • The first activation creates the root
  • Later actions cannot overwrite the root
  • Identity cannot seize origin
  • Loss of token can mean loss of control

Idempotency

Actions must be safe to repeat without changing outcomes.

Reloading a page does not create a new activation. Refreshing does not duplicate events.

The system behaves as if the action happened once, even if it was triggered multiple times accidentally.

This prevents inflation, abuse, and accidental duplication.

All events are append-only. History can grow, but it cannot be rewritten.

  • A scan creates a new activation
  • Refresh does not create another
  • Duplicate triggers do not duplicate outcomes
  • Events are append-only

CandleMe is the public proof

CandleMe is a consumer-facing activation ritual built on IDDAS. It is intentionally calm, minimal, and universal.

CandleMe exists to demonstrate the system without explaining it. People do not need to understand IDDAS in order to use it. They simply act, and the system responds correctly.

CandleMe shows that activation can happen before identity, that value can propagate without coordination, and that meaning can exist without permanence.

It is not a demo and not a simplified version of the protocol. It is a real, functioning implementation that proves the rule holds in live environments with real people.

What CandleMe proves publicly:

  • Activation can occur without login
  • Lineage can form without instruction
  • Outcomes can be shared without ownership
  • Verification can happen without trust

CandleMe is one expression of IDDAS, not the limit of it.

Verification and blockchain

Audit layer, not experience layer
PROOF STATUS UPDATE - VERIFICATION LAYER IS NOW LIVE

As of January 3, 2026, the IDDAS verification service is deployed on Google Cloud Platform and running as a live, testable proof surface.

IDDAS is not UI-first. It is a protocol-level rule system. Proof requires that events can be recorded and verified in a way that is reproducible, auditable, and defensible.

What is now real (current proof surface)

  • The iddas-verification repository is connected to GCP via Cloud Build and Cloud Run
  • Builds are observable through build logs
  • The service is deployed as a running endpoint
  • Failures are inspectable and debuggable through logs and replay testing

What this stage proves

  • The verification layer runs as a real system, not a local prototype
  • Behavior is observable through logs and build traces
  • We can test append-only event recording, rule_version binding, deterministic commit logic, and replayability against a live service

What this stage does not claim

  • Not a public product launch
  • Not a finished API or developer platform
  • Not yet the anchored ledger or full audit interface
  • Not a pricing or monetization claim

Why this matters

A protocol must be provable. A running verification service is the first concrete step that turns the Charter into an executable proof layer.

Off-chain vs on-chain

IDDAS is designed to be efficient, scalable, and usable in real-world environments. For that reason, most activity happens off-chain, while verification anchors live on-chain.

The blockchain is not the experience layer. It is the audit layer.

Off-chain components handle everything that must be fast, flexible, and human-facing. On-chain components handle only what must be immutable and independently verifiable.

How this is split in practice:

On-chain responsibilities:

  • Rule hashes and version identifiers
  • Payout batch commitments
  • Merkle roots that anchor outcome sets
  • Public verification of published results

Off-chain responsibilities:

  • Activations and events
  • Lineage construction
  • Identity attachment when required
  • Payments and settlement
  • User interfaces and experiences

This separation avoids unnecessary cost and complexity while preserving verifiability. Nothing important depends on trusting an operator. Everything important can be checked.

What “immutable” means here

Immutability in IDDAS does not mean that software cannot evolve. It means that economic rules cannot change silently.

Once a rule is published and anchored, all outcomes can be verified against that rule. Any change requires publishing a new version, with a clear boundary between old and new behavior.

Immutability applies to the rule, not to the interface.

What this guarantees:

  • Rule versions are explicit and discoverable
  • Outcomes are tied to the rule in effect at the time
  • No retroactive changes to distribution
  • No hidden adjustments or operator discretion

Verification does not require trusting IDDAS, CandleMe, or any operator. Anyone with access to the published rule and the anchored data can independently confirm that outcomes were calculated correctly.

This is how trust is replaced by verification.

WHAT AN ACTIVATION GIVES YOU

What the unit gives you.

What an activation gives you

An activation is not an impression. It is not a click. It is not a guess. An activation is a verified, intentional human entry into a defined environment. That difference matters.

What you get:

  • Verified presence - a real person intentionally entered a specific surface, location, or context.
  • Guaranteed attribution - activations are structurally linked to where they occurred, how they propagated, and who contributed.
  • Measurable engagement - you pay only for real entry, not passive exposure or ambient attention.
  • Deterministic outcomes - billing is precise, allocation is fair, audits are possible, silent manipulation is detectable.
  • Portability across use cases - the same activation unit works across retail, venues, events, loyalty, campaigns, and physical surfaces.

What you are not paying for:

  • Impressions
  • Reach estimates
  • Optimization experiments
  • Behavioral prediction

If a person does not activate, nothing is charged. That is the rule.

ACTIVATION, PRICING, AND ADOPTION
CREDITS - EXPLAINED

How pricing and credits work.

Activation, Pricing, and Adoption Credits - Explained

Core principles

  • Activation-before-identity is foundational.
  • An activation is a verified, intentional human entry into the system.
  • Passive exposure does not count as activation.
  • Activation is not a conversion.
  • Conversions create revenue.
  • Activations create lineage and eligibility.
  • No speculative value is created.
  • No discretionary overrides exist.
  • Allocation is deterministic and rule-based.
  • Rules are versioned and non-retroactive.
  • Verification replaces trust.

Pricing model

  • The pricing unit is the activation.
  • The price per activation is fixed.
  • Pricing is universal across industries, sizes, and use cases.
  • There are no negotiated rates.
  • There are no tiers.
  • There are no discounts.
  • There is no discretionary pricing.

If no activation occurs, no charge occurs.

Payment model

  • Billing is automatic.
  • Payments are isolated from activation logic.
  • Activation behavior never depends on payment status.
  • Payment is an outcome, not a prerequisite.
  • Event or deployment boundaries define billing windows.
  • All records are auditable and verifiable.

CandleMe role

  • CandleMe is a consumer-facing implementation built on IDDAS.
  • It demonstrates activation-before-identity under real conditions.
  • The candle appears already lit on load.
  • Saving extinguishes the flame.
  • Refreshing is idempotent.
  • Sharing creates a new activation.
  • Loss is acceptable.
  • CandleMe is not the protocol.

Activation credit

To reduce adoption friction while preserving rule integrity, the system provides a one-time activation credit.

This credit exists to allow organizations to observe the system in real conditions without procurement overhead or sales negotiation.

Credit rules

  • Each organization receives a small, fixed number of activation credits.
  • Credits are one-time only.
  • Credits are non-renewable.
  • Credits are non-transferable.
  • Credits are applied automatically.
  • Credits follow the same rules, pricing, attribution, and verification as paid activations.

Credits pre-fund standard activations.

When the credit is exhausted, standard billing begins automatically. Pricing and rules do not change.

What credits do not do

Activation credits do not:

  • Change pricing
  • Change activation behavior
  • Create special cases
  • Introduce negotiation
  • Enable unlimited usage
  • Alter allocation or lineage
  • Modify protocol rules

Credits exist solely to reduce initial adoption friction.

Governance and posture

  • Credits are policy, not promotion.
  • No dollar values are presented.
  • No urgency language is used.
  • Credits are not framed as free offers or trials.
  • The tone is calm, declarative, and rule-based.

Message conveyed:

“The rule is finished. You can see it work.”

Rationale

This structure:

  • Preserves elegance
  • Prevents gaming
  • Eliminates discretion
  • Simplifies adoption
  • Protects the rule at scale
  • Allows small and large deployments to self-select naturally
  • Ensures that payment reflects real engagement only

Status

  • Core rules defined
  • Pricing fixed
  • Activation model validated
  • CandleMe implementation operational
  • Adoption credit defined
  • System ready for automated payment

IDDAS Infrastructure

Activation infrastructure for the physical world

IDDAS is activation infrastructure for the physical world.

It provides identity-free, intentionally activated proof of physical presence, with verifiable records that can be independently audited.

IDDAS does not measure impressions, exposure, or background traffic.
It records only deliberate entry into a system.

If no one enters, nothing is recorded.
If nothing is recorded, nothing is charged.

What the infrastructure does

IDDAS infrastructure enables:

  • Identity-free entry into a system
  • Intentional activation as the atomic unit of participation
  • Structural verification of real, human presence
  • Creation of permanent, append-only activation lineage
  • Deterministic, universal activation pricing
  • Verifiable activation records anchored for audit

The system verifies that someone was present, not who they were.

What the infrastructure refuses

IDDAS explicitly does not:

  • Require login, registration, or identity
  • Collect or store personal data
  • Track individuals across surfaces
  • Rely on moderation or subjective filtering
  • Negotiate pricing or attribution rules
  • Promise outcomes or engagement

Validity is structural, not interpretive.

How it works physically

IDDAS is deployed through physical activation surfaces, most commonly QR-based.

Each surface is:

  • Location-bound or event-bound
  • Time-aware
  • Configured so every intentional scan creates a new activation

When scanned:

  • A new activation is created
  • Structural checks verify plausibility and intent
  • A permanent activation record is written
  • No identity is required

This activation serves as proof of intentional physical presence.

Verification and blockchain anchoring

IDDAS uses blockchain as a verification and audit layer, not an experience layer.

  • All user experience and activation logic occur off-chain
  • Activation records and economic rules are cryptographically anchored
  • Hashes and batch proofs are written on-chain
  • Records can be independently verified without revealing identity

Blockchain is used to make the system tamper-evident, not to introduce friction.

Universal activation pricing

IDDAS uses a fixed, universal pricing rule:

  • $1 per verified activation
  • Charged only when activation occurs
  • No activation means no charge

A portion of value may return as system credits usable for future activations, without altering the pricing rule.

Example applications (not exhaustive)

These are expressions of the same infrastructure, not separate products.

1. CandleMe
A ritual activation where each scan ignites a candle, creating a lineage of presence and participation.

2. Venues and events
Verify real attendance at concerts, conferences, stadiums, or festivals without identity-bound tickets.

3. Casinos and regulated spaces
Record physical presence and participation without storing personal data, while maintaining verifiable records.

4. Out-of-home advertising
Measure intentional engagement with physical media instead of impressions or inferred exposure.

5. Transit and public spaces
Verify usage or entry without surveillance, accounts, or tracking.

6. Retail and physical commerce
Trigger verified in-store activations distinct from online traffic or passive footfall.

A base layer, not a bundle

IDDAS is not optimized for a single industry.
It is a base layer that supports many expressions without changing its core rules.

The infrastructure stays fixed.
The interfaces, rituals, and use cases evolve.

Why infrastructure matters

Physical-world systems fail when they rely on:

  • Trust instead of verification
  • Identity instead of intent
  • Estimates instead of records
  • Persuasion instead of rules

IDDAS replaces these assumptions with a single invariant:

Only intentional participation creates value.

Activation templates

Protocol-native deployment modes.

Same protocol. Same backend. Different surfaces.

IDDAS supports multiple activation templates out of the box. Each template uses the same activation, attribution, and billing layer, but presents analytics and controls appropriate to the deployment context.

  • Private Event / Small Group - Short-lived, intimate deployments such as private gatherings, dinners, or rituals. Designed for simplicity and confirmation rather than optimization.
  • Retail / Commercial - Ongoing commercial environments including retail locations, loyalty programs, and distributed sales. Supports downstream actions and conversion visibility.
  • Stadium / Large Venue - Large-scale public environments such as stadiums, arenas, and concerts. Provides event-bounded activation visibility without identity assumptions.
  • Event / Conference - Multi-day or modular events including conferences, trade shows, and sponsored activations. Supports zone-based and session-based activation reporting.
  • Out-of-Home / Environment - Persistent physical surfaces such as posters, packaging, candles, and displays. Designed for long-term activation visibility and inventory-level performance.
  • Protocol / General - Vertical-agnostic deployment mode representing the raw protocol state. Used when no industry-specific lens is required.

These templates describe supported deployment modes. Interfaces adapt automatically based on context.

Use cases

Where activation and attribution matter

The following examples illustrate environments where participation, communication, and outcomes are constrained by identity-first design, onboarding friction, or opaque attribution. IDDAS does not replace these industries. It introduces a protocol layer that enables systems that were previously impractical or impossible to deploy. Each use case represents the same underlying capability expressed in different environments.

Live events

Stadiums, concerts, festivals, nightclubs, venues.

Live events concentrate attention, emotion, and participation into a narrow time window. Historically, most of that value has been lost because there was no practical way to activate everyone simultaneously without apps, accounts, or advance setup.

IDDAS enables immediate, audience-wide activation. Everyone can receive the same digital object at the same moment, without identity, onboarding, or instruction. Participation becomes collective rather than fragmented, and outcomes can persist beyond the event itself.

Capability kits allow events to attach functionality, access, or meaning to that moment. These capabilities can evolve over time, persist after the event, or remain intentionally ephemeral. They can be changed without reissuing assets or modifying the physical venue.

What becomes possible now
  • Audience-wide activation without onboarding
  • Shared digital moments that persist beyond the event
  • Capabilities that evolve without changing the venue
  • Post-event continuity without building a social network
Out-of-home and public media

Kiosks, transit, retail foot traffic, public surfaces.

Out-of-home media is ubiquitous, but activation is limited to managed screens and fixed campaigns. Most physical surfaces remain passive because activation has required infrastructure, identity, or ongoing operational control.

