
DURCHD8
Disclosures

Research
Research methodology as institutional obligation.
All structural claims, formal derivations, and published analyses issued under DURCHD8 are governed by the House Rules of Rigor and Responsibility. The following principles are codified and binding:
- Conditionality: Every claim applies only under explicitly defined scope conditions.
- Explicit Derivation: All inferential steps are stated and justified. No implicit transitions.
- Modal Discipline: Necessary, sufficient, dominant, and correlational relations are distinguished at every step.
- Falsifiability: Each core proposition includes defined revision criteria.
- Canonical Symmetry: Divergence from canonical theory triggers bilateral condition review. Convergence functions as structural alignment, not proof by authority.
- Collapse Specification: Structural failure conditions are identified for every model.
- Weakness Disclosure: Identified conceptual or definitional weaknesses are explicitly acknowledged. Incomplete analysis is disclosed; scope is limited explicitly.
- Analysis ≠ Advocacy: Structural diagnosis is separated from political endorsement. Normative positions, where present, are explicitly marked.
Substantiated critique triggers structured review and, where warranted, revision.
Methodology
Layer separation as methodological requirement.
We diagnose. We build analytical architectures. And we keep the layers apart — deliberately.
The foundational ontology (NP/NPM), the doctrinal framework (NWDC), the empirical taxonomy (NRC), and the decision architecture (Aegis ICAM) are separate instruments. Analysis feeds doctrine. Doctrine informs application. Application logic traces back to the diagnostic layer — it remains structurally intact throughout.
This separation exists because conflating layers produces conclusions that lose their auditability against their premises. Every output traces to a specific layer, a specific method, and a specific evidence base. Where normative positions are present, they are explicitly marked. Structural diagnosis is separated from political endorsement.
Governance
Binding instruments, advisory oversight, and structured review.
The standards described in Research and Methodology are codified in two governing instruments. Both are subject to advisory oversight and structured review.
Governance Framework for Research Rigor and Institutional Responsibility
Defines binding standards for all research and applied analysis — including foundational epistemic principles, the layered research architecture, operational application standards, and version control.
⇣ Download Governance Framework ⇣
House Rules of Rigor and Responsibility
Codifies conditionality, falsifiability, modal discipline, canonical symmetry, weakness disclosure, and the separation of analysis from advocacy.
Security
Document integrity, cryptographic verification, and secure communication.
Security is a foundational concern at DURCHD8. For security-related enquiries: moc.81776250324dhcru1776250324d@ces1776250324
DURCHD8 operates its own private PKI for document signing and timestamping, governed by a formal Certificate Policy and Certification Practice Statement (RFC 3647, ETSI EN 319 421/422 aligned).
⇣ Certification Practice Statement ⇣
Certificate Architecture
Three-tier hierarchy: Root CA (RSA 4096, offline vault, four-eyes access) → Signing CA (RSA 3072) → End-Entity certificates. Parallel TSA CA (RSA 3072) for RFC 3161 timestamps. End-entity certificates rotate automatically with documented overlap. CRLs refresh daily.
Document Verification
Every formal publication receives a detached CMS signature (CAdES-BES/T) and an RFC 3161 timestamp. Signed artefacts include the signature (.p7s), timestamp request/response (.tsq/.tsr/.tst), and a JSON manifest with hashes, fingerprints, and policy OIDs. Recipients verify against the published CA chain and TSA certificates.
Public Repository
Certificates, CRLs, SHA-256 manifests, and policy documents:
https://durchd8.com/.well-known/pki/
DNSSEC
Active. Certificate hashes are additionally anchored in DNSSEC-signed DNS TXT records under `_pki_sha256.*` for independent verification.