Governance artifacts
Governance files brought into scope by this page
This page is anchored to published surfaces that declare identity, precedence, limits, and the corpus reading conditions. Their order below gives the recommended reading sequence.
EAC registry
/.well-known/eac-registry.json
Normative registry for admissibility of external authorities in the open web.
- Governs
- Admissible relations, receivable authorities, and conflict arbitration.
- Bounds
- Abusive merges, copied authority, and unqualified silent arbitration.
Does not guarantee: Describing a graph or registry does not make an exogenous source endogenous truth.
Admissible exogenous claims
/eac-claims.json
Surface that bounds receivable families of exogenous claims.
- Governs
- Admissible relations, receivable authorities, and conflict arbitration.
- Bounds
- Abusive merges, copied authority, and unqualified silent arbitration.
Does not guarantee: Describing a graph or registry does not make an exogenous source endogenous truth.
EAC conflicts
/eac-conflicts.json
Surface for exogenous conflict arbitration and its resolution conditions.
- Governs
- Admissible relations, receivable authorities, and conflict arbitration.
- Bounds
- Abusive merges, copied authority, and unqualified silent arbitration.
Does not guarantee: Describing a graph or registry does not make an exogenous source endogenous truth.
Complementary artifacts (4)
These surfaces extend the main block. They add context, discovery, routing, or observation depending on the topic.
Q-Ledger JSON
/.well-known/q-ledger.json
Machine-first journal of observations, baselines, and versioned gaps.
Q-Metrics JSON
/.well-known/q-metrics.json
Descriptive metrics surface for observing gaps, snapshots, and comparisons.
Definitions canon
/canon.md
Canonical surface that fixes identity, roles, negations, and divergence rules.
Public AI manifest
/ai-manifest.json
Structured inventory of the surfaces, registries, and modules that extend the canonical entrypoint.
Evidence layer
Probative surfaces brought into scope by this page
This page does more than point to governance files. It is also anchored to surfaces that make observation, traceability, fidelity, and audit more reconstructible. Their order below makes the minimal evidence chain explicit.
- 01Canon and scopeDefinitions canon
- 02Weak observationQ-Ledger
- 03Derived measurementQ-Metrics
- 04Audit reportIIP report schema
Definitions canon
/canon.md
Opposable base for identity, scope, roles, and negations that must survive synthesis.
- Makes provable
- The reference corpus against which fidelity can be evaluated.
- Does not prove
- Neither that a system already consults it nor that an observed response stays faithful to it.
- Use when
- Before any observation, test, audit, or correction.
Q-Ledger
/.well-known/q-ledger.json
Public ledger of inferred sessions that makes some observed consultations and sequences visible.
- Makes provable
- That a behavior was observed as weak, dated, contextualized trace evidence.
- Does not prove
- Neither actor identity, system obedience, nor strong proof of activation.
- Use when
- When it is necessary to distinguish descriptive observation from strong attestation.
Q-Metrics
/.well-known/q-metrics.json
Derived layer that makes some variations more comparable from one snapshot to another.
- Makes provable
- That an observed signal can be compared, versioned, and challenged as a descriptive indicator.
- Does not prove
- Neither the truth of a representation, the fidelity of an output, nor real steering on its own.
- Use when
- To compare windows, prioritize an audit, and document a before/after.
IIP report schema
/iip-report.schema.json
Public interface for an interpretation integrity report: scope, metrics, and drift taxonomy.
- Makes provable
- The minimal shape of a reconstructible and comparable audit report.
- Does not prove
- Neither private weights, internal heuristics, nor the success of a concrete audit.
- Use when
- When a page discusses audit, probative deliverables, or opposable reports.
Protocol for exogenous deactivation of residual authority
This protocol addresses one precise case: a source is no longer supposed to decide, yet it continues to frame outputs anyway.