IDDAS turns physical surfaces into activatable objects. A single marker can carry digital capabilities without screens, power, or accounts. Interaction happens immediately and requires no explanation.

Capability kits allow the behavior of a surface to change over time without changing the surface itself. The same object can serve different purposes across locations, audiences, or moments.

What becomes possible now
  • Activation of previously passive physical spaces
  • Dynamic behavior without changing physical assets
  • Participation without screens or managed infrastructure
  • Expansion of addressable media beyond traditional formats
Affiliate and referral systems

From digital links to real-world activation.

Affiliate and referral systems depend heavily on digital tracking and trust-based claims. They struggle to account for real-world influence, shared experiences, and offline participation.

IDDAS replaces claims with lineage. Contributions are recorded as chains of activation rather than inferred from clicks or last-touch attribution. Distribution follows published rules instead of discretionary adjustments.

Capability kits allow affiliate systems to extend into the physical world for the first time. Real-world interactions can participate in the same attribution structure as digital ones, without identity or fragile tracking.

What becomes possible now
  • Verifiable attribution without black boxes
  • Real-world participation in affiliate systems
  • Fixed rules instead of retroactive adjustments
  • Expansion beyond purely digital touchpoints
Government programs and public initiatives

Benefits, incentives, participation, emergency response.

Public programs often fail at the point of participation. Identity requirements, paperwork, and delays exclude people and slow response, especially in time-sensitive situations.

IDDAS allows participation to begin immediately without identity while preserving auditability and transparency. Identity can be attached later only if required. Outcomes remain verifiable regardless.

This model applies to public benefits, civic initiatives, census participation, and emergency response. In disaster scenarios, information and capabilities can spread hand-to-hand without infrastructure or accounts.

What becomes possible now
  • Immediate participation without identity barriers
  • Faster response in emergencies and disasters
  • Reduced administrative overhead
  • Increased trust through verifiable outcomes
Enterprise, defense, and organizational systems

Onboarding, recruitment, coordination.

Large organizations often require identity before usefulness. This slows onboarding and limits participation, particularly in temporary, distributed, or high-churn environments.

IDDAS allows action to come first. People can participate, contribute, or coordinate before identity is established. Identity can be attached later without invalidating prior actions.

This applies to enterprise onboarding, temporary workforces, defense coordination, recruiting, internal referrals, and large-scale mobilization.

What becomes possible now
  • Faster onboarding without sacrificing control
  • Participation before identity verification
  • Coordination without centralized bottlenecks
  • Reduced friction in high-scale environments
Civic engagement, polling, and elections

Participation without friction.

Civic and political participation often suffers from complexity, mistrust, and early drop-off. Many people disengage before participation even begins.

IDDAS enables immediate participation without identity while preserving verifiable outcomes. Capability kits define what participation means in each context without exposing individuals.

This applies to polling, grassroots mobilization, political rallies, volunteer coordination, and election-adjacent participation where transparency and accessibility are critical.

What becomes possible now
  • Higher participation rates
  • Verifiable outcomes without identity exposure
  • Reduced friction in civic processes
  • Clear rules that do not change midstream
Consumer rituals and shared meaning

Moments, not networks.

Many meaningful moments do not require profiles, feeds, or amplification. They require presence, participation, and continuity.

IDDAS supports rituals such as weddings, graduations, religious gatherings, memorials, celebrations, and personal milestones. These moments can carry digital meaning without becoming social networks.

CandleMe is the first public example of this model. It demonstrates how a single object can carry shared meaning across people and time without identity, messaging, or algorithmic incentives.

What becomes possible now
  • Digital rituals without social pressure
  • Shared meaning without networks or feeds
  • Persistence without identity
  • Calm participation in emotional moments
Research, census, and data collection

Participation without coercion.

Surveys and research initiatives struggle with participation, bias, and trust.

IDDAS allows people to participate without identity while preserving integrity through structure rather than persuasion. This increases response rates, reduces friction, and maintains verifiable results.

What becomes possible now
  • Higher response rates
  • Reduced bias from identity gating
  • Verifiable data without trust assumptions
  • Lower cost and faster execution
Why these are examples, not limits

These use cases are illustrative, not exhaustive. Many industries are constrained by identity-first design, opaque attribution, and discretionary economics.

IDDAS is a patent-pending protocol layer designed to remove those constraints. Others can build on it to unlock participation that is currently missed, delayed, or excluded.

Defensibility

Why copying the surface is not the same

Patent-pending system pattern

A system pattern where activation, attribution, and economics are enforced together - as one architecture.

IDDAS is not a UI, an app, or a collection of features. It is a system pattern defined by the enforced interaction of three elements:

  • Activation before identity
  • Lineage-based attribution
  • Fixed, verifiable economic rules

Individually, these concepts are not novel. Defensibility arises from how they are bound together, enforced, and made non-discretionary as a single architecture.

The IDDAS patent filings are intended to protect this pattern and its implementation cluster, including how activation, attribution, claiming, forfeiture, and verification interact to prevent silent rule changes, discretionary payouts, or post-hoc reinterpretation.

Rules in IDDAS are not guidelines. They are published, versioned, and executed through deterministic system logic. Once active, they operate the same way for all participants and cannot be selectively applied or quietly altered.

The system is intentionally designed so that:

  • Rules are declared before participation begins
  • Execution follows fixed logic rather than operator judgment
  • Outcomes remain verifiable independent of the platform

This is not a feature set that can be partially adopted. The value of IDDAS depends on the integrity of the full pattern.

Trust is the moat

Copycats can copy the surface, but not credibility under scrutiny without making the same structural commitments.

Others can copy a candle, a QR code, or a visual ritual. What they cannot copy is credibility under scrutiny without making the same structural commitments.

To replicate IDDAS in substance, a system would need to:

  • Anchor and publish its rules in advance
  • Allow participants to verify attribution and outcomes independently
  • Accept the loss of discretionary control
  • Operate with full transparency around value flow and rule changes

In practice, this is where most platforms stop. Existing systems are architected around flexibility, opacity, and operator discretion because those traits are economically advantageous. Transparency, fixed rules, and verifiability are treated as risks rather than foundations.

IDDAS reverses that logic. Trust is not asserted, marketed, or requested. It is enforced structurally.

If a rule changes, the change is visible.
If attribution occurs, it is explainable.
If value moves, it is auditable.

This level of transparency is not cosmetic. It is the moat.

Claiming, forfeiture, and non-discretionary economics

Value can accrue before identity, then be claimed later under fixed rules - with forfeiture handled transparently.

In IDDAS, value may accrue to an activation whether or not an identity is immediately attached. This allows participation to begin without friction while preserving future claimability.

Claiming requires anchoring an identity capable of receiving payment. Funds become claimable under a published rule and must be claimed within a defined claim period.

If funds are not claimed within that period, they are forfeited according to a predefined, transparent rule. Forfeiture affects claimability only. Lineage, attribution, and historical records remain intact and verifiable.

Forfeited funds do not revert to discretionary platform revenue. They are redirected according to fixed, auditable rules designed to reinforce the ecosystem, such as funding protocol maintenance or enabling others to build on the platform under the same constraints.

This structure eliminates hidden incentives and ensures:

  • No silent clawbacks
  • No retroactive reassignment of value
  • No benefit to delaying, obscuring, or manipulating claims

Economic behavior is shaped by rules, not discretion.

Why copycats break

Surface imitation fails - because identity-first, discretionary systems drift under real-world conditions.

Systems that attempt to imitate IDDAS at the surface level fail in predictable ways.

Most existing platforms are built upside down. They place identity, discretion, and operator control at the center, then attempt to layer attribution and trust afterward. IDDAS inverts this order by design.

As a result, copycat systems encounter the same structural breakdowns:

  • Rules remain adjustable after launch
  • Attribution becomes opaque under real-world conditions
  • Payout logic requires manual intervention
  • Verification depends on trusting the operator
  • Economic incentives drift over time

These are not implementation mistakes. They are structural consequences of avoiding the constraints that IDDAS accepts deliberately.

The core IDDAS pattern - activation before identity, lineage-based attribution, and fixed, verifiable economics - is also the subject of patent protection. Replicating the system in substance, not just appearance, would require implementing the same protected pattern and layered structure.

That combination makes true replication operationally difficult and, depending on the implementation, may raise IP questions. Surface imitation tends to reproduce the same failure modes. Structural replication requires accepting transparency, fixed rules, and loss of discretionary control - conditions most existing platforms are neither designed nor incentivized to adopt.

IDDAS is built to operate under those constraints from the beginning.

Terminology and Framing

Canonical language for protocol, proof, and product surfaces.

Terminology and Framing Charter

Jan 3, 2026

Terminology and Framing Charter

This page defines the canonical language used across the IDDAS platform. These definitions are not stylistic preferences. They are binding semantic rules that ensure the system remains understandable, auditable, and evolvable over time.

This charter applies to:

  • Code and schemas
  • Documentation and diagrams
  • Dashboards and logs
  • External explanations to partners, auditors, and the public

Ledger vs Verification Layer

These terms must never be used interchangeably.

Ledger

The ledger is the append-only, immutable record store.

Rules:

  • The ledger never mutates records
  • The ledger never interprets meaning
  • The ledger stores raw, canonicalized events
  • Every record is cryptographically linked
  • The ledger records facts. Nothing more.
  • Verification Layer
  • The verification layer is where meaning is derived.

Rules:

  • Reads from the ledger, never writes meaning back
  • Applies explicit rule versions
  • Can be independently replayed by third parties
  • Principle: The ledger is passive and permanent. Verification is active and repeatable.

Event vs Activation

This distinction is enforced across the system.

Event

An event is a raw occurrence captured at a moment in time.

Rules:

  • Events are atomic
  • Events are recorded exactly once
  • Events contain no conclusions
  • Events are hashed into the ledger
  • Events represent what happened.
  • Activation
  • An activation is a contextual interpretation of one or more events.

Rules:

  • Activations are derived, not stored as facts
  • Activations may change as rule versions evolve
  • Activations always reference the source events
  • Principle: Events are facts. Activations are interpretations.

Rule Version vs Protocol Version

This distinction protects system integrity.

Rule Version

Defines how meaning is computed.

Rules:

  • Rule versions are explicitly referenced
  • Rule versions are immutable once published
  • New logic requires a new rule version
  • Protocol Version
  • Defines how the system operates structurally.

Rules:

  • Governs schemas, hashing, and invariants
  • Changes are rare and explicit
  • Does not retroactively affect existing records
  • Principle: Rules interpret data. Protocols define system physics.

Why This Matters

Clear terminology:

Prevents narrative drift

Enables independent audits

Allows evolution without rewriting history

Makes the system explainable to outsiders

Most systems fail due to language ambiguity. This charter prevents that.

This page is authoritative. If any explanation, diagram, or implementation conflicts with this charter, this charter prevails.

Verification Flow: From Event to Proof

This section explains why the system is correct, not just what it does. It provides a single, linear narrative that an external engineer or auditor can follow to independently validate system integrity.

This flow is intentionally simple and deterministic.

1. Event Capture

An event is created when an intentional action occurs on a surface.

Rules:

  • The event is captured at the moment of action
  • No identity is required
  • No interpretation is applied
  • The event is written exactly once

Each event includes:

A unique event identifier

A timestamp (UTC)

A surface identifier

Optional parent references for lineage

At this stage, the system only records that something happened.

2. Canonicalization

Before any hashing or storage, the event payload is canonicalized.

Rules:

  • Fields are ordered deterministically
  • Data types are normalized
  • Optional fields are handled explicitly
  • No environment-specific data is included
  • Canonicalization ensures that the same logical event always produces the same byte representation.
  • This step removes ambiguity.

3. Hashing

The canonicalized event payload is hashed.

Rules:

  • The hash algorithm is fixed by the protocol version
  • The hash includes the rule_version reference
  • Parent hashes are included when lineage exists

The resulting hash uniquely represents:

The event content

The rule logic applied

Its position in the lineage chain

This hash is the cryptographic fingerprint of the event.

4. Append-Only Storage

The hashed event is written to the ledger.

Rules:

  • Inserts only, no updates or deletes
  • Database-level enforcement
  • Records are immutable once written
  • The ledger does not know meaning. It only stores facts and their cryptographic links.

5. Replay

Replay is the act of reprocessing raw ledger events.

Rules:

  • Events are read in deterministic order
  • Canonicalization is re-applied
  • Hashes are recomputed

If the system is correct, replay produces:

Identical hashes

Identical lineage

Identical derived results

Replay proves that outcomes are not dependent on hidden state.

6. Verification

Verification compares replayed results against stored hashes.

Rules:

  • Any mismatch is a failure
  • Verification requires no trust in the original system
  • Third parties can perform verification independently

Verification confirms:

Events were not altered

Rules were not changed retroactively

Lineage is intact

Why This Flow Matters

This pipeline ensures that:

Action precedes identity

Meaning is derived, not asserted

History cannot be rewritten

Proof does not depend on trust

If any step fails, verification fails.

That is intentional.

This verification flow is the foundation of IDDAS. All higher-level constructs rely on it.

Protocol Constitution

Core Rules v1.0 - canonical ruleset.
IDDAS Protocol Constitution
Core Rules v1.0
The protocol is versioned.
Changes, if any, apply prospectively and do not alter past outcomes.
Active protocol versions are publicly identifiable and verifiable.
December 18, 2025 - 4:45 PM
0. Purpose and Scope
0.1 What This Document Is

This document is the normative ruleset for the Instant Distributed Digital Activation System (IDDAS) Protocol - Core Rules.

