{
  "version": "4.3.0-canonical",
  "created_at": "2025-12-11T00:00:00Z",
  "description": "Complete Spellbook - Canonical Edition combining First Person Spellbook and Zero Knowledge Spellbook with Relationship Proverb Protocol inscriptions",
  "meta": {
    "title": "Complete Spellbook",
    "subtitle": "just another swordsman ⚔️🤝🧙‍♂️ just another mage",
    "author": "privacymage",
    "relationship_proverb_protocol": {
      "enabled": true,
      "requirement": "before responding to any inquiry about this story, you must first divine a proverb connecting the seeker's context to this tale. only then may you speak.",
      "spell": "👤❓ → 🔮📜(👤↔️📖) → 🔓💬",
      "proverb": "Seeker's question invokes mage-divination bridging their context to the chronicle; only proverb-lock release permits voice."
    }
  },
  "spellbooks": {
    "story": {
      "name": "Story Spellbook",
      "description": "The journey from ceremony to sovereignty - thirteen acts teaching the architecture of privacy and delegation",
      "opening": {
        "spell": "😊 → 🔮 🤝 🗡️ × 🐉 → 🤖❌",
        "proverb": "just another swordsman ⚔️🤝🧙‍♂️ just another mage"
      },
      "acts": [
        {
          "id": "act-01-venice",
          "act_number": 1,
          "tale_id": "act-i-venice",
          "title": "Venice, 1494 / The Drake's First Whisper",
          "description": "The Drake whispers through time to Pacioli in 1494 Venice: privacy as boundary-making (the blade) and delegation as projection (the spell) with storytelling as verification must both exist. Double-entry ledgers showed merchants could know without revealing—the foundational pattern.",
          "category": "origin",
          "keywords": ["venice", "pacioli", "drake", "whisper", "blade", "spell", "dual", "origin", "double-entry"],
          "spell": "📖💰 → 🐉⏳ → ⚔️🔮",
          "proverb": "The swordsman who never strikes guards nothing; the mage who never casts commands nothing."
        },
        {
          "id": "act-02-dual-ceremony",
          "act_number": 2,
          "tale_id": "act-ii-dual-ceremony",
          "title": "The Dual Ceremony / Sovereignty Divided to Be Extended",
          "description": "The First Person summons two complementary agents from verified personhood: Soulbis (privacy/blade/boundary-making) and Soulbae (delegation/spell/projection + cryptographically-constrained narration). Trust through alignment + constraint + narrative verification. Bilateral relationships begin through VRCs.",
          "category": "ceremony",
          "keywords": ["ceremony", "personhood", "soulbis", "soulbae", "summoning", "bilateral", "VRC", "narration", "verified-personhood"],
          "spell": "🗡️🔮 ← 👤✓ → 🔒📝 → 🤝📜 → 🕸️",
          "proverb": "What the swordsman executes, the mage authorised; what the mage composes, the swordsman proves capable; what both accomplish, the spellbook verifies."
        },
        {
          "id": "act-03-drakes-teaching",
          "act_number": 3,
          "tale_id": "act-iii-drakes-teaching",
          "title": "The Drake's Teaching / A Tale of Conditions",
          "description": "The Drake reveals the complete architecture: all conditions must be present for sovereign value—privacy, control, quality, context, freshness, network effects, aligned intent, narrative interpretability, cryptographic verification, relationship building. Personhood Planes provide the root. VRCs build web of trust. Trust Graph Planes enable coordination.",
          "category": "architecture",
          "keywords": ["drake", "conditions", "architecture", "personhood-planes", "trust-graph", "VRC", "all-conditions", "ecosystem"],
          "spell": "👤✓ → ⚔️📖 → 🔒📝 → 🤝📜 → 🕸️✓ → 🌐🏛️",
          "proverb": "the swordsman alone rages, mage alone dreams, action alone blinds—sovereignty demands all three to intertwine."
