poztter.org / components
The pieces of a POZ record.
A POZ record is built from a small number of typed sections. Two are required — the Public Key Map and the Master Zone. The rest are optional zones that the Master delegates authority over, each governed independently.
0x0001 — root authority] K[Public Key Map
0x0000] M -.references.-> K IA[Identity Authority
0x0010] --> IZ[Identity Zone
0x0011] FA[Feed Authority
0x0020] --> FZ[Public Feed Zone
0x0021] EA[Email Authority
0x0030] --> EZ[Email Zone
0x0031] AA[Auth Authority
0x0040] --> AZ[Auth Zone
0x0041] SA[Service Authority
0x0050] --> SZ[Service Zone
0x0051] M -- delegates --> IA M -- delegates --> FA M -- delegates --> EA M -- delegates --> AA M -- delegates --> SA
required
Every key the record uses, identified by SHA-3 hash. All other sections refer to keys by index here, not by value.
ReadThe root. Defines which keys control the record itself and which keys are delegated authority over each sub-zone. Hash-chained.
Readmodels
How modification thresholds work. Groups, values, the ≥100 rule, and how to configure recovery without a single point of failure.
ReadGrant and deny thresholds, evaluated independently. The asymmetry that makes fast revocation and deliberate authorization both natural.
Readzones
Bindings between handles on centralized providers and your POZ record. Two-phase activation. Independently signed entries.
ReadNamed feeds with multiple posting chains for resilience. Posts live on feed servers; the zone holds anchors and checkpoints.
ReadGUID-addressed inboxes with end-to-end encryption keys and verifiable conversation chains. Messages reference inboxes by GUID, never name.
ReadTrust groups of fixed sizes (BASIC=2, STANDARD=4, SECURE=8). Sites declare a required size; users decide which keys go in each group.
ReadWhere servers are. Pools of hosts with priority and weight, plus the CA key that signed each server's certificate. Other zones reference services by hash.
ReadThree ports, one wire format. Plaintext queries, Noise NK private queries, and Noise NK record submission. Adaptive proof-of-work for DoS resistance.
Readinternal sections
Optional. When present, private keys should be encrypted at rest. Records distributed to third parties should not include this section.
Optional snapshots or diffs of past zone revisions for compact history storage.
Optional human-readable labels for keys ("Hardware Token", "Family Recovery"). Informational only.