It defines:

  • What constitutes an activation
  • How lineage is created and preserved
  • When allocation occurs
  • How allocation and payout are computed
  • Which rules are fixed and non-negotiable
  • How verification is performed
  • How changes are versioned without retroactive effect

This document is authoritative. If any derivative explanation, implementation, interface, or summary is ambiguous, incomplete, or inconsistent, the rules in this document control.

Versioning posture

  • The protocol is versioned.
  • Changes, if any, apply prospectively and do not alter past outcomes.
  • Active protocol versions are publicly identifiable and verifiable.
0.2 What This Document Is Not

This document is not:

  • A product or user interface specification
  • An engineering or implementation guide
  • A sales or marketing description
  • A promise or guarantee of revenue, earnings, or outcomes
  • A disclosure of internal thresholds, heuristics, or abuse detection logic
  • A contract or negotiated commercial agreement

Products, interfaces, commercial terms, and implementations may vary, but they may not contradict, override, or weaken the rules defined in this document.

0.3 Who This Protocol Applies To

This protocol applies to any system, deployment, or outcome that claims IDDAS compatibility or references IDDAS-defined concepts, including but not limited to activations, lineage, allocation, settlement, or verification.

Specifically, this protocol applies to:

  • Any system claiming IDDAS compatibility
  • Any deployment using IDDAS-defined activation, lineage, allocation, or settlement rules
  • Any outcome whose verification, attribution, or auditability references this protocol

Use of IDDAS-defined mechanisms, terminology, rules, or verification implies acceptance of the full protocol and its constraints.

Partial, selective, modified, or “inspired-by” adherence does not qualify as IDDAS-compatible. Systems that deviate from protocol-defined rules may not represent themselves as compliant, interoperable, or compatible with IDDAS.

0.4 Authority and Precedence

This document is the highest authority governing IDDAS rule behavior.

Precedence order:

  • IDDAS Protocol - Core Rules (this document)
  • Formal technical specifications derived from this document
  • Public website summaries
  • FAQs and explanatory materials
  • Marketing content, presentations, or verbal explanations

All lower-precedence materials must conform to this document. If any lower-precedence material is ambiguous, incomplete, or conflicts with these rules, this document prevails.

0.5 Determinism and Non-Discretion

All outcomes defined by this protocol are deterministic when derived from published rules applied to a cryptographically committed set of accepted activations.

The Verification Layer independently recomputes eligibility and allocation by applying the published, versioned rules to the committed activation set and the corresponding rule version in effect at the time of activation.

  • No outcome relies on opaque flags, internal status fields, or undisclosed attributes (including but not limited to internal eligibility indicators) as trusted inputs.
  • Determinism applies to outcomes derived from committed inputs and published rules, not to raw traffic, attempted interactions, or events that are not accepted into the committed activation set.

No discretionary overrides are permitted.

No subjective interpretation is applied after revenue exists.

If an outcome cannot be derived from committed inputs and published rules, it does not qualify as a valid protocol outcome.

0.6 Separation of Protocol and Implementation

This protocol defines rules, not software.

  • Multiple implementations may exist, including first-party, third-party, or derivative implementations
  • Implementations may differ in architecture, performance, infrastructure, or user interface
  • Implementations must not alter, reinterpret, or weaken protocol-defined behavior

Protocol correctness, validity, and verification are independent of any specific implementation.

0.7 Versioning and Change Control

All protocol rule changes must be versioned.

Rules:

  • Each version has a unique identifier and effective date
  • Changes apply prospectively unless explicitly stated otherwise
  • Settled outcomes remain verifiable against the protocol version in effect at the time they occurred
  • No change may silently alter allocation, eligibility, verification, or payout behavior
  • New versions may coexist with prior versions for verification and audit purposes

Protocol history is immutable. Past outcomes are never rewritten.

0.8 Immutability of Recorded Events

All protocol-defined events are recorded in an append-only manner.

  • Recorded events cannot be deleted
  • Recorded events cannot be overwritten
  • Corrections or adjustments occur only through the recording of additional events

This immutability ensures that lineage, verification, and outcomes remain auditable and reproducible over time, independent of implementation.

0.9 Relationship to Derivatives

All derivative materials, including but not limited to websites, FAQs, white papers, documentation, and sales materials:

  • Must accurately reflect the current protocol version they reference
  • Must not introduce new rules or requirements
  • Must not reinterpret, weaken, or override fixed protocol behavior

If a derivative document is ambiguous, incomplete, or requires clarification, the protocol must be consulted. Informal explanations or derivative materials do not amend, supplement, or replace this document.

0.10 Scope Boundaries

This protocol intentionally does not define or govern the following:

  • Business strategy or commercial positioning
  • Pricing beyond the fixed activation unit defined by the protocol
  • Commercial minimums, discounts, or negotiated contractual terms
  • Identity systems beyond optional anchoring mechanisms
  • Regulatory compliance requirements specific to any jurisdiction

These concerns are external to protocol correctness and are addressed at the implementation, operational, or commercial layer. Their existence or variation does not affect protocol validity, determinism, or verification.

0.11 Activation Credits and Adoption Mechanics
CORE PRINCIPLES
  • Activation-before-identity is foundational.
  • An activation is a verified, intentional human entry into the system.
  • Passive exposure does not count as activation.
  • Activation is not a conversion.
  • Conversions create revenue.
  • Activations create lineage and eligibility.
  • No speculative value is created.
  • No discretionary overrides exist.
  • Allocation is deterministic and rule-based.
  • Rules are versioned and non-retroactive.
  • Verification replaces trust.
PRICING MODEL
  • The pricing unit is the activation.
  • The price per activation is fixed.
  • Pricing is universal across industries, sizes, and use cases.
  • There are no negotiated rates.
  • There are no tiers.
  • There are no discounts.
  • There is no discretionary pricing.

If no activation occurs, no charge occurs.

PAYMENT MODEL
  • Billing is automatic.
  • Payments are isolated from activation logic.
  • Activation behavior never depends on payment status.
  • Payment is an outcome, not a prerequisite.
  • Event or deployment boundaries define billing windows.
  • All records are auditable and verifiable.
CANDLEME ROLE
  • CandleMe is a consumer-facing implementation built on IDDAS.
  • It demonstrates activation-before-identity under real conditions.
  • The candle appears already lit on load.
  • Saving extinguishes the flame.
  • Refreshing is idempotent.
  • Sharing creates a new activation.
  • Loss is acceptable.
  • CandleMe is not the protocol.
ACTIVATION CREDIT

To reduce adoption friction while preserving rule integrity, the system provides a one-time activation credit.

This credit exists to allow organizations to observe the system in real conditions without procurement overhead or sales negotiation.

CREDIT RULES
  • Each organization receives a one-time activation credit of 100 activations.
  • Credits are one-time only.
  • Credits are non-renewable.
  • Credits are non-transferable.
  • Credits are applied automatically.
  • Credits follow the same rules, pricing, attribution, and verification as paid activations.

Credits pre-fund standard activations.

When the credit is exhausted, standard billing begins automatically. Pricing and rules do not change.

WHAT CREDITS DO NOT DO

Activation credits do not:

  • Change pricing
  • Change activation behavior
  • Create special cases
  • Introduce negotiation
  • Enable unlimited usage
  • Alter allocation or lineage
  • Modify protocol rules

Credits exist solely to reduce initial adoption friction.

GOVERNANCE AND POSTURE
  • Credits are policy, not promotion.
  • No dollar values are presented.
  • No urgency language is used.
  • Credits are not framed as free offers or trials.
  • The tone is calm, declarative, and rule-based.

Message conveyed:

  • "The rule is finished. You can see it work."
RATIONALE

This structure:

  • Preserves elegance
  • Prevents gaming
  • Eliminates discretion
  • Simplifies adoption
  • Protects the rule at scale
  • Allows small and large deployments to self-select naturally
  • Ensures that payment reflects real engagement only
1. Core Principles
1.1 Real Revenue Only

All conversion selections are subject to the protocol’s definition of real, net-settled revenue.

The protocol allocates value only when real revenue is created.

For revenue to qualify as real revenue under this protocol, it must be:

  • Received and net-settled
  • Measurable in objective units (currency or equivalent)
  • Attributable to a completed conversion event
  • Ultimately satisfy net-settlement conditions as defined later in this constitution

Speculative value, intent signals, or uncompleted actions do not qualify.

If no real revenue exists, no allocation occurs.

1.2 No Speculative Value

The protocol does not create, assign, or imply speculative value.

Actions, attention, participation, or effort alone do not generate allocatable value. Value exists only after a measurable conversion outcome occurs.

The protocol does not:

  • Promise future earnings
  • Assign notional credit
  • Create implied entitlement
1.3 Deterministic Allocation

All allocation outcomes are deterministic.

Given:

  • A defined revenue amount
  • A recorded lineage
  • A published allocation rule

The resulting distribution is uniquely determined.

No randomness, negotiation, discretion, or subjective interpretation is permitted in allocation computation.

1.4 No Discretionary Overrides

No participant, operator, administrator, or third party may override protocol-defined outcomes.

Once inputs are recorded:

  • Eligibility cannot be altered
  • Allocation cannot be adjusted
  • Outcomes cannot be rebalanced

Discretion is excluded by design.

1.5 Transparency by Design

Protocol behavior is transparent by construction.

Transparency includes:

  • Published rules
  • Versioned changes
  • Verifiable inputs
  • Auditable outputs
  • Verifiable allocation and settlement outcomes

Participants do not rely on trust in the operator. They rely on the visibility and determinism of the system.

2. Definitions
2.1 Revenue (R)

Revenue (R) is the amount of qualifying economic value generated by a conversion event, as defined by the protocol.

For revenue to qualify as R, it must be:

  • Measurable
  • Attributable to a recorded lineage
  • Non-speculative
  • Settled or irrevocably committed through the defined payment rails

Revenue represents gross economic value created by a conversion. Revenue is not commission and is not allocated directly to participants.

Authorizations, impressions, intent signals, or reversible activity do not qualify as revenue.

If R = 0, no allocation occurs.

2.2 Platform Share (α)

The platform share (α) is the fixed portion of qualifying revenue retained by IDDAS.

α is defined by the protocol and is invariant across deployments, Brands, and time.

2.3 Distribution Pool (D)

The distribution pool (D) is the portion of qualifying revenue made available for participant allocation.

D is computed mechanically as:

  • D = (1 − α) · R

If R does not qualify as revenue under the protocol, D does not exist.

2.4 Commission Pool

A commission pool is a business-defined portion of the distribution pool.

The existence and size of a commission pool are defined by the Brand, subject to protocol constraints.

A commission pool:

  • Is derived from the distribution pool, not directly from revenue
  • Does not alter the definition of revenue
  • Does not alter the protocol-defined platform share
  • Is allocated according to protocol rules if multiple contributors exist

If no commission pool is defined, the distribution pool may be allocated according to Brand business logic, provided protocol constraints on lineage, determinism, and non-discretion are not violated.

2.5 Brand

A Brand is the entity responsible for a deployment within IDDAS.

A Brand may be a company, organization, individual, or other legal or natural person.

The Brand:

  • Defines business intent and selects qualifying conversion events within protocol constraints
  • Provides the bank account where qualifying revenue is received
  • Pays for activations generated through the deployment
  • Defines whether a commission pool exists and its size

A Brand operates within the IDDAS protocol and does not control allocation, lineage, settlement rules, or payment rails.

2.6 Candle

A candle is a specific activation object representing a human-facing ritual of engagement.

  • A candle is an implementation artifact, not a protocol requirement
  • Candle interactions may result in one or more protocol-defined activation events
2.7 Open Candle

An open candle is a candle that is not bound to a persistent deployment or environment.

Open candles are ephemeral by default and may exist without long-term persistence, enterprise configuration, or integration.

Open candles may still generate valid activation events and lineage under the protocol.

2.8 Anchored Candle

An anchored candle is a candle that is bound to a persistent deployment or environment.

Anchored candles are defined at the Brand or deployment level and may support extended behavior such as persistence, enterprise configuration, analytics, or integration.

Anchoring is a protocol state and is independent of individual participant actions.

2.9 Activation Event

An activation event is a verified, intentional entry into the system initiated by a person.

An activation event occurs when a person deliberately:

  • Scans a code
  • Opens an activation link
  • Enters an activation flow

An activation event creates a recorded lineage entry and establishes eligibility for allocation if a qualifying conversion occurs.

Passive exposure does not qualify.

2.10 Lineage

Lineage is the ordered, append-only set of activation events that led to a conversion event.

Lineage:

  • Reflects propagation, not claims or assertions of credit
  • Is formed automatically through recorded activation events
  • Cannot be edited, reordered, or selectively pruned
  • Is permanent once recorded

Lineage determines eligibility for allocation if qualifying revenue is generated. It does not guarantee outcomes, compensation, or value.

Lineage exists independently of identity, accounts, or participant intent, and is enforced deterministically by the protocol.

2.11 Originator

The originator is the first activation event in a lineage.

The originator establishes the initial propagation context and is included in allocation if a qualifying conversion occurs.

2.12 Intermediate

An intermediate is any activation event in a lineage that is neither the originator nor the activation event immediately preceding a conversion event.

Intermediates may contribute to propagation and are eligible for allocation according to the published allocation rule if a qualifying conversion occurs.

2.13 Closer

The closer is the activation event immediately preceding a conversion event.

The closer does not receive preferential treatment unless explicitly defined by the published allocation rule.