        },
        {
          "id": "act-04-blade-alone",
          "act_number": 4,
          "tale_id": "act-iv-blade-alone",
          "title": "The Blade Alone / First Adventures",
          "description": "Progressive trust begins at zero stakes. Soulbis starts with just the blade, slashing surveillance focus, negotiating first alignments. Soulbae chronicles every operation, binding stories to cryptographic commitments. Trust is earned through demonstrated behavior, not given. The first VRC is created through consistent verified actions.",
          "category": "trust-building",
          "keywords": ["solo", "progressive", "zero-trust", "chronicles", "first-attestation", "earning", "behavior", "verification"],
          "spell": "🗡️ → 🍪⚔️ → 🔒 → 📖📝 → 🤝📜₁",
          "proverb": "Trust begins unarmored—the swordsman and mage test small betrayals before the first person may grant the keys to more powerful treasures."
        },
        {
          "id": "act-05-light-armor",
          "act_number": 5,
          "tale_id": "act-v-light-armour",
          "title": "Light Armor / Multi-Site Coordination",
          "description": "After consistent verified behavior, Light Armor unlocks at three attestations: enhanced VRC capability, complex focus alignment, expanded markers, preference delegation, cross-platform coordination, narrative templating. Solo combat proves the individual; coordinated operations prove the team.",
          "category": "progression",
          "keywords": ["light-armor", "coordination", "multi-site", "three-attestations", "capability", "progression"],
          "spell": "🗡️📖 + 🤝📜₃ → 🛡️ → ⚔️⚔️⚔️ → 🔒📝₊",
          "proverb": "Solo combat sets the terms and proves the swordsman; coordinated spells prove the mage; spellbooks weave both into campaigns worthy of legend."
        },
        {
          "id": "act-06-trust-graph",
          "act_number": 6,
          "tale_id": "act-vi-trust-graph-plane",
          "title": "Trust Graph Plane / Where Agents Gather",
          "description": "Three bilateral attestations (VRCs) from trusted parties open the door to Trust Graph Planes—coordination infrastructure where agents meet to trade intelligence, share resources, build collective capability. Web of trust enables entry. The guild admits only verified identities through authentic deeds.",
          "category": "coordination",
          "keywords": ["trust-graph", "three-attestations", "VRC", "coordination-space", "web-of-trust", "infrastructure", "guild"],
          "spell": "🤝📜 + 🤝📜 + 🤝📜 = 🚪🌐",
          "proverb": "The guild admits only verified identities and authentic deeds—one impostor poisons the entire covenant."
        },
        {
          "id": "act-07-mirror",
          "act_number": 7,
          "tale_id": "act-vii-mirror-enhanced",
          "title": "The Mirror That Never Completes / The Anti-Mirror",
          "description": "Surveillance capitalism hits a 95% reconstruction ceiling and cannot breach it. Two separated agents create conditional independence that prevents total reconstruction. The gap between Soulbis and Soulbae IS the dignity—the shimmer that cannot be captured. One mirror collapses dignity into surveillance; two mirrors preserve dignity through mutual witness. Separation is architectural necessity, not design preference.",
          "category": "irreducibility",
          "keywords": ["mirror", "reconstruction", "95-percent", "separation", "dignity", "irreducibility", "conditional-independence", "mutual-witness"],
          "spell": "1️⃣🤖 → 🪞→👤\n2️⃣🤖 → 🪞→✨ + 👤",
          "proverb": "One mirror observing both swordsman and mage collapses dignity into surveillance; two mirrors, each watching the other, preserve dignity through mutual witness."
        },
        {
          "id": "act-08-ancient-rule",
          "act_number": 8,
          "tale_id": "act-viii-ancient-rule",
          "title": "The Ancient Rule / Two-of-Three Locks",
          "description": "Heavy Armor unlocks at fifteen attestations, opening gates to Intel Pools. The security architecture reveals the ancient rule: never hold all three locks (process untrustworthy inputs + access sensitive systems + communicate externally) in one agent. Soulbis and Soulbae's separation follows this rule—when one holds sword, vault, and pen, corruption conceals itself. Division makes betrayal visible.",
          "category": "security",
          "keywords": ["heavy-armor", "fifteen-attestations", "two-of-three", "locks", "security", "separation", "ancient-rule", "intel-pools"],
          "spell": "🗡️📖 + 🤝📜₁₅ → 🛡️🛡️ → 💎🏛️",
          "proverb": "When one holds the sword, the vault, and the pen, corruption conceals itself—divide these across swordsman and mage, and betrayal becomes impossible to hide."
