Trust Operating Layer — Version 1.0

Security
made visible.
Trust made provable.

OLIVIUM is the trust operating layer for digital systems. We make data flows visible to the people whose data it actually is. Most companies sell opacity. We sell transparency.

Constitution
v1.0
Public Audit
Weekly
Built By
Law Pocket Inc.
§ I — Founding Principles

Five things we promise. Publicly.

i.

Only the right people see the right data

Jurisdiction Guard · Matter Isolation

Every access is checked against geography, organization, role, and matter. Not by an application that might forget. By the database itself.

ii.

Every action is permanently recorded

Immutable Audit · SHA-256 Hash-Chained

Append-only audit trail. No updates. No deletes. Tampering is mathematically detectable. The audit trail is not editable by anyone, including us.

iii.

The system protects itself automatically

Dead-Man Switch · Session Expiry · Key Rotation

Sessions expire. Devices lose trust over time. Keys rotate on schedule. Suspicious behavior triggers lockouts without waiting for human review.

iv.

Even administrators can't see private information

Role Blindness · Database-Level RLS

Permissions are enforced at the database. The application doesn't decide what you can see. The data decides. Administrators see exactly what their role allows, no more.

v.

Documents are cryptographically stamper-proof

Evidence Sealing · OLIVIUM Seal Chain

Every document is hashed and timestamped at creation. The chain of custody is mathematical. Tampering breaks the chain visibly. Court-admissible by design.

§ II — Constitution

Most companies have guidelines. We have law.

Tables are law. Functions are enforcement. AI is the voice, not the authority.

OLIVIUM operates under a written constitution. Ten inviolable rules that no agent and no user can override. Amendments require a seven-day waiting period and public ratification. The constitution is published. Violation attempts are logged. Enforcement is mathematical, not aspirational.

CR-002

Minor Data Protection

Data belonging to users under 18 is never used for behavioral profiling, advertising, third-party sharing, or algorithmic recommendation optimization.

CR-003

Append-Only Audit

The audit trail accepts INSERT only. UPDATE and DELETE are blocked by database triggers. Records are SHA-256 chained.

CR-006

Client Isolation

Each client receives dedicated infrastructure: Supabase project, knowledge base, storage bucket. Cross-client access is forbidden by configuration, not by intention.

CR-009

GUARDIAN Veto Authority

GUARDIAN holds constitutional veto power over any feature affecting users under 18. Vetoes are logged publicly. Overrides require multi-party review and a five-day waiting period.

CR-010

Public Truth Reporting

Weekly audit metrics are published to the trust center. Historical reports are immutable. Unflattering metrics are not softened. Pressure to alter reports is logged and refused.

+ 5 more

Full constitution published

Read all ten rules at the trust center →

§ III — Commercial Tiers

Choose how much trust you need.

Base
$200/mo
  • Auth hardening (Supabase RLS)
  • Role-based permissions (6 default roles)
  • Immutable audit trail
  • File access controls
  • Included in every project
Shield
$1500/mo
  • Everything in Secure
  • Live security console (Shield dashboard)
  • Anomaly detection
  • Lockout flows + automatic response
  • Public trust center for your clients
  • Dedicated incident response
  • Monthly security report
Public Trust Center

We publish our scars.

Every week we publish constitutional violation attempts, GUARDIAN vetoes, citation rates, isolation verification status, and DSR fulfillment metrics. Historical reports cannot be edited. Unflattering numbers are not hidden.

v1.0
Constitution
10
Inviolable Rules
Historical Reports
0
Reports Ever Edited
Visit Trust Center →