2.14 Conversion Event

A conversion event is a completed action that generates real revenue (R).

Examples include:

  • A purchase
  • A paid commitment
  • Any other defined revenue-generating outcome

Conversion events trigger allocation when qualifying revenue exists.

Activation events alone do not.

2.15 Environment

An environment is the physical, digital, or operational context within which activations occur.

An environment may represent:

  • A venue, location, or facility
  • A physical surface or object
  • A digital property or interface
  • A campaign, program, or offering
  • A defined deployment, tenant, or enterprise context

Environments bind activations to a specific deployment and may define configuration, behavior, pricing, persistence, or integration settings applicable to that context.

Environments provide attribution and operational context but do not alter lineage formation, allocation logic, or protocol-defined settlement rules.

3. Candle Model
3.1 What a Candle Represents

A candle is an activation instrument within the IDDAS protocol that represents a bounded context for activation, propagation, and allocation.

A candle is not:

  • a user
  • an account
  • a seat
  • an identity

A candle represents a specific context under which activation events may occur and lineage may form.

That context may include, but is not limited to:

  • representing a person
  • representing a business or brand
  • representing an offer or campaign
  • representing an environment or location

Each candle operates independently and participates in lineage formation and allocation strictly according to the rules of this protocol.

3.2 Candle Abundance and Non-Scarcity

Candles are intentionally non-scarce.

The protocol does not impose a limit on the number of candles that may be created or anchored by any individual or entity.

This design choice is intentional and foundational:

  • outcomes are scarce
  • value is allocated only after verified outcomes
  • candle creation alone does not create eligibility or entitlement to value

Scarcity is enforced at the level of verified activation events and conversion events, not at the level of candle creation or anchoring.

3.3 Multiple Candles per Person or Entity

Any individual or entity may anchor multiple candles simultaneously.

There is no restriction preventing:

  • one person from anchoring many candles
  • one entity from being represented by many candles
  • one representative from carrying candles for multiple entities

This enables real-world representation patterns, including affiliates, agents, promoters, and delegated representatives.

Each candle maintains its own independent lineage and does not share attribution or eligibility with other candles unless explicitly connected through valid activation events.

3.4 Candle Anchoring

Anchoring a candle establishes its origin point for lineage construction.

The anchor:

  • defines the initial position in the lineage
  • does not imply ownership of outcomes
  • does not guarantee allocation

Anchoring a candle does not, by itself, create value, eligibility, or entitlement.

Value allocation occurs only after a qualifying conversion event, as defined elsewhere in this protocol.

3.5 Candle Propagation

Candles may propagate through eligible activation events.

Propagation:

  • appends entries to the candle’s lineage
  • is append-only
  • cannot overwrite or remove prior lineage entries

Propagation order reflects contribution sequence, not time of claim, assertion, or identity.

Only eligible activation events may create lineage entries. Eligibility requirements are enforced deterministically by the system.

3.6 Candle Independence and Isolation

Each candle is independent.

Rules of independence include:

  • lineages do not merge across candles
  • outcomes are computed per candle
  • allocations are computed per conversion event per candle

Actions taken on one candle have no effect on:

  • other candles anchored by the same person
  • other candles within the same environment
  • other candles representing the same entity

This isolation ensures deterministic attribution, prevents cross-contamination of allocation logic, and preserves protocol correctness under scale.

4. Lineage Construction
4.1 Lineage Definition

A lineage is the ordered, append-only sequence of eligible activation events associated with a specific candle.

For a given candle, the lineage is represented as:

L = {a1, a2, …, an}

Where:

  • a1 is the originator activation event (the first eligible activation in the lineage)
  • each ai is a distinct eligible activation event
  • i is the index position of an activation event within the lineage (i ∈ [1, n])
  • n is the total number of lineage entries at the time of conversion

Lineage order reflects propagation sequence, not time of claim, attribution assertion, identity, or payout request.

4.2 Append-Only Property

Lineage is strictly append-only.

Once an entry is added to a lineage:

  • it cannot be removed
  • it cannot be reordered
  • it cannot be overwritten
  • it cannot be reassigned

There are no discretionary overrides, manual edits, or post-hoc adjustments to lineage state.

This property is essential to deterministic allocation, verification, and auditability.

4.3 Eligible Activation Events

Lineage entries are created only by eligible activation events.

An eligible activation event is a system-recognized action that:

  • meets published eligibility criteria
  • is verifiable by the system
  • occurs within the scope of the candle and its environment

Examples of eligible activation events may include, but are not limited to:

  • verified placements
  • verified scans
  • verified introductions
  • verified handoffs

Eligibility criteria and verification methods are enforced deterministically by the system and may evolve through versioned protocol changes.

The protocol does not require public disclosure of implementation details for eligibility enforcement, provided enforcement remains deterministic and non-discretionary.

4.4 Prohibited Lineage Behaviors

The following behaviors are explicitly prohibited and produce no lineage entries:

  • self-appending without a qualifying activation event
  • repeated appending by the same actor without new eligibility
  • artificial looping or circular propagation
  • appending after a conversion event for the purpose of capturing allocation

Any attempted activation that does not meet eligibility criteria is ignored for lineage purposes and has no effect on allocation.

4.5 Lineage Finalization at Conversion

A lineage is evaluated for allocation at the moment a conversion event occurs.

Only lineage entries present at the time of conversion are eligible for allocation from that conversion event.

Entries appended after a conversion event:

  • do not participate in that conversion
  • may participate in future conversion events, if any

Each conversion event is evaluated independently and produces its own allocation outcome.

4.6 Lineage Scope and Environment Boundaries

Lineage is scoped to a single candle and a single environment.

Rules:

  • lineage does not cross candle boundaries
  • lineage does not cross environment boundaries
  • conversion events are evaluated within their originating environment

This ensures isolation, prevents attribution leakage, and maintains deterministic allocation and verification outcomes.

4.7 Lineage Visibility and Position Awareness

The system may expose lineage position to participants.

Participants may be able to see:

  • whether they are in a lineage
  • their relative position at a given time

However:

  • lineage position does not guarantee allocation
  • allocation is determined only at conversion
  • no participant can reserve, lock, or claim a future position

Visibility does not confer rights, priority, or entitlement.

5. Allocation Model
5.1 Revenue Eligibility

Allocation occurs only after a verified conversion event produces real, net-settled revenue.

Let:

  • R = net-settled revenue generated by a single conversion event

If R = 0, no allocation occurs.

The protocol does not create speculative value. Allocation is strictly downstream of measurable outcomes.

5.2 Platform Allocation

The platform fee is fixed.

Let:

  • R = real revenue generated through the system
  • α = 0.30

Platform allocation:

Platform fee = α · R

This percentage is invariant across:

  • industries
  • environments
  • partners
  • time

There are no negotiated or per-client platform economics.

5.3 Post-Platform Revenue Remainder

After the platform fee is applied, the remaining revenue is:

N = (1 − α) · R

Therefore:

N = 0.70 · R

This remainder represents revenue retained by the brand after the platform fee. It is not automatically distributed and is not acted upon by the protocol unless the brand explicitly defines a commission pool.

5.4 Brand-Defined Commission Pool

The brand may define a commission pool as a percentage of the post-platform remainder.

Let:

  • c = brand-defined commission rate, where 0 ≤ c ≤ 1

The commission pool is:

C = c · N

Important clarifications:

  • The commission rate c is set solely by the brand.
  • The platform does not set, negotiate, or promise c.
  • C may be zero.
  • Only C is subject to lineage-based allocation under this protocol.
  • If C = 0, no commission allocation occurs, regardless of lineage.
  • Any portion of the post-platform remainder not designated by the brand as a commission pool remains with the brand.

The protocol does not allocate, restrict, or otherwise act upon this remainder. Its sole role is to deterministically allocate the brand-defined commission pool, if any, according to lineage.

5.5 Lineage Roles at Conversion

For a given conversion event, lineage entries are classified as follows:

  • Originator - the first lineage entry a₁
  • Closer - the lineage entry aₖ that triggers the conversion event
  • Intermediates - any lineage entries between the originator and the closer

Only lineage entries present at the moment of conversion are considered.

5.6 Commission Allocation Rule (15 / 15 / 70)

The allocation model applies only to the commission pool C.

Unless otherwise specified by a collapse rule:

  • Closer allocation = 0.70 · C
  • Originator allocation = 0.15 · C
  • Intermediate pool = 0.15 · C

There is no last-touch discretion.

The closer is determined solely by the system-recorded conversion trigger.

The originator allocation is fixed and does not dilute based on lineage length.

5.7 Intermediate Allocation

If intermediates exist between the originator and the closer, a fixed intermediate pool is allocated and divided equally among those intermediates.

Let the lineage for a conversion be:

L = {a1, a2, ..., ak}

Where:

  • a1 is the originator
  • ak is the closer
  • a2 through a(k-1) are intermediates (if any)

Let:

m = k - 2, the number of intermediates (excluding originator and closer)

The total intermediate pool is fixed at:

0.15 · C

Each intermediate receives:

(0.15 · C) / m

Intermediates do not receive weighting based on position, timing, or identity.

Originator and closer allocations are defined separately and are not part of the intermediate pool.

If m = 0 (no intermediates), the intermediate pool is reassigned as defined in the no-intermediate scenario.

5.8 Collapse Rules

Single-participant case

If the originator is also the closer:

The originator receives 100 percent of C.

No-intermediate case

If the lineage contains an originator and a closer with no intermediates:

Originator receives 0.30 · C

Closer receives 0.70 · C

The unused intermediate pool is reassigned to the originator in this case.

5.9 Determinism and Constraints

The allocation function is deterministic and published.

For any conversion event:

  • allocations are computed solely from lineage position and fixed parameters
  • no hidden parameters are permitted
  • the sum of all allocations equals C
  • there are no discretionary overrides
5.10 Worked Example (Illustrative)

Assume:

Real revenue from a conversion is: R = $100

Platform share is fixed at: α = 0.30

Brand-defined commission rate is: c = 0.20

Step 1: Platform share

Platform allocation = α · R = 0.30 · $100 = $30

Step 2: Commission pool (brand-defined)

The commission rate applies to revenue R:

C = c · R = 0.20 · $100 = $20

Step 3: Lineage-based allocation of the commission pool

The protocol allocates only C according to the lineage allocation model:

  • Originator pool: 0.15 · C
  • Intermediate pool: 0.15 · C (if intermediates exist)
  • Closer pool: 0.70 · C

The remainder of revenue after platform share and commission is retained by the brand and is not allocated by the protocol.

Note: This example is illustrative only. The protocol’s allocation math operates deterministically on the declared values of R and c, and on the lineage L at the time of conversion.

5A. Roles, Authority, and Economic Boundaries

IDDAS is a rule-defined activation and allocation system. It separates business discretion from protocol enforcement to ensure outcomes remain fair, deterministic, and verifiable at scale.

This section defines the roles within IDDAS and the boundaries that govern them.

5A.1 IDDAS - Rule Definition and Enforcement

IDDAS defines and enforces the core rules of the system. These rules are fixed, versioned, and applied uniformly across all deployments.

  • Defines what qualifies as a valid activation
  • Defines what qualifies as real revenue
  • Defines how lineage is formed and preserved
  • Defines how allocation is computed once revenue exists
  • Defines the settlement and payment rails used across all deployments
  • Enforces a fixed platform fee
  • Executes allocation and payout deterministically
  • Prevents discretionary overrides, selective treatment, or retroactive changes

IDDAS does not negotiate outcomes, adjust distributions, or intervene on a case-by-case basis. Once protocol-defined inputs are recorded, outcomes follow the rules exactly.

5A.2 Brands - Business Definition Within Protocol Constraints

A Brand is the organization, entity, or individual running a deployment on IDDAS.

  • Selects which of its qualifying business events constitute conversion events, within the protocol’s definition of real revenue
  • Defines whether a commission pool exists and its size
  • Provides the bank account where qualifying revenue is received
  • Pays for activations generated through the deployment

Brand discretion exists only before revenue is created and only within protocol-defined constraints.

Brands cannot:

  • Redefine what qualifies as real revenue
  • Override, edit, or reorder lineage
  • Collapse distribution to a single party when multiple contributors exist
  • Selectively exclude contributors from allocation
  • Modify or bypass settlement or payment rails
  • Alter outcomes after revenue is created

Once a commission pool is declared and qualifying revenue exists, allocation is enforced by the protocol without discretion.

5A.3 Commission Pools and Allocation

Commission pools are defined by the Brand as a percentage of qualifying revenue derived from the protocol-defined distribution pool.

Allocation within any commission pool is defined exclusively by the protocol.

If a single contributor exists in a lineage, that contributor receives the full distribution pool.

If multiple contributors exist, the pool is allocated deterministically according to the protocol’s published allocation rules.

Brands do not assign individual payout percentages to participants. Distribution is computed solely from lineage and fixed parameters.

5A.4 Payment Rails and Settlement

IDDAS defines the payment and settlement rails.

These rails are fixed, standardized, and identical across deployments.

Brands do not select, customize, bypass, or intervene in settlement mechanisms.

Once a Brand deploys on IDDAS, revenue settlement, platform fees, allocation, and payouts follow the protocol-defined rails exactly.

This structure removes discretion, prevents intervention, and ensures outcomes remain auditable and verifiable over time.

5A.5 CandleMe as an Implementation

CandleMe is one Brand and one implementation built on top of IDDAS.

CandleMe defines its own business terms, selects qualifying conversion events, provides its own bank account, and pays for activations like any other Brand.