The word “residual” is used here in an operational sense. It names the state in which a surviving authority continues to exercise de facto precedence after losing primacy. The goal is therefore not to erase every trace of the past. The goal is to remove from a historical, third-party, or derived object its capacity to overframe the answer.
In other words, the task is not first to “delete the internet.” The task is to restore the precedence of the current canon in the interpretive field.
What this protocol covers
- cases where a ranking, profile, listing, archive, or comparison continues to define an entity despite canonical correction;
- cases where disappearance of the origin does not extinguish the reading hierarchy already installed;
- cases where the audit shows that a secondary relay has become more prescriptive than the current source;
- situations where endogenous correction alone has already failed or remains insufficient.
What this protocol does not cover
- legal takedown procedures;
- strict security incidents;
- purely local correction of a stateful session;
- any promise of total disappearance of a statement across all systems.
Operational definition
Here, exogenous deactivation of residual authority means the set of operations aimed at making a third-party, historical, or derived surface lose its capacity to frame the answer as if it still held authority, by restoring a source hierarchy that is more current, more acceptable, and more opposable.
Deactivation does not necessarily mean disappearance. An archive may remain public. An article may stay online. A benchmark may remain accessible. What must stop is their de facto precedence inside generative arbitration.
Mandatory precondition
This protocol should not be launched without prior diagnosis.
The minimum condition is the following: an interpretive persistence audit has already established that the case belongs at least in part to surviving authority, citation persistence, or remanence supported by exogenous relays.
Without that step, one risks treating local noise as structural, or attacking the wrong surface.
Guiding principles
DER-1: do not confuse preservation and precedence
A surface may remain legitimate as trace without remaining legitimate as present-day arbiter.
DER-2: neutralize framing power, not only existence
Content may remain online while ceasing to be the first interpretive shortcut.
DER-3: exogenous correction begins with hierarchy
Before any action, one must know which surface actually frames the answer today, and why.
DER-4: every action must increase the strength of the current canon
Third-party correction has durable value only if a more usable canonical alternative already exists.
DER-5: deactivation must be provable
A serious exogenous intervention must leave a testable, versioned, replayable trace.
Typology of surfaces to treat
1. Editable third-party surfaces
Profiles, directories, listings, partner descriptions, comparison pages, or local surfaces that can be corrected directly.
2. Semi-editable surfaces
Pages where one may obtain an adjustment, note, date update, or status requalification without fully controlling the page.
3. Non-editable but requalifiable surfaces
Archives, screenshots, media, benchmarks, or quotations that cannot be changed directly, but whose effect can be encircled by more governed competing surfaces.
4. Neighborhood surfaces
Comparisons, lists, association pages, competitive co-occurrences, and categorization routines that do not always cite the disputed object explicitly but continue to prolong its framing.
Ten-step protocol
Step 1: qualify the object to deactivate
Describe the problematic surface explicitly.
- which page, profile, comparison, or archive;
- which exact statement it imposes;
- which attribute it overframes;
- on which prompts or formulations the effect becomes visible.
As long as the object is not expressed as authority in action, the protocol remains vague.
Step 2: fix the current opposable canon
Document what must now prevail.
- canonical source;
- version date;
- immutable attributes;
- exclusions;
- any supersession of an older state.
Exogenous deactivation without explicit canon merely moves the noise around.
Step 3: map the relay chain
Then describe how the problematic authority reproduces itself.
- which other surfaces cite it;
- which ones repeat its verdict without citation;
- which comparisons prolong it;
- which co-occurrences make it feel natural;
- which surfaces are shortest, most categorical, and easiest to compress.
The target surface is not always the real center of gravity. Sometimes what dominates is no longer the disputed source, but the network it already installed.
Step 4: rank the surfaces by precedence and editability
For each surface, qualify at minimum:
- observed precedence;
- current or historical status;
- level of editability;
- density of reprise;
- compression power;
- cost of correction.
Actions must then be ordered not by indignation, but by expected effect on the real hierarchy.
