Part III — Protocol & Operations
last updated: 2026-03-01
This part covers how the system is composed and operated:
- reference architectures and component boundaries
- economic-security mechanisms as operational constraints
- monitoring and dispute handling in adversarial environments
- contributor workflows and operational playbooks
Recommended reading path (30–45 minutes)
- Factory Architecture Diagram — the one-page mental model.
- Reference Architecture — system components and boundaries.
- Economic Security — how acceptance constraints show up operationally.
- Operations — monitoring, drift detection, dispute handling.
- Developer Guides — day-to-day working rules.
What you can do after Part III
- Operate the protocol factory with audit-grade logs and reproducible bundles
- Investigate and respond to disputes using watcher-grade evidence
- Onboard contributors safely