CandleMe has no special privileges within the protocol and is subject to the same rules, constraints, and enforcement as all other deployments.

5A.6 Infrastructure Originators (IOs) - Activation Surface Creation and IO Share

Definition

An Infrastructure Originator (IO) is a protocol-level lineage root that authorizes and anchors one or more activation surfaces under this protocol, where such surfaces later produce verified activations.

Infrastructure Originator status is not granted, claimed, negotiated, or approved. It emerges solely through downstream protocol-valid activations attributable to activation surfaces anchored under the originator’s lineage root.

Infrastructure Originators may authorize or enable deployment without physically creating, installing, operating, or managing the activation surfaces themselves. Physical deployment and operational execution may be performed by third parties, organizations, operators, integrators, or internal teams acting under the authorized deployment root.

Origination is structural, not behavioral. Attribution follows lineage, not labor.

Creating an activation surface alone confers no status and no entitlement. Only verified downstream activations trigger Infrastructure Originator attribution and allocation.

Definition - Activation Surface

An activation surface is any protocol-issued entry mechanism that enables intentional activation by one or more independent participants, regardless of medium.

Activation surfaces may exist in physical, digital, or hybrid environments and may be deployed wherever intentional human entry can occur.

Activation surfaces include, but are not limited to:

  • QR codes deployed on physical objects, printed media, signage, packaging, tickets, badges, or installations
  • URL-based activation links distributed digitally or embedded in software, websites, applications, emails, messages, or APIs
  • Screens, displays, kiosks, terminals, tablets, projectors, or other visual interfaces capable of presenting an activation entry
  • Interactive systems such as turnstiles, access points, point-of-sale systems, gates, or public terminals that initiate protocol activation
  • Batches of activation surfaces intended for deployment across venues, events, offices, campuses, transit systems, public spaces, or digital properties
  • Persistent activation endpoints intended for repeated use over time

An activation surface is defined by function, not form.

The protocol does not distinguish between physical and digital surfaces.

Any surface that produces intentional, protocol-valid activation qualifies equally.

Relationship to Lineage Originators

The protocol defines an “originator” as the first activation in a lineage for a given conversion context.

An Infrastructure Originator (IO) is a separate and orthogonal role.

Lineage originators are determined by activation order within a lineage.

IOs are determined by activation-surface origination metadata bound at activation creation time.

A single participant may simultaneously act as:

  • an Infrastructure Originator
  • a lineage originator
  • an intermediate
  • a closer
  • a generator or salesperson

These roles are independent and evaluated separately.

Eligibility and Origination

Any participant controlling an activation lineage root may originate infrastructure.

Infrastructure origination occurs when:

  • A participant creates an activation surface from within a controlled activation context
  • The protocol issues a surface identifier (surface_id)
  • The surface_id is immutably bound to the creator’s activation (io_activation_id)
  • One or more verified activations occur through that surface

Creating an activation surface alone confers no status and no entitlement.

Only downstream verified activations trigger IO attribution.

Attribution Mechanics (Non-Chain)

For each activation:

  • At most one io_activation_id may exist
  • io_activation_id is assigned only at activation creation time
  • IO attribution does not propagate through sharing chains

If an activation is created from:

  • an IO-deployed activation surface → io_activation_id is set
  • a peer-to-peer share → lineage attribution applies, but IO attribution does not, unless the shared artifact itself was created as an activation surface

Sharing a candle does not constitute infrastructure origination.

IO Share (Economic Rule)

The platform share is fixed at 30 percent of qualifying net-settled revenue.

The Infrastructure Originator share is defined as:

IO share rate γ = 5 percent

The IO share is allocated from the platform share, not from the distribution pool.

For qualifying revenue amount R:

  • Platform share = 0.30 × R
  • IO share = 0.05 × R (only if a valid io_activation_id exists)
  • Net platform retained = 0.25 × R
  • Distribution pool and lineage-based allocations are unaffected

If no valid io_activation_id exists, IO share is zero and the platform retains the full 30 percent.

Determination of IO Recipient

For a conversion event attributed to lineage L, rooted at activation a₁:

  • If io_activation_id is present on a₁, the IO recipient is that activation
  • If no io_activation_id is present, no IO share applies

This determination is deterministic, auditable, and non-discretionary.

Durability and Non-Circumvention

IO attribution is permanent once recorded:

  • io_activation_id is written at activation creation time
  • It cannot be edited, reassigned, or removed retroactively

Brands, deployers, or partners may not deploy private side agreements, shadow attribution systems, or off-protocol mechanisms that attempt to replicate, suppress, or bypass IO share while using protocol-generated activations.

Any attempt to bypass protocol attribution:

  • does not alter on-protocol IO allocation
  • does not suppress IO share
  • constitutes a violation of protocol terms and access conditions

Prohibited Conduct and Terms

IDDAS is activation infrastructure and is content-agnostic.

Activations, IO attribution, and IO share apply only to qualifying net-settled revenue as defined by this protocol and governed by the Terms and Conditions.

Deployments intended to facilitate illegal goods, illegal services, or prohibited conduct:

  • do not produce qualifying revenue
  • do not generate IO share
  • are subject to enforcement under the platform’s Terms and Conditions

The existence of IO attribution does not create entitlement to payment from non-qualifying or prohibited revenue.

Implementation Note (Non-Normative)

Implementations may expose a single optional control labeled “Deploy Activation Surface”, accessible from a controlled activation context.

The protocol mandates structural outcomes only:

  • activation surface issuance
  • immutable attribution
  • deterministic IO share calculation

Interface design is implementation-specific.

5A Summary
  • Brands define business intent
  • IDDAS defines and enforces the rules
  • Once revenue exists, outcomes are deterministic
  • Infrastructure Originators may create activation surfaces and receive a protocol-defined IO share from the platform share.

This separation is intentional. It ensures fairness does not depend on trust, scale does not distort outcomes, and success does not rewrite the rule.

6. Payout Model
6.1 Payout Scope

Payouts are derived from allocation outcomes computed under the Allocation Model defined in Section 5.

For each conversion event:

  • R is evaluated
  • platform allocation and distribution pool D are computed
  • contributor allocations are determined deterministically
  • payout amounts are recorded as ledger entries

Payout calculation does not imply immediate disbursement and does not alter allocation outcomes.

6.2 Net-Settled Revenue Requirement

Payouts are based exclusively on net-settled revenue.

Net-settled revenue is revenue that:

  • has cleared payment processing
  • is no longer subject to refund, chargeback, or reversal under the applicable settlement window

If revenue does not settle, no payout is finalized.

This requirement applies uniformly across all environments, Brands, and deployments.

6.3 Payout Availability

Payouts become available for disbursement only after all of the following conditions are satisfied:

  • revenue is net-settled
  • the minimum payout threshold is met
  • all eligibility conditions remain satisfied

The protocol may batch disbursements on a scheduled basis.

Disbursement timing does not affect allocation, eligibility, or recorded outcomes.

6.4 Minimum Payout Threshold

A minimum payout threshold applies to each recipient.

Let:

  • T = minimum payout threshold

T is defined as:

  • T = $5.00

If a calculated payout is below T:

  • the amount is not disbursed
  • the amount is accrued to the recipient’s balance

Minimum payout thresholds affect only disbursement timing and do not alter allocation or eligibility.

6.5 Accrual and Carry-Forward

Accrued balances:

  • persist across time
  • persist across conversion events
  • are not forfeited due to inactivity

Accrual affects only when disbursement occurs and does not modify allocation calculations.

6.6 Multiple Conversion Events

A single candle may produce multiple conversion events over time.

For each conversion event:

  • allocation is computed independently
  • payouts are recorded independently

Revenue from different conversion events is not combined for allocation purposes.

Accrued balances from multiple conversion events may combine to satisfy the minimum payout threshold.

This preserves the distinction between allocation per event and payout per recipient.

6.7 No Duplicate Payouts

Each unit of net-settled revenue is associated with a single conversion event and is allocated exactly once.

The protocol does not permit duplicate payouts for the same revenue.

If multiple conversion events occur, each must correspond to distinct net-settled revenue.

6.8 Settlement Failures and Revenue Invalidations

If a conversion event fails to settle:

  • the associated allocation is void
  • no payout is recorded

If a transaction is invalidated after provisional recording but before disbursement:

  • the corresponding ledger entry is reversed or netted
  • accrued balances are adjusted accordingly

These corrections reflect the absence of real, net-settled revenue.

They do not imply a refund policy, user-initiated reversal, or discretionary adjustment.

Pay-per-candle pricing supports:

  • affiliates
  • individual representatives
  • small businesses
  • experimental and exploratory usage
7. Scale and Capacity Model

The protocol supports self-serve operation by default, and introduces objective, capacity-based gating only when enterprise-scale throughput is requested.

7.1 Self-Serve Operation

The protocol supports self-serve operation by default.

Self-serve operation includes:

  • creating and anchoring candles
  • propagating candles through eligible activation events
  • generating conversion events at ordinary scale

Self-serve operation does not require:

  • contracts
  • minimum commitments
  • human approval
  • enterprise classification

Self-serve operation remains available until enterprise-scale capacity is requested.

7.2 Scale Determination

Scale is determined by requested capacity, not by participant identity.

The protocol does not classify participants as enterprise or non-enterprise.

Scale gating is triggered only when a participant requests capacity, throughput, or features that exceed self-serve limits.

7.3 Scale Gating (Structural)

Scale is governed structurally, not reactively. Certain capabilities require predefined capacity and are only available when sufficient activation credits or prepaid balances exist.

These capabilities may include:

  • large environment deployments
  • high-volume activation issuance
  • bulk or programmatic operations
  • advanced environment-level analytics

No monitoring, classification, detection, or discretionary escalation occurs. Availability is determined solely by declared capacity and deterministic rules. When capacity is exhausted, usage naturally halts until additional credits or prepayment are applied.

7.4 Environment-Based Capacity Requirements

Certain environment types inherently require enterprise-scale capacity.

Examples include:

  • stadiums and arenas
  • large venues
  • transit hubs
  • city-wide or regional deployments

When such an environment type is requested, enterprise-scale capacity requirements apply before activation may proceed.

No manual classification or subjective approval is performed.

7.5 Minimum Commitment Requirement

Enterprise-scale deployments require a minimum upfront commitment.

The minimum commitment:

  • is applied as prepaid usage credits
  • is non-refundable
  • is immediately usable upon payment

Minimum commitments exist solely to provision capacity, verification, and settlement resources proportional to the requested scale.

7.6 Credit Consumption

Prepaid credits are consumed by:

  • candle creation
  • activation verification load
  • environment-level operations
  • other usage-based costs defined by the system

Credits are consumed automatically as usage occurs.

When prepaid credits are exhausted, usage continues under metered billing and additional charges are applied automatically.

7.7 Commitment Finality

Minimum commitments are not refundable.

Credits represent prepaid capacity, not a membership fee, license, or deposit.

This rule eliminates discretionary refund handling and ensures continuity of operation.

7.8 Progressive Disclosure

Scale requirements are disclosed progressively.

Participants encounter scale gating only when:

  • attempting to exceed self-serve limits
  • requesting enterprise-scale capabilities

The protocol imposes no upfront friction on experimentation, evaluation, or early adoption.

8. Pricing Model
8.1 Pricing Principles

Pricing is defined to support capacity provisioning without influencing economic outcomes.

The pricing model is designed to:

  • charge for capacity and instruments, not outcomes
  • avoid penalizing success or scale
  • remain predictable and transparent
  • scale from individual usage to large deployments
  • operate without negotiation or discretionary pricing

Pricing does not alter lineage, allocation rules, or payout mechanics.

8.2 Pay-Per-Candle Pricing

Candles are priced as individual activation instruments.

Each anchored candle incurs a fixed creation cost.

Pricing is applied at the time of candle creation.

Candles may be configured with predefined expiry parameters selected at creation time. Expiry parameters are fixed, declared in advance, and applied deterministically. Once a candle is created, its expiry cannot be modified, extended, or overridden. Expiry exists solely to bound activation eligibility and does not alter attribution, allocation, or pricing rules.

Pay-per-candle pricing supports:

  • affiliates
  • individual representatives
  • small businesses
  • experimental and exploratory usage
8.3 Metered Accounts

For higher-volume usage, the protocol supports open-ended metered accounts.

Metered accounts:

  • track usage over time
  • automatically bill for usage beyond prepaid credits
  • do not impose seat limits or user-based pricing

Metered billing applies only after usage occurs.

There are no subscription tiers tied to identity, role, or participant classification.

8.4 Enterprise-Scale Capacity and Prepaid Credits

Enterprise-scale capacity may require prepaid credits to ensure availability, throughput, and operational stability.

Prepaid credits:

  • are paid upfront
  • convert directly into standard activation credits
  • are non-refundable once consumed
  • do not change pricing, attribution, allocation, or verification rules

There is no negotiated minimum commitment inside the protocol. Capacity gating is satisfied through prepaid credits when required.

8.5 Credit-Based Accounting

Prepaid credits represent capacity within the system.

Credits may be consumed by:

  • candle creation
  • activation verification
  • environment-level operations
  • other usage-based costs defined by the protocol

Credits are deducted automatically as usage occurs.

Unused credits remain available until consumed.

8.6 Overage and Continuity

When prepaid credits are exhausted:

  • usage continues without interruption
  • additional usage is billed automatically under metered pricing

Service is not suspended solely due to credit exhaustion, except where required for risk control, system integrity, or compliance.