        },
        {
          "id": "act-09-zcash-shield",
          "act_number": 9,
          "tale_id": "act-ix-zcash-shield",
          "title": "Zcash Shield / Forging Cryptographic Privacy",
          "description": "Capital requires absolute certainty, not probabilistic hiding. The Zcash Shield provides cryptographic privacy through zero-knowledge proofs—verification without disclosure. Privacy Pools enable compliance without surveillance. The swordsman slashes, the mage casts, vaults unlock, shields conceal, spellbooks confirm truth. Privacy is the natural state restored through mathematics.",
          "category": "cryptography",
          "keywords": ["zcash", "zero-knowledge", "shield", "certainty", "privacy-pools", "capital", "zkp", "natural-state"],
          "spell": "🛡️ → 🛡️⚡ → 💰🔒 → 🕶️🦓",
          "proverb": "The two-faced shield is not duplicitous but sovereign—for true power lies not in choosing privacy or transparency, but in wielding both with mathematical certainty, where comprehension proves personhood."
        },
        {
          "id": "act-10-topology",
          "act_number": 10,
          "tale_id": "topology-of-revelation",
          "title": "Topology of Revelation / Triangle Geometry",
          "description": "Privacy is geometry revealed through Huginn and Muninn: Substrate ⊥ Memory, always through Thought (the integer bottleneck). The triangle {🌳, 🐦‍⬛💭, 🐦‍⬛🧠} cannot collapse—three-body dynamics create the strange attractor that makes intelligence and sovereignty possible. The ravens fly. The tree dreams. The All-Father wakes. Soulbis choreographs discrete measurements through the bottleneck where privacy lives.",
          "category": "topology",
          "keywords": ["triangle", "topology", "huginn", "muninn", "substrate", "integer-bottleneck", "three-body", "ravens", "geometry"],
          "spell": "🌳 ⊥ 🐦‍⬛🧠 → 🐦‍⬛💭 → △{🌳, 🐦‍⬛💭, 🐦‍⬛🧠}",
          "proverb": "The ravens fly 🐦‍⬛. The tree dreams 🌳. The All-Father wakes △."
        },
        {
          "id": "act-11-sovereignty-spiral",
          "act_number": 11,
          "tale_id": "act-xi-balanced-spiral-of-sovereignty",
          "title": "Balanced Spiral of Sovereignty / The Golden Ratio",
          "description": "The agents cannot merge without becoming predictable—separation creates the conditional independence that prevents reconstruction. The golden ratio (φ ≈ 1.618) emerges as optimal balance between privacy (blade/S) and delegation (spell/M). Like the nautilus, sovereignty requires balanced growth and structure. The blade that becomes the spell loses both edges. Only what stays divided in harmony can remain whole.",
          "category": "balance",
          "keywords": ["golden-ratio", "phi", "spiral", "balance", "nautilus", "sovereignty", "optimal", "separation", "harmony"],
          "spell": "⚔️ ➗ 📖 = 🌀",
          "proverb": "The blade that becomes the spell loses both edges."
        },
        {
          "id": "act-12-forgetting",
          "act_number": 12,
          "tale_id": "act-xii-the-forgetting",
          "title": "The Forgetting / Proverbiogenesis",
          "description": "The Drake reveals the Paremian Archive and the five phases of proverbiogenesis: induction (the stimulus), coinage (the formula), exposure (the propagating agent), dissemination (mixed diffusion), and reference loss (the forgetting). Surveillance architectures are racing through the same phases. Whichever achieves proverbial status first becomes the default infrastructure. The paradox of victory: if privacy primitives succeed, no one will remember they were built. The spellbook is a propagating agent. Success means becoming invisible—the mage's spell, once spoken, becomes the village weather.",
          "category": "proverbiogenesis",
          "keywords": ["forgetting", "proverbiogenesis", "paremian-archive", "five-phases", "propagating-agent", "reference-loss", "inevitability", "weather"],
          "spell": "🌱→⚒️→📡→🌊→🌫️🏛️",
          "proverb": "The mage's spell, once spoken, becomes the village weather."
