Disclosures

Responsibility precedes capability.
Research standards, methodology, governance, and verification.

Research

Rigour as institutional obligation.


We believe in responsibility — that is why we established binding house rules for our work, making academic standards more explicit for the domains we operate in. We see the necessity to raise precision across the field — in our own work first, and in public discourse and institutional analysis equally. This is a responsibility that comes with the diagnostic capability.

Every structural claim applies only under explicitly defined scope conditions. Every inferential step is stated and justified. We check our own premises against established frameworks before extending the field. Where critique surfaces, it becomes a reason to increase precision. Where ambiguity remains, we state the boundary — incomplete analysis is disclosed, scope is limited explicitly.

Necessary, sufficient, dominant, and correlational relations are distinguished at every step. Structural failure conditions are identified for every model. Each core proposition includes defined revision criteria. Where a derivation diverges from canonical theory, bilateral condition review is triggered — convergence is treated as structural alignment, as reason to verify and sharpen. Weaknesses are disclosed.

We reconstruct conditions. We value structured disagreement — critique on factual or methodological grounds strengthens the diagnostic foundation. Substantiated critique triggers structured review and, where warranted, revision.

Methodology

Layer separation as methodological requirement.


We diagnose. We build analytical architectures. And we keep the layers apart — deliberately.

The foundational ontology (NP/NPM), the doctrinal framework (NWDC), the empirical taxonomy (NRC), and the decision architecture (Aegis ICAM) are separate instruments. Analysis feeds doctrine. Doctrine informs application. Application logic traces back to the diagnostic layer — it remains structurally intact throughout.

This separation exists because conflating layers produces conclusions that lose their auditability against their premises. Every output traces to a specific layer, a specific method, and a specific evidence base. Where normative positions are present, they are explicitly marked. Structural diagnosis is separated from political endorsement. LLMs are used for translations.

Governance

Binding instruments, advisory oversight, and structured review.


The standards described in Research and Methodology are codified in two governing instruments. Both are subject to advisory oversight and structured review.

Governance Framework for Research Rigor and Institutional Responsibility

Defines binding standards for all research and applied analysis — including foundational epistemic principles, the layered research architecture, operational application standards, and version control.

⇣ Download Governance Framework ⇣

House Rules of Rigor and Responsibility

Codifies conditionality, falsifiability, modal discipline, canonical symmetry, weakness disclosure, and the separation of analysis from advocacy.

⇣ Download House Rules ⇣

Security

Document integrity, cryptographic verification, and secure communication.


Security is a foundational concern at DURCHD8. For security-related enquiries: moc.81774558082dhcru1774558082d@ces1774558082

DURCHD8 operates its own private PKI for document signing and timestamping, governed by a formal Certificate Policy and Certification Practice Statement (RFC 3647, ETSI EN 319 421/422 aligned).

⇣ Certificate Policy ⇣

⇣ Certification Practice Statement ⇣

Certificate Architecture

Three-tier hierarchy: Root CA (RSA 4096, offline vault, four-eyes access) → Signing CA (RSA 3072) → End-Entity certificates. Parallel TSA CA (RSA 3072) for RFC 3161 timestamps. End-entity certificates rotate automatically with documented overlap. CRLs refresh daily.

Document Verification

Every formal publication receives a detached CMS signature (CAdES-BES/T) and an RFC 3161 timestamp. Signed artefacts include the signature (.p7s), timestamp request/response (.tsq/.tsr/.tst), and a JSON manifest with hashes, fingerprints, and policy OIDs. Recipients verify against the published CA chain and TSA certificates.

Public Repository

Certificates, CRLs, SHA-256 manifests, and policy documents:

⇣ https://durchd8.com/.well-known/pki/ ⇣

DNSSEC

Active. Certificate hashes are additionally anchored in DNSSEC-signed DNS TXT records under `_pki_sha256.*` for independent verification.

Status: fully operational 

Request a Briefing

Structured engagement starts with context.


Every engagement begins with a briefing — a focused exchange to establish context, scope, and relevance. Strategic, corporate, NGO/donor, or editorial. Secure channels available from first contact. Learn more →