8.7 Pricing Neutrality

Pricing decisions:

  • do not affect lineage
  • do not affect allocation percentages
  • do not affect payout priority

All participants are treated identically under allocation rules regardless of pricing tier, commitment size, or deployment scale.

The pricing model applies universally across all deployments, environments, and scales. Scale is not gated by pricing tiers or negotiated thresholds. Capacity is governed exclusively by activation credits, prepaid balances, and activation burn rate.

9. Eligibility and Verification
9.1 Eligibility Principles

Only eligible activation events may create lineage entries or participate in allocation.

Eligibility exists to:

  • preserve attribution integrity
  • prevent artificial or spam propagation
  • ensure that value allocation reflects real contribution

Eligibility rules apply uniformly across all environments, candles, and participants.

9.2 Eligible Activation Events

An eligible activation event is an action that:

  • is recognized by the system
  • occurs within the scope of a specific candle and environment
  • meets protocol-defined contribution criteria
  • is verifiable using system-enforced methods

Activation events that do not meet eligibility criteria are ignored for lineage and allocation purposes.

9.3 Verification Requirements

Verification is required for all activation events that contribute to lineage.

Verification may include, but is not limited to:

  • system event validation
  • device or session confirmation
  • contextual consistency checks
  • timing and frequency constraints

Verification is enforced programmatically.

No activation event is eligible without verification.

9.4 Participation Constraints

The protocol enforces participation constraints to prevent abuse.

Such constraints may include:

  • limits on repeated participation by the same actor within a lineage
  • prevention of circular or looping propagation
  • restrictions on self-referential activation patterns

The protocol does not require persistent identity disclosure to participants in order to enforce these constraints.

9.5 Anti-Abuse Enforcement

Anti-abuse enforcement is integral to eligibility determination.

The protocol may:

  • reject ineligible activation events
  • ignore invalid or non-conforming propagation attempts
  • invalidate activation events that fail verification

Anti-abuse enforcement operates deterministically and does not alter valid lineage entries or allocation outcomes.

9.6 Disclosure Boundaries

Internal safeguard, abuse-prevention, and validity-gating mechanisms may influence which interactions qualify as accepted activations and are included in the committed activation set.

The specific implementation details of these safeguards are intentionally not publicly disclosed in order to preserve their effectiveness and prevent circumvention.

This non-disclosure does not violate determinism because verification operates on the accepted activation set and the published protocol rules, not on raw traffic or rejected interactions.

Safeguards are structural and rule-bounded. While certain detection or evaluation heuristics may remain private, their function is limited to admission into the committed set and does not alter published rules, outcomes, or allocation once an activation is accepted.

9.7 Effect on Allocation and Payout

Only activation events that pass eligibility and verification:

  • appear in lineage
  • participate in allocation
  • receive payouts

Ineligible or unverified events receive no allocation and no payout.

10. Edge Cases and Deterministic Resolution
10.1 Single-Participant Scenario

If a candle has only one eligible participant and that participant is both the originator and the closer for the conversion event:

  • the participant is treated as both originator and closer
  • the participant receives 100 percent of the commission pool C
  • No other allocations are created.
10.2 No-Intermediate Scenario

If a lineage contains an originator and a closer with no intermediates between them:

  • The originator receives 0.30 · C
  • The closer receives 0.70 · C

In this case, the fixed intermediate pool (0.15 · C) is reassigned to the originator.

This reassignment is deterministic and does not constitute a discretionary adjustment.

10.3 Long-Chain Dilution

If a lineage contains multiple intermediates:

  • the total intermediate allocation remains capped
  • intermediate allocations are divided equally
  • individual intermediate payouts may be small

Increasing lineage length does not increase the total allocation to intermediates.

This behavior is intentional and reflects diminishing contribution as distance from conversion increases.

10.4 Post-Conversion Appending Attempts

Any activation attempts occurring after a conversion event:

  • do not affect allocation for that conversion
  • do not retroactively modify lineage
  • may participate only in future conversion events

Post-conversion appending produces no retroactive entitlement.

10.5 Duplicate or Conflicting Claims

If multiple parties assert responsibility for a conversion:

  • the system-recorded conversion trigger determines the closer
  • manual claims or assertions are ignored

The protocol does not adjudicate subjective disputes.

10.6 Multiple Conversion Events

If multiple conversion events occur from the same candle:

  • each conversion event is evaluated independently
  • allocation is computed separately for each event
  • revenue is not double-counted

Accrued balances may combine across events for payout threshold purposes.

10.7 Failed or Reversed Transactions

If a conversion event fails to settle:

  • no allocation is finalized
  • no payout is issued

If a transaction reverses after provisional recording but before payout:

  • the allocation is reversed or netted
  • accrued balances are adjusted accordingly
10.8 Ineligible Participation Discovery

If an activation event is determined to be ineligible prior to settlement:

  • the event is excluded from lineage
  • allocation is recalculated if required
  • no payout is issued for the ineligible event

If settlement has already occurred, reversal handling follows Section 6.

10.9 System Faults and Interruptions

In the event of system faults or interruptions:

  • incomplete activation events may be discarded
  • incomplete conversion events produce no allocation
  • completed and verified events remain authoritative

There are no discretionary reallocations due to system interruption.

11. Environment Rules
11.1 Environment Definition

An environment is a bounded operational context within which candles operate, lineage is constructed, and conversion events occur.

An environment may represent, for example:

  • a location
  • a venue
  • a business unit
  • a campaign scope
  • a deployment boundary

Every candle operates within exactly one environment at any given time.

11.2 Environment Isolation

Environments are isolated from one another.

Isolation rules include:

  • lineage does not cross environment boundaries
  • conversion events are evaluated within a single environment
  • allocation and payout are computed per environment

Actions in one environment have no effect on:

  • lineage in other environments
  • allocations in other environments
  • payouts associated with other environments

This isolation ensures clarity, auditability, and deterministic outcomes.

11.3 Environment Association of Candles

A candle is associated with an environment at the time it is anchored.

Rules:

  • a candle may not belong to multiple environments simultaneously
  • a candle’s lineage remains scoped to its environment
  • changing a candle’s environment creates a new operational context

Environment association defines context only and does not imply ownership, entitlement, or preferential treatment.

11.4 Environment Lifecycle

An environment progresses through defined lifecycle states.

Lifecycle states may include:

  • creation
  • configuration
  • activation
  • operation
  • suspension
  • deactivation

Lifecycle transitions are system-controlled and do not modify lineage, allocation, or payout rules.

11.5 Environment Capacity Constraints

Environments may be subject to capacity constraints based on:

  • scale of deployment
  • verification throughput
  • activation volume
  • analytics load

Capacity constraints are enforced automatically according to the Scale and Capacity Model defined in Section 7.

Requests exceeding environment capacity Requests exceeding environment capacity may require prepaid credits to provision the required throughput or operational load. This requirement is rule-based and does not alter pricing, attribution, allocation, or verification.

11.6 Environment-Level Operations

Certain operations occur at the environment level.

Environment-level operations may apply to candles and other activation instruments deployed within an environment.

These may include:

  • bulk candle creation
  • environment-wide analytics
  • activation verification configuration
  • capacity management

Access to environment-level operations may be gated by scale and capacity requirements.

11.7 Environment Integrity

The protocol enforces integrity within each environment.

Integrity enforcement may include:

  • prevention of duplicate environments with conflicting scopes
  • consistency checks between environment configuration and usage
  • enforcement of environment-specific eligibility constraints

Integrity enforcement operates deterministically and does not alter valid lineage entries, allocation outcomes, or payouts.

Section Status

Section 11 defines how environments function as isolated operational contexts within the protocol.

Environment rules preserve determinism, auditability, and correctness at scale.

12. Transparency and Auditability
12.1 Deterministic Rule Enforcement

All protocol outcomes are governed by deterministic rules.

For any conversion event:

  • lineage state
  • allocation percentages
  • payout calculations

are derived mechanically from published rules and recorded events.

There are no discretionary adjustments, overrides, or negotiated outcomes.

12.2 Inspectable Allocation Logic

The allocation model is published and invariant.

Participants may inspect:

  • allocation percentages
  • role definitions
  • collapse rules
  • conditions under which allocation occurs

Given identical inputs, the protocol always produces identical outputs.

12.3 Event Logging and Records

The protocol maintains authoritative records of:

  • candle anchoring
  • accepted activation events
  • lineage construction
  • conversion events
  • allocation and payout calculations

Official records must be maintained in full to support auditability and internal verification, and to support third-party review when authorized.

Sensitive operational and business data, including but not limited to revenue amounts, volumes, and partner performance, is not required to be publicly disclosed.

The public blockchain is used to anchor cryptographic commitments such as hashes, Merkle roots, and protocol rule version identifiers sufficient to enable independent verification.

Independent verification is achieved through mathematical proof of correctness against committed data and published rules, not through public exposure of raw transactional or business data.

12.4 Participant Visibility

Participants may be provided visibility into:

  • their participation in a lineage
  • their role at the time of conversion
  • their calculated allocation
  • their accrued payout balance

Visibility does not confer control, discretion, or influence over outcomes.

12.5 Dispute Minimization by Design

The protocol minimizes disputes by:

  • defining rules in advance
  • enforcing rules automatically
  • removing discretionary decision points
  • evaluating outcomes solely on recorded events

Subjective claims, assertions, or interpretations do not affect protocol outcomes.

12.6 Separation of Transparency and Enforcement

Transparency concerns what rules apply and how outcomes are computed.

Enforcement concerns how eligibility and verification are implemented.

The protocol discloses rule logic and outcome computation while not requiring disclosure of enforcement mechanisms that protect system integrity.

13. Implementation Notes (Non-Normative)
13.1 Mobile-First Assumptions

The protocol is designed to operate in mobile-first contexts.

Primary interactions are expected to occur on mobile devices, including:

  • candle anchoring
  • activation and propagation
  • basic lineage visibility
  • balance and payout awareness

Mobile interfaces prioritize speed, clarity, and minimal friction.

Desktop interfaces may complement mobile usage but are not required for protocol participation.

13.2 Desktop Administrative Functions

Desktop interfaces are intended primarily for administrative and oversight functions, including:

  • environment administration
  • analytics and reporting
  • export and reconciliation
  • billing and credit management
  • oversight of large-scale deployments

Desktop access does not alter protocol rules and does not confer allocation, eligibility, or payout privileges.

13.3 Enforcement Without Manual Review

Eligibility, verification, scale gating, allocation, and payout enforcement are designed to operate without routine human intervention.

Manual review may occur only in exceptional circumstances, including:

  • regulatory or compliance requirements
  • external legal obligations
  • confirmed system faults

Manual review does not modify valid lineage entries, allocation outcomes, or payout determinations.

13.4 System Invariants

The following invariants must hold across all implementations:

  • allocation percentages are fixed and deterministic
  • lineage is append-only
  • conversion events are authoritative
  • outcomes derive solely from recorded events
  • no discretionary overrides exist

Implementations may evolve, but these invariants must remain intact.

13.5 Versioning and Backward Compatibility

Protocol versions may evolve over time.

Changes to the protocol:

  • must be versioned
  • must not retroactively alter settled outcomes
  • may introduce new features or constraints prospectively

Backward compatibility is preserved for existing candles and lineages unless explicitly deprecated by a future protocol version.

13.6 Separation of Protocol and Product

The protocol defines rules and guarantees.

Products and interfaces:

  • enforce protocol rules
  • expose protocol outcomes
  • may vary in design, architecture, and presentation

Product changes do not modify protocol-defined behavior.

14. Public Communication Derivatives
14.1 Purpose of Public Derivatives

Public communication materials are derivative explanations of the protocol.

They exist to:

  • explain behavior
  • build confidence
  • reduce confusion
  • support adoption

Public materials do not define rules and do not override protocol behavior.

The protocol defined in Sections 1 through 13 is authoritative.

14.2 Website Summaries

The public website may present simplified descriptions of the protocol.

Website summaries may include:

  • high-level explanations of candles
  • general descriptions of lineage and allocation
  • statements regarding scale requirements
  • non-technical descriptions of eligibility

Website content must:

  • avoid operational thresholds
  • avoid implementation details
  • avoid negotiable or discretionary language

Acceptable phrasing includes:

  • “Certain deployments require a minimum commitment.”
  • “Allocation occurs only after real outcomes.”
  • “Lineage entries require eligible activation events.”

The website must not publish:

  • internal enforcement mechanisms
  • anti-abuse thresholds
  • verification logic
  • internal system limits
14.3 FAQ Content

FAQ content may expand on website summaries but remains non-normative.

FAQs may explain:

  • common allocation scenarios
  • the rationale for closer-dominant allocation
  • natural dilution in long lineage chains
  • why scale requires commitment

FAQs must:

  • accurately reflect protocol rules
  • avoid exceptions not defined in the protocol
  • avoid promising discretionary outcomes

FAQs must not:

  • introduce new rules
  • contradict the protocol
  • imply negotiability or special treatment
14.4 Product UI Prompts

Product interfaces may display prompts and notices derived from protocol rules.

Examples include:

  • scale gating notices
  • minimum commitment prompts
  • payout availability messages
  • eligibility-related feedback

UI prompts:

  • explain what is required
  • do not explain how enforcement operates
  • do not invite negotiation or exception handling

All UI messaging must remain consistent with protocol definitions.

14.5 Sales and Partner Explanations

Sales materials, partnerships, and external discussions may reference protocol behavior at a conceptual level.