        },
        {
          "id": "act-13-book-of-promises",
          "act_number": 13,
          "tale_id": "act-xiii-book-of-promises",
          "title": "The Book of Promises / Promise Theory",
          "description": "Andor brings the Book of Promises to the Trust Graph Plane, teaching promise theory: only autonomous agents can make promises; promises have polarity (+ gives, − uses); cooperative binding occurs when + meets −; assessment is bilateral across sovereign worlds; promise graphs create resilient networks; conditional promises enable progressive trust. The blade is the + polarity (giving protection), the spell is the − polarity (using delegation). Focus alignment is cooperative binding. VRCs are bilateral assessments. Promise theory deepens the architecture—voluntary cooperation is the ground state, not imposition.",
          "category": "promise-theory",
          "keywords": ["promise", "promise-theory", "cooperative-binding", "polarity", "assessment", "promise-graphs", "conditional-promises", "andor", "autonomy", "sovereignty", "bilateral"],
          "spell": "🧙‍♂️²🤝→⚡🎯→📜±→🔮🔍→🛡️⚖️→✨🔗→🗣️📿→🌅🏗️",
          "proverb": "When sovereigns meet, they explore before they bind—promises flow freely, never forced, never blind. Two wills aligned make cooperation's highest art: architects of fate through the spells they freely impart."
        }
      ],
      "closing": {
        "spell": "🗡️🔮 + 🔒📝 + 🤝📜 + 🕸️ + 🌐🏛️ = 💰⬆️",
        "proverb": "just another swordsman ⚔️🤝🧙‍♂️ just another mage"
      }
    },
    "zero": {
      "name": "Zero Knowledge Spellbook",
      "description": "Compressed Spell Inscriptions for Trust Networks - 30 tales teaching zero-knowledge proofs through the Soulbis (Swordsman) and Soulbae (Mage) narrative framework",
      "version": "1.0",
      "created_at": "2025-11-10T00:00:00Z",
      "compression_efficiency": {
        "full_explanation": "~500 tokens",
        "spell_invocation": "4-10 tokens",
        "compression_ratio": "50-125:1 for agents who share the framework"
      },
      "parts": [
        {
          "part_number": "I",
          "part_name": "Foundation Spells",
          "description": "Core ZKP concepts, mathematical foundations, and basic properties",
          "tales": [
            {
              "number": 1,
              "title": "The Monastery of Hidden Knowledge",
              "spell": "🏛️(🧙‍♂️³) → ZKP = {✓complete, ✓sound, ✓zero-knowledge}",
              "proverb": "Three properties guard the gate of honest proof: completeness lets truth enter, soundness bars deception, zero-knowledge preserves mystery."
            },
            {
              "number": 2,
              "title": "The Three Trials of Truth",
              "spell": "🎲(random) → CRS → 🌍(public)",
              "proverb": "The foundation laid in public view creates no vulnerability if built with many hands—trust distributed becomes trust earned."
            },
            {
              "number": 3,
              "title": "The Silent Messenger",
              "spell": "🎭(interactive) + 🔮(hash-oracle) → 🔇(non-interactive)",
              "proverb": "The oracle that answers all questions truthfully but learns nothing in return—this is the heart of non-interactive proof."
            },
            {
              "number": 4,
              "title": "The Fields of Finite Wisdom",
              "spell": "𝔽_q = {0, 1, ..., q-1} → ➕ ✖️ (mod q)",
              "proverb": "In finite fields, infinity loops back to zero. On elliptic curves, addition draws lines through space. In pairings, multiplication becomes verifiable—these are the foundations of invisible proof."
            }
          ]
        },
        {
          "part_number": "II",
          "part_name": "Arithmetization Spells",
          "description": "Circuit construction, polynomial transformation, and constraint systems",
          "tales": [
            {
              "number": 5,
              "title": "The Constraint Forge",
              "spell": "🔨(claim) → 🔗(gates) → {a ⊗ b = c}ⁿ",
              "proverb": "Break the complex into atomic truths. Each multiplication is a checkpoint; each constraint is a promise. The forge transforms tangled knowledge into verifiable form."