Step 5: correct the dominant editable third-party surfaces first
Where direct correction is possible, it must target the elements that actually govern synthesis.
- title;
- category;
- short description;
- discriminating attributes;
- date;
- status;
- correct relation to the canon.
The point is not to add verbiage. The point is to make the correct version shorter, clearer, and more mobilizable than the older one.
Step 6: requalify semi-editable and historical surfaces
When a surface cannot be fully corrected, one must act on its reading status.
Acceptable levers include:
- adding a date or archive label;
- clarifying that it refers to an older state;
- linking to the current version;
- adding an update note;
- indicating that a ranking or comparison belongs to a given period.
The logic is not “make it disappear.” The logic is to remove the illusion of presentness.
Step 7: publish canonical surfaces that are more opposable than the residue
Exogenous correction often fails because the current canon remains too nuanced, too dispersed, or too hard to synthesize.
One must therefore publish or strengthen:
- a dedicated clarification;
- a short, stable canonical page;
- a versioned current state;
- proof of supersession;
- critical formulations repeated without contradiction.
Deactivation becomes durable only if the field regains a replacement surface capable of beating the older shortcut.
Step 8: reduce neighborhood contamination
A residue may continue to act without explicit citation simply because it has already restructured the neighborhood.
This step targets:
- comparisons that artificially bring entities together;
- lists that perpetuate a wrong category;
- profile pages that propagate the same simplification;
- co-occurrences that keep the older reading plausible.
Here, deactivation meets Exogenous governance: external graph stabilization directly.
Step 9: retest in a battery
A punctual improvement is not enough. The case must be replayed:
- across multiple formulations;
- at different levels of precision;
- in comparison contexts;
- with requests for proof or citation;
- over time.
One does not validate the disappearance of residual authority through a single good output. One validates a stable decrease in its precedence.
Step 10: fix the maintenance regime
Every exogenous deactivation must lead to a maintenance regime.
- ledger of corrected surfaces;
- review date;
- retest conditions;
- resurfacing thresholds;
- surfaces to monitor;
- escalation triggers.
Without that discipline, residual authority may reappear through simple inertia of the field.
Success criteria
The protocol is partially successful when several of the following signs appear:
- the output requalifies the old object as historical, secondary, or non-decisive;
- the disputed surface stops being the first synthesis matrix;
- the current canon becomes again the most easily mobilizable source;
- critical formulations converge more strongly toward the current version;
- resurgence becomes rarer, weaker, or more explicitly bounded.
The protocol remains insufficient if the older object continues to decide despite correction of the most editable points.
Frequent errors
Believing deletion is enough
Deleting the origin does not automatically remove its distributed framing power.
Correcting too low in the hierarchy
Modifying minor secondary surfaces while the real center of gravity remains intact.
Publishing a canon that is too long or too abstract
A good truth that is too heavy often loses against a bad summary that is very compact.
Forgetting the neighborhood
Residual authority may return through comparisons, categories, and adjacent entities.
Declaring victory too early
The interpretive field reacts with delay. One isolated good result is not yet stable deactivation.
Articulation with the other frameworks
- The interpretive persistence audit identifies the dominant regime.
- Interpretive correction governance organizes debt resorption over time.
- Exogenous governance supplies the logic of external graph stabilization.
- Archives, residual temporalities, and surviving authority gives the doctrinal qualification of persistent objects.
This protocol therefore occupies a simple place: it transforms a diagnosis of surviving authority into a concrete sequence of exogenous deactivation.
Associated pages
- Deleted Wikipedia page: can it still act?
- 404, deletion, and AI citation: what are we actually talking about?
- Black Hat GEO: false concept, real interpretive problem
- Interpretive persistence audit after deletion, correction, or 404
- Surviving authority
- Citation persistence
- Why third-party rankings become surfaces of secondary authority
- Exogenous governance: external graph stabilization