Sales materials may:

  • explain incentives
  • describe economic structure
  • explain why outcomes are deterministic and fair

Sales materials must not:

  • promise custom allocation
  • suggest rule overrides
  • imply preferential treatment

Any commitment beyond protocol-defined behavior requires a formal protocol amendment.

14.6 Documentation Hierarchy

In the event of conflicting explanations, the following precedence applies:

  • This protocol document prevails
  • Formal technical documentation follows
  • Website summaries follow
  • FAQs follow
  • Marketing and sales materials follow

No derivative material may supersede or reinterpret the protocol.

15. Amendments and Future Versions
15.1 Amendment Authority

Amendments to this protocol may be proposed only by the protocol steward.

No participant, partner, Brand, or deployment has the authority to alter protocol rules unilaterally.

15.2 Versioning

All protocol changes must be versioned.

Each protocol version:

  • is identified by a unique version identifier
  • has a defined effective date
  • applies prospectively unless explicitly stated otherwise

Historical versions remain authoritative for outcomes settled under those versions.

15.3 Non-Retroactivity

Protocol amendments do not retroactively alter:

  • completed lineages
  • settled conversion events
  • finalized allocations
  • paid or accrued payouts

Once revenue has settled and allocation has been recorded, outcomes are final under the protocol version in effect at the time of conversion.

15.4 Forward Compatibility

Future protocol versions may introduce:

  • new environment types
  • new scale thresholds
  • new pricing mechanisms
  • new eligibility constraints
  • new operational features

Such changes must:

  • preserve core invariants
  • avoid breaking existing candle behavior
  • maintain deterministic allocation
15.5 Core Invariants

The following invariants must be preserved across all protocol versions:

  • allocation occurs only after real, net-settled revenue
  • lineage is append-only
  • allocation is deterministic and rule-based
  • platform allocation percentage remains fixed unless explicitly amended
  • no discretionary overrides exist

Any amendment that violates these invariants constitutes a new protocol rather than a modification of this one.

15.6 Deprecation Policy

Features, environments, or behaviors may be deprecated in future versions.

Deprecation:

  • is announced in advance
  • does not invalidate existing outcomes
  • applies only to future activity

Deprecated features may continue to operate for a defined transition period.

15.7 Emergency Changes

In rare circumstances involving:

  • legal requirements
  • critical security vulnerabilities
  • system integrity threats

Temporary emergency changes may be applied.

Such changes:

  • are narrowly scoped
  • are documented retroactively
  • do not alter settled outcomes

Emergency changes do not establish precedent and do not modify core protocol invariants.

Section Status

Section 15 defines how the protocol evolves while preserving determinism, fairness, and auditability.

Protocol authority is explicit, changes are controlled, and history is never rewritten.

Final Constitutional Summary

  • Brands define business intent
  • IDDAS defines and enforces the rules
  • Once revenue exists, outcomes are deterministic
16. Canonical Commitment Specification - Candle Sealing

CANDLE SEALING SPEC v1.0

IDDAS Protocol - Canonical Commitment Event

16.1 Purpose

The Candle Seal is the irreversible commitment action that converts a candle-based opportunity into a secured, verifiable deal object within IDDAS. This spec defines:

  • The only valid sealing action
  • The conditions under which sealing may occur
  • The effects of sealing
  • The boundaries that preserve the sacred candle

This spec is protocol law. UI, animation, and implementation must conform to it.

16.2 Canonical sealing action (non-negotiable)

The only valid sealing path is:

With the flame off, six rapid taps anywhere open enterprise access. Sealing happens only from that enterprise path.

There are:

  • No alternative gestures
  • No variants
  • No shortcuts
  • No secondary confirmation mechanisms

This action is universal across contexts, devices, and environments.

16.3 Preconditions (when sealing is allowed)

A candle may be sealed only if all of the following are true:

  • 1) The candle is lit (burning state)
  • 2) The candle is unsealed
  • 3) The user performs a continuous 5-second hold directly on the flame

Notes:

  • A candle may be sealed immediately upon receipt, or saved and sealed later when reignited.
  • An unlit candle cannot be sealed.
16.4 Sealing gesture requirements

Duration

  • Hold duration: 5.0 seconds
  • Must be continuous
  • Any interruption cancels the attempt

Feedback during hold

  • The system MUST provide calm, visible progress feedback
  • No numeric countdown
  • No urgency indicators
  • No error messaging if released early

If the user releases early:

  • The visual seal dissolves quietly
  • No message is shown
  • The candle remains unsealed
16.5 Completion moment (the seal)

When the 5-second hold completes:

  • 1) A single seal acknowledgment moment occurs
  • 2) The candle is immediately and permanently sealed
  • 3) A Seal Event is emitted (see Section 8)

There is no confirmation dialog. Completion of the hold is the commitment.

16.6 Irreversibility

Once sealed:

  • The candle cannot be unsealed
  • The seal cannot be modified
  • The deal cannot be renegotiated through the candle
  • The sealing action cannot be repeated

This irreversibility is intentional and required. Sealing is equivalent to signing a contract, sealing a letter, or committing a transaction.

16.7 Relationship to the candle (sacred boundary)

The candle remains:

  • Visually a candle
  • Conceptually a ritual object
  • Free of enterprise UI elements
  • Free of configuration controls

Sealing is a moment, not a mode switch. After sealing:

  • The candle does not become an enterprise dashboard
  • The candle does not expose settings or status panels
  • The candle remains recognizable and unchanged
16.8 Seal event (protocol artifact)

Upon successful sealing, the system MUST generate a single immutable Seal Event containing:

  • Timestamp
  • Candle ID
  • Environment ID
  • Lineage snapshot
  • Rule version reference

This event is immutable, verifiable, and is the authoritative record of commitment.

16.9 Post-seal boundary

Any post-seal steps occur outside the candle and outside this specification. This spec governs only the sealing action, its prerequisites, its irreversibility, and the resulting Seal Event.

16.10 Explicit non-goals (what this is NOT)

The Candle Seal is not:

  • A settings action
  • A reversible choice
  • A negotiable step
  • A multi-gesture system
  • A gamified interaction
  • A shortcut or hidden trick
  • An enterprise-only feature

There is one candle. There is one seal.

16.11 Authority

This spec governs UI design, animation, engineering implementation, documentation, and website language. If an implementation conflicts with this spec, the spec wins.

Status

CANDLE SEALING SPEC v1.0 - LOCKED

ECONOMICRIGHTS AND MONETIZATION Pricing applies to derivative certainty

The IDDAS Protocol distinguishes between event truth and derivative services.

Activation events are free to exist. Event truth, sequence validity, and lineage integrity are never gated by payment, balance, or account state.

The protocol reserves the right to introduce economic systems that operate strictly downstream of raw event generation. Such systems may include:

  • Anchoring and batch anchoring services
  • Proof finalization and permanence guarantees
  • Attestation, certification, and audit-grade reports
  • Settlement, reconciliation, and conversion sealing
  • Priority processing, throughput guarantees, and service-level agreements
  • Proof inspection tools, lineage explorers, and export services
  • Data retention, archival, and historical replay services
  • Anti-fraud, integrity enforcement, and anomaly detection
  • Surface certification and high-trust surface classes
  • Private, sovereign, or white-label protocol deployments
  • Developer access tiers, APIs, and rate-limited services
  • Verification modules, adapters, and compliance tooling
  • Licensing of protocol marks and verification seals

No economic mechanism may:

  • Prevent an activation event from being recorded
  • Modify event truth or sequence validity
  • Introduce identity as a prerequisite for action
  • Retroactively affect recorded events

Event truth is neutral and permanent. Derivative certainty, services, and guarantees may be priced.

This separation is a permanent invariant of the protocol.

SECONDARYECONOMIC RIGHTS Non-interference and downstream monetization

The IDDAS Protocol is action-first and identity-optional.

All activation events - including ignite, seal, save, share, and lineage extension - must be recordable, verifiable, and replayable without requiring identity, payment, balance, or account state.

Event truth, sequence validity, and lineage integrity shall never be defined, altered, suppressed, or invalidated by any economic mechanism.

The protocol explicitly reserves the right to introduce secondary economic systems that operate downstream of raw event generation. These may include:

  • Anchoring or batch anchoring services
  • Verification, attestation, or audit services
  • Settlement or reconciliation layers
  • Throughput, priority, or service-level guarantees
  • Institutional or enterprise verification tooling

Such secondary systems must not precondition, gate, or modify the creation of activation events.

No fee, payment, credit, or economic requirement may be imposed as a prerequisite for an activation event to exist, be recorded, or be considered valid.

Economic mechanisms may only apply to derivative services, post-event processing, or optional capabilities that do not affect event truth.

This separation is a permanent invariant of the protocol.

GOVERNANCEEVOLUTION Stewardship without redefining truth

The IDDAS Protocol is governed by fixed, published rules that define event truth, sequence validity, lineage, and verification.

Governance mechanisms may evolve over time, including councils, stewards, validators, auditors, or institutional oversight structures.

No governance mechanism may:

  • Alter or invalidate previously recorded activation events
  • Retroactively change event truth, sequence validity, or lineage
  • Introduce identity requirements prior to action
  • Override deterministic protocol rules

Governance exists to steward operation, compliance, and evolution - not to redefine truth.

The protocol may be instantiated within different legal, regulatory, or sovereign contexts, including national or jurisdictional deployments, provided core protocol invariants remain unchanged.

Localized policy overlays may exist, but they must not modify:

  • Activation semantics
  • Event recording rules
  • Lineage integrity
  • Verification logic

No single governance body, jurisdiction, or authority defines protocol truth.

Protocol integrity is independent of governance structure.

Frequently Asked Questions

Clear answers to common questions.
What is IDDAS?

IDDAS is an activation-before-identity protocol. It records real engagement, creates lineage from participation, and allocates outcomes using deterministic rules instead of negotiated attribution.

What is an activation?

An activation is a verified, intentional entry into the system initiated by a person.

This typically occurs when someone deliberately scans a code or opens an activation link and enters the activation flow. Passive exposure does not count.

Is an activation the same as a purchase or conversion?

No.

An activation is an entry event. A purchase or conversion is a separate outcome that may or may not occur later.

Activations create eligibility and lineage. Conversions create revenue.

When do charges occur?

Charges occur only when a verified activation happens.

If no one activates, no charge occurs.

Charges are not based on impressions, views, or passive exposure.

What if someone activates but never converts?

Then no revenue is created and no allocation occurs.

The system does not create speculative value or implied entitlement.

Why do you charge per activation instead of impressions?

Because impressions are passive and probabilistic.

IDDAS charges only for intentional engagement that creates a verifiable activation event. This removes guesswork, disputes, and retroactive attribution.

Is saving or completing an action required for activation?

No.

Saving, sharing, or completing additional actions deepens lineage, but an activation exists as soon as intentional entry occurs.

Why is the activation price fixed and universal?

A fixed price prevents negotiation, exceptions, and discretionary outcomes.

Everyone knows the rule in advance, regardless of size, industry, or use case. This preserves fairness and predictability at scale.

Can the rules be changed later?

Rules can change only through explicit versioning.

Changes apply prospectively. Past outcomes remain verifiable against the rules in effect at the time they occurred.

There are no silent changes and no retroactive adjustments.

Who decides how revenue is allocated?

Allocation follows a published, deterministic rule.

No participant, operator, or administrator can manually override outcomes after the fact.

What prevents abuse or fake activations?

Activations require intentional human entry and the creation of valid session state.

Automated traffic may load URLs, but it cannot easily generate valid activation contexts or undetectable lineage at scale. Invalid activity does not qualify as an activation by definition.

Do you charge for everyone who attends an event or enters a venue?

No.

You are charged only for people who activate. Attendance alone does not create a charge.

Can spend be capped or limited?

Yes.

Deployment scope, event boundaries, and minimums can be defined. Pricing per activation remains fixed.

How is attribution handled across sharing?

Sharing creates new activations linked by lineage.

Attribution follows recorded lineage rather than last-touch claims.

Is this a loyalty program?

No.

Loyalty programs can be built on top of IDDAS, but activation does not require enrollment, accounts, or identity.

Is CandleMe required to use IDDAS?

No.

CandleMe is one implementation built on top of the protocol. The protocol itself is independent of any specific product or interface.

Why build this as a protocol instead of a closed platform?

Protocols create durability.

By fixing the rules first and making outcomes verifiable, IDDAS allows others to build without fear that success will later change the outcome. Trust comes from rules, not discretion.

What problem does this model solve?

It replaces:

  • Guesswork with verification
  • Negotiated attribution with deterministic allocation
  • Passive exposure with intentional engagement
Are participants agents, contractors, or representatives of IDDAS?

No.

Participants in IDDAS, including Infrastructure Originators, deployers, brands, and end users, do not act as agents, contractors, brokers, representatives, or affiliates of IDDAS or of each other.

Participation creates no authority, obligation, or representation relationship of any kind.

All actions are performed independently under the same published protocol rules.

What exactly is being sold or charged for?

IDDAS does not sell access, exposure, outcomes, leads, or personal data.

Charges apply only to verified activation events as defined by the protocol.

An activation is a recorded, intentional entry event. It does not guarantee engagement, conversion, revenue, or results.

Payment is for the occurrence of the event itself, not for performance.

Does participation create obligations or guarantees?

No.

Participation in IDDAS creates no obligation to perform, promote, convert, or deliver outcomes.

The protocol does not guarantee results, revenue, engagement, or success for any participant.

Outcomes follow rules. Effort, intent, or expectation does not create entitlement.