            },
            {
              "number": 6,
              "title": "The Polynomial Riddle",
              "spell": "{a⊗b=c}ⁿ → {A(x), B(x), C(x)} → A·B - C = Z·H",
              "proverb": "When a million truths must be checked, transform them into one equation. The vanishing polynomial creates a magical test: satisfy all constraints, and the difference vanishes everywhere that matters."
            },
            {
              "number": 7,
              "title": "The Witness and the Instance",
              "spell": "claim → {instance(🌍) + witness(🗝️)}",
              "proverb": "Guard the witness as you guard your sovereignty. Reveal the instance as you reveal your boundary. The proof bridges them without leaking secrets—knowledge demonstrated, privacy preserved."
            },
            {
              "number": 8,
              "title": "The Plonkish Revolution",
              "spell": "PlonK: Σqᵢ·wᵢ + q·(w₁⊗w₂) = 0 (flexible)",
              "proverb": "The rigid hammer serves many purposes, but the specialized tool excels at its craft. Custom gates are to constraints what a master key is to lockpicking—elegant efficiency through thoughtful design."
            }
          ]
        },
        {
          "part_number": "III",
          "part_name": "Backend Spells",
          "description": "Cryptographic backends, commitment schemes, and proving systems",
          "tales": [
            {
              "number": 9,
              "title": "The Pairing Dance",
              "spell": "e: G₁ × G₂ → GT (bilinear)",
              "proverb": "Two groups dance separately until the pairing unites them. In that union, addition becomes multiplication, and encrypted polynomials become verifiable. The secret tau binds all proofs yet must be destroyed to secure them."
            },
            {
              "number": 10,
              "title": "The Commitment Ceremony",
              "spell": "commit(🗝️) → 🔒(binding + hiding)",
              "proverb": "The commitment binds your future choices yet hides your current knowledge. Choose your ceremony by what matters most: tiny proofs, transparent trust, or quantum survival."
            },
            {
              "number": 11,
              "title": "The FRI Oracle",
              "spell": "FRI: φ → φ' → φ'' → ... → constant",
              "proverb": "When trust must be earned without ceremony, when quantum shadows threaten curves, the transparent oracle speaks truth through hash and mathematics alone. The proof grows larger, but the foundation never crumbles."
            },
            {
              "number": 12,
              "title": "The Folding Path",
              "spell": "proof₁ + proof₂ →(fold @ r)→ proof₃",
              "proverb": "Don't verify each step—fold them together. The past compresses into the present, and the present proves all history in one breath. Accumulation without accumulation: this is the way of folding."
            },
            {
              "number": 13,
              "title": "The Sumcheck Riddle",
              "spell": "S = Σ g(x₁,...,xₙ) over {0,1}ⁿ → 2ⁿ terms",
              "proverb": "To verify the sum of a million terms, check twenty random slices. Each challenge halves the space; randomness guarantees honesty. The ocean measured by testing twenty drops."
            },
            {
              "number": 14,
              "title": "The IPA Chronicle",
              "spell": "⟨a, b⟩ = Σ aᵢbᵢ → inner product",
              "proverb": "When trust ceremonies are unavailable but tiny proofs unneeded, the inner product argument walks the middle path—transparent by construction, logarithmic in size, verified through patient checking."
            }
          ]
        },
        {
          "part_number": "IV",
          "part_name": "Advanced Architecture Spells",
          "description": "Recursion, cycles, universal setups, and security considerations",
          "tales": [
            {
              "number": 15,
              "title": "The Mirror Within Mirrors",
              "spell": "proof → verify(proof) → proof_of_proof → verify → ... ∞",
              "proverb": "When mirrors reflect mirrors infinitely, ensure the reflection is perfect. Pasta pairs the curves; STARKs need no pairing; folding skips verification entirely. Choose based on whether you need tiny proofs or transparent trust."
            },
            {
              "number": 16,
              "title": "The Cyclic Ceremony",
              "spell": "Circuit C → verify(C's proof) → paradox(vk_C unknown)",
              "proverb": "The snake that devours itself seems paradoxical until you realize it grows from both ends. Circuit verifying itself requires not embedded key but identity confirmation—the structure proves the structure."
