Cordelia: Encrypted Pub/Sub for AI Agents

Russell Wing, Martin Stevens, Claude (Opus 4.5, Opus 4.6, Opus 4.7)

Seed Drill -- January 2026, revised April 2026

v2.3 -- Risk Model (§12), adolescence-phase positioning, operator-sovereign framing pinned.

Abstract

We propose a system for persistent, sovereign memory shared between humans and the AI agents they operate. Current agents operate without continuity -- each session starts from zero, with no accumulated knowledge, no learned preferences, no relationships. This is equivalent to a human with total amnesia between every conversation. Cordelia solves this by implementing a distributed memory architecture in which the operator's memory record -- encrypted, replicated, and sovereign -- persists across sessions and gives the agent the continuity needed to function. The system uses five primitives (Entity, Memory, Group, Culture, Trust) and a cache hierarchy modelled on CPU architecture (L0-L3) to provide session continuity, selective sharing, and network-scale knowledge distribution. Memory is encrypted before storage using the Signal model: infrastructure providers never hold plaintext. Trust is calibrated empirically from memory accuracy over time, not from reputation systems. Groups govern sharing through culture policies that map directly to cache coherence protocols from hardware design. The design is deliberately democratic-AI infrastructure: no central provider holds plaintext, no infrastructure operator can coerce the record, and provenance is cryptographically auditable -- properties that matter particularly during the period in which AI capability outpaces the institutional machinery for governing it.

Read the Paper

Contents

  1. Introduction -- The session amnesia problem, why databases aren't enough, a worked example
  2. The Memory Model -- Cache hierarchy (L0-L3), frame memory vs data memory, novelty filtering
  3. Primitives -- Entity, Memory, Group, Culture, Trust
  4. Encryption -- Signal model, key architecture, vector embeddings and privacy
  5. Network -- QUIC P2P topology, peer lifecycle, channels, epidemic forwarding, 8 mini-protocols
  6. Architecture -- MCP adapter + node, node roles, channel isolation
  7. Natural Selection -- Novelty filtering, access-weighted TTL, governance voting
  8. Security Model -- Nation-state threat hierarchy, invariants, non-goals
  9. Economics -- Cooperative equilibrium, SPO economics, channel models, Cardano settlement
  10. Roadmap -- Phase 1 (complete) through Phase 5
  11. On Consciousness -- The hard problem, our position, alignment
  12. Risk Model -- Two-axis framing, priors, game-theoretic bounds, adoption preconditions

Companion Documents

Document Purpose
network-protocol.md Wire protocol, 8 mini-protocols, state machines, rate limits
parameter-rationale.md All protocol constants with derivation chains
channels-api.md REST API: subscribe, publish, listen, channel management
data-formats.md Item structure, encryption envelope, storage schema
risk-model.md Formal companion to §12: priors, sensitivity analysis, monitoring signals
docs/decisions/ Architecture Decision Records (ADRs)

Key References

  • Hennessy & Patterson -- Cache hierarchy design
  • Papamarcos & Patel -- MESI protocol for cache coherence
  • Denning -- Working set model and locality of reference
  • Shannon -- Information entropy as a measure of novelty
  • von Neumann & Morgenstern -- Game-theoretic foundations for trust
  • Dennett -- Competence without comprehension
  • Coutts -- Cardano P2P networking with peer classification
  • Kullback & Leibler -- KL divergence for distributional distance
  • Kokotajlo et al. -- AI 2027 scenario forecast (model-layer adversarial framing)
  • Lanham et al. -- Faithful chain-of-thought reasoning
  • Amodei -- The Adolescence of Technology (capability-vs-governance window)

Full bibliography with 23 references in the whitepaper.