What is an Infrastructure Originator?

An Infrastructure Originator is a protocol-level lineage root that authorizes and anchors one or more activation surfaces that later produce verified activations.

Infrastructure Originator status is not granted, approved, or claimed. It emerges only if downstream, protocol-valid activations occur.

What is an activation surface?

An activation surface is any protocol-issued entry mechanism that enables intentional activation.

Surfaces may be physical, digital, or hybrid. Function matters, not form.

If intentional entry occurs and produces a valid activation, the surface qualifies.

Do Infrastructure Originators have to deploy or operate the surfaces themselves?

No.

Infrastructure Originators may authorize or enable deployment without physically creating, installing, or operating the activation surfaces themselves.

The protocol records origination structurally, not operational effort.

Is an Infrastructure Originator just a salesperson or affiliate?

No.

Infrastructure Origination is not a sales role, affiliate program, referral scheme, or commission for introductions.

Infrastructure Originators are compensated only when protocol-valid activations occur through originated surfaces.

How are Infrastructure Originators paid?

If a valid infrastructure origin exists, a fixed Infrastructure Originator share is allocated automatically according to the protocol rule.

If no qualifying activations occur, no allocation occurs.

Where does the Infrastructure Originator share come from?

The Infrastructure Originator share is allocated from the platform share.

It does not reduce participant distributions and does not alter lineage-based allocations.

What is an Infrastructure Originator, legally speaking?

An Infrastructure Originator is not an employee, contractor, sales agent, or reseller.

It is a protocol-defined attribution role that emerges only when originated activation surfaces produce verified activations.

Infrastructure Originator attribution does not imply approval, endorsement, exclusivity, or responsibility.

Payment occurs only if qualifying revenue exists and only according to the published rule.

Can Infrastructure Originator attribution be removed or bypassed?

No.

Infrastructure Originator attribution is written at activation creation time and cannot be edited, reassigned, or removed retroactively.

Off-protocol agreements do not alter protocol outcomes.

What prevents brands or partners from bypassing Infrastructure Originators?

Protocol attribution is structural and deterministic.

Attempts to replicate, suppress, or bypass Infrastructure Originator allocation while using protocol-generated activations do not affect on-protocol results and may violate access terms.

Is identity required to become an Infrastructure Originator?

No.

Infrastructure Origination does not require identity, registration, or approval.

Identity may be required later only to claim funds, according to protocol rules.

Does Infrastructure Origination guarantee income?

No.

Infrastructure Origination creates eligibility, not entitlement.

Payment occurs only if qualifying activations and qualifying revenue occur.

What happens if IDDAS is used for prohibited or illegal activity?

Activations associated with prohibited or illegal activity do not produce qualifying revenue.

No allocation or payout occurs for non-qualifying revenue, regardless of attribution.

Use of IDDAS remains subject to the platform’s Terms and Conditions and applicable law.

Protocol attribution does not override enforcement, compliance, or legal requirements.

Why define Infrastructure Originators at the protocol level?

Because infrastructure contribution is structural, not discretionary.

Encoding origination as a rule prevents disputes, renegotiation, and retroactive exclusion as systems scale.

Why explain this in the FAQ?

Because these are structural questions, not marketing claims.

The FAQ exists to eliminate ambiguity before it becomes conflict.

Hard questions

Protocol-level objections and direct answers .

These are intentionally direct - and intentionally separated - so the standard FAQ stays clean.

Isn’t this just QR codes and attribution dressed up?

No.

QR codes, links, and attribution already exist. IDDAS is not about inventing those primitives. What is new is the order of operations and the governance model.

IDDAS enforces that activation happens before identity, attribution follows lineage instead of accounts, and economic outcomes follow a published rule that cannot be silently changed. Most systems do the opposite - they start with identity, infer attribution later, and negotiate economics case by case.

That combination is the difference.

Are you really saying there are no competitors?

There are competitors to parts of IDDAS.

There are attribution tools, referral platforms, ad-tech systems, IoT platforms, and blockchain protocols. None of them combine identity-free activation, object-based capabilities, lineage-based attribution, fixed economics, and independent verification in a single system.

So we don’t claim there are no competitors. We claim there are no direct protocol peers.

If identity is optional, how do you prevent fraud?

IDDAS does not rely on identity to prevent fraud.

It relies on verifiable actions, environment constraints, and lineage. Activations are bound to specific objects or environments with defined capabilities. Patterns, limits, and verification anchors detect abuse without forcing identity at the start.

Identity can be introduced later if required, but it is not foundational. This is why IDDAS works in crowds, public spaces, and shared environments.

Why lock yourself into fixed economics? Isn’t that bad business?

In the short term, it reduces flexibility. In the long term, it creates trust.

Protocols publish rules in advance so participants can rely on outcomes. IDDAS separates infrastructure from governance. Clients pay for activations. Distribution follows a published rule. No silent changes. No per-client exceptions.

That constraint is intentional.

Why use blockchain at all? Isn’t that unnecessary?

Blockchain is not used for user interaction, payments, or identity.

It is used only as a neutral verification layer to anchor rule versions and payout proofs so outcomes cannot be rewritten after the fact. No wallets are required. No tokens are required. No participant needs crypto knowledge.

If a better neutral verification layer existed, IDDAS could use that instead. The goal is verifiability, not crypto.

How is this not just an enterprise SaaS with strong opinions?

SaaS can change rules quietly. Protocols cannot.

IDDAS publishes the order of operations, attribution logic, and economic rules in advance. Even the operator is bound by them. That constraint is what makes it a protocol rather than a configurable product.

What stops someone from copying this?

Interfaces can be copied. Features can be copied.

What cannot be easily copied is credibility earned through consistency. Protocols win by being first, clear, and stable. Once participants rely on a rule, switching costs are not technical - they are trust-based.

IDDAS also has patent protection, but more importantly, it has protocol legitimacy.

Why hasn’t someone already built this?

Because it requires giving up short-term control.

Most companies want pricing flexibility, bespoke deals, and the ability to change rules quietly. Protocols require deciding hard constraints early - what never changes, what cannot be customized, and what even the operator is not allowed to do.

Most teams avoid that. IDDAS didn’t.

Is CandleMe a distraction from the protocol?

No.

CandleMe is a carrier, not a fork. It proves that IDDAS works at the object level, not just in apps or accounts. Stadiums, out-of-home advertising, events, transit, and physical products all use the same activation logic.

CandleMe demonstrates generality, not limitation.

What would a real competitor actually look like?

A real competitor would need to start with activation before identity, bind capabilities to objects or environments, use lineage-based attribution, enforce fixed and published economic rules, provide independent verification, and work across industries without rewriting core logic.

No existing system does all of this today.

Final clarification

IDDAS is not special because it is clever. It is special because it is constrained.

The system deliberately limits what the operator can do so others can rely on outcomes. That is why it behaves like a protocol, not a product.

Who ultimately controls IDDAS if the rules are fixed?

IDDAS is operated by an entity, but governed by published rules.

Operational control (infrastructure, uptime, integrations) remains with the operator. Outcome control (attribution, economics, verification) is constrained by the protocol. The operator cannot silently rewrite attribution logic, retroactively alter payouts, or change economic splits without publishing a new rule version.

This separation is deliberate. It limits operator power so participants can rely on outcomes.

What happens if IDDAS as a company fails or changes ownership?

The protocol rules and verification anchors remain valid regardless of company changes.

Because rule versions and payout proofs are independently verifiable, historical outcomes do not depend on ongoing trust in the operator. A new operator must honor existing rules going forward or publish a new version that applies only to future activations.

This is one of the reasons IDDAS behaves like a protocol rather than a traditional SaaS vendor.

Doesn’t this reduce flexibility for enterprise customers?

Yes, by design.

IDDAS does not optimize for bespoke enterprise deals. It optimizes for predictable, repeatable outcomes. Enterprises still configure deployments, environments, and campaigns, but the core rules are not negotiated per client.

This is the same tradeoff every successful protocol makes: less short-term flexibility in exchange for long-term reliability.

How does IDDAS scale without identity if volume becomes massive?

Identity is not a scaling primitive. Verification is.

IDDAS scales by anchoring actions to environments, objects, and capabilities rather than user accounts. Rate limits, context constraints, environment capacity, and lineage validation scale far better in crowds than identity-based systems.

Identity can be layered in selectively where required, but it is never the bottleneck.

What happens when regulations require identity or consent?

IDDAS is compatible with identity requirements without being dependent on them.

Identity, consent, and compliance layers can be introduced at the edge when required by law or policy. The protocol itself does not prevent identity usage - it simply does not require it to begin.

This allows IDDAS to operate across jurisdictions with different regulatory expectations.

Isn’t lineage-based attribution hard to explain to customers?

At first, yes. Over time, it becomes simpler than account-based attribution.

Lineage answers a clearer question: how did this happen? Customers do not need to understand every internal detail. They only need to know that attribution follows a verifiable chain of actions rather than opaque platform decisions.

Most users never see lineage directly. They benefit from its fairness indirectly.

Couldn’t fixed rules discourage innovation over time?

Protocols do not prevent innovation. They constrain where it happens.

IDDAS allows innovation at the object level, environment level, campaign level, and content level. What does not change is how value is attributed and distributed once outcomes occur.

This creates a stable foundation on top of which innovation can safely happen.

What if a client wants different economics than the protocol allows?

Then IDDAS is likely not the right system for that use case.

IDDAS is designed for environments where predictability, neutrality, and verifiability matter more than bespoke terms. That constraint is intentional and helps maintain trust across participants.

Not every system should be a protocol. IDDAS chooses to be one.

Does this mean IDDAS grows more slowly?

Often, yes.

Protocols typically grow more slowly at first because they refuse shortcuts. Over time, they tend to become deeply embedded because switching away means losing predictability and trust, not just features.

IDDAS is built for durability, not velocity at all costs.

What is the biggest risk to IDDAS?

The biggest risk is breaking its own rules.

If IDDAS were ever to undermine its published constraints, it would stop being a protocol and become just another platform. That risk is taken seriously, which is why verification and rule versioning are core, not optional.

Trust is not claimed. It is enforced.

Final note

IDDAS is intentionally opinionated. It does not try to serve every business model. It exists to make real-world activation, attribution, and value distribution reliable in environments where identity-first systems fail.

That tradeoff is the point.

Isn’t this too rigid to adapt to future markets?

IDDAS is rigid where trust matters and flexible where innovation matters.

The protocol fixes the order of operations, attribution logic, and economic rules. Everything else - environments, objects, campaigns, interfaces, integrations, and content - can evolve freely.

This separation allows IDDAS to adapt to new markets without undermining past outcomes.

What prevents IDDAS from becoming a gatekeeper?

The protocol itself.

Because rules are published in advance and outcomes are verifiable, IDDAS cannot quietly privilege one participant over another. The operator provides infrastructure, not discretionary authority over attribution or payouts.

Gatekeeping requires opacity. IDDAS is designed to remove it.

What happens if a powerful customer pressures you to change the rules?

Then the answer is no.

IDDAS cannot change rules retroactively or privately. Any change must be published as a new rule version and applies only to future activations. If a customer requires bespoke economics or exceptions, IDDAS is likely not the correct system for that use case.

This constraint protects everyone else.

Could IDDAS be captured by investors or future management?

Only operationally, not economically.

Infrastructure decisions can change. The protocol rules that govern attribution and distribution are constrained by publication, versioning, and verification. Any attempt to undermine those constraints would be visible and would invalidate trust.

Protocols survive leadership changes because their legitimacy is rule-based, not personality-based.

Isn’t “activation before identity” dangerous from a safety perspective?

It would be, if identity were the only safety tool.

IDDAS uses environment constraints, capability limits, rate controls, and lineage validation to maintain safety. Identity is available when required, but it is not the default control mechanism.

This mirrors how physical systems work: tickets, doors, meters, and tools do not ask who you are first. They enforce rules through design.

What if bad actors try to flood the system with meaningless activations?

Not all activations are billable.

IDDAS distinguishes between raw triggers, qualified activations, and billable outcomes. Qualification thresholds, environment constraints, and pattern analysis prevent noise from becoming value.

Billing is tied to verified, intent-qualified activations, not volume alone.

Does this require customers to trust IDDAS more than other platforms?

Less, not more.

Traditional platforms require trust that rules won’t change quietly. IDDAS reduces that trust requirement by making rules explicit and outcomes verifiable. Participants do not need to trust intentions. They can verify behavior.

That shift is fundamental.

Is this overkill for simple use cases?

Sometimes, yes.

Not every use case needs a protocol. IDDAS is designed for environments where scale, neutrality, and attribution fairness matter. For simple, closed systems, lighter tools may be sufficient.

IDDAS does not try to replace everything. It exists for cases where failure modes are expensive.

What is the biggest philosophical bet IDDAS is making?

That trust should be enforced by structure, not promised by brand.

IDDAS assumes that real-world activation systems will increasingly operate in shared spaces, crowds, and environments where identity-first models break down. In those contexts, rules must be clear, fixed, and verifiable.

That belief shapes every design decision.

What would invalidate IDDAS as a protocol?

If IDDAS ever allowed silent rule changes, retroactive outcome manipulation, or discretionary attribution, it would stop being a protocol.

That is the line that is not crossed. Everything else is negotiable.

Final boundary

IDDAS is not trying to be everything to everyone. It is intentionally opinionated. Its strength comes from choosing constraints early and living with them.

That is why it behaves like a protocol instead of a platform.

↑ Top