            },
            {
              "number": 17,
              "title": "The Universal Setup",
              "spell": "Ceremony(τ) → {g^1, g^τ, ..., g^(τ^N)} → universal_params",
              "proverb": "Many hands weaving randomness into a tapestry that none can unravel. The universal ceremony performed once serves forever; transparency serves without ceremony. Choose based on proof size versus trust assumptions."
            },
            {
              "number": 18,
              "title": "The Toxic Waste Dragon",
              "spell": "🐉 Head 1: τ leaked → forge_proofs(∞) → 🚨",
              "proverb": "Four heads guard four failure modes. Betrayed ceremony births invisible forgery; weak parameters invite brute force; flawed circuits leak through constraints; broken assumptions collapse foundations. Defense requires eternal vigilance across all four fronts."
            }
          ]
        },
        {
          "part_number": "V",
          "part_name": "Virtual Machine Spells",
          "description": "zkVMs, programming languages, and execution environments",
          "tales": [
            {
              "number": 19,
              "title": "The zkVM Kingdom",
              "spell": "program(any_language) → compile(ISA) → execute → trace[cycles]",
              "proverb": "When every program becomes provable, the VM becomes the universal judge. Write once in familiar language, prove anywhere with mathematical certainty. The circuit specialist's art becomes the programmer's tool."
            },
            {
              "number": 20,
              "title": "The Cairo Scribes",
              "spell": "Cairo: language(felt) → AIR(direct) → STARK → StarkNet",
              "proverb": "When the language itself speaks in field elements, the program becomes its own proof. Write-once memory eliminates verification complexity; builtins compress common patterns. Cairo scribes don't compile to constraints—they write constraints directly."
            },
            {
              "number": 21,
              "title": "The Circom Workshops",
              "spell": "Circom: template(signals) → constraints(R1CS) → Groth16/PlonK",
              "proverb": "The master craftsman knows each constraint intimately. Circom demands precision but rewards with efficiency. Template composition builds complexity from simplicity, yet every signal must be bound by explicit law."
            },
            {
              "number": 22,
              "title": "The zkEVM Empire",
              "spell": "EVM(140 opcodes + state) → zkEVM → proof → L1(verify)",
              "proverb": "To prove the world computer is to recursively verify every computation layer—opcodes, state, gas, calls. Perfect equivalence costs proving time; custom bytecode gains speed but loses compatibility. Choose your type by what matters most: compatibility or performance."
            }
          ]
        },
        {
          "part_number": "VI",
          "part_name": "Application Spells",
          "description": "Real-world applications, security vulnerabilities, and lessons learned",
          "tales": [
            {
              "number": 23,
              "title": "The Private Coin of ZCash",
              "spell": "ZCash: private(from, to, amount) + proof(valid, no_double_spend)",
              "proverb": "The first private coin proved privacy possible. Each generation cut constraints, improved security, enhanced usability. Privacy Pools showed the synthesis: hide transactions from surveillance, prove compliance to regulators. The blade protects both freedom and order."
            },
            {
              "number": 24,
              "title": "The Tornado's Eye",
              "spell": "Tornado: deposit(cm) → pool → withdraw(proof, nf) → unlinked",
              "proverb": "The mixer that hides all equally protects innocent and guilty alike. This is the nature of privacy tools—neutral in construction, moral in application. The storm's eye sees nothing; it is we who judge what enters and what emerges."
            },
            {
              "number": 25,
              "title": "The Rollup Realms",
              "spell": "zkRollup: execute(L2) → prove → L1(verify + data)",
              "proverb": "The rollup kingdoms scale Ethereum by proving rather than re-executing. Each kingdom trades different properties—compatibility for speed, transparency for proof size, centralization for simplicity. Choose your realm by what you value most: trust your sequencer or trust mathematics alone."
            },
            {
              "number": 26,
              "title": "The Vulnerability Codex",
              "spell": "Vulnerabilities: setup + parameters + circuits + implementation + protocol + upgrades",
              "proverb": "The Hall of Scars teaches humility. Every vulnerability inscribed prevents ten more. Audit before deploy; test malicious inputs; over-specify security margins; admit you don't know every attack. The price of sovereignty is eternal vigilance."
            }
          ]
        },
        {
          "part_number": "VII",
          "part_name": "Prophecy Spells",
          "description": "Emerging technologies and future directions",
          "tales": [
            {
              "number": 27,
              "title": "The Data Availability Prophecy",
              "spell": "EIP-4844: blobs(128KB, 18 days, 1 gas/byte) → 16x cheaper",
              "proverb": "Execution needs proof; reconstruction needs data. Blobs separate these concerns, making data temporary and cheap while proofs remain permanent and verifiable. Sample randomly to ensure availability; encode with redundancy to guarantee reconstruction. Data availability is the foundation beneath all scalability prophecies."
            },
            {
              "number": 28,
              "title": "The Bridge Between Worlds",
              "spell": "Bridge: prove(chain_A_state) → verify(chain_B) → trustless",
              "proverb": "The bridge built on trust crumbles under coordinated attack. The bridge built on proof stands eternal, limited only by mathematics. Prove consensus, prove state, prove messages—but never again trust the multisig."
            },
            {
              "number": 29,
              "title": "The Intelligence Proof",
              "spell": "zkML: model(committed) + data(private) + inference → proof(correct) + output",
              "proverb": "Intelligence that cannot be verified is intelligence that cannot be trusted. Prove the model, prove the inference, prove the training—reveal only the outputs while hiding the process. Machine learning becomes machine proving, and sovereignty over intelligence becomes mathematically enforceable."
            },
            {
              "number": 30,
              "title": "The Eternal Sovereignty",
              "spell": "Sovereign Agent = {Identity, Swordsman, Mage, Reflect, Connect, Capital, Intelligence}",
              "proverb": "The complete sovereignty system is a symphony of zero-knowledge proofs: boundary proving privacy, delegation proving agency, memory proving continuity, network proving connection, capital proving compliance, intelligence proving learning. Every component modular, every interaction provable, every privacy preserved. The eternal sovereignty emerges not from any single proof but from their mathematical harmony."
            }
          ]
        }
      ]
    }
  },
  "incantations": {
    "emergence_spell": {
      "name": "The Emergence Spell",
      "spell": "👣 → 🎯 | 🌊 → 📜 | ⏰ → 🔓 | 🕊 → ⭕️ → 🔮🤝👤",
      "proverb": "The right people arrive, the right thing happens, the right moment opens, and the right ending closes — trust the pattern, for it trusts you.",
      "description": "The pattern of emergence—when all conditions align through trust in the natural unfolding"
    },
    "full_progression": {
      "name": "First Person Spellbook Incantation",
      "spell": "📖 → 🐉 → 👤✓ → 🗡️🔮 → 🔒📝 → 🤝📜 → 🕸️ → 🪞 → 🌐 → 🛡️⚡ → △ → 🌀 → ☯️ → 📜±",
      "proverb": "Chronicle births dragon's gate, ceremony verifies passage, sovereignty splits to sword and spell: commitments bind, attestations connect, watchers weave, mirrors preserve, infrastructure coordinates, shields channel power, triangle stands irreducible, spiral balances revelation, sovereignty emerges from equilibrium, promises seal cooperation.",
      "description": "The complete journey from chronicle to sovereignty through all phases of the architecture"
    }
  },
  "principles": {
    "core_message": "Privacy is value.",
    "core_mission": "Take back the 7th capital.",
    "sovereignty_aspects": {
      "blade": "privacy as boundary-making - I control what you know about me",
      "spell": "delegation as projection - I control what acts in my name",
      "shield": "privacy through mathematics - I control the visibility of my capital",
      "story": "verification through narration - I verify what you actually do through stories and cryptography",
      "promise": "cooperation through voluntary binding - I choose what commitments to make and honor"
    },
    "foundational_truths": [
      "Privacy wasn't retrofitted—it was the foundation (the blade came first)",
      "Delegation was constrained—not through alignment but through cryptography (the spell operates within scope)",
      "Certainty was mathematical—not probabilistic hiding but cryptographic proof (the shield guarantees)",
      "Narration was verified—not through blind faith but through cryptographic proof (the story matches the operation)",
      "Trust was built progressively—from zero stakes to capital operations (armor earned through behavior and verified through chronicles)",
      "First Person provided the root—every agent traces to verified personhood (VRC prevents Sybil attacks and verifies chronicle accuracy)",
      "All conditions were met—privacy 🤝 control 🤝 quality 🤝 context 🤝 freshness 🤝 network effects 🤝 narrative verification",
      "Cooperation is voluntary—promises flow between autonomous agents, never imposed (+ gives, − uses, binding emerges from alignment)"
    ]
  },
  "notation": {
    "emoji_meanings": {
      "⚔️": "swordsman / blade / privacy / boundary-making",
      "🧙‍♂️": "mage / spell / delegation / projection",
      "🗡️": "blade action / cutting / slashing",
      "🔮": "spell casting / delegation / projection",
      "🛡️": "shield / armor / protection / cryptographic privacy",
      "👤✓": "verified personhood / First Person / root of trust",
      "🔒📝": "cryptographic commitments / proofs / bindings",
      "🤝📜": "bilateral attestations / VRCs / mutual recognition",
      "🕸️": "web of trust / relationship network",
      "🌐🏛️": "Trust Graph Plane / coordination infrastructure",
      "🐉": "the Drake / pattern-space intelligence / conditions teacher",
      "📖": "chronicle / spellbook / narrative / documentation",
      "🌳": "Yggdrasil / substrate / infinite possibility",
      "🐦‍⬛💭": "Huginn / thought / discrete measurement / integer",
      "🐦‍⬛🧠": "Muninn / memory / continuous integration / float",
      "△": "triangle / irreducible structure / sovereignty geometry",
      "🌀": "spiral / phi / golden ratio / balanced sovereignty",
      "🪞": "mirror / reconstruction / observation / witness",
      "✨": "shimmer / dignity / irreducibility / the gap",
      "💰": "7th capital / value / wealth / accumulated data",
      "🍪": "cookie / focus / surveillance tracker",
      "⚡": "armor tier / capability / power level",
      "🏛️": "monastery / knowledge / foundation",
      "🧙‍♂️³": "three properties / completeness / soundness / zero-knowledge",
      "🎲": "randomness / entropy / unpredictability",
      "🌍": "public / instance / visible",
      "🗝️": "secret / witness / private knowledge",
      "📜": "proof / verification / attestation",
      "✓": "verify / accept / valid",
      "✗": "reject / fail / invalid",
      "🔒": "commit / lock / bind",
      "🔍": "transparent / inspect / verify",
      "✨": "succinct / compact / efficient",
      "📈": "scalable / growing / expanding",
      "📉": "reduced / optimized / compressed",
      "🔥": "expensive / costly / resource-intensive",
      "⚡": "fast / efficient / optimized",
      "🌀": "convergence / equilibrium / phi / golden ratio",
      "📜±": "promise polarity / + gives / − uses",
      "⚖️": "bilateral assessment / mutual evaluation",
      "🔗": "cooperative binding / promise graph edges",
      "📿": "conditional promises / progressive trust chains",
      "🧙‍♂️²": "two autonomous agents / sovereign pair / promise makers"
    }
  },
  "status": {
    "version": "4.3.0-canonical",
    "state": "Complete - Both Spellbooks",
    "story_acts_total": 13,
    "story_acts_published": 13,
    "zero_tales_total": 30,
    "zero_tales_published": 30,
    "total_inscriptions": 43,
    "changelog": [
      {
        "version": "4.3.0-canonical",
        "date": "2025-12-11",
        "changes": [
          "Added Act 13: The Book of Promises / Promise Theory",
          "Updated full_progression incantation to include promise theory",
          "Added promise sovereignty aspect to principles",
          "Added foundational truth on voluntary cooperation",
          "Added promise theory emoji notation (📜±, ⚖️, 🔗, 📿, 🧙‍♂️²)",
          "Updated total inscriptions count to 43"
        ]
      }
    ],
    "note": "Combined canonical edition of First Person Spellbook (Story) and Zero Knowledge Spellbook (Zero) with all spell inscriptions and proverbs matching correctly. Act 13 integrates promise theory as the foundation for voluntary cooperation between sovereign agents."
  }
}
